首页 > 最新文献

Computer Networks最新文献

英文 中文
Efficient smart home message verification protocol based on Chebyshev chaotic mapping 基于切比雪夫混沌映射的高效智能家居消息验证协议
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-20 DOI: 10.1016/j.comnet.2026.112033
Vincent Omollo Nyangaresi , Mohd Shariq , Daisy Nyang’anyi Ondwari , Muhammad Shafiq , Khalid Alsubhi , Mehedi Masud
Smart home networks deploy a myriad of sensors and intelligent devices to collect and disseminate massive and sensitive data, facilitating task automation for enhancing comfort, quality of life, efficiency, and sustainability. However, the utilization of public channels for interactions between users and smart home devices raises serious privacy and security issues. Numerous authentication schemes have been proposed in recent literature; most of them are prone to security attacks, including offline guessing, privileged insiders, and impersonation. In addition, some of them have complicated architectures that result in high resource consumption. In this paper, efficient Chebyshev polynomials and hashing functions are leveraged to develop a robust authentication protocol for smart homes. The Burrows–Abadi–Needham (BAN) logic-based detailed formal security analysis confirms the robustness of the joint authentication and key negotiation procedures. In addition, informal security analysis shows that the proposed protocol is secure against the Dolev-Yao (D-Y) and Canetti and Krawczyk (C-K) adversary models, mitigating several known security attacks. In terms of performance, the developed scheme incurs relatively low computation, energy, and communication costs.
智能家居网络部署了无数的传感器和智能设备来收集和传播大量敏感数据,促进任务自动化,以提高舒适度、生活质量、效率和可持续性。然而,利用公共渠道进行用户和智能家居设备之间的交互会引发严重的隐私和安全问题。在最近的文献中提出了许多认证方案;它们中的大多数都容易受到安全攻击,包括离线猜测、特权内部人员和冒充。此外,它们中的一些具有复杂的体系结构,从而导致高资源消耗。在本文中,利用高效的切比雪夫多项式和哈希函数来开发智能家居的鲁棒认证协议。基于Burrows-Abadi-Needham (BAN)逻辑的详细形式化安全分析证实了联合认证和密钥协商程序的鲁棒性。此外,非正式的安全分析表明,提议的协议对Dolev-Yao (D-Y)和Canetti和Krawczyk (C-K)对手模型是安全的,减轻了几种已知的安全攻击。在性能方面,本方案的计算、能量和通信成本相对较低。
{"title":"Efficient smart home message verification protocol based on Chebyshev chaotic mapping","authors":"Vincent Omollo Nyangaresi ,&nbsp;Mohd Shariq ,&nbsp;Daisy Nyang’anyi Ondwari ,&nbsp;Muhammad Shafiq ,&nbsp;Khalid Alsubhi ,&nbsp;Mehedi Masud","doi":"10.1016/j.comnet.2026.112033","DOIUrl":"10.1016/j.comnet.2026.112033","url":null,"abstract":"<div><div>Smart home networks deploy a myriad of sensors and intelligent devices to collect and disseminate massive and sensitive data, facilitating task automation for enhancing comfort, quality of life, efficiency, and sustainability. However, the utilization of public channels for interactions between users and smart home devices raises serious privacy and security issues. Numerous authentication schemes have been proposed in recent literature; most of them are prone to security attacks, including offline guessing, privileged insiders, and impersonation. In addition, some of them have complicated architectures that result in high resource consumption. In this paper, efficient Chebyshev polynomials and hashing functions are leveraged to develop a robust authentication protocol for smart homes. The Burrows–Abadi–Needham (BAN) logic-based detailed formal security analysis confirms the robustness of the joint authentication and key negotiation procedures. In addition, informal security analysis shows that the proposed protocol is secure against the Dolev-Yao (D-Y) and Canetti and Krawczyk (C-K) adversary models, mitigating several known security attacks. In terms of performance, the developed scheme incurs relatively low computation, energy, and communication costs.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112033"},"PeriodicalIF":4.6,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A platform perspective for the computing continuum: Synergetic orchestration of compute and network resources for hyper-distributed applications 计算连续体的平台视角:超分布式应用程序的计算和网络资源的协同编排
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-17 DOI: 10.1016/j.comnet.2026.112029
Nikos Filinis , Ioannis Dimolitsas , Dimitrios Spatharakis , Paolo Bono , Anastasios Zafeiropoulos , Cristina Emilia Costa , Roberto Bruschi , Symeon Papavassiliou
The rapid advancements in technologies across the Computing Continuum have reinforced the need for the interplay of various network and compute orchestration mechanisms within distributed infrastructure architectures to support the hyper-distributed application (HDA) deployments. A unified approach to managing heterogeneous components is crucial for reconciling conflicting objectives and creating a synergetic framework. To undertake these challenges, we present NEPHELE, a platform that realizes a hierarchical multi-layered orchestration architecture that incorporates infrastructure and application orchestration workflows across diverse resource management layers. The proposed platform integrates well-defined components spanning network and multi-cluster compute domains to enable intent-driven, dynamic orchestration. At its core, the Synergetic Meta-Orchestrator (SMO) integrates diverse application requirements, generating deployment plans by interfacing with underlying orchestrators over distributed compute and network infrastructure. In the current work, we present the NEPHELE architecture, enumerate its interaction workflows, and evaluate key components of the overall architecture based on the instantiation and usage of the NEPHELE platform. The platform is evaluated in a multi-domain infrastructure setup to assess the operational overhead of the introduced orchestration functionality, considering also the assessment of different topology configurations on resource instantiation times and allocation dynamics, and network latency. Finally, we demonstrate the platform’s effectiveness in orchestrating distributed application graphs under varying placement intents, performance constraints, and workload stress conditions. The evaluation results outline the effectiveness of NEPHELE in orchestrating various infrastructure layers and application lifecycle scenarios through a unified interface.
计算连续体技术的快速发展加强了对分布式基础设施体系结构中各种网络和计算编排机制的相互作用的需求,以支持超分布式应用程序(HDA)部署。管理异构组件的统一方法对于协调冲突的目标和创建协同框架至关重要。为了应对这些挑战,我们提出了NEPHELE,这是一个实现分层多层编排架构的平台,它将跨不同资源管理层的基础设施和应用程序编排工作流结合在一起。提出的平台集成了跨网络和多集群计算域的定义良好的组件,以实现意图驱动的动态编排。协同元协调器(SMO)的核心是集成各种应用程序需求,通过与分布式计算和网络基础设施上的底层协调器接口生成部署计划。在当前的工作中,我们提出了NEPHELE体系结构,列举了它的交互工作流,并基于NEPHELE平台的实例化和使用评估了整个体系结构的关键组件。在多域基础设施设置中对平台进行评估,以评估引入的编排功能的操作开销,同时考虑对资源实例化时间和分配动态以及网络延迟的不同拓扑配置的评估。最后,我们演示了该平台在不同放置意图、性能约束和工作负载压力条件下编排分布式应用程序图的有效性。评估结果概述了NEPHELE通过统一接口编排各种基础设施层和应用程序生命周期场景的有效性。
{"title":"A platform perspective for the computing continuum: Synergetic orchestration of compute and network resources for hyper-distributed applications","authors":"Nikos Filinis ,&nbsp;Ioannis Dimolitsas ,&nbsp;Dimitrios Spatharakis ,&nbsp;Paolo Bono ,&nbsp;Anastasios Zafeiropoulos ,&nbsp;Cristina Emilia Costa ,&nbsp;Roberto Bruschi ,&nbsp;Symeon Papavassiliou","doi":"10.1016/j.comnet.2026.112029","DOIUrl":"10.1016/j.comnet.2026.112029","url":null,"abstract":"<div><div>The rapid advancements in technologies across the Computing Continuum have reinforced the need for the interplay of various network and compute orchestration mechanisms within distributed infrastructure architectures to support the hyper-distributed application (HDA) deployments. A unified approach to managing heterogeneous components is crucial for reconciling conflicting objectives and creating a synergetic framework. To undertake these challenges, we present NEPHELE, a platform that realizes a hierarchical multi-layered orchestration architecture that incorporates infrastructure and application orchestration workflows across diverse resource management layers. The proposed platform integrates well-defined components spanning network and multi-cluster compute domains to enable intent-driven, dynamic orchestration. At its core, the Synergetic Meta-Orchestrator (SMO) integrates diverse application requirements, generating deployment plans by interfacing with underlying orchestrators over distributed compute and network infrastructure. In the current work, we present the NEPHELE architecture, enumerate its interaction workflows, and evaluate key components of the overall architecture based on the instantiation and usage of the NEPHELE platform. The platform is evaluated in a multi-domain infrastructure setup to assess the operational overhead of the introduced orchestration functionality, considering also the assessment of different topology configurations on resource instantiation times and allocation dynamics, and network latency. Finally, we demonstrate the platform’s effectiveness in orchestrating distributed application graphs under varying placement intents, performance constraints, and workload stress conditions. The evaluation results outline the effectiveness of NEPHELE in orchestrating various infrastructure layers and application lifecycle scenarios through a unified interface.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112029"},"PeriodicalIF":4.6,"publicationDate":"2026-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TrafficCL: Contrastive learning on network traffic for accurate, efficient and robust IP cross-regional detection TrafficCL:基于网络流量的对比学习,实现准确、高效、鲁棒的IP跨区域检测
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-16 DOI: 10.1016/j.comnet.2026.112022
Yiyang Huang , Mingxin Cui , Gaopeng Gou , Chang Liu , Yong Wang , Bing Xia , Guoming Ren , Zheyuan Gu , Xiyuan Zhang , Gang Xiong
Dynamic IP technologies such as IP address pool rotation by Internet operators and elastic IP drift by cloud service providers are widely adopted, breaking the static binding between IP addresses and geographical locations and posing severe challenges to the accuracy, efficiency, and robustness of IP cross-regional detection. Traditional solutions rely on third-party IP geolocation databases, whose large-scale batch update mode fails to synchronize IP regional attribution in a timely manner, struggling to adapt to dynamic IP changes. This results in insufficient detection accuracy and efficiency, compromising the stability of geographically related network services. To address this issue, this paper proposes TrafficCL, a traffic feature-based IP cross-regional detection method: it constructs a geographically associated traffic feature set, aligns traffic embedding distance with geographical distance via contrastive learning to enhance geographical attributes, integrates data augmentation to improve model robustness, designs a lightweight binary classification task for regional deviation detection, and adopts a targeted update strategy to avoid large-scale update latency. Experimental results show that TrafficCL significantly outperforms the active probing method PoP: on the Beijing cross-district dataset, the accuracy increases from 0.781 to 0.982, the F1-score improves by 2.2 times, and the processing efficiency for ten-thousand-level samples is enhanced by 23.6 times. When facing 10 % data loss, 10 % network feature fluctuation, and a positional offset of approximately 500 m, the F1-score degradation is less than 3 % in all cases, demonstrating excellent robustness. This method effectively improves the accuracy, efficiency, and robustness of IP cross-regional detection, and has practical significance for ensuring the stability of geographically related network services.
互联网运营商的IP地址池轮换、云服务提供商的弹性IP漂移等动态IP技术被广泛采用,打破了IP地址与地理位置之间的静态绑定,对IP跨区域检测的准确性、高效性和鲁棒性提出了严峻挑战。传统解决方案依赖第三方IP地理定位数据库,其大规模批量更新方式无法及时同步IP区域归属,难以适应IP动态变化。这导致检测精度和效率不足,影响地理相关网络业务的稳定性。针对这一问题,本文提出了基于流量特征的IP跨区域检测方法TrafficCL:构建地理关联的交通特征集,通过对比学习将交通嵌入距离与地理距离对齐增强地理属性,集成数据增强提高模型鲁棒性,设计轻量级二值分类任务进行区域偏差检测,采用针对性更新策略避免大规模更新延迟。实验结果表明,TrafficCL显著优于主动探测方法PoP:在北京跨区域数据集上,准确率从0.781提高到0.982,f1得分提高2.2倍,万级样本处理效率提高23.6倍。当面对10%的数据丢失、10%的网络特征波动和大约500 m的位置偏移时,f1分数在所有情况下的退化都小于3%,表现出出色的鲁棒性。该方法有效提高了IP跨区域检测的准确性、效率和鲁棒性,对保障地理相关网络业务的稳定性具有实际意义。
{"title":"TrafficCL: Contrastive learning on network traffic for accurate, efficient and robust IP cross-regional detection","authors":"Yiyang Huang ,&nbsp;Mingxin Cui ,&nbsp;Gaopeng Gou ,&nbsp;Chang Liu ,&nbsp;Yong Wang ,&nbsp;Bing Xia ,&nbsp;Guoming Ren ,&nbsp;Zheyuan Gu ,&nbsp;Xiyuan Zhang ,&nbsp;Gang Xiong","doi":"10.1016/j.comnet.2026.112022","DOIUrl":"10.1016/j.comnet.2026.112022","url":null,"abstract":"<div><div>Dynamic IP technologies such as IP address pool rotation by Internet operators and elastic IP drift by cloud service providers are widely adopted, breaking the static binding between IP addresses and geographical locations and posing severe challenges to the accuracy, efficiency, and robustness of IP cross-regional detection. Traditional solutions rely on third-party IP geolocation databases, whose large-scale batch update mode fails to synchronize IP regional attribution in a timely manner, struggling to adapt to dynamic IP changes. This results in insufficient detection accuracy and efficiency, compromising the stability of geographically related network services. To address this issue, this paper proposes TrafficCL, a traffic feature-based IP cross-regional detection method: it constructs a geographically associated traffic feature set, aligns traffic embedding distance with geographical distance via contrastive learning to enhance geographical attributes, integrates data augmentation to improve model robustness, designs a lightweight binary classification task for regional deviation detection, and adopts a targeted update strategy to avoid large-scale update latency. Experimental results show that TrafficCL significantly outperforms the active probing method PoP: on the Beijing cross-district dataset, the accuracy increases from 0.781 to 0.982, the F1-score improves by 2.2 times, and the processing efficiency for ten-thousand-level samples is enhanced by 23.6 times. When facing 10 % data loss, 10 % network feature fluctuation, and a positional offset of approximately 500 m, the F1-score degradation is less than 3 % in all cases, demonstrating excellent robustness. This method effectively improves the accuracy, efficiency, and robustness of IP cross-regional detection, and has practical significance for ensuring the stability of geographically related network services.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112022"},"PeriodicalIF":4.6,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LCC-AKA: Lightweight certificateless cross-domain authentication key agreement protocol for IoT devices LCC-AKA:物联网设备的轻量级无证书跨域认证密钥协议
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-16 DOI: 10.1016/j.comnet.2026.112018
Yingjie Cai , Tianbo Lu , Jiaze Shang , Yanfang Li , Qitai Gong , Hanrui Chen
Authentication key agreement (AKA) protocol is an effective method for achieving secure communication between Internet of Things (IoT) devices. However, existing public key infrastructure-based and identity-based AKA protocols face limitations due to complex certificate management and key escrow issues. Furthermore, cross-domain communication is a fundamental requirement for IoT. However, current solutions addressing this challenge rely on trusted third parties, which undoubtedly increases the communication overhead and system complexity during the authentication phase. To address these challenges, we propose a new provably secure lightweight certificateless cross-domain authentication key agreement protocol (LCC-AKA). By introducing a certificateless public key cryptographic mechanism during the registration phase, we eliminate the need for complex certificate management and the limitations of key escrow, while also preventing insider attacks even under the semi-honest Key Generation Center (KGC) assumption. In the cross-domain authentication key agreement phase, we present a mechanism that enables direct cross-domain authentication and key agreement between devices without relying on trusted third parties, utilizing lightweight elliptic curve and hash function operations to achieve efficiency. In terms of security, we analyze the security vulnerabilities of existing certificateless cross-domain AKA schemes and extend the Real-Or-Random (ROR) model. The LCC-AKA protocol is provably secure under the extended ROR model and BAN logic. Security and performance analyses demonstrate that the LCC-AKA protocol can resist both insider and outsider attacks, including public key replacement attacks, while maintaining low computational and communication overhead.
认证密钥协议(AKA)是实现物联网设备间安全通信的有效方法。然而,由于复杂的证书管理和密钥托管问题,现有的基于公共密钥基础设施和基于身份的AKA协议面临限制。此外,跨域通信是物联网的基本要求。然而,解决这一挑战的当前解决方案依赖于受信任的第三方,这无疑增加了身份验证阶段的通信开销和系统复杂性。为了解决这些挑战,我们提出了一种新的可证明安全的轻量级无证书跨域认证密钥协议(LCC-AKA)。通过在注册阶段引入无证书公钥加密机制,我们消除了对复杂证书管理的需要和密钥托管的限制,同时即使在半诚实的密钥生成中心(KGC)假设下也可以防止内部攻击。在跨域认证密钥协议阶段,我们提出了一种机制,可以在不依赖可信第三方的情况下实现设备之间的直接跨域认证和密钥协议,利用轻量级椭圆曲线和哈希函数操作来实现效率。在安全性方面,我们分析了现有无证书跨域AKA方案的安全漏洞,并扩展了Real-Or-Random (ROR)模型。在扩展的ROR模型和BAN逻辑下,证明了LCC-AKA协议的安全性。安全性和性能分析表明,lc - aka协议可以抵抗内部和外部攻击,包括公钥替换攻击,同时保持较低的计算和通信开销。
{"title":"LCC-AKA: Lightweight certificateless cross-domain authentication key agreement protocol for IoT devices","authors":"Yingjie Cai ,&nbsp;Tianbo Lu ,&nbsp;Jiaze Shang ,&nbsp;Yanfang Li ,&nbsp;Qitai Gong ,&nbsp;Hanrui Chen","doi":"10.1016/j.comnet.2026.112018","DOIUrl":"10.1016/j.comnet.2026.112018","url":null,"abstract":"<div><div>Authentication key agreement (AKA) protocol is an effective method for achieving secure communication between Internet of Things (IoT) devices. However, existing public key infrastructure-based and identity-based AKA protocols face limitations due to complex certificate management and key escrow issues. Furthermore, cross-domain communication is a fundamental requirement for IoT. However, current solutions addressing this challenge rely on trusted third parties, which undoubtedly increases the communication overhead and system complexity during the authentication phase. To address these challenges, we propose a new provably secure lightweight certificateless cross-domain authentication key agreement protocol (LCC-AKA). By introducing a certificateless public key cryptographic mechanism during the registration phase, we eliminate the need for complex certificate management and the limitations of key escrow, while also preventing insider attacks even under the semi-honest Key Generation Center (KGC) assumption. In the cross-domain authentication key agreement phase, we present a mechanism that enables direct cross-domain authentication and key agreement between devices without relying on trusted third parties, utilizing lightweight elliptic curve and hash function operations to achieve efficiency. In terms of security, we analyze the security vulnerabilities of existing certificateless cross-domain AKA schemes and extend the Real-Or-Random (ROR) model. The LCC-AKA protocol is provably secure under the extended ROR model and BAN logic. Security and performance analyses demonstrate that the LCC-AKA protocol can resist both insider and outsider attacks, including public key replacement attacks, while maintaining low computational and communication overhead.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112018"},"PeriodicalIF":4.6,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ControlShard: A cross-shard transaction processing method based on congestion control strategy ControlShard:一种基于拥塞控制策略的跨分片事务处理方法
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-16 DOI: 10.1016/j.comnet.2026.112028
Junfeng Tian, Yuyang Zhao, Jin Tian
Sharding technology significantly enhances blockchain performance by dividing nodes into multiple groups to propose blocks in parallel. However, cross-shard transactions require timely communication between shards to ensure information consistency, which has a great impact on the performance of sharded blockchains. To address this challenge, we propose ControlShard, which builds shards specifically for cross-shard transactions and allows users to have different account status in different shards, further reducing communication overhead. ControlShard allows multiple blocks to be committed in a single consensus round and employs a congestion control strategy to determine the maximum number of blocks suitable for the current network conditions. Additionally, ControlShard employs a pipelining strategy to further enhance parallel processing capabilities. We implemented a system prototype and evaluated its performance using real Ethereum transactions. Under the experimental conditions specified in this paper, ControlShard outperforms existing advanced solutions in terms of throughput and transaction confirmation latency, achieving a throughput up to 2.2 times that of BrokerChain and 4.1 times that of Monoxide.
Sharding技术通过将节点分成多组并行提出区块,显著提高区块链的性能。但是,跨分片交易需要分片之间及时通信,以保证信息的一致性,这对分片区块链的性能影响很大。为了应对这一挑战,我们提出了ControlShard,它专门为跨分片事务构建分片,并允许用户在不同的分片中拥有不同的帐户状态,进一步减少通信开销。ControlShard允许在单个共识轮中提交多个块,并采用拥塞控制策略来确定适合当前网络条件的最大块数量。此外,ControlShard采用流水线策略来进一步增强并行处理能力。我们实现了一个系统原型,并使用真实的以太坊交易评估了其性能。在本文规定的实验条件下,ControlShard在吞吐量和交易确认延迟方面优于现有的先进解决方案,吞吐量高达BrokerChain的2.2倍,是一氧化碳的4.1倍。
{"title":"ControlShard: A cross-shard transaction processing method based on congestion control strategy","authors":"Junfeng Tian,&nbsp;Yuyang Zhao,&nbsp;Jin Tian","doi":"10.1016/j.comnet.2026.112028","DOIUrl":"10.1016/j.comnet.2026.112028","url":null,"abstract":"<div><div>Sharding technology significantly enhances blockchain performance by dividing nodes into multiple groups to propose blocks in parallel. However, cross-shard transactions require timely communication between shards to ensure information consistency, which has a great impact on the performance of sharded blockchains. To address this challenge, we propose ControlShard, which builds shards specifically for cross-shard transactions and allows users to have different account status in different shards, further reducing communication overhead. ControlShard allows multiple blocks to be committed in a single consensus round and employs a congestion control strategy to determine the maximum number of blocks suitable for the current network conditions. Additionally, ControlShard employs a pipelining strategy to further enhance parallel processing capabilities. We implemented a system prototype and evaluated its performance using real Ethereum transactions. Under the experimental conditions specified in this paper, ControlShard outperforms existing advanced solutions in terms of throughput and transaction confirmation latency, achieving a throughput up to 2.2 times that of BrokerChain and 4.1 times that of Monoxide.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112028"},"PeriodicalIF":4.6,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CATER: Congestion aware trust-enabled routing for energy-constrained wireless sensor networks 面向能量受限无线传感器网络的拥塞感知可信路由
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-15 DOI: 10.1016/j.comnet.2026.112030
Mahendra Kumar Jangir , Karan Singh , Tayyab Khan , Ali Ahmadian
Wireless Sensor Networks (WSNs) are essential in modern applications like environmental monitoring, industrial automation, and security. However, they suffer from pivotal issues of internal threats, congestion, and power constraint, crippling their efficiency and reliability. These threats include data manipulation and congestion, which degrade network performance. Addressing these challenges is crucial to ensure WSNs can maintain reliable operation while effectively managing energy resources and combating malicious activities. Thus, to address these limitations, this paper introduces CATER (Congestion Aware Trust-Enabled Routing), a new trust-based congestion-aware energy-constrained routing protocol for WSNs. CATER's primary contributions are: (1) an end-to-end multi-dimension trust evaluation model consisting of direct trust, indirect trust, energy trust, and an expected positive probability trust model for robust trust estimation; (2) an adaptive congestion control model for dynamically adjusting transmission rates according to real-time network status using the buffer capacity and queue length as variables; and (3) a trust-enabled routing module performing secure and efficient data transmission employing trusted sensor node selection. After trust evaluation, the proposed CATER protocol detects the congestion in the WSN. The congestion is detected using buffer capacity and queue length at a sensor node. Once congestion is detected at a node, the congested node sends a feedback message to the neighbor (source) node to optimize the transmission rate. The proposed CATER protocol always selects energy-efficient and trustworthy next-hop to transfer available data packets toward the sink. MATLAB simulations readily verify that CATER improves energy efficiency by 15.82%, packet drop ratio by 46.95%, and decreases end-to-end delay by 31.81% compared to other state-of-the-art existing routing protocols like CHicDra and SEFR. CATER also improves network throughput and packet delivery ratio (PDR) even in over-loaded and adversarial environments up to 50% adversarial nodes. The findings conclusively demonstrate CATER to be a very effective tool for providing efficient, reliable, and congestion-aware routing for WSNs with profound implications for real-world industrial and IoT applications.
无线传感器网络(wsn)在环境监测、工业自动化和安全等现代应用中至关重要。然而,它们受到内部威胁、拥塞和功率限制等关键问题的困扰,削弱了它们的效率和可靠性。这些威胁包括数据操纵和拥塞,它们会降低网络性能。解决这些挑战对于确保wsn能够在有效管理能源资源和打击恶意活动的同时保持可靠运行至关重要。因此,为了解决这些限制,本文引入了一种新的基于信任的wsn拥塞感知能量约束路由协议CATER(拥塞感知可信路由)。主要贡献有:(1)建立了由直接信任、间接信任、能量信任组成的端到端多维信任评估模型,并建立了期望正概率信任模型进行鲁棒性信任估计;(2)以缓冲区容量和队列长度为变量,根据实时网络状态动态调整传输速率的自适应拥塞控制模型;(3)采用可信传感器节点选择实现安全高效数据传输的可信路由模块。该协议经过信任评估后,检测WSN中的拥塞情况。使用传感器节点上的缓冲区容量和队列长度来检测拥塞。当某个节点检测到拥塞时,拥塞节点会向邻居(源)节点发送反馈消息,以优化传输速率。提出的CATER协议总是选择节能且可靠的下一跳将可用数据包传输到sink。MATLAB仿真很容易验证,与其他先进的现有路由协议(如CHicDra和SEFR)相比,CATER将能源效率提高了15.82%,丢包率降低了46.95%,并将端到端延迟降低了31.81%。即使在超载和对抗环境中,甚至在对抗节点高达50%的情况下,CATER也能提高网络吞吐量和分组传送率(PDR)。研究结果最终表明,CATER是一种非常有效的工具,可为wsn提供高效、可靠和拥塞感知路由,对现实世界的工业和物联网应用具有深远的影响。
{"title":"CATER: Congestion aware trust-enabled routing for energy-constrained wireless sensor networks","authors":"Mahendra Kumar Jangir ,&nbsp;Karan Singh ,&nbsp;Tayyab Khan ,&nbsp;Ali Ahmadian","doi":"10.1016/j.comnet.2026.112030","DOIUrl":"10.1016/j.comnet.2026.112030","url":null,"abstract":"<div><div>Wireless Sensor Networks (WSNs) are essential in modern applications like environmental monitoring, industrial automation, and security. However, they suffer from pivotal issues of internal threats, congestion, and power constraint, crippling their efficiency and reliability. These threats include data manipulation and congestion, which degrade network performance. Addressing these challenges is crucial to ensure WSNs can maintain reliable operation while effectively managing energy resources and combating malicious activities. Thus, to address these limitations, this paper introduces CATER (Congestion Aware Trust-Enabled Routing), a new trust-based congestion-aware energy-constrained routing protocol for WSNs. CATER's primary contributions are: (1) an end-to-end multi-dimension trust evaluation model consisting of direct trust, indirect trust, energy trust, and an expected positive probability trust model for robust trust estimation; (2) an adaptive congestion control model for dynamically adjusting transmission rates according to real-time network status using the buffer capacity and queue length as variables; and (3) a trust-enabled routing module performing secure and efficient data transmission employing trusted sensor node selection. After trust evaluation, the proposed CATER protocol detects the congestion in the WSN. The congestion is detected using buffer capacity and queue length at a sensor node. Once congestion is detected at a node, the congested node sends a feedback message to the neighbor (source) node to optimize the transmission rate. The proposed CATER protocol always selects energy-efficient and trustworthy next-hop to transfer available data packets toward the sink. MATLAB simulations readily verify that CATER improves energy efficiency by 15.82%, packet drop ratio by 46.95%, and decreases end-to-end delay by 31.81% compared to other state-of-the-art existing routing protocols like CHicDra and SEFR. CATER also improves network throughput and packet delivery ratio (PDR) even in over-loaded and adversarial environments up to 50% adversarial nodes. The findings conclusively demonstrate CATER to be a very effective tool for providing efficient, reliable, and congestion-aware routing for WSNs with profound implications for real-world industrial and IoT applications.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112030"},"PeriodicalIF":4.6,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy minimization for cellular-connected UAV-aided inspection systems: A dual radio map-driven hierarchical optimization algorithm 蜂窝连接无人机辅助检测系统的能量最小化:一种双无线电地图驱动的分层优化算法
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-15 DOI: 10.1016/j.comnet.2026.112027
Fahui Wu , Shi Peng , Wei Wang , Jiangling Cao , Dingcheng Yang , Sihan Fu , Xiaoli Ye
The burgeoning development of low-altitude economy networks (LAEN) relies heavily on the efficient and sustainable operation of cellular-connected unmanned aerial vehicles (UAVs) for critical services, particularly in infrastructure inspection. While UAV-aided inspection offers significant advantages over traditional inspection methods, the challenge of minimizing total system energy consumption remains paramount, constrained by both limited onboard battery capacity and highly dynamic low-altitude wireless networks (LAWN). To address this issue, a cellular-connected UAV-aided inspection system is investigated, and a dual radio map-driven hierarchical optimization algorithm is proposed to enhance the system´s energy efficiency. Initially, urban map data and relevant transmitter information are utilized to construct a dual radio map, which comprises the communication outage probability (COP) map and the reference signal received power (RSRP) map. Subsequently, leveraging this a priori channel knowledge, the A star (A*) algorithm is employed to optimize the UAV’s trajectory between any two inspection points, thereby stabilizing the communication link. Finally, the optimized trajectory information is fed into the particle swarm optimization (PSO) algorithm to determine the optimal task assignment strategy for the energy-constrained UAV, achieving the overall energy minimization objective. The numerical results validate that our proposed algorithm achieves lower energy consumption compared to benchmark schemes, while simultaneously guaranteeing the required communication quality for the low-altitude UAV.
低空经济网络(LAEN)的迅速发展在很大程度上依赖于蜂窝连接无人机(uav)的高效和可持续运行,用于关键服务,特别是基础设施检查。尽管与传统检测方法相比,无人机辅助检测具有显著优势,但由于机载电池容量有限和高度动态低空无线网络(LAWN)的限制,最大限度地降低系统总能耗仍然是最重要的挑战。为了解决这一问题,研究了一种蜂窝连接的无人机辅助检测系统,并提出了一种双无线电地图驱动的分层优化算法来提高系统的能量效率。首先,利用城市地图数据和相关发射机信息构建双射电图,包括通信中断概率(COP)图和参考信号接收功率(RSRP)图。随后,利用这一先验信道知识,利用a星(a *)算法优化无人机在任意两个检测点之间的轨迹,从而稳定通信链路。最后,将优化后的轨迹信息输入粒子群优化算法(PSO),确定能量受限无人机的最优任务分配策略,实现整体能量最小化目标。数值结果验证了该算法在保证低空无人机所需通信质量的同时,实现了较低的能耗。
{"title":"Energy minimization for cellular-connected UAV-aided inspection systems: A dual radio map-driven hierarchical optimization algorithm","authors":"Fahui Wu ,&nbsp;Shi Peng ,&nbsp;Wei Wang ,&nbsp;Jiangling Cao ,&nbsp;Dingcheng Yang ,&nbsp;Sihan Fu ,&nbsp;Xiaoli Ye","doi":"10.1016/j.comnet.2026.112027","DOIUrl":"10.1016/j.comnet.2026.112027","url":null,"abstract":"<div><div>The burgeoning development of low-altitude economy networks (LAEN) relies heavily on the efficient and sustainable operation of cellular-connected unmanned aerial vehicles (UAVs) for critical services, particularly in infrastructure inspection. While UAV-aided inspection offers significant advantages over traditional inspection methods, the challenge of minimizing total system energy consumption remains paramount, constrained by both limited onboard battery capacity and highly dynamic low-altitude wireless networks (LAWN). To address this issue, a cellular-connected UAV-aided inspection system is investigated, and a dual radio map-driven hierarchical optimization algorithm is proposed to enhance the system´s energy efficiency. Initially, urban map data and relevant transmitter information are utilized to construct a dual radio map, which comprises the communication outage probability (COP) map and the reference signal received power (RSRP) map. Subsequently, leveraging this a priori channel knowledge, the A star (A*) algorithm is employed to optimize the UAV’s trajectory between any two inspection points, thereby stabilizing the communication link. Finally, the optimized trajectory information is fed into the particle swarm optimization (PSO) algorithm to determine the optimal task assignment strategy for the energy-constrained UAV, achieving the overall energy minimization objective. The numerical results validate that our proposed algorithm achieves lower energy consumption compared to benchmark schemes, while simultaneously guaranteeing the required communication quality for the low-altitude UAV.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112027"},"PeriodicalIF":4.6,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized federated learning with vertical model parallelism and topology construction 具有垂直模型并行性和拓扑结构的分散联邦学习
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-15 DOI: 10.1016/j.comnet.2026.112015
Yang Xu , Zuan Xie , Hongli Xu , Yunming Liao , Zhiwei Yao
In order to avoid the possible bottleneck of conventional parameter server architecture, the decentralized federated learning (DFL) is developed on the peer-to-peer (P2P) communication. However, due to the intrinsic features of edge computing (EC), such as limited and heterogeneous computing capability, constrained bandwidth and non-IID data, DFL with a unified model structure and fixed communication topology results in a slow convergence rate. To address these challenges, we adopt the vertical model parallelism and propose an efficient model training framework called SWIFT. Specifically, we divide the complete model into multiple non-overlapping columns, and allow each client to train a sub-model with different length of column group according to its computing capacity. We theoretically analyze the convergence upper bound of SWIFT, and reveal that the convergence rate will be impacted by the consensus distance among different clients. To reduce the consensus distance and accelerate training, we propose a dynamic topology construction algorithm by selecting appropriate neighbors for each client before model aggregation. Experimental results demonstrate that, compared with the baseline methods, SWIFT can approximately achieve a 2.3 ×  speedup and save 46% communication traffic.
为了避免传统参数服务器架构可能存在的瓶颈,在点对点(P2P)通信的基础上发展了分散式联邦学习(DFL)。然而,由于边缘计算(edge computing, EC)固有的计算能力有限且异构、带宽受限、非iid数据等特点,统一模型结构、固定通信拓扑的DFL收敛速度较慢。为了解决这些挑战,我们采用了垂直模型并行,并提出了一个高效的模型训练框架SWIFT。具体而言,我们将完整的模型划分为多个不重叠的列,并允许每个客户端根据其计算能力训练具有不同列组长度的子模型。从理论上分析了SWIFT的收敛上界,揭示了不同客户端之间的共识距离会影响SWIFT的收敛速度。为了减少一致性距离和加速训练,我们提出了一种动态拓扑构建算法,在模型聚合之前为每个客户端选择合适的邻居。实验结果表明,与基准方法相比,SWIFT可以实现约2.3 × 的加速,节省46%的通信流量。
{"title":"Decentralized federated learning with vertical model parallelism and topology construction","authors":"Yang Xu ,&nbsp;Zuan Xie ,&nbsp;Hongli Xu ,&nbsp;Yunming Liao ,&nbsp;Zhiwei Yao","doi":"10.1016/j.comnet.2026.112015","DOIUrl":"10.1016/j.comnet.2026.112015","url":null,"abstract":"<div><div>In order to avoid the possible bottleneck of conventional parameter server architecture, the decentralized federated learning (DFL) is developed on the peer-to-peer (P2P) communication. However, due to the intrinsic features of edge computing (EC), such as limited and heterogeneous computing capability, constrained bandwidth and non-IID data, DFL with a unified model structure and fixed communication topology results in a slow convergence rate. To address these challenges, we adopt the vertical model parallelism and propose an efficient model training framework called SWIFT. Specifically, we divide the complete model into multiple non-overlapping columns, and allow each client to train a sub-model with different length of column group according to its computing capacity. We theoretically analyze the convergence upper bound of SWIFT, and reveal that the convergence rate will be impacted by the consensus distance among different clients. To reduce the consensus distance and accelerate training, we propose a dynamic topology construction algorithm by selecting appropriate neighbors for each client before model aggregation. Experimental results demonstrate that, compared with the baseline methods, SWIFT can approximately achieve a <strong>2.3 × </strong> speedup and save <strong>46%</strong> communication traffic.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112015"},"PeriodicalIF":4.6,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based searchable encryption for secure data sharing with blockchain in VANETs 基于属性的可搜索加密,用于VANETs中与区块链的安全数据共享
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-15 DOI: 10.1016/j.comnet.2026.112026
Zhenqi Wang , Peng Yang , Angze Du , Dongmei Yang , Xiaoyan Liu
Vehicular Ad Hoc Networks (VANETs) are critical for enhancing road safety and optimizing traffic flow. Attribute-based searchable encryption (ABSE) with blockchain supports one-to-many encryption, ciphertext search, and decentralized storage, providing a solution to enable data sharing in VANETs. However, existing VANETs schemes face many limitations: blockchain miner nodes are at risk of stealing vehicle attribute keys during key verification; the lack of permission control may also lead to unauthorized downloads; and multi-keyword search, encryption, and decryption require a lot of computing power. To address these issues, we propose an attribute-based searchable encryption scheme for secure data sharing with blockchain (ABSE-VANETs). Specifically, we introduce multiple authorization authorities to manage attributes and generate obfuscated key parameters via bilinear pairing to prevent the leakage of vehicle attribute keys. We combine linear integer secret sharing (LISS) to bind the ciphertext download permission and the vehicle attribute set to prevent unauthorized ciphertext download. Moreover, we optimize the multi-keyword index generation algorithm and trapdoor structure and construct a multi-keyword index with the help of blockchain, which achieves the fast positioning of the ciphertext address on the chain. Finally, we utilize the edge cloud server to realize proxy decryption of ciphertexts, which further reduces the computation pressure on the vehicle terminal. Formal security analysis and performance comparison experiments show that our scheme is highly secure under the DBDH assumption and performs well in terms of communication and computation efficiency.
车辆自组织网络(vanet)对于提高道路安全和优化交通流至关重要。ABSE (Attribute-based searchable encryption)与区块链结合,支持一对多加密、密文搜索和去中心化存储,为VANETs提供数据共享解决方案。然而,现有的VANETs方案面临许多局限性:区块链挖矿节点在密钥验证过程中存在窃取车辆属性密钥的风险;缺乏权限控制也可能导致未经授权的下载;多关键字搜索、加密和解密需要大量的计算能力。为了解决这些问题,我们提出了一种基于属性的可搜索加密方案,用于与b区块链进行安全数据共享(ABSE-VANETs)。具体而言,我们引入多个授权机构来管理属性,并通过双线性配对生成模糊的密钥参数,以防止车辆属性密钥的泄漏。我们结合线性整数秘密共享(LISS)来绑定密文下载权限和车辆属性集,以防止未经授权的密文下载。此外,我们优化了多关键字索引生成算法和活板门结构,并借助区块链构造了一个多关键字索引,实现了密文地址在链上的快速定位。最后利用边缘云服务器实现对密文的代理解密,进一步降低了车载终端的计算压力。正式的安全性分析和性能对比实验表明,我们的方案在DBDH假设下具有很高的安全性,并且在通信和计算效率方面表现良好。
{"title":"Attribute-based searchable encryption for secure data sharing with blockchain in VANETs","authors":"Zhenqi Wang ,&nbsp;Peng Yang ,&nbsp;Angze Du ,&nbsp;Dongmei Yang ,&nbsp;Xiaoyan Liu","doi":"10.1016/j.comnet.2026.112026","DOIUrl":"10.1016/j.comnet.2026.112026","url":null,"abstract":"<div><div>Vehicular Ad Hoc Networks (VANETs) are critical for enhancing road safety and optimizing traffic flow. Attribute-based searchable encryption (ABSE) with blockchain supports one-to-many encryption, ciphertext search, and decentralized storage, providing a solution to enable data sharing in VANETs. However, existing VANETs schemes face many limitations: blockchain miner nodes are at risk of stealing vehicle attribute keys during key verification; the lack of permission control may also lead to unauthorized downloads; and multi-keyword search, encryption, and decryption require a lot of computing power. To address these issues, we propose an attribute-based searchable encryption scheme for secure data sharing with blockchain (ABSE-VANETs). Specifically, we introduce multiple authorization authorities to manage attributes and generate obfuscated key parameters via bilinear pairing to prevent the leakage of vehicle attribute keys. We combine linear integer secret sharing (LISS) to bind the ciphertext download permission and the vehicle attribute set to prevent unauthorized ciphertext download. Moreover, we optimize the multi-keyword index generation algorithm and trapdoor structure and construct a multi-keyword index with the help of blockchain, which achieves the fast positioning of the ciphertext address on the chain. Finally, we utilize the edge cloud server to realize proxy decryption of ciphertexts, which further reduces the computation pressure on the vehicle terminal. Formal security analysis and performance comparison experiments show that our scheme is highly secure under the DBDH assumption and performs well in terms of communication and computation efficiency.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 112026"},"PeriodicalIF":4.6,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical federated learning algorithm with synchronous and asynchronous aggregation collaboration in internet of vehicles 基于同步和异步聚合协作的车联网分层联邦学习算法
IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-15 DOI: 10.1016/j.comnet.2026.111994
Ling Xing, Jingjing Cui, Kaikai Deng, Honghai Wu, Huahong Ma
Federated Learning (FL) has emerged as a key distributed framework for processing real-time vehicular data in the Internet of Vehicles (IoV), aiming to enhance driving experiences and service quality. However, challenges such as network congestion, limited signal coverage leading to latency, and inefficiencies arising from data and device heterogeneity hinder FL performance in IoV environments. To address these issues, we propose HierFed, a hierarchical federated learning algorithm that combines synchronous and asynchronous aggregation strategies, which comprises two components: (i) an asynchronous cache aggregation mechanism, where client-side cache updates are transmitted to the edge server for asynchronous aggregation. By calibrating the relationship between cache updates and model deviations, clients can update models without synchronous waiting, thereby mitigating latency; (ii) a synchronous aggregation mechanism, where the cloud server optimizes global model updates by computing aggregation weights under gradient normalization and constraint conditions, followed by reducing inter-client model inconsistency and enhances overall model convergence. Experimental results show that HierFed outperforms all baselines, achieving an 8.83% improvement in model accuracy at the edge tier (asynchronous FL), a 13.84% improvement at the cloud tier (synchronous FL), and a 10.79% overall improvement in hierarchical FL.
联邦学习(FL)已成为车联网(IoV)中处理实时车辆数据的关键分布式框架,旨在提高驾驶体验和服务质量。然而,网络拥塞、有限的信号覆盖导致延迟、数据和设备异构导致的效率低下等挑战阻碍了FL在车联网环境中的性能。为了解决这些问题,我们提出了HierFed,这是一种结合同步和异步聚合策略的分层联邦学习算法,它包括两个组件:(i)异步缓存聚合机制,其中客户端缓存更新被传输到边缘服务器进行异步聚合。通过校准缓存更新和模型偏差之间的关系,客户端可以在不同步等待的情况下更新模型,从而减少延迟;(ii)同步聚合机制,云服务器通过计算梯度归一化和约束条件下的聚合权值来优化全局模型更新,从而减少客户端间模型不一致,增强整体模型收敛性。实验结果表明,HierFed优于所有基线,在边缘层(异步FL)的模型精度提高了8.83%,在云层(同步FL)的模型精度提高了13.84%,在分层FL的整体精度提高了10.79%。
{"title":"Hierarchical federated learning algorithm with synchronous and asynchronous aggregation collaboration in internet of vehicles","authors":"Ling Xing,&nbsp;Jingjing Cui,&nbsp;Kaikai Deng,&nbsp;Honghai Wu,&nbsp;Huahong Ma","doi":"10.1016/j.comnet.2026.111994","DOIUrl":"10.1016/j.comnet.2026.111994","url":null,"abstract":"<div><div>Federated Learning (FL) has emerged as a key distributed framework for processing real-time vehicular data in the Internet of Vehicles (IoV), aiming to enhance driving experiences and service quality. However, challenges such as network congestion, limited signal coverage leading to latency, and inefficiencies arising from data and device heterogeneity hinder FL performance in IoV environments. To address these issues, we propose <em>HierFed</em>, a hierarchical federated learning algorithm that combines synchronous and asynchronous aggregation strategies, which comprises two components: (i) an <em>asynchronous cache aggregation mechanism</em>, where client-side cache updates are transmitted to the edge server for asynchronous aggregation. By calibrating the relationship between cache updates and model deviations, clients can update models without synchronous waiting, thereby mitigating latency; (ii) a <em>synchronous aggregation mechanism</em>, where the cloud server optimizes global model updates by computing aggregation weights under gradient normalization and constraint conditions, followed by reducing inter-client model inconsistency and enhances overall model convergence. Experimental results show that <em>HierFed</em> outperforms all baselines, achieving an 8.83% improvement in model accuracy at the edge tier (asynchronous FL), a 13.84% improvement at the cloud tier (synchronous FL), and a 10.79% overall improvement in hierarchical FL.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"277 ","pages":"Article 111994"},"PeriodicalIF":4.6,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1