首页 > 最新文献

Computer Networks最新文献

英文 中文
Blockchain-assisted Verifiable Secure Multi-Party Data Computing 区块链辅助的可验证安全多方数据计算
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-10 DOI: 10.1016/j.comnet.2024.110712

Secure multi-party computation (SMPC) is a crucial technology that supports privacy preservation, enabling multiple users to perform computations on any function without disclosing their private inputs and outputs in a distrustful environment. Existing secure multi-party computation models typically rely on obfuscation circuits and cryptographic protocols to facilitate collaborative computation of tasks. However, the efficiency and privacy leakage of users have not been paid much attention during the computation process. To address these problems, this article proposes a privacy-preserving approach Blockchain-assisted Verifiable Secure Multi-Party Data Computing (BVS-MPDC). Specifically, to prevent privacy leakage when users and multiple participants share data, BVS-MPDC uses additive homomorphic encryption to encrypt data shares; and verifies the generated Pedersen commitment of all the data. BVS-MPDC utilizes an improved Schnorr aggregation signature to improve computation efficiency between computing nodes and smart contracts by submitting an aggregation signature to the blockchain. Moreover, we design and implement a smart contract for verifying aggregation signature results on Ethereum. The security proof is presented under the UC framework. Finally, simulation experiments of performance evaluations demonstrate that our scheme outperforms existing schemes in computation overhead and verification.

安全多方计算(SMPC)是一项支持隐私保护的重要技术,它能让多个用户在不信任的环境中对任何函数进行计算,而不会泄露他们的私人输入和输出。现有的安全多方计算模型通常依靠混淆电路和加密协议来促进任务的协作计算。然而,在计算过程中,用户的效率和隐私泄露问题并未受到重视。针对这些问题,本文提出了一种隐私保护方法--区块链辅助可验证安全多方数据计算(Blockchain-assisted Verifiable Secure Multi-Party Data Computing,BVS-MPDC)。具体来说,为了防止用户和多方参与者共享数据时泄露隐私,BVS-MPDC 使用加法同态加密技术对数据共享进行加密,并验证生成的所有数据的佩德森承诺。BVS-MPDC 利用改进的 Schnorr 聚合签名,通过向区块链提交聚合签名,提高计算节点和智能合约之间的计算效率。此外,我们还设计并实现了一个智能合约,用于验证以太坊上的聚合签名结果。安全证明是在 UC 框架下提出的。最后,性能评估的模拟实验证明,我们的方案在计算开销和验证方面优于现有方案。
{"title":"Blockchain-assisted Verifiable Secure Multi-Party Data Computing","authors":"","doi":"10.1016/j.comnet.2024.110712","DOIUrl":"10.1016/j.comnet.2024.110712","url":null,"abstract":"<div><p>Secure multi-party computation (SMPC) is a crucial technology that supports privacy preservation, enabling multiple users to perform computations on any function without disclosing their private inputs and outputs in a distrustful environment. Existing secure multi-party computation models typically rely on obfuscation circuits and cryptographic protocols to facilitate collaborative computation of tasks. However, the efficiency and privacy leakage of users have not been paid much attention during the computation process. To address these problems, this article proposes a privacy-preserving approach <strong>B</strong>lockchain-assisted <strong>V</strong>erifiable <strong>S</strong>ecure <strong>M</strong>ulti-<strong>P</strong>arty <strong>D</strong>ata <strong>C</strong>omputing (BVS-MPDC). Specifically, to prevent privacy leakage when users and multiple participants share data, BVS-MPDC uses additive homomorphic encryption to encrypt data shares; and verifies the generated Pedersen commitment of all the data. BVS-MPDC utilizes an improved Schnorr aggregation signature to improve computation efficiency between computing nodes and smart contracts by submitting an aggregation signature to the blockchain. Moreover, we design and implement a smart contract for verifying aggregation signature results on Ethereum. The security proof is presented under the UC framework. Finally, simulation experiments of performance evaluations demonstrate that our scheme outperforms existing schemes in computation overhead and verification.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems Raiju:强化学习引导的网络系统自动安全评估后开发
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-09 DOI: 10.1016/j.comnet.2024.110706

To discover threats to a network system, investigating the behaviors of attackers after successful exploitation is an important phase, called post-exploitation. Although various efficient tools support post-exploitation implementation, the crucial factor in completing this process remains experienced human experts, known as penetration testers or pen-testers. This study proposes the Raiju framework, a Reinforcement Learning (RL)-driven automation approach, which automatically implements steps of the post-exploitation phase for security-level evaluation. We implement two well-known RL algorithms, Advantage Actor–Critic (A2C) and Proximal Policy Optimization (PPO), to evaluate specialized agents capable of making intelligent actions. With the support of Metasploit, modules corresponding to selected actions of the agent automatically launch real attacks of privileges escalation (PE), gathering hashdump (GH), and lateral movement (LM) on multiple platforms. Through leveraging RL, our objective is to empower agents that can autonomously select suitable actions to exploit vulnerabilities within target systems. This approach enables the automation of specific components within the penetration testing (PT) workflow, thereby enhancing its efficiency and adaptability to evolving threats and vulnerabilities. The experiments are performed in four real environments with agents trained in thousands of episodes. The agents can automatically launch exploits on the four environments and achieve a success ratio of over 84% across the three attack types. Furthermore, our experiments demonstrate the remarkable effectiveness of the A2C algorithm in the realm of post-exploitation automation.

要发现对网络系统的威胁,调查攻击者在成功利用后的行为是一个重要阶段,称为 "后利用"。尽管各种高效工具支持后开发的实施,但完成这一过程的关键因素仍然是经验丰富的人类专家,即所谓的渗透测试人员或笔试人员。本研究提出的 Raiju 框架是一种强化学习(RL)驱动的自动化方法,可自动执行安全级别评估的后开发阶段步骤。我们实施了两种著名的强化学习算法,即优势行为批判(A2C)和近端策略优化(PPO),以评估能够采取智能行动的专门代理。在 Metasploit 的支持下,与代理的选定行动相对应的模块会在多个平台上自动发起权限升级(PE)、收集 hashdump(GH)和横向移动(LM)等真实攻击。通过利用 RL,我们的目标是使代理能够自主选择合适的行动,利用目标系统中的漏洞。这种方法可以实现渗透测试(PT)工作流程中特定组件的自动化,从而提高其效率和对不断变化的威胁和漏洞的适应性。实验在四个真实环境中进行,代理经过数千次训练。代理可以在四个环境中自动发起攻击,在三种攻击类型中的成功率超过 84%。此外,我们的实验还证明了 A2C 算法在漏洞利用后自动化领域的显著效果。
{"title":"Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems","authors":"","doi":"10.1016/j.comnet.2024.110706","DOIUrl":"10.1016/j.comnet.2024.110706","url":null,"abstract":"<div><p>To discover threats to a network system, investigating the behaviors of attackers after successful exploitation is an important phase, called post-exploitation. Although various efficient tools support post-exploitation implementation, the crucial factor in completing this process remains experienced human experts, known as penetration testers or pen-testers. This study proposes the Raiju framework, a Reinforcement Learning (RL)-driven automation approach, which automatically implements steps of the post-exploitation phase for security-level evaluation. We implement two well-known RL algorithms, Advantage Actor–Critic (A2C) and Proximal Policy Optimization (PPO), to evaluate specialized agents capable of making intelligent actions. With the support of Metasploit, modules corresponding to selected actions of the agent automatically launch real attacks of privileges escalation (PE), gathering hashdump (GH), and lateral movement (LM) on multiple platforms. Through leveraging RL, our objective is to empower agents that can autonomously select suitable actions to exploit vulnerabilities within target systems. This approach enables the automation of specific components within the penetration testing (PT) workflow, thereby enhancing its efficiency and adaptability to evolving threats and vulnerabilities. The experiments are performed in four real environments with agents trained in thousands of episodes. The agents can automatically launch exploits on the four environments and achieve a success ratio of over 84% across the three attack types. Furthermore, our experiments demonstrate the remarkable effectiveness of the A2C algorithm in the realm of post-exploitation automation.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed quantum computing: A survey 分布式量子计算:调查
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-08 DOI: 10.1016/j.comnet.2024.110672

Nowadays, quantum computing has reached the engineering phase, with fully-functional quantum processors integrating hundreds of noisy qubits. Yet – to fully unveil the potential of quantum computing out of the labs into the business reality – the challenge ahead is to substantially scale the qubit number, reaching orders of magnitude exceeding thousands of fault-tolerant qubits. To this aim, the distributed quantum computing paradigm is recognized as the key solution for scaling the number of qubits. Indeed, accordingly to such a paradigm, multiple small-to-moderate-scale quantum processors communicate and cooperate for executing computational tasks exceeding the computational power of single processing devices. The aim of this survey is to provide the reader with an overview about the main challenges and open problems arising with distributed quantum computing from a computer and communications engineering perspective. Furthermore, this survey provides an easy access and guide towards the relevant literature and the prominent results in the field.

如今,量子计算已进入工程设计阶段,全功能量子处理器集成了数百个噪声量子比特。然而,要将量子计算的潜力从实验室充分释放到商业现实中,未来的挑战是大幅扩展量子比特数量,使其数量级超过数千个容错量子比特。为此,分布式量子计算模式被认为是扩展量子比特数量的关键解决方案。事实上,根据这种模式,多个中小规模的量子处理器可以进行通信和合作,以执行超过单个处理设备计算能力的计算任务。本调查旨在从计算机和通信工程的角度,向读者概述分布式量子计算所面临的主要挑战和公开问题。此外,本调查报告还为读者查阅相关文献和了解该领域的重要成果提供了便捷的途径和指南。
{"title":"Distributed quantum computing: A survey","authors":"","doi":"10.1016/j.comnet.2024.110672","DOIUrl":"10.1016/j.comnet.2024.110672","url":null,"abstract":"<div><p>Nowadays, quantum computing has reached the engineering phase, with fully-functional quantum processors integrating hundreds of noisy qubits. Yet – to fully unveil the potential of quantum computing out of the labs into the business reality – the challenge ahead is to substantially scale the qubit number, reaching orders of magnitude exceeding thousands of fault-tolerant qubits. To this aim, the <em>distributed quantum computing</em> paradigm is recognized as the key solution for scaling the number of qubits. Indeed, accordingly to such a paradigm, multiple small-to-moderate-scale quantum processors communicate and cooperate for executing computational tasks exceeding the computational power of single processing devices. The aim of this survey is to provide the reader with an overview about the main challenges and open problems arising with distributed quantum computing from a computer and communications engineering perspective. Furthermore, this survey provides an easy access and guide towards the relevant literature and the prominent results in the field.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005048/pdfft?md5=f68b505aaa36ec5892906577c769a4c6&pid=1-s2.0-S1389128624005048-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on green communication for wearable and implantable wireless body area networks 可穿戴和植入式无线体域网络的绿色通信综述
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110693

In the interconnected world, where wearable devices and implantable sensors have become integral to healthcare, Wireless Body Area Networks (WBANs) play a very pivotal role. These networks enable continuous monitoring of vital signs, early detection of health issues, and personalized patient care. However, ensuring the longevity and reliability of WBANs remains a multifaceted challenge. This comprehensive survey addresses this challenge by providing key insights and practical solutions. We investigate the intricacies of indoor communication links within WBANs, characterizing wireless channels thereby revealing factors that influence the quality of the received signal. By understanding multipath propagation, small-scale fading, and interference, we empower engineers to optimize communication protocols for reliable data transmission. In particular, we describe practical path loss models that have been successfully implemented in real-world WBANs. These models account for indoor scenarios, considering floor attenuation, wall partitions, and other environmental factors.

Furthermore, we explore diverse energy harvesting (EH) techniques, from converting body movements to electrical energy to harnessing ambient RF signals. By addressing energy efficiency challenges, we extend the lifespan of WBAN devices, benefiting both patients and healthcare providers. We have also demonstrated the feasibility of incorporating EH into WBANs, via three case studies showcasing real-world validation. Finally, as the field evolves, we highlight open research problems, inviting further investigation into efficient wireless communication, seamless integration of EH techniques, and novel protocols for WBANs. In summary, this survey bridges theory and practice, fostering advancements in WBAN technology. By addressing wireless indoor channel modeling, energy efficiency, and their practical implementation in BAN, we contribute to the effectiveness of WBANs in indoor scenarios.

在互联世界中,可穿戴设备和植入式传感器已成为医疗保健不可或缺的一部分,而无线体域网(WBAN)则发挥着举足轻重的作用。这些网络能够对生命体征进行连续监测,及早发现健康问题,并为患者提供个性化护理。然而,确保 WBAN 的使用寿命和可靠性仍然是一个多方面的挑战。本综合调查报告通过提供关键见解和实用解决方案来应对这一挑战。我们研究了 WBAN 室内通信链路的复杂性,描述了无线信道的特征,从而揭示了影响接收信号质量的因素。通过了解多径传播、小尺度衰落和干扰,我们使工程师能够优化通信协议,实现可靠的数据传输。我们特别介绍了已成功应用于实际 WBAN 的实用路径损耗模型。此外,我们还探索了多种能量采集(EH)技术,从将身体运动转换为电能到利用环境射频信号。通过解决能效难题,我们延长了 WBAN 设备的使用寿命,使患者和医疗服务提供者都能从中受益。我们还通过三个案例研究展示了在 WBAN 中集成 EH 的可行性,并进行了实际验证。最后,随着该领域的不断发展,我们强调了一些开放性研究问题,希望进一步研究高效无线通信、EH 技术的无缝集成以及 WBAN 的新型协议。总之,本研究为理论与实践搭建了桥梁,促进了 WBAN 技术的发展。通过探讨无线室内信道建模、能效及其在 BAN 中的实际应用,我们为提高 WBAN 在室内场景中的有效性做出了贡献。
{"title":"A review on green communication for wearable and implantable wireless body area networks","authors":"","doi":"10.1016/j.comnet.2024.110693","DOIUrl":"10.1016/j.comnet.2024.110693","url":null,"abstract":"<div><p>In the interconnected world, where wearable devices and implantable sensors have become integral to healthcare, Wireless Body Area Networks (WBANs) play a very pivotal role. These networks enable continuous monitoring of vital signs, early detection of health issues, and personalized patient care. However, ensuring the longevity and reliability of WBANs remains a multifaceted challenge. This comprehensive survey addresses this challenge by providing key insights and practical solutions. We investigate the intricacies of indoor communication links within WBANs, characterizing wireless channels thereby revealing factors that influence the quality of the received signal. By understanding multipath propagation, small-scale fading, and interference, we empower engineers to optimize communication protocols for reliable data transmission. In particular, we describe practical path loss models that have been successfully implemented in real-world WBANs. These models account for indoor scenarios, considering floor attenuation, wall partitions, and other environmental factors.</p><p>Furthermore, we explore diverse energy harvesting (EH) techniques, from converting body movements to electrical energy to harnessing ambient RF signals. By addressing energy efficiency challenges, we extend the lifespan of WBAN devices, benefiting both patients and healthcare providers. We have also demonstrated the feasibility of incorporating EH into WBANs, via three case studies showcasing real-world validation. Finally, as the field evolves, we highlight open research problems, inviting further investigation into efficient wireless communication, seamless integration of EH techniques, and novel protocols for WBANs. In summary, this survey bridges theory and practice, fostering advancements in WBAN technology. By addressing wireless indoor channel modeling, energy efficiency, and their practical implementation in BAN, we contribute to the effectiveness of WBANs in indoor scenarios.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(User behavior)-based LS prediction model and anti-LS reverse-leadership strategy in the (VLC/RF)-V2X network (基于(用户行为)的 LS 预测模型和(VLC/RF)-V2X 网络中的反 LS 逆向领导策略
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110684

The hybrid vehicle to everything (V2X) network based on visible light communication (VLC) and radio frequency (RF) is an excellent choice for future vehicle communication. In this paper, the (user behavior)-based longitudinal-separation (LS) prediction model and the reverse-leadership strategy in the hybrid V2X network are firstly proposed. By user behavior, the LS is divided into active separation (ASP) and passive separation (PSP). By characteristics of ASP and PSP, the longitudinal-separation prediction model is constructed. By this model, ASP and PSP can be predicted respectively before they occur. By the prediction result of the model, a reverse-leadership strategy for the platoon is presented. By this strategy, communication links can be self-adaptively changed to avoid outages caused by LS. In this scheme (model+strategy), LS can be predicted timely and communication links can be handed over in advance. Finally, the validity of the model and the effectiveness of the scheme are demonstrated by simulations based on data from NGSIM data set and PTV-Vissim simulation software. Besides, the proposed scheme not only has its comparative advantages of fewer outages and handovers, but also can decrease the path loss, average outage time and handover delay significantly.

基于可见光通信(VLC)和射频(RF)的混合车对物(V2X)网络是未来车辆通信的最佳选择。本文首先提出了混合 V2X 网络中基于(用户行为)的纵向分离(LS)预测模型和反向引导策略。根据用户行为,LS 可分为主动分离(ASP)和被动分离(PSP)。根据 ASP 和 PSP 的特征,构建了纵向分离预测模型。通过该模型,可以在 ASP 和 PSP 发生之前分别对其进行预测。根据模型的预测结果,提出了排的反向领导策略。通过该策略,可以自适应地改变通信链路,以避免 LS 导致的中断。在这种方案(模型+策略)中,可以及时预测 LS 并提前移交通信链路。最后,通过基于 NGSIM 数据集和 PTV-Vissim 仿真软件的仿真,证明了模型的正确性和方案的有效性。此外,所提出的方案不仅具有中断和移交次数少的比较优势,还能显著降低路径损耗、平均中断时间和移交延迟。
{"title":"(User behavior)-based LS prediction model and anti-LS reverse-leadership strategy in the (VLC/RF)-V2X network","authors":"","doi":"10.1016/j.comnet.2024.110684","DOIUrl":"10.1016/j.comnet.2024.110684","url":null,"abstract":"<div><p>The hybrid vehicle to everything (V2X) network based on visible light communication (VLC) and radio frequency (RF) is an excellent choice for future vehicle communication. In this paper, the (user behavior)-based longitudinal-separation (LS) prediction model and the reverse-leadership strategy in the hybrid V2X network are firstly proposed. By user behavior, the LS is divided into active separation (ASP) and passive separation (PSP). By characteristics of ASP and PSP, the longitudinal-separation prediction model is constructed. By this model, ASP and PSP can be predicted respectively before they occur. By the prediction result of the model, a reverse-leadership strategy for the platoon is presented. By this strategy, communication links can be self-adaptively changed to avoid outages caused by LS. In this scheme (model+strategy), LS can be predicted timely and communication links can be handed over in advance. Finally, the validity of the model and the effectiveness of the scheme are demonstrated by simulations based on data from NGSIM data set and PTV-Vissim simulation software. Besides, the proposed scheme not only has its comparative advantages of fewer outages and handovers, but also can decrease the path loss, average outage time and handover delay significantly.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving scalable capacity in wireless mesh networks 实现无线网状网络的可扩展容量
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110696

Wireless mesh networks are critical in enabling key networking scenarios in beyond-5G (B5G) and 6G networks, including integrated access and backhaul (IAB), multi-hop sidelinks, and V2X. However, it still poses a challenge to deliver scalable per-node throughput via mesh networking. As shown in Gupta and Kumar’s seminal research (Gupta and Kumar, 2000), multi-hop transmission results in a per-node throughput of Θ(1/nlogn) in a wireless network with n nodes, significantly limiting the potential of large-scale deployment of wireless mesh networks. Follow-up research has achieved O(1) per-node throughput in a dense network, but how to achieve scalability remains an unresolved issue for an extended wireless network where the network size increases with a constant node density. This issue prevents a wireless mesh network from large-scale deployment. To this end, this paper aims to develop a theoretical approach to achieving scalable per-node throughput in wireless mesh networks. First, the key factors that limit the per-node throughput of wireless mesh networks are analyzed, through which two major ones are identified, i.e., link sharing and interference. Next, a multi-tier hierarchical architecture is proposed to overcome the link-sharing issue. The inter-tier interference under this architecture is then mitigated by utilizing orthogonal frequency allocation between adjacent tiers, while the intra-tier interference is reduced by considering two specific transmission schemes, one is MIMO spatial multiplexing with time-division, the other is MIMO beamforming. Theoretical analysis shows that the multi-tier mesh networking architecture can achieve a per-node throughput of Θ(1) in both schemes, as long as certain conditions on network parameters including bandwidth, the number of antennas, and the number of nodes of each tier are satisfied. A case study on a realistic deployment of 10,000 nodes is then carried out, which demonstrates that a scalable throughput of Θ(1) is achievable with a reasonable assumption on bandwidth and the number of antennas.

无线网状网络对于实现超 5G (B5G) 和 6G 网络中的关键联网方案至关重要,这些方案包括集成接入和回程 (IAB)、多跳侧链路和 V2X。然而,通过网状网络提供可扩展的每节点吞吐量仍是一项挑战。如 Gupta 和 Kumar 的开创性研究(Gupta and Kumar, 2000)所示,在有 n 个节点的无线网络中,多跳传输导致每个节点的吞吐量为 Θ(1/nlogn),大大限制了无线网状网络大规模部署的潜力。后续研究实现了密集网络中每个节点的吞吐量为 O(1),但对于网络规模随节点密度恒定而增加的扩展无线网络,如何实现可扩展性仍是一个悬而未决的问题。这个问题阻碍了无线网状网络的大规模部署。为此,本文旨在开发一种理论方法,以实现无线网状网络中可扩展的单位节点吞吐量。首先,本文分析了限制无线网状网络单位节点吞吐量的关键因素,并确定了两个主要因素,即链路共享和干扰。接着,提出了一种多层分级架构来克服链路共享问题。在这种架构下,相邻层之间利用正交频率分配来减轻层间干扰,而层内干扰则通过考虑两种特定的传输方案来减少,一种是带时分的多输入多输出(MIMO)空间复用,另一种是多输入多输出(MIMO)波束成形。理论分析表明,只要网络参数(包括带宽、天线数量和每层节点数量)满足一定条件,多层网状网络架构在这两种方案中都能达到每节点吞吐量Θ(1)。随后,对 10,000 个节点的实际部署情况进行了案例研究,结果表明,在对带宽和天线数量做出合理假设的情况下,Θ(1) 的可扩展吞吐量是可以实现的。
{"title":"Achieving scalable capacity in wireless mesh networks","authors":"","doi":"10.1016/j.comnet.2024.110696","DOIUrl":"10.1016/j.comnet.2024.110696","url":null,"abstract":"<div><p>Wireless mesh networks are critical in enabling key networking scenarios in beyond-5G (B5G) and 6G networks, including integrated access and backhaul (IAB), multi-hop sidelinks, and V2X. However, it still poses a challenge to deliver scalable per-node throughput via mesh networking. As shown in Gupta and Kumar’s seminal research (Gupta and Kumar, 2000), multi-hop transmission results in a per-node throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>/</mo><msqrt><mrow><mi>n</mi><mo>log</mo><mi>n</mi></mrow></msqrt><mo>)</mo></mrow></mrow></math></span> in a wireless network with <span><math><mi>n</mi></math></span> nodes, significantly limiting the potential of large-scale deployment of wireless mesh networks. Follow-up research has achieved <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> per-node throughput in a dense network, but how to achieve scalability remains an unresolved issue for an extended wireless network where the network size increases with a constant node density. This issue prevents a wireless mesh network from large-scale deployment. To this end, this paper aims to develop a theoretical approach to achieving scalable per-node throughput in wireless mesh networks. First, the key factors that limit the per-node throughput of wireless mesh networks are analyzed, through which two major ones are identified, i.e., link sharing and interference. Next, a multi-tier hierarchical architecture is proposed to overcome the link-sharing issue. The inter-tier interference under this architecture is then mitigated by utilizing orthogonal frequency allocation between adjacent tiers, while the intra-tier interference is reduced by considering two specific transmission schemes, one is MIMO spatial multiplexing with time-division, the other is MIMO beamforming. Theoretical analysis shows that the multi-tier mesh networking architecture can achieve a per-node throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> in both schemes, as long as certain conditions on network parameters including bandwidth, the number of antennas, and the number of nodes of each tier are satisfied. A case study on a realistic deployment of 10,000 nodes is then carried out, which demonstrates that a scalable throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> is achievable with a reasonable assumption on bandwidth and the number of antennas.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141992834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced-SETL: A multi-variable deep reinforcement learning approach for contention window optimization in dense Wi-Fi networks 增强型-SETL:密集 Wi-Fi 网络中争用窗口优化的多变量深度强化学习方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110690

In this paper, we introduce the Enhanced Smart Exponential-Threshold-Linear (Enhanced-SETL) algorithm, a new approach that uses the multi-variable Deep Reinforcement Learning (DRL) framework to simultaneously optimize multiple settings of the Contention Window (CW) in IEEE 802.11 wireless networks. Unlike traditional DRL methods that adjust only a single CW parameter, our innovative approach simultaneously optimizes both the CW minimum (CWmin) and CW Threshold (CWThreshold), significantly improving network traffic control. We utilize a Double Deep Q-learning Network (DDQN) for dynamic updates of these CW settings, broadcasted across the dense Wi-Fi networks. This dual adjustment method, coupled with dynamic, data-driven updates, not only enhances throughput, but also reduces collision rates, and ensures fairness access across both static and dynamic wireless environments. Enhanced-SETL achieves a throughput improvement ranging from 3.55% up to 43.73% and from 3.98% up to 30.15% in static and dynamic scenarios over standard protocols and state-of-the-art DRL models, while maintaining a fairness index near 99% across diverse stations, showcasing its effectiveness and adaptability in various network conditions.

本文介绍了增强型智能指数阈值线性(Enhanced Smart Exponential-Threshold-Linear,Enhanced-SETL)算法,这是一种利用多变量深度强化学习(DRL)框架同时优化 IEEE 802.11 无线网络中竞争窗口(Contention Window,CW)多种设置的新方法。与只调整单一竞争窗口参数的传统 DRL 方法不同,我们的创新方法可同时优化竞争窗口最小值(CWmin)和竞争窗口阈值(CWThreshold),从而显著改善网络流量控制。我们利用双深度 Q-learning 网络(DDQN)对这些 CW 设置进行动态更新,并在密集的 Wi-Fi 网络中进行广播。这种双重调整方法与数据驱动的动态更新相结合,不仅提高了吞吐量,还降低了碰撞率,并确保了静态和动态无线环境下的公平接入。与标准协议和最先进的 DRL 模型相比,增强型 SETL 在静态和动态场景中的吞吐量分别提高了 3.55% 至 43.73%,以及 3.98% 至 30.15%,同时在不同站点之间保持了接近 99% 的公平性指数,展示了其在各种网络条件下的有效性和适应性。
{"title":"Enhanced-SETL: A multi-variable deep reinforcement learning approach for contention window optimization in dense Wi-Fi networks","authors":"","doi":"10.1016/j.comnet.2024.110690","DOIUrl":"10.1016/j.comnet.2024.110690","url":null,"abstract":"<div><p>In this paper, we introduce the Enhanced Smart Exponential-Threshold-Linear (Enhanced-SETL) algorithm, a new approach that uses the multi-variable Deep Reinforcement Learning (DRL) framework to simultaneously optimize multiple settings of the Contention Window (CW) in IEEE 802.11 wireless networks. Unlike traditional DRL methods that adjust only a single CW parameter, our innovative approach simultaneously optimizes both the CW minimum (<span><math><mrow><mi>C</mi><msub><mi>W</mi><mrow><mi>m</mi><mi>i</mi><mi>n</mi></mrow></msub></mrow></math></span>) and CW Threshold (<span><math><mrow><mi>C</mi><msub><mi>W</mi><mrow><mi>T</mi><mi>h</mi><mi>r</mi><mi>e</mi><mi>s</mi><mi>h</mi><mi>o</mi><mi>l</mi><mi>d</mi></mrow></msub></mrow></math></span>), significantly improving network traffic control. We utilize a Double Deep <em>Q</em>-learning Network (DDQN) for dynamic updates of these CW settings, broadcasted across the dense Wi-Fi networks. This dual adjustment method, coupled with dynamic, data-driven updates, not only enhances throughput, but also reduces collision rates, and ensures fairness access across both static and dynamic wireless environments. Enhanced-SETL achieves a throughput improvement ranging from 3.55% up to 43.73% and from 3.98% up to 30.15% in static and dynamic scenarios over standard protocols and state-of-the-art DRL models, while maintaining a fairness index near 99% across diverse stations, showcasing its effectiveness and adaptability in various network conditions.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S138912862400522X/pdfft?md5=fe5bf107051a7089d2435b2d6188ffa5&pid=1-s2.0-S138912862400522X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative edge caching: A multi-agent deep reinforcement learning approach for cooperative replacement strategies 创新边缘缓存:合作替换策略的多代理深度强化学习方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110694

Cooperative edge caching has emerged as a promising solution to alleviate the traffic burden of backhaul and improve the Quality of Service of 5G applications in the 5G era. Several cooperative edge caching methods alleviate the traffic burden of backhaul by transmitting contents between edge nodes cooperatively, thereby reducing the delay of content transmission. However, these methods have a limited ability to handle complex information in multi-edge scenarios, and they mainly focus on cooperation in content transmission while scarcely considering cooperation in cache replacement. As a result, they cannot effectively utilize the cache space of collaborative edges, leading to suboptimal system utility. In this paper, we propose a cache replacement strategy for cooperative edge caching based on a novel multi-agent deep reinforcement learning network. Firstly, we present a cooperative edge caching model aimed at maximizing the system throughput. Then, we formulate the cache replacement process in the cooperative edge caching system as a Markov Game (MG) model. Finally, we design a Discrete MADDPG algorithm based on a discrete multi-agent actor-critic network to derive the cache replacement strategy and effectively manage content redundancy within the system. Simulation results demonstrate that our proposed algorithm achieves higher system throughput while effectively controlling content redundancy.

在 5G 时代,合作边缘缓存已成为减轻回程流量负担和提高 5G 应用服务质量的一种有前途的解决方案。几种合作边缘缓存方法通过在边缘节点之间合作传输内容来减轻回程的流量负担,从而减少内容传输的延迟。然而,这些方法处理多边缘场景中复杂信息的能力有限,而且主要侧重于内容传输方面的合作,很少考虑缓存替换方面的合作。因此,这些方法无法有效利用协作边缘的缓存空间,导致系统效用达不到最优。本文提出了一种基于新型多代理深度强化学习网络的合作边缘缓存的缓存替换策略。首先,我们提出了一个旨在最大化系统吞吐量的合作边缘缓存模型。然后,我们将合作边缘缓存系统中的缓存替换过程表述为马尔可夫博弈(MG)模型。最后,我们设计了一种基于离散多代理行为批判网络的离散 MADDPG 算法,以推导缓存替换策略并有效管理系统内的内容冗余。仿真结果表明,我们提出的算法在有效控制内容冗余的同时实现了更高的系统吞吐量。
{"title":"Innovative edge caching: A multi-agent deep reinforcement learning approach for cooperative replacement strategies","authors":"","doi":"10.1016/j.comnet.2024.110694","DOIUrl":"10.1016/j.comnet.2024.110694","url":null,"abstract":"<div><p>Cooperative edge caching has emerged as a promising solution to alleviate the traffic burden of backhaul and improve the Quality of Service of 5G applications in the 5G era. Several cooperative edge caching methods alleviate the traffic burden of backhaul by transmitting contents between edge nodes cooperatively, thereby reducing the delay of content transmission. However, these methods have a limited ability to handle complex information in multi-edge scenarios, and they mainly focus on cooperation in content transmission while scarcely considering cooperation in cache replacement. As a result, they cannot effectively utilize the cache space of collaborative edges, leading to suboptimal system utility. In this paper, we propose a cache replacement strategy for cooperative edge caching based on a novel multi-agent deep reinforcement learning network. Firstly, we present a cooperative edge caching model aimed at maximizing the system throughput. Then, we formulate the cache replacement process in the cooperative edge caching system as a Markov Game (MG) model. Finally, we design a Discrete MADDPG algorithm based on a discrete multi-agent actor-critic network to derive the cache replacement strategy and effectively manage content redundancy within the system. Simulation results demonstrate that our proposed algorithm achieves higher system throughput while effectively controlling content redundancy.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security 调查网络安全漏洞和加强无人机安全的对策
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110695

Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to around 43 billion USD by the 2025. With the increase in the usages, there is increase in cyber-attacks. So, Drone security and privacy are of major concern as they are used to perform the critical operations. The rapid adoption of UAVs in various sectors has prompted the need for robust and comprehensive cyber security measures. By implementing robust countermeasures, such as authentication, encryption etc. the risks posed by cyber threats can be significantly mitigated. The study investigates cyber security vulnerabilities and countermeasures in UAV systems within the scope of Authentication techniques, Physical Layer Security, Covert Communication. Relaying and Trajectory Optimization techniques are also discussed so that the flight trajectory can be optimized. It also discusses the communication modes used in UAV communication. An analysis of communication protocols is also carried out in this survey. The goal of the survey is to get the idea of cyber security threats involved in UAV communication. Our analysis emphasizes the importance of a holistic approach to UAV cyber security, leveraging the synergies among these domains to enhance overall resilience.

从监视、侦察等军事行动到运输、农业等商业活动,无人机和其他形式的无人驾驶飞行器(UAVs)的使用与日俱增。到 2025 年,无人机市场将增长到 430 亿美元左右。随着使用的增加,网络攻击也随之增加。因此,无人机的安全和隐私成为人们关注的焦点,因为它们被用来执行关键操作。无人机在各行各业的快速应用,促使人们需要采取强大而全面的网络安全措施。通过实施强有力的应对措施,如身份验证、加密等,可以大大降低网络威胁带来的风险。本研究从认证技术、物理层安全、隐蔽通信、中继和轨迹优化技术等方面研究了无人机系统的网络安全漏洞和应对措施。还讨论了中继和轨迹优化技术,以便优化飞行轨迹。报告还讨论了无人机通信中使用的通信模式。本研究还对通信协议进行了分析。调查的目的是了解无人飞行器通信中涉及的网络安全威胁。我们的分析强调了对无人机网络安全采取整体方法的重要性,利用这些领域之间的协同作用来增强整体复原力。
{"title":"Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security","authors":"","doi":"10.1016/j.comnet.2024.110695","DOIUrl":"10.1016/j.comnet.2024.110695","url":null,"abstract":"<div><p>Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to around 43 billion USD by the 2025. With the increase in the usages, there is increase in cyber-attacks. So, Drone security and privacy are of major concern as they are used to perform the critical operations. The rapid adoption of UAVs in various sectors has prompted the need for robust and comprehensive cyber security measures. By implementing robust countermeasures, such as authentication, encryption etc. the risks posed by cyber threats can be significantly mitigated. The study investigates cyber security vulnerabilities and countermeasures in UAV systems within the scope of Authentication techniques, Physical Layer Security, Covert Communication. Relaying and Trajectory Optimization techniques are also discussed so that the flight trajectory can be optimized. It also discusses the communication modes used in UAV communication. An analysis of communication protocols is also carried out in this survey. The goal of the survey is to get the idea of cyber security threats involved in UAV communication. Our analysis emphasizes the importance of a holistic approach to UAV cyber security, leveraging the synergies among these domains to enhance overall resilience.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on spectrum sharing techniques for 5G/B5G intelligent wireless networks: Opportunities, challenges and future research directions 关于 5G/B5G 智能无线网络频谱共享技术的全面调查:机遇、挑战和未来研究方向
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110697

The increasing popularity of the Internet of Everything and small-cell devices has enormously accelerated traffic loads. Consequently, increased bandwidth and high data rate requirements stimulate the operation at the millimeter wave and the Tera-Hertz spectrum bands in the fifth generation (5G) and beyond 5G (B5G) wireless networks. Furthermore, efficient spectrum allocation, maximizing the spectrum utilization, achieving efficient spectrum sharing (SS), and managing the spectrum to enhance the system performance remain challenging. To this end, recent studies have implemented artificial intelligence and machine learning techniques, enabling intelligent and efficient spectrum leveraging. However, despite many recent research advances focused on maximizing utilization of the spectrum bands, achieving efficient sharing, allocation, and management of the enormous available spectrum remains challenging. Therefore, the current article acquaints a comprehensive survey on intelligent SS methodologies for 5G and B5G wireless networks, considering the applications of artificial intelligence for efficient SS. Specifically, a thorough overview of SS methodologies is conferred, following which the various spectrum utilization opportunities arising from the existing SS methodologies in intelligent wireless networks are discussed. Subsequently, to highlight critical limitations of the existing methodologies, recent literature on existing SS methodologies is reviewed in detail, classifying them based on the implemented technology, i.e., cognitive radio, machine learning, blockchain, and multiple other techniques. Moreover, the related SS techniques are reviewed to highlight significant challenges in the B5G intelligent wireless network. Finally, to provide an insight into the prospective research avenues, the article is concluded by presenting several potential research directions and proposed solutions.

万物互联和小型蜂窝设备的日益普及极大地加快了流量负荷。因此,带宽和高数据速率要求的增加刺激了第五代(5G)和超越 5G(B5G)无线网络中毫米波和太赫兹频段的运行。此外,有效的频谱分配、最大化频谱利用率、实现有效的频谱共享(SS)以及管理频谱以提高系统性能仍然具有挑战性。为此,最近的研究采用了人工智能和机器学习技术,实现了智能、高效的频谱利用。然而,尽管最近的许多研究进展都集中在最大限度地提高频带利用率上,但实现巨大可用频谱的高效共享、分配和管理仍具有挑战性。因此,本文全面探讨了 5G 和 B5G 无线网络的智能 SS 方法,并考虑了人工智能在高效 SS 方面的应用。具体来说,本文首先对智能固态网络方法进行了全面概述,然后讨论了现有智能固态网络方法在智能无线网络中产生的各种频谱利用机会。随后,为了强调现有方法的关键局限性,详细回顾了有关现有 SS 方法的最新文献,并根据实施技术(即认知无线电、机器学习、区块链和其他多种技术)对其进行了分类。此外,还回顾了相关的 SS 技术,以突出 B5G 智能无线网络面临的重大挑战。最后,为了深入探讨前瞻性研究途径,文章通过提出几个潜在的研究方向和建议的解决方案进行了总结。
{"title":"A comprehensive survey on spectrum sharing techniques for 5G/B5G intelligent wireless networks: Opportunities, challenges and future research directions","authors":"","doi":"10.1016/j.comnet.2024.110697","DOIUrl":"10.1016/j.comnet.2024.110697","url":null,"abstract":"<div><p>The increasing popularity of the Internet of Everything and small-cell devices has enormously accelerated traffic loads. Consequently, increased bandwidth and high data rate requirements stimulate the operation at the millimeter wave and the Tera-Hertz spectrum bands in the fifth generation (5G) and beyond 5G (B5G) wireless networks. Furthermore, efficient spectrum allocation, maximizing the spectrum utilization, achieving efficient spectrum sharing (SS), and managing the spectrum to enhance the system performance remain challenging. To this end, recent studies have implemented artificial intelligence and machine learning techniques, enabling intelligent and efficient spectrum leveraging. However, despite many recent research advances focused on maximizing utilization of the spectrum bands, achieving efficient sharing, allocation, and management of the enormous available spectrum remains challenging. Therefore, the current article acquaints a comprehensive survey on intelligent SS methodologies for 5G and B5G wireless networks, considering the applications of artificial intelligence for efficient SS. Specifically, a thorough overview of SS methodologies is conferred, following which the various spectrum utilization opportunities arising from the existing SS methodologies in intelligent wireless networks are discussed. Subsequently, to highlight critical limitations of the existing methodologies, recent literature on existing SS methodologies is reviewed in detail, classifying them based on the implemented technology, i.e., cognitive radio, machine learning, blockchain, and multiple other techniques. Moreover, the related SS techniques are reviewed to highlight significant challenges in the B5G intelligent wireless network. Finally, to provide an insight into the prospective research avenues, the article is concluded by presenting several potential research directions and proposed solutions.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1