首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
Pulse: Multi-objective scheduling of service-based applications in multi-cluster cloud-edge-IoT infrastructures 脉冲:多集群云边缘物联网基础设施中基于服务的应用的多目标调度
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-02-10 DOI: 10.1016/j.jnca.2026.104439
Marlon Etheredge, Juan Aznar Poveda, Stefan Pedratscher, Abolfazl Younesi, Thomas Fahringer
{"title":"Pulse: Multi-objective scheduling of service-based applications in multi-cluster cloud-edge-IoT infrastructures","authors":"Marlon Etheredge, Juan Aznar Poveda, Stefan Pedratscher, Abolfazl Younesi, Thomas Fahringer","doi":"10.1016/j.jnca.2026.104439","DOIUrl":"https://doi.org/10.1016/j.jnca.2026.104439","url":null,"abstract":"","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"60 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2026-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146152962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and energy-aware detection of Mirai botnet for future 6G-enabled IoT networks 为未来支持6g的物联网网络提供强大的Mirai僵尸网络和能量感知检测
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-02-09 DOI: 10.1016/j.jnca.2026.104438
Zainab Alwaisi, Tanesh Kumar, Simone Soderi
Next-generation IoT wireless communication systems emphasise the importance and urgent need for energy-efficient security measures, thus requiring a balanced approach to address growing security vulnerabilities and fulfil energy demands in advanced wireless communication networks. However, the evolution of 6G networks and their integration with advanced technologies will revolutionise the IoT ecosystem while simultaneously introducing new security threats such as the Mirai malware, which targets IoT devices, infects multiple nodes, and depletes computational and energy resources. This study introduces a novel security algorithm designed to minimise energy consumption while effectively detecting botnet attacks at the smart device level. This research examines four distinct types of Mirai botnet attacks: scan, UDP, TCP, and ACK flooding.The experimental evaluation was conducted using real IoT device data collected from a Raspberry Pi setup combined with network traffic traces simulating the four Mirai attack scenarios to ensure realistic and reproducible results. Two ML algorithms, SVM and KNN, are employed to detect these botnet attacks, with each algorithm’s detection accuracy and energy efficiency thoroughly assessed. Results indicate that the proposed approach significantly enhances smart device security while minimising energy use. Findings show that the KNN algorithm outperforms SVM in terms of accuracy and energy efficiency for detecting Mirai botnet attacks, achieving detection rates above 99% across various attack types. This study highlights the importance of selecting suitable security techniques for IoT networks to address the evolving threats and energy demands of 6G-enabled wireless communication systems, providing valuable insights for future research.
下一代物联网无线通信系统强调节能安全措施的重要性和迫切需要,因此需要一种平衡的方法来解决日益增长的安全漏洞并满足先进无线通信网络的能源需求。然而,6G网络的发展及其与先进技术的集成将彻底改变物联网生态系统,同时引入新的安全威胁,如Mirai恶意软件,它以物联网设备为目标,感染多个节点,并消耗计算和能源资源。本研究介绍了一种新的安全算法,旨在最大限度地减少能源消耗,同时有效地检测智能设备级别的僵尸网络攻击。这项研究检查了四种不同类型的Mirai僵尸网络攻击:扫描、UDP、TCP和ACK洪水。实验评估使用了从树莓派设置中收集的真实物联网设备数据,并结合网络流量轨迹模拟了四种Mirai攻击场景,以确保结果的真实性和可重复性。采用SVM和KNN两种机器学习算法来检测这些僵尸网络攻击,并对每种算法的检测精度和能量效率进行了全面评估。结果表明,所提出的方法显着提高了智能设备的安全性,同时最大限度地减少了能源使用。研究结果表明,KNN算法在检测Mirai僵尸网络攻击的准确率和能量效率方面优于SVM,在各种攻击类型中检测率均在99%以上。该研究强调了为物联网网络选择合适的安全技术以应对不断变化的威胁和支持6g无线通信系统的能源需求的重要性,为未来的研究提供了有价值的见解。
{"title":"Robust and energy-aware detection of Mirai botnet for future 6G-enabled IoT networks","authors":"Zainab Alwaisi, Tanesh Kumar, Simone Soderi","doi":"10.1016/j.jnca.2026.104438","DOIUrl":"https://doi.org/10.1016/j.jnca.2026.104438","url":null,"abstract":"Next-generation IoT wireless communication systems emphasise the importance and urgent need for energy-efficient security measures, thus requiring a balanced approach to address growing security vulnerabilities and fulfil energy demands in advanced wireless communication networks. However, the evolution of 6G networks and their integration with advanced technologies will revolutionise the IoT ecosystem while simultaneously introducing new security threats such as the Mirai malware, which targets IoT devices, infects multiple nodes, and depletes computational and energy resources. This study introduces a novel security algorithm designed to minimise energy consumption while effectively detecting botnet attacks at the smart device level. This research examines four distinct types of Mirai botnet attacks: scan, UDP, TCP, and ACK flooding.The experimental evaluation was conducted using real IoT device data collected from a Raspberry Pi setup combined with network traffic traces simulating the four Mirai attack scenarios to ensure realistic and reproducible results. Two ML algorithms, SVM and KNN, are employed to detect these botnet attacks, with each algorithm’s detection accuracy and energy efficiency thoroughly assessed. Results indicate that the proposed approach significantly enhances smart device security while minimising energy use. Findings show that the KNN algorithm outperforms SVM in terms of accuracy and energy efficiency for detecting Mirai botnet attacks, achieving detection rates above 99% across various attack types. This study highlights the importance of selecting suitable security techniques for IoT networks to address the evolving threats and energy demands of 6G-enabled wireless communication systems, providing valuable insights for future research.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"1 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146146704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized detection of DDoS attack patterns using machine learning models 使用机器学习模型的DDoS攻击模式的广义检测
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-02-06 DOI: 10.1016/j.jnca.2026.104441
Razvan Bocu, Maksim Iavich
{"title":"Generalized detection of DDoS attack patterns using machine learning models","authors":"Razvan Bocu, Maksim Iavich","doi":"10.1016/j.jnca.2026.104441","DOIUrl":"https://doi.org/10.1016/j.jnca.2026.104441","url":null,"abstract":"","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"48 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Immersive intelligence: ST-GNN guided and RL-optimized multimodal intent-driven Kubernetes Orchestration for 6G resource management 沉浸式智能:用于6G资源管理的ST-GNN引导和rl优化的多模态意图驱动的Kubernetes编排
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-02-05 DOI: 10.1016/j.jnca.2026.104440
Muhammad Asif, Wang-Cheol Song, Yeo-Chan Yoon
{"title":"Immersive intelligence: ST-GNN guided and RL-optimized multimodal intent-driven Kubernetes Orchestration for 6G resource management","authors":"Muhammad Asif, Wang-Cheol Song, Yeo-Chan Yoon","doi":"10.1016/j.jnca.2026.104440","DOIUrl":"https://doi.org/10.1016/j.jnca.2026.104440","url":null,"abstract":"","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"39 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2026-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Color Based Allocation (CBA) approach for managing high user density in 6G Networks 基于颜色分配(CBA)的6G网络高用户密度管理方法
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.jnca.2026.104437
Anutusha Dogra, Rakesh Kumar Jha
{"title":"Color Based Allocation (CBA) approach for managing high user density in 6G Networks","authors":"Anutusha Dogra, Rakesh Kumar Jha","doi":"10.1016/j.jnca.2026.104437","DOIUrl":"https://doi.org/10.1016/j.jnca.2026.104437","url":null,"abstract":"","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"29 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146089495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic dependency-aware vulnerability and patch management for critical interconnected systems 关键互联系统的动态依赖感知漏洞和补丁管理
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-27 DOI: 10.1016/j.jnca.2026.104436
Umar Sa’ad , Woongsoo Na , Nhu-Ngoc Dao , Sungrae Cho
Critical infrastructure systems characterized by complex interdependencies face significant challenges in vulnerability management due to cascading risk propagation through interconnected components. Traditional approaches that individually prioritize vulnerabilities inefficiently manage these dependency structures, leading to suboptimal security outcomes. This paper introduces an adaptive dependency-aware patching technique (ADAPT), a dynamic vulnerability and patch management framework that integrates formal dependency modeling with reinforcement learning to optimize patching strategies for critical interconnected systems. The proposed approach employs a mathematical formulation to capture direct and transitive dependencies via reachability matrices, enabling precise quantification of cascading risk propagation. The framework dynamically adapts patching decisions under resource constraints using proximal policy optimization within a constrained Markov decision process formulation. Comprehensive evaluation across 954 system configurations and six baseline strategies demonstrates consistent performance improvements, with 5.5% advantage over state-of-the-art NSGA-II multi-objective optimization while achieving 1513× computational speedup. Optimality gap analysis reveals 4.33% average deviation from theoretical bounds, validating the framework’s near-optimal solution quality. A critical infrastructure case study confirms practical applicability, with ADAPT achieving 89.7% risk reduction compared to 86.4% for sophisticated baseline methods, while enabling real-time decision-making through sub-second computation times. The results demonstrate superior performance under high dependency density and resource constraints, highlighting the framework’s suitability for environments where cascading failures pose operational threats.
具有复杂相互依赖关系的关键基础设施系统由于风险通过互联组件级联传播,在漏洞管理方面面临重大挑战。单独对漏洞进行优先级排序的传统方法无法有效地管理这些依赖关系结构,从而导致次优的安全性结果。本文介绍了一种自适应依赖感知补丁技术(ADAPT),这是一种动态漏洞和补丁管理框架,它将形式化依赖建模与强化学习相结合,以优化关键互联系统的补丁策略。所提出的方法采用数学公式通过可达性矩阵捕获直接和传递的依赖关系,从而实现级联风险传播的精确量化。该框架利用约束马尔可夫决策过程公式中的近端策略优化来动态适应资源约束下的补丁决策。对954个系统配置和6个基线策略的综合评估显示了一致的性能改进,在实现1,513×computational加速的同时,比最先进的NSGA-II多目标优化优势5.5%。最优性差距分析显示,与理论边界的平均偏差为4.33%,验证了框架的近最优解质量。关键基础设施案例研究证实了其实际适用性,与复杂基线方法相比,ADAPT的风险降低率为89.7%,同时通过亚秒级的计算时间实现实时决策。结果显示了在高依赖密度和资源约束下的卓越性能,突出了框架对级联故障构成操作威胁的环境的适用性。
{"title":"Dynamic dependency-aware vulnerability and patch management for critical interconnected systems","authors":"Umar Sa’ad ,&nbsp;Woongsoo Na ,&nbsp;Nhu-Ngoc Dao ,&nbsp;Sungrae Cho","doi":"10.1016/j.jnca.2026.104436","DOIUrl":"10.1016/j.jnca.2026.104436","url":null,"abstract":"<div><div>Critical infrastructure systems characterized by complex interdependencies face significant challenges in vulnerability management due to cascading risk propagation through interconnected components. Traditional approaches that individually prioritize vulnerabilities inefficiently manage these dependency structures, leading to suboptimal security outcomes. This paper introduces an adaptive dependency-aware patching technique (ADAPT), a dynamic vulnerability and patch management framework that integrates formal dependency modeling with reinforcement learning to optimize patching strategies for critical interconnected systems. The proposed approach employs a mathematical formulation to capture direct and transitive dependencies via reachability matrices, enabling precise quantification of cascading risk propagation. The framework dynamically adapts patching decisions under resource constraints using proximal policy optimization within a constrained Markov decision process formulation. Comprehensive evaluation across 954 system configurations and six baseline strategies demonstrates consistent performance improvements, with 5.5% advantage over state-of-the-art NSGA-II multi-objective optimization while achieving 1513× computational speedup. Optimality gap analysis reveals 4.33% average deviation from theoretical bounds, validating the framework’s near-optimal solution quality. A critical infrastructure case study confirms practical applicability, with ADAPT achieving 89.7% risk reduction compared to 86.4% for sophisticated baseline methods, while enabling real-time decision-making through sub-second computation times. The results demonstrate superior performance under high dependency density and resource constraints, highlighting the framework’s suitability for environments where cascading failures pose operational threats.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"248 ","pages":"Article 104436"},"PeriodicalIF":8.0,"publicationDate":"2026-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146056010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ILAD: A hardware-efficient authenticated encryption scheme for VANET applications based on Ascon ILAD:基于Ascon的VANET应用程序的硬件高效身份验证加密方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-22 DOI: 10.1016/j.jnca.2026.104428
Jiali Tang, Lang Li, Xingqi Yue
The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has intensified the need for secure and efficient communication protocols, particularly in resource-constrained environments. Conventional encryption schemes offer strong security but frequently underperform in terms of computational efficiency and resource utilization due to their high complexity and resource demands. Ascon, a widely adopted lightweight encryption algorithm, provides robust security but poses challenges in hardware optimization. This paper introduces ILAD, a hardware-efficient authenticated encryption algorithm specifically designed for VANET applications. ILAD improves security and reduces resource overhead by optimizing key components within the round function and restructuring the sponge construction to enhance module reusability and hardware efficiency. The S-box is constructed using a Tent map-based chaotic system and refined through iterative optimization to ensure strong cryptographic properties and minimal resource usage, implemented with area-saving MOAI1 logic gates. Experimental results demonstrate that ILAD achieves a 36.1% reduction in S-box area and a 15.2% reduction in total area under UMC 0.18μm process technology. The algorithm has been successfully deployed on the i.MX6ULL_PRO development board, a Cortex-A7-based low-power processor platform, where it achieved stable performance with low latency and energy consumption. Comprehensive security evaluations confirm ILAD’s robustness against various cryptanalytic attacks, making it a strong candidate for secure and lightweight VANET deployments.
车辆自组织网络(vanet)的迅速扩展,加强了对安全和高效通信协议的需求,特别是在资源受限的环境中。传统的加密方案具有较强的安全性,但由于其较高的复杂性和资源需求,在计算效率和资源利用率方面往往表现不佳。Ascon是一种被广泛采用的轻量级加密算法,它提供了强大的安全性,但在硬件优化方面提出了挑战。本文介绍了一种专为VANET应用而设计的硬件高效认证加密算法ILAD。ILAD通过优化round功能内的关键组件,重构海绵结构,提高模块的可重用性和硬件效率,提高了安全性,降低了资源开销。S-box使用基于Tent映射的混沌系统构建,并通过迭代优化进行改进,以确保强大的密码特性和最小的资源使用,并使用节省面积的MOAI1逻辑门实现。实验结果表明,在UMC 0.18μm工艺下,ILAD的s盒面积减小了36.1%,总面积减小了15.2%。该算法已成功部署在基于cortex - a7的低功耗处理器平台i.MX6ULL_PRO开发板上,实现了低延迟和低能耗的稳定性能。全面的安全评估证实了ILAD对各种密码分析攻击的稳健性,使其成为安全和轻量级VANET部署的有力候选者。
{"title":"ILAD: A hardware-efficient authenticated encryption scheme for VANET applications based on Ascon","authors":"Jiali Tang,&nbsp;Lang Li,&nbsp;Xingqi Yue","doi":"10.1016/j.jnca.2026.104428","DOIUrl":"10.1016/j.jnca.2026.104428","url":null,"abstract":"<div><div>The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has intensified the need for secure and efficient communication protocols, particularly in resource-constrained environments. Conventional encryption schemes offer strong security but frequently underperform in terms of computational efficiency and resource utilization due to their high complexity and resource demands. Ascon, a widely adopted lightweight encryption algorithm, provides robust security but poses challenges in hardware optimization. This paper introduces ILAD, a hardware-efficient authenticated encryption algorithm specifically designed for VANET applications. ILAD improves security and reduces resource overhead by optimizing key components within the round function and restructuring the sponge construction to enhance module reusability and hardware efficiency. The S-box is constructed using a Tent map-based chaotic system and refined through iterative optimization to ensure strong cryptographic properties and minimal resource usage, implemented with area-saving MOAI1 logic gates. Experimental results demonstrate that ILAD achieves a 36.1% reduction in S-box area and a 15.2% reduction in total area under UMC <span><math><mrow><mn>0</mn><mo>.</mo><mn>18</mn><mspace></mspace><mi>μ</mi><mi>m</mi></mrow></math></span> process technology. The algorithm has been successfully deployed on the i.MX6ULL_PRO development board, a Cortex-A7-based low-power processor platform, where it achieved stable performance with low latency and energy consumption. Comprehensive security evaluations confirm ILAD’s robustness against various cryptanalytic attacks, making it a strong candidate for secure and lightweight VANET deployments.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"248 ","pages":"Article 104428"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146033298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redefining resilience: A hybrid quantum-fuzzy Deep Q-Network paradigm for perpetual wireless rechargeable sensor networks 重新定义弹性:用于永久无线可充电传感器网络的混合量子模糊深度q -网络范式
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-20 DOI: 10.1016/j.jnca.2026.104427
Riya Goyal, Abhinav Tomar
Wireless Rechargeable Sensor Networks (WRSNs) offer a transformative solution to energy constraints in remote and mission-critical Internet of Things (IoT) environments by leveraging Wireless Energy Transfer (WET). However, current state-of-the-art approaches often suffer from limited scalability, inefficient energy scheduling, and inadequate adaptability to dynamic network states. Key challenges such as optimal mobile charger (MC) deployment, cooperative multi-agent scheduling, and intelligent threshold determination for on-demand charging remain insufficiently addressed—particularly in large-scale, real-time WRSNs. This paper proposes a novel hybrid framework that integrates Deep Q-Networks (DQNs) with a Quantum-Inspired Fuzzy Logic (QIFL) model for resilient and perpetual energy replenishment. To overcome spatial and load imbalances, an Enhanced Black Hole Optimization (EBHO) technique is used for partitioning the network and deploying MCs optimally. Unlike prior work, the proposed approach dynamically adapts charging thresholds using QIFL, capturing nonlinear energy consumption patterns and spatial heterogeneity. A multi-agent DQN model is deployed to handle high-dimensional state–action spaces, facilitating decentralized decision-making under uncertainty. Further, a proximity-aware charging mechanism, empowered by an improved Adaptive Genetic Algorithm (AGA), ensures real-time task redistribution among MCs, maintaining network longevity and zero sensor node failure. Experimental results demonstrate a 19.59% improvement in energy utilization and complete elimination of dead nodes compared to leading benchmarks, establishing the superiority of the proposed scheme for large-scale, adaptive, and sustainable WRSN operations.
无线可充电传感器网络(WRSNs)通过利用无线能量传输(WET)技术,为远程和关键任务物联网(IoT)环境中的能源限制提供了一种变革性解决方案。然而,目前最先进的方法往往存在可扩展性有限、能量调度效率低下以及对动态网络状态适应性不足的问题。诸如优化移动充电器(MC)部署、协作式多智能体调度和按需充电的智能阈值确定等关键挑战仍然没有得到充分解决,特别是在大规模、实时的WRSNs中。本文提出了一种新的混合框架,该框架将深度q网络(DQNs)与量子启发模糊逻辑(QIFL)模型相结合,用于弹性和永久能量补充。为了克服空间和负载不平衡,采用增强黑洞优化(EBHO)技术对网络进行分区和优化部署。与之前的工作不同,该方法使用QIFL动态调整充电阈值,捕捉非线性能量消耗模式和空间异质性。采用多智能体DQN模型处理高维状态-动作空间,促进不确定情况下的分散决策。此外,通过改进的自适应遗传算法(AGA),就近感知收费机制确保了mc之间的实时任务重新分配,保持了网络寿命和零传感器节点故障。实验结果表明,与领先基准相比,该方案在能源利用率和完全消除死节点方面提高了19.59%,证明了该方案在大规模、自适应和可持续WRSN运行方面的优势。
{"title":"Redefining resilience: A hybrid quantum-fuzzy Deep Q-Network paradigm for perpetual wireless rechargeable sensor networks","authors":"Riya Goyal,&nbsp;Abhinav Tomar","doi":"10.1016/j.jnca.2026.104427","DOIUrl":"10.1016/j.jnca.2026.104427","url":null,"abstract":"<div><div>Wireless Rechargeable Sensor Networks (WRSNs) offer a transformative solution to energy constraints in remote and mission-critical Internet of Things (IoT) environments by leveraging Wireless Energy Transfer (WET). However, current state-of-the-art approaches often suffer from limited scalability, inefficient energy scheduling, and inadequate adaptability to dynamic network states. Key challenges such as optimal mobile charger (MC) deployment, cooperative multi-agent scheduling, and intelligent threshold determination for on-demand charging remain insufficiently addressed—particularly in large-scale, real-time WRSNs. This paper proposes a novel hybrid framework that integrates Deep Q-Networks (DQNs) with a Quantum-Inspired Fuzzy Logic (QIFL) model for resilient and perpetual energy replenishment. To overcome spatial and load imbalances, an Enhanced Black Hole Optimization (EBHO) technique is used for partitioning the network and deploying MCs optimally. Unlike prior work, the proposed approach dynamically adapts charging thresholds using QIFL, capturing nonlinear energy consumption patterns and spatial heterogeneity. A multi-agent DQN model is deployed to handle high-dimensional state–action spaces, facilitating decentralized decision-making under uncertainty. Further, a proximity-aware charging mechanism, empowered by an improved Adaptive Genetic Algorithm (AGA), ensures real-time task redistribution among MCs, maintaining network longevity and zero sensor node failure. Experimental results demonstrate a 19.59% improvement in energy utilization and complete elimination of dead nodes compared to leading benchmarks, establishing the superiority of the proposed scheme for large-scale, adaptive, and sustainable WRSN operations.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"248 ","pages":"Article 104427"},"PeriodicalIF":8.0,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The DPC-LSTM-MD scheme for detecting selective forwarding attack under variable environment in event-driven wireless sensor networks 事件驱动无线传感器网络中可变环境下选择性转发攻击检测的DPC-LSTM-MD方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-29 DOI: 10.1016/j.jnca.2025.104411
Yilun Ma, Yuanming Wu
In an event-driven wireless sensor network (EWSN), events occur randomly, prompting sensor nodes within the event area to detect and transmit data packets to a sink via router nodes (RNs) through multi-hop communication. Some RNs, referred to as malicious nodes, may launch selective forwarding attacks by selectively dropping part or all of the received packets. Additionally, harsh environmental conditions can degrade channel quality, sometimes forcing RNs to abandon forwarding data packets. Under these conditions, it becomes challenging to distinguish malicious nodes from normal nodes solely based on their packet forwarding rates. To address this issue, we propose the DPC-LSTM-MD scheme to detect selective forwarding attacks. This approach utilizes the time series of nodes’ packet forwarding behaviors as a dataset. The Density Peaks Clustering (DPC) method is employed to extract features representative of normal node behavior. Subsequently, a Long Short-Term Memory (LSTM) network predicts the single round forwarding rate (SFR) of nodes in the next time series interval. Based on the prediction error, we apply the minimum density (MD) method combined with the 3-sigma rule to identify and isolate malicious nodes. Our results demonstrate that the DPC-LSTM-MD scheme achieves a low false detection rate (FDR) of 2% and a low missed detection rate (MDR) of 3%, significantly improving network throughput.
在事件驱动的无线传感器网络(EWSN)中,事件是随机发生的,事件区域内的传感器节点通过多跳通信的方式检测数据包,并通过路由器节点(RNs)将数据包发送到sink。有些rn被称为恶意节点,可能会选择性地丢弃部分或全部接收到的报文,从而发起选择性转发攻击。此外,恶劣的环境条件会降低信道质量,有时会迫使RNs放弃转发数据包。在这种情况下,仅根据报文转发速率来区分恶意节点和正常节点变得很有挑战性。为了解决这个问题,我们提出了DPC-LSTM-MD方案来检测选择性转发攻击。该方法利用节点数据包转发行为的时间序列作为数据集。采用密度峰聚类(DPC)方法提取正常节点行为的特征。随后,LSTM (Long - short - Memory)网络预测下一个时间序列间隔内节点的单轮转发速率(SFR)。基于预测误差,我们采用最小密度(MD)方法结合3-sigma规则来识别和隔离恶意节点。我们的研究结果表明,DPC-LSTM-MD方案实现了2%的低误检率(FDR)和3%的低漏检率(MDR),显著提高了网络吞吐量。
{"title":"The DPC-LSTM-MD scheme for detecting selective forwarding attack under variable environment in event-driven wireless sensor networks","authors":"Yilun Ma,&nbsp;Yuanming Wu","doi":"10.1016/j.jnca.2025.104411","DOIUrl":"10.1016/j.jnca.2025.104411","url":null,"abstract":"<div><div>In an event-driven wireless sensor network (EWSN), events occur randomly, prompting sensor nodes within the event area to detect and transmit data packets to a sink via router nodes (RNs) through multi-hop communication. Some RNs, referred to as malicious nodes, may launch selective forwarding attacks by selectively dropping part or all of the received packets. Additionally, harsh environmental conditions can degrade channel quality, sometimes forcing RNs to abandon forwarding data packets. Under these conditions, it becomes challenging to distinguish malicious nodes from normal nodes solely based on their packet forwarding rates. To address this issue, we propose the DPC-LSTM-MD scheme to detect selective forwarding attacks. This approach utilizes the time series of nodes’ packet forwarding behaviors as a dataset. The Density Peaks Clustering (DPC) method is employed to extract features representative of normal node behavior. Subsequently, a Long Short-Term Memory (LSTM) network predicts the single round forwarding rate (SFR) of nodes in the next time series interval. Based on the prediction error, we apply the minimum density (MD) method combined with the 3-sigma rule to identify and isolate malicious nodes. Our results demonstrate that the DPC-LSTM-MD scheme achieves a low false detection rate (FDR) of 2% and a low missed detection rate (MDR) of 3%, significantly improving network throughput.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104411"},"PeriodicalIF":8.0,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A piecewise chaotic starfish optimization algorithm for energy-efficient coverage in wireless sensor networks 一种用于无线传感器网络节能覆盖的分段混沌海星优化算法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-25 DOI: 10.1016/j.jnca.2025.104410
Muhammad Suhail Shaikh , Shuwei Qiu , Xiaoqing Dong , Chang Wang , Wulfran Fendzi Mbasso
Enhancing coverage and reducing energy consumption are fundamental challenges in wireless sensor networks (WSNs) for high-volume and data-intensive deployment. WSNs play an important role in emerging technologies and face practical limitations, particularly related to coverage and energy consumption. Strategical placement of these sensor nodes is important to ensure service quality; however, many existing optimization algorithms for sensor node placement struggle with low coverage rate and high energy consumption. A significant issue lies in determining the optimal sensor node locations, as these significantly influence the network's coverage and energy consumption. This work presented a Piecewise Chaotic Starfish Optimization Algorithm (CSFOA) for addressing the challenge of optimizing the sensor node placement to maximize coverage and minimize energy consumption in WSNs. The integration of the piecewise chaotic map enhances the convergence and exploration capacity of the algorithm in identifying better solutions. The effectiveness of CSFOA is confirmed by a range of diverse benchmark functions as unimodal, multimodal, fixed, and variable, proving its excellence in optimization performance. CSFOA obtained better results for sensor node deployment in real test cases. For instance, in Test System 1 with 20 nodes, the coverage rate is 97.4757 % and the energy consumption is 0.29967 nJ/bit. In Test System 2 with 30 nodes, the coverage is 99.9713 % and the energy consumption is 3.2193 nJ/bit. Test System 3 with 40 nodes has a 98.8690 % coverage rate and energy consumption of 5.1107 nJ/bit. Compared to CMFO, CSSA, CPSO, SFOA, MFO, SSA, and PSO algorithms, CSFOA realizes an average improvement of 16.41 %, 5.36 %, 3.45 %, 2.371 %, 2.80 %, and 2.18 % on various evaluation metrics. These results underscore the algorithm's capability in balancing coverage and energy efficiency enhancement, and they confirm the algorithm's value as a more effective solution to sensor node deployment issues in different applications.
增强覆盖和降低能耗是无线传感器网络(wsn)在大容量和数据密集型部署中的基本挑战。无线传感器网络在新兴技术中发挥着重要作用,但也面临着实际的限制,特别是在覆盖和能耗方面。这些传感器节点的战略布局对于确保服务质量非常重要;然而,现有的传感器节点布局优化算法存在着低覆盖率和高能耗的问题。一个重要的问题在于确定传感器节点的最佳位置,因为这些位置会显著影响网络的覆盖范围和能耗。本文提出了一种分段混沌海星优化算法(CSFOA),用于解决优化传感器节点位置以最大化覆盖范围和最小化能量消耗的挑战。分段混沌映射的集成增强了算法的收敛性和探索能力,从而识别出更好的解。通过单峰、多峰、固定和可变等多种基准函数,验证了CSFOA的有效性,证明了其优化性能的优越性。在实际的测试用例中,CSFOA获得了更好的传感器节点部署结果。例如,在20个节点的测试系统1中,覆盖率为97.4757%,能耗为0.29967 nJ/bit。在30个节点的测试系统2中,覆盖率为99.9713%,能耗为3.2193 nJ/bit。测试系统3有40个节点,覆盖率为98.8690%,能耗为5.1107 nJ/bit。与CMFO、CSSA、CPSO、SFOA、MFO、SSA和PSO算法相比,CSFOA算法在各项评价指标上平均提高了16.41%、5.36%、3.45%、2.371%、2.80%和2.18%。这些结果强调了该算法在平衡覆盖范围和提高能效方面的能力,并证实了该算法作为不同应用中传感器节点部署问题的更有效解决方案的价值。
{"title":"A piecewise chaotic starfish optimization algorithm for energy-efficient coverage in wireless sensor networks","authors":"Muhammad Suhail Shaikh ,&nbsp;Shuwei Qiu ,&nbsp;Xiaoqing Dong ,&nbsp;Chang Wang ,&nbsp;Wulfran Fendzi Mbasso","doi":"10.1016/j.jnca.2025.104410","DOIUrl":"10.1016/j.jnca.2025.104410","url":null,"abstract":"<div><div>Enhancing coverage and reducing energy consumption are fundamental challenges in wireless sensor networks (WSNs) for high-volume and data-intensive deployment. WSNs play an important role in emerging technologies and face practical limitations, particularly related to coverage and energy consumption. Strategical placement of these sensor nodes is important to ensure service quality; however, many existing optimization algorithms for sensor node placement struggle with low coverage rate and high energy consumption. A significant issue lies in determining the optimal sensor node locations, as these significantly influence the network's coverage and energy consumption. This work presented a Piecewise Chaotic Starfish Optimization Algorithm (CSFOA) for addressing the challenge of optimizing the sensor node placement to maximize coverage and minimize energy consumption in WSNs. The integration of the piecewise chaotic map enhances the convergence and exploration capacity of the algorithm in identifying better solutions. The effectiveness of CSFOA is confirmed by a range of diverse benchmark functions as unimodal, multimodal, fixed, and variable, proving its excellence in optimization performance. CSFOA obtained better results for sensor node deployment in real test cases. For instance, in Test System 1 with 20 nodes, the coverage rate is 97.4757 % and the energy consumption is 0.29967 nJ/bit. In Test System 2 with 30 nodes, the coverage is 99.9713 % and the energy consumption is 3.2193 nJ/bit. Test System 3 with 40 nodes has a 98.8690 % coverage rate and energy consumption of 5.1107 nJ/bit. Compared to CMFO, CSSA, CPSO, SFOA, MFO, SSA, and PSO algorithms, CSFOA realizes an average improvement of 16.41 %, 5.36 %, 3.45 %, 2.371 %, 2.80 %, and 2.18 % on various evaluation metrics. These results underscore the algorithm's capability in balancing coverage and energy efficiency enhancement, and they confirm the algorithm's value as a more effective solution to sensor node deployment issues in different applications.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104410"},"PeriodicalIF":8.0,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145845509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1