首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
DACS: Distributed adjustable computation scheme in highly scalable data center networks based on multi-protection routing DACS:基于多保护路由的高可扩展数据中心网络分布式可调计算方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-24 DOI: 10.1016/j.jnca.2025.104425
Wanling Lin , Jou-Ming Chang , Xiao-Yan Li
In data center networks (DCNs), many value-added services involving multiple tenants and distributed sites can be naturally modeled as multi-party communication (MPC) processes, where participants exchange information across infrastructures to support collaborative computation. For MPC, it usually ensures that the private data of the multiple parties involved in the collaborative computation are safe, the computational results maintain acceptable accuracy, and all participants are in the same fair position in a distributed environment. This article considers an unexplored application based on MPC called the distributed adjustable computation scheme (DACS), which allows computation to be invoked when the collected data reaches a specified threshold in the communication. We developed a distributed algorithm using secure multi-protection routing to enable DACS. The proposed algorithm guarantees that each private data can be successfully delivered to the desired recipient even if any faulty component (including server or link) exists in the network. Also, no other than the destination can receive the complete private data. We implement DACS on highly scalable data center networks. Through simulation, experimental results show that DACS is highly reliable and achieves high security efficiency.
在数据中心网络(dcn)中,许多涉及多个租户和分布式站点的增值服务可以自然地建模为多方通信(MPC)过程,其中参与者跨基础设施交换信息以支持协作计算。对于MPC来说,通常要保证参与协同计算的多方的私有数据是安全的,计算结果保持可接受的准确性,并且在分布式环境中所有参与者都处于同样公平的地位。本文考虑一种未开发的基于MPC的应用程序,称为分布式可调计算方案(DACS),它允许在收集的数据达到通信中的指定阈值时调用计算。我们开发了一种使用安全多保护路由的分布式算法来实现DACS。该算法保证了即使网络中存在任何故障组件(包括服务器或链路),每个私有数据也能成功地传递到期望的接收方。此外,只有目的地才能接收到完整的私有数据。我们在高度可扩展的数据中心网络上实现DACS。仿真实验结果表明,DACS具有较高的可靠性和安全效率。
{"title":"DACS: Distributed adjustable computation scheme in highly scalable data center networks based on multi-protection routing","authors":"Wanling Lin ,&nbsp;Jou-Ming Chang ,&nbsp;Xiao-Yan Li","doi":"10.1016/j.jnca.2025.104425","DOIUrl":"10.1016/j.jnca.2025.104425","url":null,"abstract":"<div><div>In data center networks (DCNs), many value-added services involving multiple tenants and distributed sites can be naturally modeled as multi-party communication (MPC) processes, where participants exchange information across infrastructures to support collaborative computation. For MPC, it usually ensures that the private data of the multiple parties involved in the collaborative computation are safe, the computational results maintain acceptable accuracy, and all participants are in the same fair position in a distributed environment. This article considers an unexplored application based on MPC called the distributed adjustable computation scheme (DACS), which allows computation to be invoked when the collected data reaches a specified threshold in the communication. We developed a distributed algorithm using secure multi-protection routing to enable DACS. The proposed algorithm guarantees that each private data can be successfully delivered to the desired recipient even if any faulty component (including server or link) exists in the network. Also, no other than the destination can receive the complete private data. We implement DACS on highly scalable data center networks. Through simulation, experimental results show that DACS is highly reliable and achieves high security efficiency.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104425"},"PeriodicalIF":8.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart parking optimization with software defined networking and blockchain: SPOSChain 基于软件定义网络和b区块链:SPOSChain的智能停车优化
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-22 DOI: 10.1016/j.jnca.2025.104414
Huseyin Ozgur Kamali , Ali Berkay Gorgulu , Murat Karakus , Evrim Guler , Suleyman Uludag
The growing pressures of urbanization, vehicular proliferation, and fragmented parking infrastructure pose significant sustainability and mobility challenges in modern cities. In response, we present SPOSChain (Smart Parking Optimization with SDN and Blockchain), a novel Blockchain-enhanced and Software-Defined Networking (SDN)-based smart parking system that unifies independent parking providers under a decentralized, intelligent coordination framework. SPOSChain introduces a four-layer architecture integrating IoT, data, control, and blockchain layers, to ensure transparency, scalability, and real-time responsiveness. The core parking assignment task is formulated as a fairness-driven optimization problem, which is mathematically equivalent to a parallel job scheduling problem, known to be NP-hard, thereby necessitating the development of efficient heuristic strategies. To this end, we propose, adopt, and evaluate multiple heuristic and hybrid algorithms, including Local Search, Branch-and-Bound, and Genetic Search, culminating in a time-aware Hybrid Search model. Simulation results under diverse vehicle arrival distributions (uniform, normal, and exponential) demonstrate that our approach significantly reduces load imbalance, quantified via the Total of Differences metric, while improving responsiveness and maintaining scalability. SPOSChain not only enables equitable and efficient parking allocation but also supports sustainable urban mobility by reducing driver search time, CO2 emissions, and network overhead. These results underscore the transformative potential of programmable, decentralized parking systems in future smart city infrastructures.
城市化、车辆激增和零散的停车基础设施带来的日益增长的压力,对现代城市的可持续性和流动性构成了重大挑战。作为回应,我们提出了SPOSChain(基于SDN和区块链的智能停车优化),这是一种新型的基于区块链增强和软件定义网络(SDN)的智能停车系统,它将独立的停车提供商统一在一个分散的智能协调框架下。SPOSChain引入了集成物联网、数据、控制和区块链层的四层架构,以确保透明度、可扩展性和实时响应能力。核心停车分配任务是一个公平驱动的优化问题,它在数学上相当于一个并行作业调度问题,被称为NP-hard,因此需要开发有效的启发式策略。为此,我们提出、采用并评估了多种启发式和混合算法,包括局部搜索、分支定界和遗传搜索,最终形成了具有时间意识的混合搜索模型。不同车辆到达分布(均匀分布、正态分布和指数分布)下的仿真结果表明,我们的方法显著降低了负载不平衡(通过Total of Differences度量进行量化),同时提高了响应能力并保持了可扩展性。SPOSChain不仅能实现公平高效的停车分配,还能通过减少驾驶员搜索时间、二氧化碳排放和网络开销来支持可持续的城市交通。这些结果强调了可编程的、分散的停车系统在未来智慧城市基础设施中的变革潜力。
{"title":"Smart parking optimization with software defined networking and blockchain: SPOSChain","authors":"Huseyin Ozgur Kamali ,&nbsp;Ali Berkay Gorgulu ,&nbsp;Murat Karakus ,&nbsp;Evrim Guler ,&nbsp;Suleyman Uludag","doi":"10.1016/j.jnca.2025.104414","DOIUrl":"10.1016/j.jnca.2025.104414","url":null,"abstract":"<div><div>The growing pressures of urbanization, vehicular proliferation, and fragmented parking infrastructure pose significant sustainability and mobility challenges in modern cities. In response, we present <span>SPOSChain</span> (Smart Parking Optimization with SDN and Blockchain), a novel Blockchain-enhanced and Software-Defined Networking (SDN)-based smart parking system that unifies independent parking providers under a decentralized, intelligent coordination framework. <span>SPOSChain</span> introduces a four-layer architecture integrating IoT, data, control, and blockchain layers, to ensure transparency, scalability, and real-time responsiveness. The core parking assignment task is formulated as a fairness-driven optimization problem, which is mathematically equivalent to a parallel job scheduling problem, known to be NP-hard, thereby necessitating the development of efficient heuristic strategies. To this end, we propose, adopt, and evaluate multiple heuristic and hybrid algorithms, including Local Search, Branch-and-Bound, and Genetic Search, culminating in a time-aware Hybrid Search model. Simulation results under diverse vehicle arrival distributions (uniform, normal, and exponential) demonstrate that our approach significantly reduces load imbalance, quantified via the Total of Differences metric, while improving responsiveness and maintaining scalability. <span>SPOSChain</span> not only enables equitable and efficient parking allocation but also supports sustainable urban mobility by reducing driver search time, CO<span><math><msub><mrow></mrow><mrow><mn>2</mn></mrow></msub></math></span> emissions, and network overhead. These results underscore the transformative potential of programmable, decentralized parking systems in future smart city infrastructures.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104414"},"PeriodicalIF":8.0,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145813948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective parrot optimizer with improved Lévy flight and adaptive elliptical segmentation - based screening mechanism for layout optimization of wireless sensor networks 基于改进lsamvy飞行和自适应椭圆分割筛选机制的多目标鹦鹉优化器无线传感器网络布局优化机制
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-22 DOI: 10.1016/j.jnca.2025.104413
Yun-Hao Zhang, Jie-Sheng Wang, Yu-Xuan Xing, Yu-Feng Sun, Si-Wen Zhang, Xue-Lian Bai
With the rapid development of science and technology, wireless sensor networks (WSN) are increasingly applied in environmental monitoring, industrial control, and smart cities. However, WSN deployment faces three core challenges that existing algorithms fail to address comprehensively. (1) Insufficient coverage precision. Traditional optimization algorithms (e.g., NSGA-II, MOPSO) often leave local coverage holes due to limited fine-grained search capability. (2) High resource redundancy. Fixed grid or weight-based methods (e.g., MOEA/D) cannot dynamically adjust node distribution according to environmental density, leading to redundant deployment. (3) Unbalanced energy consumption. Single-objective or simplified multi-objective approaches ignore the trade-off between coverage, waste rate, and energy consumption, shortening network lifetime. To tackle these issues, a multi-objective parrot optimizer (MOPO) based on improved Lévy flight and an adaptive elliptical segmentation screening mechanism is proposed for WSN deployment optimization. The randomness of original Lévy flight causes large step-length jumps, making fine-grained searches difficult. Thus, a Sigmoid perturbation mechanism is integrated into Lévy flight to enhance local search accuracy while preserving global exploration. Based on this improvement, an elite non-dominated strategy is combined with an adaptive grid (dynamic adjustment by solution density) and elliptical segmentation selection—this ensures retention of optimal individuals in high-density areas, maintains population diversity, and accelerates exploration of sparse regions. An external archive further preserves a uniform and diverse Pareto solution set. MOPO is tested in obstacle-free/obstacle WSN models with coverage, waste rate, and energy consumption rate as objectives. Comparative experiments with NSGA-II, MOPSO, and MOGWO in different monitoring areas show MOPO ranks first in all Friedman tests. A real-world test (41°10′20″N, 29°04′30″E, 1320 × 610 m2) achieves 94 % target coverage. This proves MOPO effectively solves the three core challenges of WSN deployment, providing a practical and efficient optimization method for large-scale, resource-constrained WSN scenarios.
随着科学技术的飞速发展,无线传感器网络(WSN)在环境监测、工业控制、智慧城市等领域的应用越来越广泛。然而,无线传感器网络的部署面临着现有算法无法全面解决的三个核心挑战。(1)覆盖精度不够。传统的优化算法(如NSGA-II、MOPSO)由于细粒度搜索能力有限,往往会留下局部覆盖漏洞。(2)资源冗余度高。固定网格或基于权重的方法(如MOEA/D)无法根据环境密度动态调整节点分布,导致冗余部署。(3)能源消耗不平衡。单目标或简化的多目标方法忽略了覆盖率、浪费率和能源消耗之间的权衡,缩短了网络的生命周期。针对这些问题,提出了一种基于改进lsamvy飞行和自适应椭圆分割筛选机制的多目标鹦鹉优化器(MOPO),用于WSN部署优化。原始lsamvy飞行的随机性导致了较大的步长跳跃,使得细粒度搜索变得困难。因此,将Sigmoid摄动机制集成到lsamvy飞行中,以提高局部搜索精度,同时保持全局搜索。在此基础上,将精英非支配策略与自适应网格(根据解密度动态调整)和椭圆分割选择相结合,确保在高密度区域保留最佳个体,保持种群多样性,并加速对稀疏区域的探索。外部存档进一步保存统一和多样的Pareto解集。MOPO在无障碍物/障碍物WSN模型中进行测试,以覆盖率、浪费率和能耗率为目标。与NSGA-II、MOPSO和MOGWO在不同监测区域的对比实验表明,MOPO在所有Friedman测试中均排名第一。实际测试(41°10 ' 20″N, 29°04 ' 30″E, 1320×610 m2)达到94%的目标覆盖率。这证明MOPO有效解决了WSN部署的三大核心挑战,为大规模、资源受限的WSN场景提供了一种实用高效的优化方法。
{"title":"Multi-objective parrot optimizer with improved Lévy flight and adaptive elliptical segmentation - based screening mechanism for layout optimization of wireless sensor networks","authors":"Yun-Hao Zhang,&nbsp;Jie-Sheng Wang,&nbsp;Yu-Xuan Xing,&nbsp;Yu-Feng Sun,&nbsp;Si-Wen Zhang,&nbsp;Xue-Lian Bai","doi":"10.1016/j.jnca.2025.104413","DOIUrl":"10.1016/j.jnca.2025.104413","url":null,"abstract":"<div><div>With the rapid development of science and technology, wireless sensor networks (WSN) are increasingly applied in environmental monitoring, industrial control, and smart cities. However, WSN deployment faces three core challenges that existing algorithms fail to address comprehensively. (1) Insufficient coverage precision. Traditional optimization algorithms (e.g., NSGA-II, MOPSO) often leave local coverage holes due to limited fine-grained search capability. (2) High resource redundancy. Fixed grid or weight-based methods (e.g., MOEA/D) cannot dynamically adjust node distribution according to environmental density, leading to redundant deployment. (3) Unbalanced energy consumption. Single-objective or simplified multi-objective approaches ignore the trade-off between coverage, waste rate, and energy consumption, shortening network lifetime. To tackle these issues, a multi-objective parrot optimizer (MOPO) based on improved Lévy flight and an adaptive elliptical segmentation screening mechanism is proposed for WSN deployment optimization. The randomness of original Lévy flight causes large step-length jumps, making fine-grained searches difficult. Thus, a Sigmoid perturbation mechanism is integrated into Lévy flight to enhance local search accuracy while preserving global exploration. Based on this improvement, an elite non-dominated strategy is combined with an adaptive grid (dynamic adjustment by solution density) and elliptical segmentation selection—this ensures retention of optimal individuals in high-density areas, maintains population diversity, and accelerates exploration of sparse regions. An external archive further preserves a uniform and diverse Pareto solution set. MOPO is tested in obstacle-free/obstacle WSN models with coverage, waste rate, and energy consumption rate as objectives. Comparative experiments with NSGA-II, MOPSO, and MOGWO in different monitoring areas show MOPO ranks first in all Friedman tests. A real-world test (41°10′20″N, 29°04′30″E, 1320 × 610 m<sup>2</sup>) achieves 94 % target coverage. This proves MOPO effectively solves the three core challenges of WSN deployment, providing a practical and efficient optimization method for large-scale, resource-constrained WSN scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104413"},"PeriodicalIF":8.0,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145813864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust eclipse attack detection framework for Ethereum networks 一个健壮的eclipse攻击检测框架用于以太坊网络
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-19 DOI: 10.1016/j.jnca.2025.104416
Zubaida Rehman , Iqbal Gondal , Hai Dong , Mengmeng Ge , Mark A. Gregory , Ikram ul Haq
Eclipse attacks, which isolate victim nodes by monopolizing their peer connections, remain a critical threat to Ethereum’s consensus mechanism. To address this, we present a principled framework for detecting Eclipse attacks in Ethereum peer-to-peer networks, grounded in a formal adversarial model. Existing defenses are either ad-hoc or lack provable guarantees, leaving open questions about their reliability under adaptive adversaries. Our work aims to bridge this gap by formally defining eclipse attack detection as a security property. We specify soundness, completeness, and robustness theorems under bounded adversarial drift, and derive formal guarantees within false positive and false negative bounds, resilience to adversarial manipulation, and multi-node compositional reliability. We then instantiate a lightweight detection framework that maps packet-level traffic features to predictions using ensemble classifiers (Random Forest, XGBoost). The system was validated using a controlled Ethereum testbed and extended with CTGAN-generated synthetic traces to emulate networks of up to 100 nodes. Empirical evaluation shows that our framework achieves up to 96% F1-score with sub-second inference latency, well within Ethereum’s 12-second Proof-of-Stake validator time slots. These findings demonstrate that lightweight statistical features, when coupled with formal analysis, enable accurate, efficient, and scalable detection of network-level partitioning attacks. Our work establishes a deployable and theoretically grounded defense foundation for securing modern blockchain systems against eclipse adversaries.
Eclipse攻击通过垄断受害节点的对等连接来隔离受害节点,这仍然是对以太坊共识机制的严重威胁。为了解决这个问题,我们提出了一个原则性框架,用于检测以太坊点对点网络中的Eclipse攻击,该框架以正式的对抗模型为基础。现有的防御要么是临时的,要么缺乏可证明的保证,这使得它们在自适应对手下的可靠性问题悬而未决。我们的工作旨在通过将eclipse攻击检测正式定义为一种安全属性来弥合这一差距。我们指定了有界对抗漂移下的稳健性、完备性和鲁棒性定理,并推导了假正和假负边界内的形式保证、对抗操作的弹性和多节点组成可靠性。然后,我们实例化了一个轻量级检测框架,该框架使用集成分类器(Random Forest, XGBoost)将数据包级流量特征映射到预测。该系统使用受控的以太坊测试平台进行了验证,并使用ctgan生成的合成轨迹进行了扩展,以模拟多达100个节点的网络。经验评估表明,我们的框架在亚秒级推理延迟下达到了96%的f1得分,完全在以太坊12秒的权益证明验证器时间段内。这些发现表明,轻量级统计特性与形式化分析相结合,能够准确、高效和可扩展地检测网络级分区攻击。我们的工作为保护现代区块链系统免受eclipse对手的攻击建立了一个可部署的和理论上的防御基础。
{"title":"A robust eclipse attack detection framework for Ethereum networks","authors":"Zubaida Rehman ,&nbsp;Iqbal Gondal ,&nbsp;Hai Dong ,&nbsp;Mengmeng Ge ,&nbsp;Mark A. Gregory ,&nbsp;Ikram ul Haq","doi":"10.1016/j.jnca.2025.104416","DOIUrl":"10.1016/j.jnca.2025.104416","url":null,"abstract":"<div><div>Eclipse attacks, which isolate victim nodes by monopolizing their peer connections, remain a critical threat to Ethereum’s consensus mechanism. To address this, we present a principled framework for detecting Eclipse attacks in Ethereum peer-to-peer networks, grounded in a formal adversarial model. Existing defenses are either ad-hoc or lack provable guarantees, leaving open questions about their reliability under adaptive adversaries. Our work aims to bridge this gap by formally defining eclipse attack detection as a security property. We specify soundness, completeness, and robustness theorems under bounded adversarial drift, and derive formal guarantees within false positive and false negative bounds, resilience to adversarial manipulation, and multi-node compositional reliability. We then instantiate a lightweight detection framework that maps packet-level traffic features to predictions using ensemble classifiers (Random Forest, XGBoost). The system was validated using a controlled Ethereum testbed and extended with CTGAN-generated synthetic traces to emulate networks of up to 100 nodes. Empirical evaluation shows that our framework achieves up to 96% F1-score with sub-second inference latency, well within Ethereum’s 12-second Proof-of-Stake validator time slots. These findings demonstrate that lightweight statistical features, when coupled with formal analysis, enable accurate, efficient, and scalable detection of network-level partitioning attacks. Our work establishes a deployable and theoretically grounded defense foundation for securing modern blockchain systems against eclipse adversaries.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104416"},"PeriodicalIF":8.0,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seamless service migration for the Internet of Vehicles in edge computing: A dynamic dirty page filtering and two-stages compression technique 基于边缘计算的车联网无缝服务迁移:动态脏页过滤和两阶段压缩技术
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-19 DOI: 10.1016/j.jnca.2025.104412
Kaifeng Hua , Shengchao Su , Nannan Zhang
With the growing demand for dynamic resources in the Internet of Vehicles, service migration has become essential for maintaining user service continuity. However, existing techniques often transfer redundant dirty page data during operation state file transfers, leading to high network traffic and significant migration delays, which are unsuitable for the low latency and low traffic requirements of intelligent transportation scenarios. To overcome this issue, this paper proposes a Intelligent Adaptive Container Migration Technique called IACMT, which is based on dynamic filtering of dirty pages with two-stage compression. IACMT features a dirty page filtering mechanism that intelligently identifies active dirty pages by monitoring the frequency of page accesses and modification patterns in real time. This mechanism facilitates the delayed transmission of less critical dirty pages, effectively reducing the data size during the iterative transmission phase. Furthermore, it incorporates a two-stage data compression algorithm that employs run-length encoding (RLE) followed by dynamic Huffman coding. In the initial stage, RLE eliminates redundant byte sequences in the state file. The subsequent output is then adaptively compressed using a dynamic Huffman tree, improving compression efficiency while managing computational overhead. Experimental results show that IACMT reduces data transmission volume by approximately 35 % for typical in-vehicle workloads, while cutting migration time and service interruption duration by around 24 % and 34 %, respectively.
随着车联网对动态资源的需求日益增长,服务迁移成为保持用户服务连续性的必要条件。然而,现有技术在运行状态文件传输过程中经常传输冗余的脏页数据,导致网络流量大,迁移延迟大,不适合智能交通场景的低延迟、低流量要求。为了克服这一问题,本文提出了一种基于两阶段压缩的脏页动态过滤的智能自适应容器迁移技术IACMT。IACMT提供了一个脏页面过滤机制,通过实时监控页面访问频率和修改模式,智能地识别活动脏页面。这种机制有助于延迟传输不太关键的脏页,有效地减少了迭代传输阶段的数据大小。此外,它还结合了一种采用运行长度编码(RLE)和动态霍夫曼编码的两阶段数据压缩算法。在初始阶段,RLE消除状态文件中的冗余字节序列。然后使用动态霍夫曼树自适应压缩后续输出,在管理计算开销的同时提高压缩效率。实验结果表明,对于典型的车载工作负载,IACMT将数据传输量减少了约35%,同时将迁移时间和服务中断时间分别减少了约24%和34%。
{"title":"Seamless service migration for the Internet of Vehicles in edge computing: A dynamic dirty page filtering and two-stages compression technique","authors":"Kaifeng Hua ,&nbsp;Shengchao Su ,&nbsp;Nannan Zhang","doi":"10.1016/j.jnca.2025.104412","DOIUrl":"10.1016/j.jnca.2025.104412","url":null,"abstract":"<div><div>With the growing demand for dynamic resources in the Internet of Vehicles, service migration has become essential for maintaining user service continuity. However, existing techniques often transfer redundant dirty page data during operation state file transfers, leading to high network traffic and significant migration delays, which are unsuitable for the low latency and low traffic requirements of intelligent transportation scenarios. To overcome this issue, this paper proposes a <u>I</u>ntelligent <u>A</u>daptive <u>C</u>ontainer <u>M</u>igration <u>T</u>echnique called IACMT, which is based on dynamic filtering of dirty pages with two-stage compression. IACMT features a dirty page filtering mechanism that intelligently identifies active dirty pages by monitoring the frequency of page accesses and modification patterns in real time. This mechanism facilitates the delayed transmission of less critical dirty pages, effectively reducing the data size during the iterative transmission phase. Furthermore, it incorporates a two-stage data compression algorithm that employs run-length encoding (RLE) followed by dynamic Huffman coding. In the initial stage, RLE eliminates redundant byte sequences in the state file. The subsequent output is then adaptively compressed using a dynamic Huffman tree, improving compression efficiency while managing computational overhead. Experimental results show that IACMT reduces data transmission volume by approximately 35 % for typical in-vehicle workloads, while cutting migration time and service interruption duration by around 24 % and 34 %, respectively.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104412"},"PeriodicalIF":8.0,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PE-Chain: An efficient hierarchical sharding architecture for dynamically participating node models PE-Chain:用于动态参与节点模型的高效分层分片架构
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-19 DOI: 10.1016/j.jnca.2025.104415
Junfeng Tian , Yujian Wu , Jin Tian , Liuling Qi
Sharding is a widely adopted technique for enhancing blockchain scalability by partitioning the network into multiple sub-shards, thereby distributing the workload. However, traditional dynamic sharding schemes often suffer from delayed adjustments to the shard count, hindering rapid convergence to an optimal workload distribution in practical deployments and limiting overall scalability. Furthermore, the dynamic participation of nodes is frequently overlooked. To address these challenges, this paper proposes PolyembryonyChain (PE-Chain), a novel and efficient hierarchical sharding architecture designed for environments with dynamically participating nodes, with the goal of achieving elastic scalability. Its core innovations are twofold. First, it introduces a dynamic threshold sharding algorithm that adaptively adjusts the number of shards and optimizes the network topology to enable elastic expansion. Second, it incorporates a validator assignment and reconfiguration scheme, specifically tailored for dynamic hierarchical environments, to ensure system security. A comprehensive security analysis and simulation results demonstrate that PE-Chain significantly outperforms state-of-the-art baselines, achieving approximately 28% higher throughput while maintaining low latency, which underscores its superior scalability and practical value.
分片是一种广泛采用的技术,通过将网络划分为多个子分片来增强区块链的可伸缩性,从而分配工作负载。然而,传统的动态分片方案往往会延迟调整分片数,从而阻碍了在实际部署中快速收敛到最佳工作负载分布,并限制了整体可扩展性。此外,节点的动态参与常常被忽略。为了解决这些挑战,本文提出了PolyembryonyChain (PE-Chain),这是一种新颖高效的分层分片架构,专为具有动态参与节点的环境而设计,目标是实现弹性可扩展性。它的核心创新是双重的。首先,引入动态阈值分片算法,自适应调整分片数量,优化网络拓扑结构,实现弹性扩展。其次,它结合了验证器分配和重新配置方案,专门为动态分层环境量身定制,以确保系统安全性。综合安全分析和仿真结果表明,PE-Chain显着优于最先进的基线,在保持低延迟的同时实现了约28%的高吞吐量,这凸显了其优越的可扩展性和实用价值。
{"title":"PE-Chain: An efficient hierarchical sharding architecture for dynamically participating node models","authors":"Junfeng Tian ,&nbsp;Yujian Wu ,&nbsp;Jin Tian ,&nbsp;Liuling Qi","doi":"10.1016/j.jnca.2025.104415","DOIUrl":"10.1016/j.jnca.2025.104415","url":null,"abstract":"<div><div>Sharding is a widely adopted technique for enhancing blockchain scalability by partitioning the network into multiple sub-shards, thereby distributing the workload. However, traditional dynamic sharding schemes often suffer from delayed adjustments to the shard count, hindering rapid convergence to an optimal workload distribution in practical deployments and limiting overall scalability. Furthermore, the dynamic participation of nodes is frequently overlooked. To address these challenges, this paper proposes PolyembryonyChain (PE-Chain), a novel and efficient hierarchical sharding architecture designed for environments with dynamically participating nodes, with the goal of achieving elastic scalability. Its core innovations are twofold. First, it introduces a dynamic threshold sharding algorithm that adaptively adjusts the number of shards and optimizes the network topology to enable elastic expansion. Second, it incorporates a validator assignment and reconfiguration scheme, specifically tailored for dynamic hierarchical environments, to ensure system security. A comprehensive security analysis and simulation results demonstrate that PE-Chain significantly outperforms state-of-the-art baselines, achieving approximately 28% higher throughput while maintaining low latency, which underscores its superior scalability and practical value.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104415"},"PeriodicalIF":8.0,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CASLO: Joint scaling and deployment for microservices leveraging context-aware SLO assignment CASLO:利用上下文感知的SLO分配来联合扩展和部署微服务
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-19 DOI: 10.1016/j.jnca.2025.104417
Shuang Zeng, Haitao Zhang, Zezhong Yan
Service Level Objective (SLO) assignment involves distributing an application’s end-to-end latency SLO among its microservices, guiding each microservice’s resource allocation based on its assigned sub-SLO. However, existing SLO assignment methods primarily focus on horizontal scaling, overlooking the significant impact of varying resource usage contexts across nodes and container configurations on microservice latency characteristics. Moreover, these methods fail to consider how scaling decisions affect node resource usage. This oversight creates discrepancies between decision-time and runtime latency characteristics, which can lead to SLO violations or resource wastage. This paper proposes CASLO, a joint scaling and deployment method based on context-aware SLO assignment that aims to meet application SLOs with minimal resource usage. It characterizes microservice latency by categorizing influencing factors into node and container contexts, which enables the model to capture dynamic performance under varying conditions. Building on this characterization, CASLO employs Particle Swarm Optimization (PSO) to iteratively estimate each microservice’s tolerance to contextual resource conditions. For each tolerance, it determines the resource usage of each node post-scaling and deployment, addressing discrepancies of latency characteristics between decision-time and runtime and distinguishing latency characteristics across nodes. Based on the determined resource context, CASLO assigns SLOs to each microservice, dynamically configuring container resources to derive scaling and deployment decisions. Resource usage is then calculated to provide feedback to PSO for iterative optimization. Compared to state-of-the-art methods, CASLO achieves 32% reduction in resource usage and decreases the frequency of SLO violations by 61%.
服务水平目标(SLO)分配涉及在微服务之间分配应用程序的端到端延迟SLO,并根据分配的子SLO指导每个微服务的资源分配。然而,现有的SLO分配方法主要关注水平扩展,忽略了跨节点和容器配置的不同资源使用上下文对微服务延迟特征的重大影响。此外,这些方法没有考虑缩放决策对节点资源使用的影响。这种疏忽造成了决策时间和运行时延迟特征之间的差异,这可能导致违反SLO或资源浪费。本文提出了一种基于上下文感知SLO分配的联合扩展和部署方法CASLO,旨在以最小的资源使用满足应用程序的SLO。它通过将影响因素分类为节点和容器上下文来表征微服务延迟,从而使模型能够捕获不同条件下的动态性能。在此特征的基础上,CASLO使用粒子群优化(PSO)来迭代估计每个微服务对上下文资源条件的容忍度。对于每个容差,它确定每个节点在扩展和部署后的资源使用情况,解决决策时间和运行时之间延迟特征的差异,并区分节点之间的延迟特征。基于确定的资源上下文,CASLO将slo分配给每个微服务,动态配置容器资源以得出扩展和部署决策。然后计算资源使用情况,向粒子群算法提供反馈,进行迭代优化。与最先进的方法相比,CASLO减少了32%的资源使用,并将违反SLO的频率降低了61%。
{"title":"CASLO: Joint scaling and deployment for microservices leveraging context-aware SLO assignment","authors":"Shuang Zeng,&nbsp;Haitao Zhang,&nbsp;Zezhong Yan","doi":"10.1016/j.jnca.2025.104417","DOIUrl":"10.1016/j.jnca.2025.104417","url":null,"abstract":"<div><div>Service Level Objective (SLO) assignment involves distributing an application’s end-to-end latency SLO among its microservices, guiding each microservice’s resource allocation based on its assigned sub-SLO. However, existing SLO assignment methods primarily focus on horizontal scaling, overlooking the significant impact of varying resource usage contexts across nodes and container configurations on microservice latency characteristics. Moreover, these methods fail to consider how scaling decisions affect node resource usage. This oversight creates discrepancies between decision-time and runtime latency characteristics, which can lead to SLO violations or resource wastage. This paper proposes CASLO, a joint scaling and deployment method based on context-aware SLO assignment that aims to meet application SLOs with minimal resource usage. It characterizes microservice latency by categorizing influencing factors into node and container contexts, which enables the model to capture dynamic performance under varying conditions. Building on this characterization, CASLO employs Particle Swarm Optimization (PSO) to iteratively estimate each microservice’s tolerance to contextual resource conditions. For each tolerance, it determines the resource usage of each node post-scaling and deployment, addressing discrepancies of latency characteristics between decision-time and runtime and distinguishing latency characteristics across nodes. Based on the determined resource context, CASLO assigns SLOs to each microservice, dynamically configuring container resources to derive scaling and deployment decisions. Resource usage is then calculated to provide feedback to PSO for iterative optimization. Compared to state-of-the-art methods, CASLO achieves 32% reduction in resource usage and decreases the frequency of SLO violations by 61%.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"247 ","pages":"Article 104417"},"PeriodicalIF":8.0,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-assisted relay selection in mmWave D2D communication under presence of dynamic obstacles with unknown orientation 存在未知方向动态障碍物的毫米波D2D通信中网络辅助中继选择
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-15 DOI: 10.1016/j.jnca.2025.104394
Durgesh Singh , Sasthi C. Ghosh
Millimeter wave (mmWave) D2D communication is highly vulnerable to blockages from dynamic obstacles leading to severe packet loss and deterioration in quality of service. User equipments (UEs) acting as relays are chosen to divert the communication path in case of blockage. However, relays themselves are vulnerable to be blocked due to their and obstacles’ motion. Thus mobility parameters of dynamic obstacles must be captured effectively, but it is challenging as they might not be connected to the network. Additionally, instantaneous change in their orientation in motion is difficult to measure which might vary abruptly compared to their speed which can be sensed with high accuracy. A probabilistic model is developed considering the obstacle’s orientation in motion is unknown. Later the geometrical structure of the problem is analyzed and then exploited to devise a novel technique to derive closed form blockage expression for a given pair of UE. The proposed technique can be applied across exhaustive scenarios of motion of a given UE pair which may get blocked due to dynamic obstacles. Through extensive simulations, we have observed that our proposed approach outperforms both classical received signal strength (RSS) based approach and two recent state of the art approaches. We have also validated our results against an oracle which has complete speed and orientation information regarding UEs and obstacles.
毫米波(mmWave) D2D通信极易受到动态障碍物阻塞的影响,导致严重的丢包和服务质量下降。选择用户设备作为继电器,在通信受阻时改道。然而,由于继电器和障碍物的运动,继电器本身很容易被阻塞。因此,必须有效地捕获动态障碍物的移动参数,但由于它们可能没有连接到网络中,因此具有挑战性。此外,它们在运动中方向的瞬时变化很难测量,与它们的速度相比,它们可能会突然变化,而速度可以高精度地感知。建立了考虑障碍物运动方向未知的概率模型。然后对问题的几何结构进行了分析,并在此基础上提出了一种求解给定UE对封闭形式阻塞表达式的新方法。所提出的技术可以应用于可能由于动态障碍物而受阻的给定UE对运动的穷举场景。通过大量的模拟,我们观察到我们提出的方法优于经典的基于接收信号强度(RSS)的方法和两种最新的技术方法。我们还针对一个oracle验证了我们的结果,该oracle具有关于ue和障碍物的完整速度和方向信息。
{"title":"Network-assisted relay selection in mmWave D2D communication under presence of dynamic obstacles with unknown orientation","authors":"Durgesh Singh ,&nbsp;Sasthi C. Ghosh","doi":"10.1016/j.jnca.2025.104394","DOIUrl":"10.1016/j.jnca.2025.104394","url":null,"abstract":"<div><div>Millimeter wave (mmWave) D2D communication is highly vulnerable to blockages from dynamic obstacles leading to severe packet loss and deterioration in quality of service. User equipments (UEs) acting as relays are chosen to divert the communication path in case of blockage. However, relays themselves are vulnerable to be blocked due to their and obstacles’ motion. Thus mobility parameters of dynamic obstacles must be captured effectively, but it is challenging as they might not be connected to the network. Additionally, instantaneous change in their orientation in motion is difficult to measure which might vary abruptly compared to their speed which can be sensed with high accuracy. A probabilistic model is developed considering the obstacle’s orientation in motion is <em>unknown</em>. Later the geometrical structure of the problem is analyzed and then exploited to devise a novel technique to derive closed form blockage expression for a given pair of UE. The proposed technique can be applied across exhaustive scenarios of motion of a given UE pair which may get blocked due to dynamic obstacles. Through extensive simulations, we have observed that our proposed approach outperforms both classical received signal strength (RSS) based approach and two recent state of the art approaches. We have also validated our results against an oracle which has complete speed and orientation information regarding UEs and obstacles.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104394"},"PeriodicalIF":8.0,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145760433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic and Adaptive Scheduling of Cognitive Sensors for collaborative target tracking in energy-efficient IOT environments 节能物联网环境下协同目标跟踪的认知传感器动态自适应调度
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-12 DOI: 10.1016/j.jnca.2025.104400
Muhammad Nawaz Khan , Sokjoon Lee , Tariq Hussain , Razaz Waheeb Attar , Mohsin Shah , Amal Hassan Alhazmi
In the digital age of the Internet of Things (IoT), there is a significant shift from traditional computing to an ubiquitous, highly connected, and automated world that provides services to anyone, anywhere, and at any time. An IoT-based system is an unstable network characterized by fluctuating dynamics and fragile connections, resulting in lower performance on congestion, latency, and energy consumption. To effectively manage these functional parameters and implement a dynamic scheduling mechanism, this paper presents a novel scheme, “Dynamic and Adaptive Scheduling of Cognitive Sensors (DASCS) for Collaborative Target Tracking in Energy-Efficient IoT Environments”. In this approach, cognitive sensors dynamically schedule their functions according to their role in the wireless mesh grid and adapt to new states by checking the network traffic conditions. Its dual goals involve reducing network traffic to significantly decrease energy consumption and enhancing network performance by equally distributing energy resources throughout the grid. Furthermore, it works in object detection and monitors the direction of movement within the IoT environment. DASCS improves network performance by increasing packet delivery ratios by 2.31% at the base station and 27.92% at the cluster head, while adding more live sensors, it improves network stability by 38.46%. DASCS also enhances energy efficiency by increasing the average residual energy by 68.8% compared to other benchmark schemes while maintaining a high event detection rate and a low false alarm rate.
在物联网(IoT)的数字时代,从传统计算到无处不在、高度连接和自动化的世界发生了重大转变,可以随时随地为任何人提供服务。基于物联网的系统是一个动态波动、连接脆弱的不稳定网络,在拥塞、时延、能耗等方面性能较低。为了有效地管理这些功能参数并实现动态调度机制,本文提出了一种新的方案——“面向节能物联网环境下协同目标跟踪的认知传感器动态自适应调度”。在该方法中,认知传感器根据其在无线网格中的角色动态调度其功能,并通过检查网络流量状况来适应新的状态。它的双重目标包括减少网络流量以显著降低能源消耗,并通过在整个电网中均匀分配能源来提高网络性能。此外,它还可以用于物体检测并监控物联网环境中的运动方向。dasss提高了网络性能,在基站和集群头部分别提高了2.31%和27.92%的数据包投递率,同时增加了更多的实时传感器,网络稳定性提高了38.46%。与其他基准方案相比,DASCS还提高了能源效率,在保持高事件检测率和低虚警率的同时,平均剩余能量增加了68.8%。
{"title":"Dynamic and Adaptive Scheduling of Cognitive Sensors for collaborative target tracking in energy-efficient IOT environments","authors":"Muhammad Nawaz Khan ,&nbsp;Sokjoon Lee ,&nbsp;Tariq Hussain ,&nbsp;Razaz Waheeb Attar ,&nbsp;Mohsin Shah ,&nbsp;Amal Hassan Alhazmi","doi":"10.1016/j.jnca.2025.104400","DOIUrl":"10.1016/j.jnca.2025.104400","url":null,"abstract":"<div><div>In the digital age of the Internet of Things (IoT), there is a significant shift from traditional computing to an ubiquitous, highly connected, and automated world that provides services to anyone, anywhere, and at any time. An IoT-based system is an unstable network characterized by fluctuating dynamics and fragile connections, resulting in lower performance on congestion, latency, and energy consumption. To effectively manage these functional parameters and implement a dynamic scheduling mechanism, this paper presents a novel scheme, “Dynamic and Adaptive Scheduling of Cognitive Sensors (DASCS) for Collaborative Target Tracking in Energy-Efficient IoT Environments”. In this approach, cognitive sensors dynamically schedule their functions according to their role in the wireless mesh grid and adapt to new states by checking the network traffic conditions. Its dual goals involve reducing network traffic to significantly decrease energy consumption and enhancing network performance by equally distributing energy resources throughout the grid. Furthermore, it works in object detection and monitors the direction of movement within the IoT environment. DASCS improves network performance by increasing packet delivery ratios by 2.31% at the base station and 27.92% at the cluster head, while adding more live sensors, it improves network stability by 38.46%. DASCS also enhances energy efficiency by increasing the average residual energy by 68.8% compared to other benchmark schemes while maintaining a high event detection rate and a low false alarm rate.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"248 ","pages":"Article 104400"},"PeriodicalIF":8.0,"publicationDate":"2025-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145731203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlackoutADR: Exploiting adaptive data rate vulnerabilities in LoRaWAN-based FANETs BlackoutADR:利用基于lorawan的fanet中的自适应数据速率漏洞
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-08 DOI: 10.1016/j.jnca.2025.104409
Khaoula Hidawi , Sabrine Ennaji , Elena Ferrari
This paper introduces BlackoutADR, a novel adversarial attack exploiting LoRaWAN’s Adaptive Data Rate (ADR) mechanism in cellular-connected UAV networks, with applicability to other IoT systems as well. By subtly manipulating Received Signal Strength Indicator (RSSI) and Signal-to-Noise Ratio (SNR), BlackoutADR increases UAV transmission power, causing 45% faster battery depletion within 100 s of simulation time and disrupting network operations. Using NS-3 simulations with a 20-UAV FANET, we evaluate its evasion of multiple ML-based IDSs (CNN, LSTM, BiLSTM, FNN, LoRaWAN-specific). Results show BlackoutADR remains undetected due to its subtle manipulations evading even dynamic thresholds, outperforming traditional jamming attacks. To address the identified vulnerability, we outline reactive measures, including dynamic threshold-based IDSs, secure ADR mechanisms, and recommendations for drone manufacturers.
本文介绍了BlackoutADR,这是一种利用LoRaWAN自适应数据速率(ADR)机制在蜂窝连接无人机网络中的新型对抗性攻击,也适用于其他物联网系统。通过巧妙地操纵接收信号强度指标(RSSI)和信噪比(SNR), BlackoutADR增加了无人机的发射功率,在模拟时间的100秒内导致45%的电池耗尽并中断网络运行。利用NS-3模拟20架无人机FANET,我们评估了它对多个基于ml的ids (CNN, LSTM, BiLSTM, FNN, lorawan特定)的规避。结果表明,BlackoutADR仍然未被发现,因为它的微妙操纵甚至逃避了动态阈值,优于传统的干扰攻击。为了解决已识别的漏洞,我们概述了反应性措施,包括基于动态阈值的ids,安全ADR机制以及对无人机制造商的建议。
{"title":"BlackoutADR: Exploiting adaptive data rate vulnerabilities in LoRaWAN-based FANETs","authors":"Khaoula Hidawi ,&nbsp;Sabrine Ennaji ,&nbsp;Elena Ferrari","doi":"10.1016/j.jnca.2025.104409","DOIUrl":"10.1016/j.jnca.2025.104409","url":null,"abstract":"<div><div>This paper introduces <em>BlackoutADR</em>, a novel adversarial attack exploiting LoRaWAN’s Adaptive Data Rate (ADR) mechanism in cellular-connected UAV networks, with applicability to other IoT systems as well. By subtly manipulating Received Signal Strength Indicator (RSSI) and Signal-to-Noise Ratio (SNR), <em>BlackoutADR</em> increases UAV transmission power, causing 45% faster battery depletion within 100 s of simulation time and disrupting network operations. Using NS-3 simulations with a 20-UAV FANET, we evaluate its evasion of multiple ML-based IDSs (CNN, LSTM, BiLSTM, FNN, LoRaWAN-specific). Results show <em>BlackoutADR</em> remains undetected due to its subtle manipulations evading even dynamic thresholds, outperforming traditional jamming attacks. To address the identified vulnerability, we outline reactive measures, including dynamic threshold-based IDSs, secure ADR mechanisms, and recommendations for drone manufacturers.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104409"},"PeriodicalIF":8.0,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145705027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1