首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
BlackoutADR: Exploiting adaptive data rate vulnerabilities in LoRaWAN-based FANETs BlackoutADR:利用基于lorawan的fanet中的自适应数据速率漏洞
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-08 DOI: 10.1016/j.jnca.2025.104409
Khaoula Hidawi , Sabrine Ennaji , Elena Ferrari
This paper introduces BlackoutADR, a novel adversarial attack exploiting LoRaWAN’s Adaptive Data Rate (ADR) mechanism in cellular-connected UAV networks, with applicability to other IoT systems as well. By subtly manipulating Received Signal Strength Indicator (RSSI) and Signal-to-Noise Ratio (SNR), BlackoutADR increases UAV transmission power, causing 45% faster battery depletion within 100 s of simulation time and disrupting network operations. Using NS-3 simulations with a 20-UAV FANET, we evaluate its evasion of multiple ML-based IDSs (CNN, LSTM, BiLSTM, FNN, LoRaWAN-specific). Results show BlackoutADR remains undetected due to its subtle manipulations evading even dynamic thresholds, outperforming traditional jamming attacks. To address the identified vulnerability, we outline reactive measures, including dynamic threshold-based IDSs, secure ADR mechanisms, and recommendations for drone manufacturers.
本文介绍了BlackoutADR,这是一种利用LoRaWAN自适应数据速率(ADR)机制在蜂窝连接无人机网络中的新型对抗性攻击,也适用于其他物联网系统。通过巧妙地操纵接收信号强度指标(RSSI)和信噪比(SNR), BlackoutADR增加了无人机的发射功率,在模拟时间的100秒内导致45%的电池耗尽并中断网络运行。利用NS-3模拟20架无人机FANET,我们评估了它对多个基于ml的ids (CNN, LSTM, BiLSTM, FNN, lorawan特定)的规避。结果表明,BlackoutADR仍然未被发现,因为它的微妙操纵甚至逃避了动态阈值,优于传统的干扰攻击。为了解决已识别的漏洞,我们概述了反应性措施,包括基于动态阈值的ids,安全ADR机制以及对无人机制造商的建议。
{"title":"BlackoutADR: Exploiting adaptive data rate vulnerabilities in LoRaWAN-based FANETs","authors":"Khaoula Hidawi ,&nbsp;Sabrine Ennaji ,&nbsp;Elena Ferrari","doi":"10.1016/j.jnca.2025.104409","DOIUrl":"10.1016/j.jnca.2025.104409","url":null,"abstract":"<div><div>This paper introduces <em>BlackoutADR</em>, a novel adversarial attack exploiting LoRaWAN’s Adaptive Data Rate (ADR) mechanism in cellular-connected UAV networks, with applicability to other IoT systems as well. By subtly manipulating Received Signal Strength Indicator (RSSI) and Signal-to-Noise Ratio (SNR), <em>BlackoutADR</em> increases UAV transmission power, causing 45% faster battery depletion within 100 s of simulation time and disrupting network operations. Using NS-3 simulations with a 20-UAV FANET, we evaluate its evasion of multiple ML-based IDSs (CNN, LSTM, BiLSTM, FNN, LoRaWAN-specific). Results show <em>BlackoutADR</em> remains undetected due to its subtle manipulations evading even dynamic thresholds, outperforming traditional jamming attacks. To address the identified vulnerability, we outline reactive measures, including dynamic threshold-based IDSs, secure ADR mechanisms, and recommendations for drone manufacturers.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104409"},"PeriodicalIF":8.0,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145705027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SELB: Self-Evolution Load Balancing Based on Temporal Graph Convolutional Network in Software-Defined Data Center Networks 软件定义数据中心网络中基于时间图卷积网络的自进化负载平衡
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-02 DOI: 10.1016/j.jnca.2025.104401
Yong Liu , Guisheng Liu , Tianyi Yu , Qian Meng
Software-Defined Networking (SDN) is a network architecture that separates the control plane and data plane of the traditional data center network, resulting in enhanced network scalability and flexibility. The conventional Equal Cost MultiPath (ECMP) load balancing algorithm, which relies on static hash mapping, has limitations when applied to data center networks, leading to issues such as hash conflicts and congestion between mouse and elephant flows. Therefore, load balancing based on flowlet granularity has been proposed. This approach divides flows into flowlets, leveraging the burstiness of traffic to enhance load balancing capabilities. However, these approaches encounter several challenges, such as the lack of real-time feedback on network load situations, the inability of static flowlet timeouts to adapt to dynamic changes in the network, and inadequate consideration of load distribution. To address these challenges, we propose a novel load balancing strategy called Self-Evolution Load Balancing (SELB) based on Temporal Graph Convolutional Network (T-GCN). SELB utilizes the T-GCN to dynamically predict the network load state for real-time feedback. Meanwhile, the adaptive flow splitting algorithm is employed to dynamically adjust the timeout of flowlets, effectively adapting to changes in network dynamics. Moreover, SELB incorporates a load-aware route planning strategy that considers the overall network load distribution. By doing so, it can intelligently route flowlets along equivalent multipaths, enhancing load balancing capabilities. The simulation results demonstrate that SELB effectively reduces Flow Completion Time (FCT), enhances average throughput, and improves load balancing performance in comparison to existing schemes.
SDN (Software-Defined Networking)是一种将传统数据中心网络的控制平面和数据平面分离开来的网络架构,增强了网络的可扩展性和灵活性。传统的等成本多路径(Equal Cost MultiPath, ECMP)负载平衡算法依赖于静态哈希映射,在应用于数据中心网络时存在局限性,会导致诸如哈希冲突和象流之间的拥塞等问题。因此,提出了基于流粒度的负载均衡。这种方法将流分成小流,利用流量的突发性来增强负载平衡能力。然而,这些方法遇到了一些挑战,例如缺乏对网络负载情况的实时反馈,静态流超时不能适应网络的动态变化,以及对负载分布的考虑不足。为了解决这些挑战,我们提出了一种新的负载平衡策略,称为基于时间图卷积网络(T-GCN)的自进化负载平衡(SELB)。SELB利用T-GCN动态预测网络负载状态,进行实时反馈。同时,采用自适应流分割算法动态调整小流超时,有效适应网络动态变化。此外,SELB还结合了考虑整个网络负载分布的负载感知路由规划策略。通过这样做,它可以沿着等效的多路径智能地路由流,增强负载平衡能力。仿真结果表明,与现有算法相比,SELB算法有效地缩短了流完成时间(Flow Completion Time, FCT),提高了平均吞吐量,改善了负载均衡性能。
{"title":"SELB: Self-Evolution Load Balancing Based on Temporal Graph Convolutional Network in Software-Defined Data Center Networks","authors":"Yong Liu ,&nbsp;Guisheng Liu ,&nbsp;Tianyi Yu ,&nbsp;Qian Meng","doi":"10.1016/j.jnca.2025.104401","DOIUrl":"10.1016/j.jnca.2025.104401","url":null,"abstract":"<div><div>Software-Defined Networking (SDN) is a network architecture that separates the control plane and data plane of the traditional data center network, resulting in enhanced network scalability and flexibility. The conventional Equal Cost MultiPath (ECMP) load balancing algorithm, which relies on static hash mapping, has limitations when applied to data center networks, leading to issues such as hash conflicts and congestion between mouse and elephant flows. Therefore, load balancing based on flowlet granularity has been proposed. This approach divides flows into flowlets, leveraging the burstiness of traffic to enhance load balancing capabilities. However, these approaches encounter several challenges, such as the lack of real-time feedback on network load situations, the inability of static flowlet timeouts to adapt to dynamic changes in the network, and inadequate consideration of load distribution. To address these challenges, we propose a novel load balancing strategy called Self-Evolution Load Balancing (SELB) based on Temporal Graph Convolutional Network (T-GCN). SELB utilizes the T-GCN to dynamically predict the network load state for real-time feedback. Meanwhile, the adaptive flow splitting algorithm is employed to dynamically adjust the timeout of flowlets, effectively adapting to changes in network dynamics. Moreover, SELB incorporates a load-aware route planning strategy that considers the overall network load distribution. By doing so, it can intelligently route flowlets along equivalent multipaths, enhancing load balancing capabilities. The simulation results demonstrate that SELB effectively reduces Flow Completion Time (FCT), enhances average throughput, and improves load balancing performance in comparison to existing schemes.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104401"},"PeriodicalIF":8.0,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145657738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-secure digital signature-based communication protocol for the Internet of Drones (IoD) 无人机互联网(IoD)基于量子安全数字签名的通信协议
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-26 DOI: 10.1016/j.jnca.2025.104398
Jithu Vijay V.P., Shahanas I.N., Sabu M. Thampi, Aiswarya S. Nair
The use of drones is rapidly increasing in areas such as surveillance, defense, and emergency services. As a result, ensuring secure communication and proper authentication has become a major concern in the Internet of Drones, where drones must share data and coordinate their actions in real time. One of the biggest challenges in drone networks is maintaining secure and reliable communication between drones. The dynamic and distributed nature of these networks increases the risk of security breaches. Existing systems mostly rely on cryptographic methods like RSA and ECC. These methods will not remain secure in the future because of advancements in quantum computing. These systems also depend on static data storage and centralized credential management, which make them vulnerable to attacks such as impersonation, replay, and man-in-the-middle. To address these issues, we propose a quantum-secure drone-to-drone authentication and secure communication protocol that utilizes Post Quantum Cryptographic (PQC) algorithms such as, Kyber for encryption and Dilithium for digital signatures. Both are lattice-based lightweight cryptographic algorithms that offer strong resistance against quantum attacks. Instead of storing secret data on drones and to prevent cloning, we use Physical Unclonable Functions (PUF) to generate device specific seeds for authentication and key generation during each session. A Hyperledger Fabric Blockchain is used at the Ground Control Station (GCS) to store drone credentials securely and avoid single point failure. We conducted the formal security analysis using the Burrows–Abadi–Needham (BAN) logic for trust validation and the Scyther tool to formally analyze and verify resistance against classical and quantum-era attacks. In addition to formal proofs, informal analysis confirms that the protocol maintains data integrity and authentication even under active network threats. We implemented the protocol using Raspberry Pi drones and a Linux-based GCS. Performance results show a low computation time of 0.08 s for authentication and 0.12 s for secure communication on Raspberry Pi 5, with minimal memory usage and acceptable communication cost suitable for implementation on resource-constrained drones.
无人机在监视、防御和应急服务等领域的使用正在迅速增加。因此,确保安全通信和适当的身份验证已成为无人机互联网的主要关注点,无人机必须实时共享数据并协调其行动。无人机网络面临的最大挑战之一是保持无人机之间安全可靠的通信。这些网络的动态和分布式特性增加了安全漏洞的风险。现有的系统主要依赖于RSA和ECC等加密方法。由于量子计算的进步,这些方法在未来将不会保持安全。这些系统还依赖于静态数据存储和集中式凭证管理,这使得它们容易受到诸如模拟、重放和中间人攻击等攻击。为了解决这些问题,我们提出了一种量子安全无人机对无人机身份验证和安全通信协议,该协议利用后量子加密(PQC)算法,如Kyber加密和Dilithium数字签名。两者都是基于格的轻量级加密算法,可提供强大的抗量子攻击能力。而不是在无人机上存储秘密数据,以防止克隆,我们使用物理不可克隆功能(PUF)来生成设备特定的种子认证和密钥生成在每个会话期间。地面控制站(GCS)使用Hyperledger Fabric区块链来安全地存储无人机凭证并避免单点故障。我们使用Burrows-Abadi-Needham (BAN)逻辑进行了正式的安全分析,用于信任验证,并使用Scyther工具正式分析和验证对经典和量子时代攻击的抵抗力。除了正式的证明之外,非正式的分析证实,即使在活跃的网络威胁下,该协议也能保持数据完整性和身份验证。我们使用树莓派无人机和基于linux的GCS实现了该协议。性能结果表明,该算法在Raspberry Pi 5上的认证计算时间为0.08 s,安全通信计算时间为0.12 s,具有最小的内存使用和可接受的通信成本,适合在资源受限的无人机上实现。
{"title":"A quantum-secure digital signature-based communication protocol for the Internet of Drones (IoD)","authors":"Jithu Vijay V.P.,&nbsp;Shahanas I.N.,&nbsp;Sabu M. Thampi,&nbsp;Aiswarya S. Nair","doi":"10.1016/j.jnca.2025.104398","DOIUrl":"10.1016/j.jnca.2025.104398","url":null,"abstract":"<div><div>The use of drones is rapidly increasing in areas such as surveillance, defense, and emergency services. As a result, ensuring secure communication and proper authentication has become a major concern in the Internet of Drones, where drones must share data and coordinate their actions in real time. One of the biggest challenges in drone networks is maintaining secure and reliable communication between drones. The dynamic and distributed nature of these networks increases the risk of security breaches. Existing systems mostly rely on cryptographic methods like RSA and ECC. These methods will not remain secure in the future because of advancements in quantum computing. These systems also depend on static data storage and centralized credential management, which make them vulnerable to attacks such as impersonation, replay, and man-in-the-middle. To address these issues, we propose a quantum-secure drone-to-drone authentication and secure communication protocol that utilizes Post Quantum Cryptographic (PQC) algorithms such as, Kyber for encryption and Dilithium for digital signatures. Both are lattice-based lightweight cryptographic algorithms that offer strong resistance against quantum attacks. Instead of storing secret data on drones and to prevent cloning, we use Physical Unclonable Functions (PUF) to generate device specific seeds for authentication and key generation during each session. A Hyperledger Fabric Blockchain is used at the Ground Control Station (GCS) to store drone credentials securely and avoid single point failure. We conducted the formal security analysis using the Burrows–Abadi–Needham (BAN) logic for trust validation and the Scyther tool to formally analyze and verify resistance against classical and quantum-era attacks. In addition to formal proofs, informal analysis confirms that the protocol maintains data integrity and authentication even under active network threats. We implemented the protocol using Raspberry Pi drones and a Linux-based GCS. Performance results show a low computation time of 0.08 s for authentication and 0.12 s for secure communication on Raspberry Pi 5, with minimal memory usage and acceptable communication cost suitable for implementation on resource-constrained drones.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104398"},"PeriodicalIF":8.0,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145609218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A digital twin-based reputation assessment model for JointCloud computing 基于数字孪生的联合云计算信誉评估模型
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-24 DOI: 10.1016/j.jnca.2025.104395
Yadi Wu , Lina Wang , Rongwei Yu , Xiuwen Huang , Jiatong Liu
JointCloud Computing (JCC) supports a collaborative model of multiple cloud service providers to provide users with robust performance and adequate services. Reputation is an important aspect for the stable development of the JCC system, affecting the cooperation among service providers and users’ choice of services. Most of the existing reputation assessment solutions only consider a single factor of user feedback or service quality, and cannot provide an accurate reputation assessment for the complex system of JCC. In addition, JointCloud services are provided by multiple service providers in cooperation, and existing solutions do not consider this service characteristic, making it difficult to accurately measure the reputation of the service. In order to provide a comprehensive reputation assessment for JCC, we proposed a reputation assessment model based on digital twins. A reputation calculation module is embedded in the digital twin, and a hybrid subjective–objective-based reputation assessment method and a split-integration-based reputation assessment method are designed for different JointCloud subjects to achieve a comprehensive and accurate reputation assessment. We conducted a series of experiments to evaluate the performance of the proposed reputation evaluation model and present the experimental results. The proposed method achieves a reputation assessment bias of 0.0112, which reduces the average bias by 0.2184 compared to existing researches. In real-world scenarios, the proposed model incurs a communication overhead of 93.7735 ms, with a digital twin data acquisition frequency of 36.4273 ms. The evaluation results show that our reputation evaluation model is feasible in terms of performance and accuracy.
联合云计算(JCC)支持多个云服务提供商的协作模型,为用户提供强大的性能和充分的服务。信誉是JCC系统稳定发展的重要方面,影响着服务提供商之间的合作和用户对服务的选择。现有的声誉评估方案大多只考虑用户反馈或服务质量这一单一因素,无法为JCC复杂的系统提供准确的声誉评估。此外,JointCloud的服务是由多个服务提供商合作提供的,现有的解决方案没有考虑到这一服务特性,因此很难准确衡量服务的声誉。为了给JCC提供一个全面的声誉评估,我们提出了一个基于数字孪生的声誉评估模型。在数字孪生中嵌入声誉计算模块,针对不同的JointCloud主体设计基于主客观混合的声誉评估方法和基于分裂集成的声誉评估方法,实现全面、准确的声誉评估。我们进行了一系列实验来评估所提出的声誉评估模型的性能,并给出了实验结果。该方法的声誉评估偏差为0.0112,比现有研究的平均偏差降低了0.2184。在实际场景中,该模型的通信开销为93.7735 ms,数字孪生数据采集频率为36.4273 ms。评价结果表明,所建立的信誉评价模型在性能和准确性上是可行的。
{"title":"A digital twin-based reputation assessment model for JointCloud computing","authors":"Yadi Wu ,&nbsp;Lina Wang ,&nbsp;Rongwei Yu ,&nbsp;Xiuwen Huang ,&nbsp;Jiatong Liu","doi":"10.1016/j.jnca.2025.104395","DOIUrl":"10.1016/j.jnca.2025.104395","url":null,"abstract":"<div><div>JointCloud Computing (JCC) supports a collaborative model of multiple cloud service providers to provide users with robust performance and adequate services. Reputation is an important aspect for the stable development of the JCC system, affecting the cooperation among service providers and users’ choice of services. Most of the existing reputation assessment solutions only consider a single factor of user feedback or service quality, and cannot provide an accurate reputation assessment for the complex system of JCC. In addition, JointCloud services are provided by multiple service providers in cooperation, and existing solutions do not consider this service characteristic, making it difficult to accurately measure the reputation of the service. In order to provide a comprehensive reputation assessment for JCC, we proposed a reputation assessment model based on digital twins. A reputation calculation module is embedded in the digital twin, and a hybrid subjective–objective-based reputation assessment method and a split-integration-based reputation assessment method are designed for different JointCloud subjects to achieve a comprehensive and accurate reputation assessment. We conducted a series of experiments to evaluate the performance of the proposed reputation evaluation model and present the experimental results. The proposed method achieves a reputation assessment bias of 0.0112, which reduces the average bias by 0.2184 compared to existing researches. In real-world scenarios, the proposed model incurs a communication overhead of 93.7735 ms, with a digital twin data acquisition frequency of 36.4273 ms. The evaluation results show that our reputation evaluation model is feasible in terms of performance and accuracy.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104395"},"PeriodicalIF":8.0,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-assisted lightweight authentication scheme for smart home environments 一种用于智能家居环境的区块链辅助轻量级认证方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-24 DOI: 10.1016/j.jnca.2025.104397
Xiujun Wang, Wenlong Dong, Wenjie Hu, Juyan Li
With the rapid development of Internet of Things (IoT) technology, smart home systems have significantly enhanced the convenience and automation level of users’ daily lives. However, as sensitive data is transmitted between smart devices over open channels, the security risks associated with data transmission have become increasingly prominent. Authentication and key exchange (AKE) protocols are designed to facilitate identity authentication and confidential communication between smart devices. However, existing AKE protocols often suffer from low efficiency and poor scalability. These limitations make them unsuitable for resource-constrained IoT devices and unable to provide secure mutual authentication. To tackle these challenges, this study introduces a blockchain-assisted lightweight authentication scheme for smart homes. The proposed scheme integrates biometric authentication and device credentials to achieve multi-factor authentication. Meanwhile, blockchain technology is employed to record and protect interactions between users and smart devices, thereby enhancing the security, transparency, and auditability of the communication process. Formal security analysis under the Random Oracle Model (ROM) confirms the scheme’s key confidentiality. Furthermore, informal analysis demonstrates its robustness against common threats, including replay, man-in-the-middle, impersonation, and device capture attacks. Benchmarks against existing protocols demonstrate that our design incurs the least computational, communication, and energy overhead. It achieves this efficiency while preserving robust security and scalability, making it ideal for resource-limited smart-home devices.
随着物联网(IoT)技术的飞速发展,智能家居系统显著提高了用户日常生活的便利性和自动化程度。然而,随着敏感数据在智能设备之间通过开放通道传输,数据传输带来的安全风险日益突出。认证和密钥交换(AKE)协议旨在促进智能设备之间的身份认证和保密通信。然而,现有的AKE协议往往存在效率低、可扩展性差的问题。这些限制使它们不适合资源受限的物联网设备,也无法提供安全的相互认证。为了应对这些挑战,本研究为智能家居引入了一种区块链辅助的轻量级身份验证方案。该方案集成了生物特征认证和设备凭证,实现了多因素认证。同时,采用区块链技术对用户与智能设备之间的交互进行记录和保护,增强了通信过程的安全性、透明性和可审计性。在随机Oracle模型(ROM)下的正式安全分析证实了该方案的密钥机密性。此外,非正式分析证明了它对常见威胁的健壮性,包括重播、中间人攻击、模拟和设备捕获攻击。针对现有协议的基准测试表明,我们的设计产生的计算、通信和能源开销最小。它实现了这种效率,同时保持了强大的安全性和可扩展性,使其成为资源有限的智能家居设备的理想选择。
{"title":"A blockchain-assisted lightweight authentication scheme for smart home environments","authors":"Xiujun Wang,&nbsp;Wenlong Dong,&nbsp;Wenjie Hu,&nbsp;Juyan Li","doi":"10.1016/j.jnca.2025.104397","DOIUrl":"10.1016/j.jnca.2025.104397","url":null,"abstract":"<div><div>With the rapid development of Internet of Things (IoT) technology, smart home systems have significantly enhanced the convenience and automation level of users’ daily lives. However, as sensitive data is transmitted between smart devices over open channels, the security risks associated with data transmission have become increasingly prominent. Authentication and key exchange (AKE) protocols are designed to facilitate identity authentication and confidential communication between smart devices. However, existing AKE protocols often suffer from low efficiency and poor scalability. These limitations make them unsuitable for resource-constrained IoT devices and unable to provide secure mutual authentication. To tackle these challenges, this study introduces a blockchain-assisted lightweight authentication scheme for smart homes. The proposed scheme integrates biometric authentication and device credentials to achieve multi-factor authentication. Meanwhile, blockchain technology is employed to record and protect interactions between users and smart devices, thereby enhancing the security, transparency, and auditability of the communication process. Formal security analysis under the Random Oracle Model (ROM) confirms the scheme’s key confidentiality. Furthermore, informal analysis demonstrates its robustness against common threats, including replay, man-in-the-middle, impersonation, and device capture attacks. Benchmarks against existing protocols demonstrate that our design incurs the least computational, communication, and energy overhead. It achieves this efficiency while preserving robust security and scalability, making it ideal for resource-limited smart-home devices.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104397"},"PeriodicalIF":8.0,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networks of splicing processors: Wheel graph topology simulation 拼接处理器网络:轮图拓扑仿真
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-24 DOI: 10.1016/j.jnca.2025.104393
José Angel Sánchez Martín , Victor Mitrana , Mihaela Păun , José Ramó n Sánchez Couso
We continue the investigation regarding the simulation of different network topologies in networks having processors inspired by the DNA splicing which are located in their nodes. These networks are called networks of splicing processors. So far, it was shown how every network of splicing processors, no matter its topology, can be converted, by a direct construction, into an equivalent network with a desired topology, especially a common one like star, grid or complete (or full-mesh). A short discussion highlights the importance of wheel graph topology in relation to biology and DNA computing. This work completes this study by giving an effective construction of a wheel (ring-star) network of splicing processors that is equivalent to an arbitrary network. The size and time complexity of our construction is evaluated. Finally, we discuss a very preliminary simulation of the networks considered here by means of recent technologies and strategies that are suitable to handle the massive data and parallel processing requirements of these networks.
我们将继续研究网络中不同网络拓扑的模拟,这些网络的处理器受到位于其节点中的DNA剪接的启发。这些网络被称为拼接处理器网络。到目前为止,它已经展示了如何将每个拼接处理器网络,无论其拓扑如何,都可以通过直接构造转换为具有所需拓扑的等效网络,特别是像星形,网格或完整(或全网格)这样的常见网络。一个简短的讨论强调了车轮图拓扑在生物学和DNA计算方面的重要性。这项工作通过给出一个等效于任意网络的拼接处理器的轮式(环状)网络的有效结构来完成这项研究。我们的结构的大小和时间复杂性进行了评估。最后,我们通过适合处理这些网络的海量数据和并行处理要求的最新技术和策略,讨论了这里所考虑的网络的非常初步的模拟。
{"title":"Networks of splicing processors: Wheel graph topology simulation","authors":"José Angel Sánchez Martín ,&nbsp;Victor Mitrana ,&nbsp;Mihaela Păun ,&nbsp;José Ramó n Sánchez Couso","doi":"10.1016/j.jnca.2025.104393","DOIUrl":"10.1016/j.jnca.2025.104393","url":null,"abstract":"<div><div>We continue the investigation regarding the simulation of different network topologies in networks having processors inspired by the DNA splicing which are located in their nodes. These networks are called networks of splicing processors. So far, it was shown how every network of splicing processors, no matter its topology, can be converted, by a direct construction, into an equivalent network with a desired topology, especially a common one like star, grid or complete (or full-mesh). A short discussion highlights the importance of wheel graph topology in relation to biology and DNA computing. This work completes this study by giving an effective construction of a wheel (ring-star) network of splicing processors that is equivalent to an arbitrary network. The size and time complexity of our construction is evaluated. Finally, we discuss a very preliminary simulation of the networks considered here by means of recent technologies and strategies that are suitable to handle the massive data and parallel processing requirements of these networks.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104393"},"PeriodicalIF":8.0,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community detection via core node identification and local label diffusion with GraphSAGE boundary refinement in complex networks 复杂网络中基于核心节点识别和GraphSAGE边界细化的局部标签扩散的社区检测
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-24 DOI: 10.1016/j.jnca.2025.104399
Asgarali Bouyer , Pouya Shahgholi , Bahman Arasteh , Amin Golzari Oskouei , Xiaoyang Liu
Community detection is a vital task in social network analysis, enabling the extraction of hidden structures and relationships. However, existing diffusion-based local community detection algorithms often depend on similarity-based scoring, which frequently failing to identify influential core nodes for expanding label. To address these shortcomings, we propose the local detecting and structuring communities (LDSC) method that integrates structural and relational insights with graph-based metrics and deep learning for refined community detection. LDSC uniquely stands out by combining Local Influence (LI) and Adaptive Absorbing Strength (AAS) metrics with GraphSAGE-based boundary refinement and adaptive community merging, tackling persistent challenges like scalability, boundary ambiguity, and structural cohesion unmet by prior methods. The method unfolds in four key phases: (1) Core Node Detection, employing a distinctive metric fusing LI and AAS to identify structurally significant nodes; (2) Label Diffusion, dynamically propagating labels from core nodes to neighbors for precise community formation; (3) Boundary Node Reassignment, using GraphSAGE to resolve ambiguities; and (4) Adaptive Community Merging, using an innovative local merging strategy to enhance cohesion. Evaluations on synthetic LFR benchmarks and real-world networks (e.g., Karate, Dolphins, DBLP, Amazon, LiveJournal, Orkut) demonstrate LDSC's superiority over baseline methods (e.g., LPA, CNM, WalkTrap, Louvain) and state-of-the-art approaches (e.g., Leiden, Infomap, LSMD, CLD_GE, FluidC, LCDR, LS), achieving perfect NMI/ARI (1.0) in Karate and Dolphins, top NMI in LiveJournal (0.92) and Orkut (0.65), average scores of 0.85 NMI and 0.75 ARI, and >15 % NMI improvement in large-scale networks like DBLP, showcasing unmatched accuracy, stability, and efficiency.
社区检测是社会网络分析中的一项重要任务,它可以提取隐藏的结构和关系。然而,现有的基于扩散的局部社区检测算法往往依赖于基于相似度的评分,往往无法识别有影响力的核心节点来扩展标签。为了解决这些缺点,我们提出了局部检测和构建社区(LDSC)方法,该方法将结构和关系洞察力与基于图的度量和深度学习相结合,以实现精细的社区检测。LDSC通过将局部影响(LI)和自适应吸收强度(AAS)指标与基于graphsage的边界细化和自适应社区合并相结合,独特地脱颖而出,解决了先前方法无法解决的可扩展性、边界模糊和结构内聚等持续挑战。该方法分为四个关键阶段:(1)核心节点检测,采用融合LI和AAS的独特度量来识别结构上重要的节点;(2)标签扩散,将标签从核心节点动态传播到相邻节点,以精确形成社区;(3)边界节点重新分配,使用GraphSAGE解决歧义;(4)适应性社区合并,采用创新的局部合并策略增强凝聚力。对合成LFR基准和现实世界网络(例如,空手道、海豚、DBLP、亚马逊、LiveJournal、Orkut)的评估表明,LDSC优于基线方法(例如,LPA、CNM、WalkTrap、Louvain)和最先进的方法(例如,Leiden、Infomap、LSMD、CLD_GE、FluidC、LCDR、LS),在空手道和海豚中实现了完美的NMI/ARI(1.0),在LiveJournal(0.92)和Orkut(0.65)中实现了最高的NMI,平均得分为0.85 NMI和0.75 ARI。在DBLP等大型网络中,NMI提高了15%,展示了无与伦比的准确性、稳定性和效率。
{"title":"Community detection via core node identification and local label diffusion with GraphSAGE boundary refinement in complex networks","authors":"Asgarali Bouyer ,&nbsp;Pouya Shahgholi ,&nbsp;Bahman Arasteh ,&nbsp;Amin Golzari Oskouei ,&nbsp;Xiaoyang Liu","doi":"10.1016/j.jnca.2025.104399","DOIUrl":"10.1016/j.jnca.2025.104399","url":null,"abstract":"<div><div>Community detection is a vital task in social network analysis, enabling the extraction of hidden structures and relationships. However, existing diffusion-based local community detection algorithms often depend on similarity-based scoring, which frequently failing to identify influential core nodes for expanding label. To address these shortcomings, we propose the local detecting and structuring communities (LDSC) method that integrates structural and relational insights with graph-based metrics and deep learning for refined community detection. LDSC uniquely stands out by combining Local Influence (LI) and Adaptive Absorbing Strength (AAS) metrics with GraphSAGE-based boundary refinement and adaptive community merging, tackling persistent challenges like scalability, boundary ambiguity, and structural cohesion unmet by prior methods. The method unfolds in four key phases: (1) Core Node Detection, employing a distinctive metric fusing LI and AAS to identify structurally significant nodes; (2) Label Diffusion, dynamically propagating labels from core nodes to neighbors for precise community formation; (3) Boundary Node Reassignment, using GraphSAGE to resolve ambiguities; and (4) Adaptive Community Merging, using an innovative local merging strategy to enhance cohesion. Evaluations on synthetic LFR benchmarks and real-world networks (e.g., Karate, Dolphins, DBLP, Amazon, LiveJournal, Orkut) demonstrate LDSC's superiority over baseline methods (e.g., LPA, CNM, WalkTrap, Louvain) and state-of-the-art approaches (e.g., Leiden, Infomap, LSMD, CLD_GE, FluidC, LCDR, LS), achieving perfect NMI/ARI (1.0) in Karate and Dolphins, top NMI in LiveJournal (0.92) and Orkut (0.65), average scores of 0.85 NMI and 0.75 ARI, and &gt;15 % NMI improvement in large-scale networks like DBLP, showcasing unmatched accuracy, stability, and efficiency.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104399"},"PeriodicalIF":8.0,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARProof: A cross-protocol approach to detect and mitigate ARP-spoofing attacks in smart home networks ARProof:一种在智能家庭网络中检测和减轻arp欺骗攻击的跨协议方法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-24 DOI: 10.1016/j.jnca.2025.104396
Md Mizanur Rahman , Faycal Bouhafs , Sayed Amir Hoseini , Frank den Hartog
Smart homes are increasingly vulnerable to cyberattacks that lead to network instability, causing homeowners to lodge complaints with their Broadband Service Providers (BSPs). Therefore, effective and timely detection of cyberattacks is crucial for both customers and BSPs. Address Resolution Protocol (ARP) spoofing is one of the most common attacks that can facilitate larger and more severe follow-up attacks. Unfortunately, there are currently no methods that can effectively detect and mitigate ARP spoofing in smart homes from a BSP’s perspective. Current Machine Learning (ML)-based methods often rely on a single dataset from a controlled lab environment designed to mimic a single home, assuming that the results will generalize to all smart homes. Our findings indicate that this assumption is flawed. They are also unsuitable for smart homes from a BSP’s perspective, as they require custom applications, introduce additional overhead, and often rely on the injection of probing traffic into the network. To address these issues, we developed an algorithm that can detect ARP spoofing in smart home networks, regardless of the network structure or connected devices. It uses a cross-protocol strategy by correlating ARP packets with Dynamic Host Configuration Protocol (DHCP) messages to validate address bindings. We evaluated our method using four public datasets and two real-world testbeds, achieving 100% detection accuracy in all scenarios. In addition, the algorithm requires only little computational overhead, confirming its suitability for use by BSPs to detect and mitigate ARP spoofing attacks in smart homes.
智能家居越来越容易受到网络攻击,导致网络不稳定,导致房主向他们的宽带服务提供商(bsp)投诉。因此,有效、及时地检测网络攻击对客户和bsp都至关重要。ARP (Address Resolution Protocol)欺骗是一种最常见的攻击方式,它可以引发更大规模、更严重的后续攻击。不幸的是,从BSP的角度来看,目前还没有方法可以有效地检测和减轻智能家居中的ARP欺骗。当前基于机器学习(ML)的方法通常依赖于来自受控实验室环境的单个数据集,该环境旨在模拟单个家庭,并假设结果将推广到所有智能家庭。我们的发现表明,这种假设是有缺陷的。从BSP的角度来看,它们也不适合智能家居,因为它们需要定制应用程序,引入额外的开销,并且通常依赖于向网络注入探测流量。为了解决这些问题,我们开发了一种算法,可以检测智能家庭网络中的ARP欺骗,无论网络结构或连接的设备如何。它使用跨协议策略,通过将ARP报文与DHCP (Dynamic Host Configuration Protocol)消息关联来验证地址绑定。我们使用四个公共数据集和两个真实世界的测试平台来评估我们的方法,在所有场景下都实现了100%的检测准确率。此外,该算法只需要很少的计算开销,证实了bsp使用它来检测和减轻智能家居中的ARP欺骗攻击的适用性。
{"title":"ARProof: A cross-protocol approach to detect and mitigate ARP-spoofing attacks in smart home networks","authors":"Md Mizanur Rahman ,&nbsp;Faycal Bouhafs ,&nbsp;Sayed Amir Hoseini ,&nbsp;Frank den Hartog","doi":"10.1016/j.jnca.2025.104396","DOIUrl":"10.1016/j.jnca.2025.104396","url":null,"abstract":"<div><div>Smart homes are increasingly vulnerable to cyberattacks that lead to network instability, causing homeowners to lodge complaints with their Broadband Service Providers (BSPs). Therefore, effective and timely detection of cyberattacks is crucial for both customers and BSPs. Address Resolution Protocol (ARP) spoofing is one of the most common attacks that can facilitate larger and more severe follow-up attacks. Unfortunately, there are currently no methods that can effectively detect and mitigate ARP spoofing in smart homes from a BSP’s perspective. Current Machine Learning (ML)-based methods often rely on a single dataset from a controlled lab environment designed to mimic a single home, assuming that the results will generalize to all smart homes. Our findings indicate that this assumption is flawed. They are also unsuitable for smart homes from a BSP’s perspective, as they require custom applications, introduce additional overhead, and often rely on the injection of probing traffic into the network. To address these issues, we developed an algorithm that can detect ARP spoofing in smart home networks, regardless of the network structure or connected devices. It uses a cross-protocol strategy by correlating ARP packets with Dynamic Host Configuration Protocol (DHCP) messages to validate address bindings. We evaluated our method using four public datasets and two real-world testbeds, achieving 100% detection accuracy in all scenarios. In addition, the algorithm requires only little computational overhead, confirming its suitability for use by BSPs to detect and mitigate ARP spoofing attacks in smart homes.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104396"},"PeriodicalIF":8.0,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data evacuation optimization using multi-objective reinforcement learning 基于多目标强化学习的数据疏散优化
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-19 DOI: 10.1016/j.jnca.2025.104390
Xiaole Li , Yinghui Jiang , Xing Wang , Jiuru Wang , Lei Gao , Shanwen Yi
After some disaster occurs, rapid data evacuation among cloud data centers is of great importance. Data evacuation optimization is a two-stage process including destination selection and flow scheduling. These two stages are related to each other, while evacuation efficiency is affected by evacuation distance, bandwidth allocation ratio, and total amount of evacuation flow at the same time. The mutual constraints among multiple factors make it difficult to find or approximate the optimal solution via single-objective optimization. This paper proposes a new two-stage data evacuation strategy using multi-objective reinforcement learning, with evacuation flow optimization as the central optimization objective across both stages. In the first stage, it simultaneously minimizes total path length and maximizes the total available bandwidth to determine source–destination pair for every evacuation transfer. In the second stage, it simultaneously allocates proportional bandwidth and maximizes the total amount of evacuation flow to find path and allocate bandwidth for every evacuation transfer. Reward function is set based on classifying candidate sets to search for optimal solution while ensuring that feasible solutions are obtained. Chebyshev scalarization function is used to evaluate action rewards and optimize action selection process. Performance comparison is implemented with state-of-the-art algorithms based on different data volumes and network scales. Simulation result demonstrates that the new strategy outperforms other algorithms with higher evacuation efficiency, good convergence and robustness.
在灾难发生后,云数据中心之间的快速数据疏散是非常重要的。数据疏散优化是一个包括目的地选择和流量调度两个阶段的过程。这两个阶段是相互关联的,疏散效率同时受到疏散距离、带宽分配比例和疏散流量总量的影响。多因素之间的相互约束使得单目标优化很难找到或逼近最优解。本文提出了一种新的基于多目标强化学习的两阶段数据疏散策略,并将疏散流优化作为两阶段的中心优化目标。在第一阶段,它同时最小化总路径长度和最大化总可用带宽,以确定每次疏散传输的源-目的对。第二阶段,在分配比例带宽的同时,使疏散流总量最大化,为每个疏散转移寻找路径并分配带宽。在对候选集进行分类的基础上设置奖励函数,在保证获得可行解的前提下寻找最优解。采用切比雪夫标量函数对行动奖励进行评价,优化行动选择过程。基于不同的数据量和网络规模,使用最先进的算法实现性能比较。仿真结果表明,该策略具有较高的疏散效率、较好的收敛性和鲁棒性。
{"title":"Data evacuation optimization using multi-objective reinforcement learning","authors":"Xiaole Li ,&nbsp;Yinghui Jiang ,&nbsp;Xing Wang ,&nbsp;Jiuru Wang ,&nbsp;Lei Gao ,&nbsp;Shanwen Yi","doi":"10.1016/j.jnca.2025.104390","DOIUrl":"10.1016/j.jnca.2025.104390","url":null,"abstract":"<div><div>After some disaster occurs, rapid data evacuation among cloud data centers is of great importance. Data evacuation optimization is a two-stage process including destination selection and flow scheduling. These two stages are related to each other, while evacuation efficiency is affected by evacuation distance, bandwidth allocation ratio, and total amount of evacuation flow at the same time. The mutual constraints among multiple factors make it difficult to find or approximate the optimal solution via single-objective optimization. This paper proposes a new two-stage data evacuation strategy using multi-objective reinforcement learning, with evacuation flow optimization as the central optimization objective across both stages. In the first stage, it simultaneously minimizes total path length and maximizes the total available bandwidth to determine source–destination pair for every evacuation transfer. In the second stage, it simultaneously allocates proportional bandwidth and maximizes the total amount of evacuation flow to find path and allocate bandwidth for every evacuation transfer. Reward function is set based on classifying candidate sets to search for optimal solution while ensuring that feasible solutions are obtained. Chebyshev scalarization function is used to evaluate action rewards and optimize action selection process. Performance comparison is implemented with state-of-the-art algorithms based on different data volumes and network scales. Simulation result demonstrates that the new strategy outperforms other algorithms with higher evacuation efficiency, good convergence and robustness.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104390"},"PeriodicalIF":8.0,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145560057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain 基于verk累加器的区块链多状态可验证和可更新(VA-MSVU)方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-14 DOI: 10.1016/j.jnca.2025.104392
Shangping Wang, Juanjuan Ma, Qi Huang, Xiaoling Xie
As the application scope of blockchain technology continues to expand, challenges arise in the state verification of blockchain systems based on account models. Traditionally, Merkle Patricia Tries are used to maintain the state of the world, and the verification of a specific data block needs to be verified step by step up to the root node, which guarantees the data integrity, but in large-scale systems, problems such as low efficiency of verification and updating, insufficient security, and increased storage demand still occur, which affects the performance of blockchain networks. In this paper, we propose a Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain. The scheme integrates Verkle tree (VT), Verkle accumulator (VA), KZG polynomial commitment, and aggregated proofs to verify the integrity of multiple account states in batches. By mapping account states to the VT, our approach enhances security, reduces the size of state data, and improves both verification speed and update efficiency. Simulation results show that the VA-MSVU scheme has smaller proof size and faster verification speed than the existing stored data structure, demonstrating the advantages of the VA-MSVU scheme in terms of simplicity and efficiency. For verifying multiple account states, the aggregated proofs of the scheme have significant advantages over KZG polynomial commitment and single-point proof, excelling in proof size, verification and update rate. In addition, by adjusting the branching factor in Verkle tree, a trade-off between computational overhead and communication is achieved to improve the adaptability of the system to different network scenarios.
随着区块链技术应用范围的不断扩大,基于账户模型的区块链系统状态验证出现了挑战。传统上使用Merkle Patricia Tries来维护世界的状态,特定数据块的验证需要逐级验证到根节点,保证了数据的完整性,但在大规模系统中,仍然会出现验证更新效率低、安全性不足、存储需求增加等问题,影响区块链网络的性能。在本文中,我们提出了一种基于verle - accumulator的区块链多状态可验证和可更新(VA-MSVU)方案。该方案集成了Verkle树(VT)、Verkle累加器(VA)、KZG多项式承诺和聚合证明,以批量验证多个账户状态的完整性。通过将帐户状态映射到VT,我们的方法增强了安全性,减少了状态数据的大小,并提高了验证速度和更新效率。仿真结果表明,与现有存储的数据结构相比,VA-MSVU方案具有更小的证明尺寸和更快的验证速度,证明了VA-MSVU方案在简单和高效方面的优势。对于验证多账户状态,该方案的聚合证明比KZG多项式承诺和单点证明具有显著的优势,在证明大小、验证和更新速度方面都具有优势。此外,通过调整Verkle树的分支因子,实现了计算开销和通信之间的平衡,提高了系统对不同网络场景的适应性。
{"title":"Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain","authors":"Shangping Wang,&nbsp;Juanjuan Ma,&nbsp;Qi Huang,&nbsp;Xiaoling Xie","doi":"10.1016/j.jnca.2025.104392","DOIUrl":"10.1016/j.jnca.2025.104392","url":null,"abstract":"<div><div>As the application scope of blockchain technology continues to expand, challenges arise in the state verification of blockchain systems based on account models. Traditionally, Merkle Patricia Tries are used to maintain the state of the world, and the verification of a specific data block needs to be verified step by step up to the root node, which guarantees the data integrity, but in large-scale systems, problems such as low efficiency of verification and updating, insufficient security, and increased storage demand still occur, which affects the performance of blockchain networks. In this paper, we propose a Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain. The scheme integrates Verkle tree (VT), Verkle accumulator (VA), KZG polynomial commitment, and aggregated proofs to verify the integrity of multiple account states in batches. By mapping account states to the VT, our approach enhances security, reduces the size of state data, and improves both verification speed and update efficiency. Simulation results show that the VA-MSVU scheme has smaller proof size and faster verification speed than the existing stored data structure, demonstrating the advantages of the VA-MSVU scheme in terms of simplicity and efficiency. For verifying multiple account states, the aggregated proofs of the scheme have significant advantages over KZG polynomial commitment and single-point proof, excelling in proof size, verification and update rate. In addition, by adjusting the branching factor in Verkle tree, a trade-off between computational overhead and communication is achieved to improve the adaptability of the system to different network scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104392"},"PeriodicalIF":8.0,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145531183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1