首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
SIoV-IDS: SDN-enabled zero-trust framework for explainable intrusion detection in IoVs using Variational Autoencoders and EX-LSTM SIoV-IDS:支持sdn的零信任框架,用于iov中使用变分自编码器和EX-LSTM的可解释入侵检测
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-13 DOI: 10.1016/j.jnca.2025.104389
Muddasar Laghari , Yuanchang Zhong , Muhammad Junaid Tahir , Muhammad Adil
In response to cyber attacks targeting the Internet of Vehicles (IoV) ecosystem, we propose SIoV-DS, a secure framework addressing inter-vehicle communication, intra-vehicle networks, and infrastructure threats using a zero-trust approach. Vehicle data is first encoded with a Variational Autoencoder (V-AE) to mitigate inference attacks, then analyzed by an Extended Long Short-Term Memory (EX-LSTM) detector capable of identifying diverse attacks, including Denial of Service (DoS), spoofing, and malware. For interpretability, Shapley Additive Explanations (SHAP) provide insights into EX-LSTM decisions, assisting Security Operations Center (SOC) analysts. SIoV-DS is deployed over a Software-Defined Networking (SDN) architecture to ensure scalability. Evaluations on CIC-IoV2024 and Edge-IIoTset2022 datasets demonstrate high accuracy (99.78% and 95.01%, respectively), while inference-time analysis confirms feasibility for real-time detection, effectively securing the IoV ecosystem against advanced cyber threats.
为了应对针对车联网(IoV)生态系统的网络攻击,我们提出了SIoV-DS,这是一个使用零信任方法解决车际通信、车内网络和基础设施威胁的安全框架。车辆数据首先使用变分自动编码器(V-AE)进行编码,以减轻推理攻击,然后通过扩展长短期记忆(EX-LSTM)检测器进行分析,该检测器能够识别各种攻击,包括拒绝服务(DoS),欺骗和恶意软件。在可解释性方面,Shapley加性解释(SHAP)提供了对EX-LSTM决策的见解,协助安全运营中心(SOC)分析师。SIoV-DS通过软件定义网络(SDN)架构部署,以确保可扩展性。对CIC-IoV2024和Edge-IIoTset2022数据集的评估表明,该方法具有较高的准确率(分别为99.78%和95.01%),而推断时间分析证实了实时检测的可行性,有效地保护了车联网生态系统免受高级网络威胁。
{"title":"SIoV-IDS: SDN-enabled zero-trust framework for explainable intrusion detection in IoVs using Variational Autoencoders and EX-LSTM","authors":"Muddasar Laghari ,&nbsp;Yuanchang Zhong ,&nbsp;Muhammad Junaid Tahir ,&nbsp;Muhammad Adil","doi":"10.1016/j.jnca.2025.104389","DOIUrl":"10.1016/j.jnca.2025.104389","url":null,"abstract":"<div><div>In response to cyber attacks targeting the Internet of Vehicles (IoV) ecosystem, we propose <strong>SIoV-DS</strong>, a secure framework addressing inter-vehicle communication, intra-vehicle networks, and infrastructure threats using a zero-trust approach. Vehicle data is first encoded with a <em>Variational Autoencoder (V-AE)</em> to mitigate inference attacks, then analyzed by an <em>Extended Long Short-Term Memory (EX-LSTM)</em> detector capable of identifying diverse attacks, including Denial of Service (DoS), spoofing, and malware. For interpretability, <em>Shapley Additive Explanations (SHAP)</em> provide insights into EX-LSTM decisions, assisting Security Operations Center (SOC) analysts. SIoV-DS is deployed over a <em>Software-Defined Networking (SDN)</em> architecture to ensure scalability. Evaluations on <em>CIC-IoV2024</em> and <em>Edge-IIoTset2022</em> datasets demonstrate high accuracy (99.78% and 95.01%, respectively), while inference-time analysis confirms feasibility for real-time detection, effectively securing the IoV ecosystem against advanced cyber threats.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104389"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145531187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPPA-SKU: Towards efficient conditional privacy-preserving authentication protocol with secret key update in VANET 面向VANET的具有密钥更新的高效条件隐私保护认证协议
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-10-30 DOI: 10.1016/j.jnca.2025.104369
Xinyu Fan , Shiyuan Xu , Yibo Cao , Xue Chen , Yu Chen , Tianrun Xu
The rapid development of intelligent transportation systems (ITS) has raised higher requirements for traffic data sharing and collaboration. As an effective solution, vehicular ad-hoc network (VANET) has emerged to support real-time data transfer between vehicles and infrastructure. However, VANET faces the challenges of data security and privacy. To alleviate these, many conditional privacy-preserving authentication (CPPA) schemes have been proposed. CPPA utilizes signature technology to ensure message authenticity while enabling the effective tracing of malicious vehicles. Unfortunately, traditional CPPA schemes fail to consider the security of secret keys stored in tamper-proof devices (TPDs). Additionally, most existing schemes still suffer from excessive computational and communication overhead. In this paper, we propose CPPA-SKU, an efficient CPPA scheme with message recovery for VANET. CPPA-SKU introduces a secret key update method using a secure pseudo-random function and Shamir’s secret sharing to prevent key leakage issues in TPDs. Additionally, CPPA-SKU enables the recovery of relevant messages, eliminating the need to embed messages in signatures, thereby reducing the communication overhead. Furthermore, CPPA-SKU is implemented based on the elliptic curve cryptosystem, which avoids expensive bilinear pairing operations while ensuring the security of signatures. We also formally prove the security of CPPA-SKU in the random oracle model. Comprehensive performance evaluations indicate that CPPA-SKU reduces computational overhead by approximately 1.3×–2.8× and communication overhead by approximately 1.5×-3.5×.
智能交通系统的快速发展对交通数据的共享和协作提出了更高的要求。作为一种有效的解决方案,车载自组织网络(VANET)已经出现,以支持车辆和基础设施之间的实时数据传输。然而,VANET面临着数据安全和隐私方面的挑战。为了缓解这些问题,人们提出了许多条件隐私保护身份验证方案。CPPA利用签名技术确保消息真实性,同时有效跟踪恶意车辆。不幸的是,传统的CPPA方案没有考虑存储在防篡改设备(TPDs)中的密钥的安全性。此外,大多数现有方案仍然存在过多的计算和通信开销。在本文中,我们提出了一种有效的带消息恢复的VANET的CPPA- sku方案。CPPA-SKU引入了一种使用安全伪随机函数和Shamir秘密共享的密钥更新方法,以防止密钥泄露问题。此外,CPPA-SKU支持恢复相关消息,无需在签名中嵌入消息,从而减少了通信开销。此外,CPPA-SKU是基于椭圆曲线密码系统实现的,避免了昂贵的双线性配对操作,同时保证了签名的安全性。并在随机oracle模型下正式证明了CPPA-SKU的安全性。综合性能评估表明,CPPA-SKU减少了大约1.3×-2.8×的计算开销和大约1.5×-3.5×的通信开销。
{"title":"CPPA-SKU: Towards efficient conditional privacy-preserving authentication protocol with secret key update in VANET","authors":"Xinyu Fan ,&nbsp;Shiyuan Xu ,&nbsp;Yibo Cao ,&nbsp;Xue Chen ,&nbsp;Yu Chen ,&nbsp;Tianrun Xu","doi":"10.1016/j.jnca.2025.104369","DOIUrl":"10.1016/j.jnca.2025.104369","url":null,"abstract":"<div><div>The rapid development of intelligent transportation systems (ITS) has raised higher requirements for traffic data sharing and collaboration. As an effective solution, vehicular ad-hoc network (VANET) has emerged to support real-time data transfer between vehicles and infrastructure. However, VANET faces the challenges of data security and privacy. To alleviate these, many conditional privacy-preserving authentication (CPPA) schemes have been proposed. CPPA utilizes signature technology to ensure message authenticity while enabling the effective tracing of malicious vehicles. Unfortunately, traditional CPPA schemes fail to consider the security of secret keys stored in tamper-proof devices (TPDs). Additionally, most existing schemes still suffer from excessive computational and communication overhead. In this paper, we propose CPPA-SKU, an efficient CPPA scheme with message recovery for VANET. CPPA-SKU introduces a secret key update method using a secure pseudo-random function and Shamir’s secret sharing to prevent key leakage issues in TPDs. Additionally, CPPA-SKU enables the recovery of relevant messages, eliminating the need to embed messages in signatures, thereby reducing the communication overhead. Furthermore, CPPA-SKU is implemented based on the elliptic curve cryptosystem, which avoids expensive bilinear pairing operations while ensuring the security of signatures. We also formally prove the security of CPPA-SKU in the random oracle model. Comprehensive performance evaluations indicate that CPPA-SKU reduces computational overhead by approximately 1.3<span><math><mo>×</mo></math></span>–2.8<span><math><mo>×</mo></math></span> and communication overhead by approximately 1.5<span><math><mo>×</mo></math></span>-3.5<span><math><mo>×</mo></math></span>.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104369"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145404577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-assisted lightweight authentication scheme for smart home environments 一种用于智能家居环境的区块链辅助轻量级认证方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-24 DOI: 10.1016/j.jnca.2025.104397
Xiujun Wang, Wenlong Dong, Wenjie Hu, Juyan Li
With the rapid development of Internet of Things (IoT) technology, smart home systems have significantly enhanced the convenience and automation level of users’ daily lives. However, as sensitive data is transmitted between smart devices over open channels, the security risks associated with data transmission have become increasingly prominent. Authentication and key exchange (AKE) protocols are designed to facilitate identity authentication and confidential communication between smart devices. However, existing AKE protocols often suffer from low efficiency and poor scalability. These limitations make them unsuitable for resource-constrained IoT devices and unable to provide secure mutual authentication. To tackle these challenges, this study introduces a blockchain-assisted lightweight authentication scheme for smart homes. The proposed scheme integrates biometric authentication and device credentials to achieve multi-factor authentication. Meanwhile, blockchain technology is employed to record and protect interactions between users and smart devices, thereby enhancing the security, transparency, and auditability of the communication process. Formal security analysis under the Random Oracle Model (ROM) confirms the scheme’s key confidentiality. Furthermore, informal analysis demonstrates its robustness against common threats, including replay, man-in-the-middle, impersonation, and device capture attacks. Benchmarks against existing protocols demonstrate that our design incurs the least computational, communication, and energy overhead. It achieves this efficiency while preserving robust security and scalability, making it ideal for resource-limited smart-home devices.
随着物联网(IoT)技术的飞速发展,智能家居系统显著提高了用户日常生活的便利性和自动化程度。然而,随着敏感数据在智能设备之间通过开放通道传输,数据传输带来的安全风险日益突出。认证和密钥交换(AKE)协议旨在促进智能设备之间的身份认证和保密通信。然而,现有的AKE协议往往存在效率低、可扩展性差的问题。这些限制使它们不适合资源受限的物联网设备,也无法提供安全的相互认证。为了应对这些挑战,本研究为智能家居引入了一种区块链辅助的轻量级身份验证方案。该方案集成了生物特征认证和设备凭证,实现了多因素认证。同时,采用区块链技术对用户与智能设备之间的交互进行记录和保护,增强了通信过程的安全性、透明性和可审计性。在随机Oracle模型(ROM)下的正式安全分析证实了该方案的密钥机密性。此外,非正式分析证明了它对常见威胁的健壮性,包括重播、中间人攻击、模拟和设备捕获攻击。针对现有协议的基准测试表明,我们的设计产生的计算、通信和能源开销最小。它实现了这种效率,同时保持了强大的安全性和可扩展性,使其成为资源有限的智能家居设备的理想选择。
{"title":"A blockchain-assisted lightweight authentication scheme for smart home environments","authors":"Xiujun Wang,&nbsp;Wenlong Dong,&nbsp;Wenjie Hu,&nbsp;Juyan Li","doi":"10.1016/j.jnca.2025.104397","DOIUrl":"10.1016/j.jnca.2025.104397","url":null,"abstract":"<div><div>With the rapid development of Internet of Things (IoT) technology, smart home systems have significantly enhanced the convenience and automation level of users’ daily lives. However, as sensitive data is transmitted between smart devices over open channels, the security risks associated with data transmission have become increasingly prominent. Authentication and key exchange (AKE) protocols are designed to facilitate identity authentication and confidential communication between smart devices. However, existing AKE protocols often suffer from low efficiency and poor scalability. These limitations make them unsuitable for resource-constrained IoT devices and unable to provide secure mutual authentication. To tackle these challenges, this study introduces a blockchain-assisted lightweight authentication scheme for smart homes. The proposed scheme integrates biometric authentication and device credentials to achieve multi-factor authentication. Meanwhile, blockchain technology is employed to record and protect interactions between users and smart devices, thereby enhancing the security, transparency, and auditability of the communication process. Formal security analysis under the Random Oracle Model (ROM) confirms the scheme’s key confidentiality. Furthermore, informal analysis demonstrates its robustness against common threats, including replay, man-in-the-middle, impersonation, and device capture attacks. Benchmarks against existing protocols demonstrate that our design incurs the least computational, communication, and energy overhead. It achieves this efficiency while preserving robust security and scalability, making it ideal for resource-limited smart-home devices.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104397"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data evacuation optimization using multi-objective reinforcement learning 基于多目标强化学习的数据疏散优化
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-19 DOI: 10.1016/j.jnca.2025.104390
Xiaole Li , Yinghui Jiang , Xing Wang , Jiuru Wang , Lei Gao , Shanwen Yi
After some disaster occurs, rapid data evacuation among cloud data centers is of great importance. Data evacuation optimization is a two-stage process including destination selection and flow scheduling. These two stages are related to each other, while evacuation efficiency is affected by evacuation distance, bandwidth allocation ratio, and total amount of evacuation flow at the same time. The mutual constraints among multiple factors make it difficult to find or approximate the optimal solution via single-objective optimization. This paper proposes a new two-stage data evacuation strategy using multi-objective reinforcement learning, with evacuation flow optimization as the central optimization objective across both stages. In the first stage, it simultaneously minimizes total path length and maximizes the total available bandwidth to determine source–destination pair for every evacuation transfer. In the second stage, it simultaneously allocates proportional bandwidth and maximizes the total amount of evacuation flow to find path and allocate bandwidth for every evacuation transfer. Reward function is set based on classifying candidate sets to search for optimal solution while ensuring that feasible solutions are obtained. Chebyshev scalarization function is used to evaluate action rewards and optimize action selection process. Performance comparison is implemented with state-of-the-art algorithms based on different data volumes and network scales. Simulation result demonstrates that the new strategy outperforms other algorithms with higher evacuation efficiency, good convergence and robustness.
在灾难发生后,云数据中心之间的快速数据疏散是非常重要的。数据疏散优化是一个包括目的地选择和流量调度两个阶段的过程。这两个阶段是相互关联的,疏散效率同时受到疏散距离、带宽分配比例和疏散流量总量的影响。多因素之间的相互约束使得单目标优化很难找到或逼近最优解。本文提出了一种新的基于多目标强化学习的两阶段数据疏散策略,并将疏散流优化作为两阶段的中心优化目标。在第一阶段,它同时最小化总路径长度和最大化总可用带宽,以确定每次疏散传输的源-目的对。第二阶段,在分配比例带宽的同时,使疏散流总量最大化,为每个疏散转移寻找路径并分配带宽。在对候选集进行分类的基础上设置奖励函数,在保证获得可行解的前提下寻找最优解。采用切比雪夫标量函数对行动奖励进行评价,优化行动选择过程。基于不同的数据量和网络规模,使用最先进的算法实现性能比较。仿真结果表明,该策略具有较高的疏散效率、较好的收敛性和鲁棒性。
{"title":"Data evacuation optimization using multi-objective reinforcement learning","authors":"Xiaole Li ,&nbsp;Yinghui Jiang ,&nbsp;Xing Wang ,&nbsp;Jiuru Wang ,&nbsp;Lei Gao ,&nbsp;Shanwen Yi","doi":"10.1016/j.jnca.2025.104390","DOIUrl":"10.1016/j.jnca.2025.104390","url":null,"abstract":"<div><div>After some disaster occurs, rapid data evacuation among cloud data centers is of great importance. Data evacuation optimization is a two-stage process including destination selection and flow scheduling. These two stages are related to each other, while evacuation efficiency is affected by evacuation distance, bandwidth allocation ratio, and total amount of evacuation flow at the same time. The mutual constraints among multiple factors make it difficult to find or approximate the optimal solution via single-objective optimization. This paper proposes a new two-stage data evacuation strategy using multi-objective reinforcement learning, with evacuation flow optimization as the central optimization objective across both stages. In the first stage, it simultaneously minimizes total path length and maximizes the total available bandwidth to determine source–destination pair for every evacuation transfer. In the second stage, it simultaneously allocates proportional bandwidth and maximizes the total amount of evacuation flow to find path and allocate bandwidth for every evacuation transfer. Reward function is set based on classifying candidate sets to search for optimal solution while ensuring that feasible solutions are obtained. Chebyshev scalarization function is used to evaluate action rewards and optimize action selection process. Performance comparison is implemented with state-of-the-art algorithms based on different data volumes and network scales. Simulation result demonstrates that the new strategy outperforms other algorithms with higher evacuation efficiency, good convergence and robustness.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104390"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145560057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networks of splicing processors: Wheel graph topology simulation 拼接处理器网络:轮图拓扑仿真
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-24 DOI: 10.1016/j.jnca.2025.104393
José Angel Sánchez Martín , Victor Mitrana , Mihaela Păun , José Ramó n Sánchez Couso
We continue the investigation regarding the simulation of different network topologies in networks having processors inspired by the DNA splicing which are located in their nodes. These networks are called networks of splicing processors. So far, it was shown how every network of splicing processors, no matter its topology, can be converted, by a direct construction, into an equivalent network with a desired topology, especially a common one like star, grid or complete (or full-mesh). A short discussion highlights the importance of wheel graph topology in relation to biology and DNA computing. This work completes this study by giving an effective construction of a wheel (ring-star) network of splicing processors that is equivalent to an arbitrary network. The size and time complexity of our construction is evaluated. Finally, we discuss a very preliminary simulation of the networks considered here by means of recent technologies and strategies that are suitable to handle the massive data and parallel processing requirements of these networks.
我们将继续研究网络中不同网络拓扑的模拟,这些网络的处理器受到位于其节点中的DNA剪接的启发。这些网络被称为拼接处理器网络。到目前为止,它已经展示了如何将每个拼接处理器网络,无论其拓扑如何,都可以通过直接构造转换为具有所需拓扑的等效网络,特别是像星形,网格或完整(或全网格)这样的常见网络。一个简短的讨论强调了车轮图拓扑在生物学和DNA计算方面的重要性。这项工作通过给出一个等效于任意网络的拼接处理器的轮式(环状)网络的有效结构来完成这项研究。我们的结构的大小和时间复杂性进行了评估。最后,我们通过适合处理这些网络的海量数据和并行处理要求的最新技术和策略,讨论了这里所考虑的网络的非常初步的模拟。
{"title":"Networks of splicing processors: Wheel graph topology simulation","authors":"José Angel Sánchez Martín ,&nbsp;Victor Mitrana ,&nbsp;Mihaela Păun ,&nbsp;José Ramó n Sánchez Couso","doi":"10.1016/j.jnca.2025.104393","DOIUrl":"10.1016/j.jnca.2025.104393","url":null,"abstract":"<div><div>We continue the investigation regarding the simulation of different network topologies in networks having processors inspired by the DNA splicing which are located in their nodes. These networks are called networks of splicing processors. So far, it was shown how every network of splicing processors, no matter its topology, can be converted, by a direct construction, into an equivalent network with a desired topology, especially a common one like star, grid or complete (or full-mesh). A short discussion highlights the importance of wheel graph topology in relation to biology and DNA computing. This work completes this study by giving an effective construction of a wheel (ring-star) network of splicing processors that is equivalent to an arbitrary network. The size and time complexity of our construction is evaluated. Finally, we discuss a very preliminary simulation of the networks considered here by means of recent technologies and strategies that are suitable to handle the massive data and parallel processing requirements of these networks.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104393"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent and explainable intrusion detection framework for Internet of Sensor Things using generalizable optimized active Machine Learning 一个智能的、可解释的传感器物联网入侵检测框架,使用可推广的优化主动机器学习
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-10-10 DOI: 10.1016/j.jnca.2025.104358
Muhammad Hasnain , Nadeem Javaid , Abdul Khader Jilani Saudagar , Neeraj Kumar
<div><div>Intrusion Detection (ID) in the Internet of Secure Things (IoST) has become increasingly critical due to the rising frequency and sophistication of cyber-attacks, which can lead to severe consequences such as data breaches, financial losses, and service disruptions. These risks are further intensified in computationally limited environments, where limited computational capacity and rapidly evolving threats make accurate and efficient detection challenging. In this study, a data-efficient ID framework tailored for resource-constrained environments is proposed by leveraging active learning and meta-heuristic optimization techniques. The proposed framework systematically addresses three critical limitations commonly observed in traditional models: data imbalance, inefficient hyperparameter tuning, and dependency on large labeled datasets. Initially, to mitigate class imbalance, adaptive synthetic sampling generates synthetic instances for minority classes, thereby enhancing learning in complex regions of the feature space. Next, for hyperparameter optimization, the Sandpiper Optimization (SO) algorithm fine-tunes the regularization parameter of Logistic Regression (LR), yielding significant improvements in model generalization. Finally, the challenge of limited labeled data is addressed through two active learning strategies: Active Learning Uncertainty-based (ALU) and Active Learning Entropy-based (ALE). These strategies selectively query the most informative samples from the unlabeled pool, ensuring maximum learning with minimal annotation effort. The performance of the proposed models is evaluated on two benchmark datasets: the wireless sensor networks and network intrusion detection datasets. Simulation results demonstrate that proposed models outperform base model LR. LRALE achieves improvements of 10.48% and 3.16% in accuracy, 19.48% and 3.16% in recall, and 7.23% and 1.04% in F1-score on WSN-DS and CIC-IDS-DS datasets, respectively. LRALU shows improvements of 18.18% and 2.11% in accuracy, 18.18% and 2.11% in recall, and 14.63% and 2.08% in Receiver Operating Characteristic-Area Under the Curve (ROC-AUC). Similarly, LRSO achieves improvements of 9.09% and 2.11% in accuracy, 9.09% and 1.05% in recall, and 9.76% and 3.12% in ROC-AUC on WSN-DS and CIC-IDS-DS datasets, respectively. To ensure model generalization and stability across different data partitions, a rigorous 10-fold cross-validation is conducted. Model interpretability is further enhanced using eXplainable artificial intelligence techniques, including Local interpretable model-agnostic explanations and Shapley additive explanations, to elucidate feature contributions and improve transparency. Additionally, statistical significance testing through paired <em>t</em>-tests confirms the robustness and reliability of the proposed models. Overall, this framework introduces a comprehensive, annotation-efficient, and transparent ID solution that significantly advances the domain, m
由于网络攻击的频率和复杂性不断上升,入侵检测(ID)在安全物联网(IoST)中变得越来越重要,这可能导致严重的后果,如数据泄露、经济损失和服务中断。在计算能力有限的环境中,这些风险进一步加剧,在这些环境中,有限的计算能力和快速发展的威胁使准确有效的检测变得困难。在本研究中,通过利用主动学习和元启发式优化技术,提出了一个针对资源受限环境量身定制的数据高效ID框架。提出的框架系统地解决了传统模型中常见的三个关键限制:数据不平衡、低效的超参数调优以及对大型标记数据集的依赖。首先,为了缓解类不平衡,自适应合成采样为少数类生成合成实例,从而增强特征空间复杂区域的学习。接下来,对于超参数优化,Sandpiper optimization (SO)算法对Logistic Regression (LR)的正则化参数进行微调,显著提高了模型泛化能力。最后,通过两种主动学习策略:基于不确定性的主动学习(ALU)和基于熵的主动学习(ALE)来解决有限标记数据的挑战。这些策略有选择地从未标记池中查询最有信息的样本,确保以最小的注释工作量获得最大的学习。在无线传感器网络和网络入侵检测两个基准数据集上对所提模型的性能进行了评估。仿真结果表明,所提模型优于基本模型LR。LRALE在WSN-DS和CIC-IDS-DS数据集上的准确率提高了10.48%和3.16%,召回率提高了19.48%和3.16%,f1评分提高了7.23%和1.04%。LRALU的准确率分别提高18.18%和2.11%,召回率分别提高18.18%和2.11%,接受者工作特征曲线下面积(ROC-AUC)分别提高14.63%和2.08%。同样,LRSO在WSN-DS和CIC-IDS-DS数据集上的准确率分别提高9.09%和2.11%,召回率分别提高9.09%和1.05%,ROC-AUC分别提高9.76%和3.12%。为了确保模型在不同数据分区之间的泛化和稳定性,进行了严格的10倍交叉验证。使用可解释的人工智能技术,包括局部可解释的模型不可知论解释和Shapley加性解释,进一步增强了模型的可解释性,以阐明特征贡献并提高透明度。此外,通过配对t检验的统计显著性检验证实了所提出模型的稳健性和可靠性。总的来说,这个框架引入了一个全面的、注释高效的、透明的ID解决方案,极大地推进了这个领域,使其非常适合在IoSTs环境中进行实际部署。
{"title":"An intelligent and explainable intrusion detection framework for Internet of Sensor Things using generalizable optimized active Machine Learning","authors":"Muhammad Hasnain ,&nbsp;Nadeem Javaid ,&nbsp;Abdul Khader Jilani Saudagar ,&nbsp;Neeraj Kumar","doi":"10.1016/j.jnca.2025.104358","DOIUrl":"10.1016/j.jnca.2025.104358","url":null,"abstract":"&lt;div&gt;&lt;div&gt;Intrusion Detection (ID) in the Internet of Secure Things (IoST) has become increasingly critical due to the rising frequency and sophistication of cyber-attacks, which can lead to severe consequences such as data breaches, financial losses, and service disruptions. These risks are further intensified in computationally limited environments, where limited computational capacity and rapidly evolving threats make accurate and efficient detection challenging. In this study, a data-efficient ID framework tailored for resource-constrained environments is proposed by leveraging active learning and meta-heuristic optimization techniques. The proposed framework systematically addresses three critical limitations commonly observed in traditional models: data imbalance, inefficient hyperparameter tuning, and dependency on large labeled datasets. Initially, to mitigate class imbalance, adaptive synthetic sampling generates synthetic instances for minority classes, thereby enhancing learning in complex regions of the feature space. Next, for hyperparameter optimization, the Sandpiper Optimization (SO) algorithm fine-tunes the regularization parameter of Logistic Regression (LR), yielding significant improvements in model generalization. Finally, the challenge of limited labeled data is addressed through two active learning strategies: Active Learning Uncertainty-based (ALU) and Active Learning Entropy-based (ALE). These strategies selectively query the most informative samples from the unlabeled pool, ensuring maximum learning with minimal annotation effort. The performance of the proposed models is evaluated on two benchmark datasets: the wireless sensor networks and network intrusion detection datasets. Simulation results demonstrate that proposed models outperform base model LR. LRALE achieves improvements of 10.48% and 3.16% in accuracy, 19.48% and 3.16% in recall, and 7.23% and 1.04% in F1-score on WSN-DS and CIC-IDS-DS datasets, respectively. LRALU shows improvements of 18.18% and 2.11% in accuracy, 18.18% and 2.11% in recall, and 14.63% and 2.08% in Receiver Operating Characteristic-Area Under the Curve (ROC-AUC). Similarly, LRSO achieves improvements of 9.09% and 2.11% in accuracy, 9.09% and 1.05% in recall, and 9.76% and 3.12% in ROC-AUC on WSN-DS and CIC-IDS-DS datasets, respectively. To ensure model generalization and stability across different data partitions, a rigorous 10-fold cross-validation is conducted. Model interpretability is further enhanced using eXplainable artificial intelligence techniques, including Local interpretable model-agnostic explanations and Shapley additive explanations, to elucidate feature contributions and improve transparency. Additionally, statistical significance testing through paired &lt;em&gt;t&lt;/em&gt;-tests confirms the robustness and reliability of the proposed models. Overall, this framework introduces a comprehensive, annotation-efficient, and transparent ID solution that significantly advances the domain, m","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104358"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145384600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNCCQ-PPO: A dynamic network congestion control algorithm based on deep reinforcement learning for XQUIC DNCCQ-PPO:基于深度强化学习的XQUIC动态网络拥塞控制算法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-10-30 DOI: 10.1016/j.jnca.2025.104371
Wenhui Yu , Jinyao Liu , Xiaoqiang Di , Pei Xiao , Hui Qi
The diversity of network forms and services poses challenges to the TCP protocol in achieving good performance. The current XQUIC implementation of the QUIC protocol still adopts TCP’s heuristic congestion control mechanisms, resulting in limited performance gains. In recent years, reinforcement learning-based congestion control has emerged as an effective alternative to traditional strategies, but existing algorithms are not optimized for dynamic network characteristics. In this paper, we propose a deep reinforcement learning-based congestion control algorithm, Dynamic Network Congestion Control for QUIC Based on PPO (DNCCQ-PPO). To address the heterogeneity of dynamic network training environments, we introduce a novel sampling interaction mechanism, action space, and reward function, and propose an asynchronous distributed training scheme. Additionally, we develop a generalized reinforcement learning framework for congestion control algorithm development that supports XQUIC, and verify the performance of DNCCQ-PPO within this framework. Experimental results demonstrate the algorithm’s fast convergence and excellent training performance. In performance tests, DNCCQ-PPO achieves throughput comparable to that of CUBIC while reducing latency by 54.78%. In multi-stream fairness tests, it outperforms several mainstream algorithms. In satellite network simulations, DNCCQ-PPO maintains high throughput while reducing latency by 69.58% and 72.77% compared to CUBIC and PCC, respectively.
网络形式和业务的多样性对TCP协议的性能提出了挑战。目前QUIC协议的XQUIC实现仍然采用TCP的启发式拥塞控制机制,导致性能提升有限。近年来,基于强化学习的拥塞控制已成为传统策略的有效替代,但现有算法并未针对网络的动态特性进行优化。本文提出了一种基于深度强化学习的拥塞控制算法——基于PPO的QUIC动态网络拥塞控制(DNCCQ-PPO)。为了解决动态网络训练环境的异质性,引入了一种新的采样交互机制、动作空间和奖励函数,提出了一种异步分布式训练方案。此外,我们开发了一个用于支持XQUIC的拥塞控制算法开发的广义强化学习框架,并在该框架内验证了DNCCQ-PPO的性能。实验结果表明,该算法具有较快的收敛速度和良好的训练性能。在性能测试中,DNCCQ-PPO实现了与CUBIC相当的吞吐量,同时将延迟降低了54.78%。在多流公平性测试中,它优于几种主流算法。在卫星网络模拟中,与CUBIC和PCC相比,DNCCQ-PPO在保持高吞吐量的同时,延迟分别降低了69.58%和72.77%。
{"title":"DNCCQ-PPO: A dynamic network congestion control algorithm based on deep reinforcement learning for XQUIC","authors":"Wenhui Yu ,&nbsp;Jinyao Liu ,&nbsp;Xiaoqiang Di ,&nbsp;Pei Xiao ,&nbsp;Hui Qi","doi":"10.1016/j.jnca.2025.104371","DOIUrl":"10.1016/j.jnca.2025.104371","url":null,"abstract":"<div><div>The diversity of network forms and services poses challenges to the TCP protocol in achieving good performance. The current XQUIC implementation of the QUIC protocol still adopts TCP’s heuristic congestion control mechanisms, resulting in limited performance gains. In recent years, reinforcement learning-based congestion control has emerged as an effective alternative to traditional strategies, but existing algorithms are not optimized for dynamic network characteristics. In this paper, we propose a deep reinforcement learning-based congestion control algorithm, Dynamic Network Congestion Control for QUIC Based on PPO (DNCCQ-PPO). To address the heterogeneity of dynamic network training environments, we introduce a novel sampling interaction mechanism, action space, and reward function, and propose an asynchronous distributed training scheme. Additionally, we develop a generalized reinforcement learning framework for congestion control algorithm development that supports XQUIC, and verify the performance of DNCCQ-PPO within this framework. Experimental results demonstrate the algorithm’s fast convergence and excellent training performance. In performance tests, DNCCQ-PPO achieves throughput comparable to that of CUBIC while reducing latency by 54.78%. In multi-stream fairness tests, it outperforms several mainstream algorithms. In satellite network simulations, DNCCQ-PPO maintains high throughput while reducing latency by 69.58% and 72.77% compared to CUBIC and PCC, respectively.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104371"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145404579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain 基于verk累加器的区块链多状态可验证和可更新(VA-MSVU)方案
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-14 DOI: 10.1016/j.jnca.2025.104392
Shangping Wang, Juanjuan Ma, Qi Huang, Xiaoling Xie
As the application scope of blockchain technology continues to expand, challenges arise in the state verification of blockchain systems based on account models. Traditionally, Merkle Patricia Tries are used to maintain the state of the world, and the verification of a specific data block needs to be verified step by step up to the root node, which guarantees the data integrity, but in large-scale systems, problems such as low efficiency of verification and updating, insufficient security, and increased storage demand still occur, which affects the performance of blockchain networks. In this paper, we propose a Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain. The scheme integrates Verkle tree (VT), Verkle accumulator (VA), KZG polynomial commitment, and aggregated proofs to verify the integrity of multiple account states in batches. By mapping account states to the VT, our approach enhances security, reduces the size of state data, and improves both verification speed and update efficiency. Simulation results show that the VA-MSVU scheme has smaller proof size and faster verification speed than the existing stored data structure, demonstrating the advantages of the VA-MSVU scheme in terms of simplicity and efficiency. For verifying multiple account states, the aggregated proofs of the scheme have significant advantages over KZG polynomial commitment and single-point proof, excelling in proof size, verification and update rate. In addition, by adjusting the branching factor in Verkle tree, a trade-off between computational overhead and communication is achieved to improve the adaptability of the system to different network scenarios.
随着区块链技术应用范围的不断扩大,基于账户模型的区块链系统状态验证出现了挑战。传统上使用Merkle Patricia Tries来维护世界的状态,特定数据块的验证需要逐级验证到根节点,保证了数据的完整性,但在大规模系统中,仍然会出现验证更新效率低、安全性不足、存储需求增加等问题,影响区块链网络的性能。在本文中,我们提出了一种基于verle - accumulator的区块链多状态可验证和可更新(VA-MSVU)方案。该方案集成了Verkle树(VT)、Verkle累加器(VA)、KZG多项式承诺和聚合证明,以批量验证多个账户状态的完整性。通过将帐户状态映射到VT,我们的方法增强了安全性,减少了状态数据的大小,并提高了验证速度和更新效率。仿真结果表明,与现有存储的数据结构相比,VA-MSVU方案具有更小的证明尺寸和更快的验证速度,证明了VA-MSVU方案在简单和高效方面的优势。对于验证多账户状态,该方案的聚合证明比KZG多项式承诺和单点证明具有显著的优势,在证明大小、验证和更新速度方面都具有优势。此外,通过调整Verkle树的分支因子,实现了计算开销和通信之间的平衡,提高了系统对不同网络场景的适应性。
{"title":"Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain","authors":"Shangping Wang,&nbsp;Juanjuan Ma,&nbsp;Qi Huang,&nbsp;Xiaoling Xie","doi":"10.1016/j.jnca.2025.104392","DOIUrl":"10.1016/j.jnca.2025.104392","url":null,"abstract":"<div><div>As the application scope of blockchain technology continues to expand, challenges arise in the state verification of blockchain systems based on account models. Traditionally, Merkle Patricia Tries are used to maintain the state of the world, and the verification of a specific data block needs to be verified step by step up to the root node, which guarantees the data integrity, but in large-scale systems, problems such as low efficiency of verification and updating, insufficient security, and increased storage demand still occur, which affects the performance of blockchain networks. In this paper, we propose a Verkle-Accumulator-Based Multiple State Verifiable and Updatable (VA-MSVU) scheme for blockchain. The scheme integrates Verkle tree (VT), Verkle accumulator (VA), KZG polynomial commitment, and aggregated proofs to verify the integrity of multiple account states in batches. By mapping account states to the VT, our approach enhances security, reduces the size of state data, and improves both verification speed and update efficiency. Simulation results show that the VA-MSVU scheme has smaller proof size and faster verification speed than the existing stored data structure, demonstrating the advantages of the VA-MSVU scheme in terms of simplicity and efficiency. For verifying multiple account states, the aggregated proofs of the scheme have significant advantages over KZG polynomial commitment and single-point proof, excelling in proof size, verification and update rate. In addition, by adjusting the branching factor in Verkle tree, a trade-off between computational overhead and communication is achieved to improve the adaptability of the system to different network scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104392"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145531183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community detection via core node identification and local label diffusion with GraphSAGE boundary refinement in complex networks 复杂网络中基于核心节点识别和GraphSAGE边界细化的局部标签扩散的社区检测
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-24 DOI: 10.1016/j.jnca.2025.104399
Asgarali Bouyer , Pouya Shahgholi , Bahman Arasteh , Amin Golzari Oskouei , Xiaoyang Liu
Community detection is a vital task in social network analysis, enabling the extraction of hidden structures and relationships. However, existing diffusion-based local community detection algorithms often depend on similarity-based scoring, which frequently failing to identify influential core nodes for expanding label. To address these shortcomings, we propose the local detecting and structuring communities (LDSC) method that integrates structural and relational insights with graph-based metrics and deep learning for refined community detection. LDSC uniquely stands out by combining Local Influence (LI) and Adaptive Absorbing Strength (AAS) metrics with GraphSAGE-based boundary refinement and adaptive community merging, tackling persistent challenges like scalability, boundary ambiguity, and structural cohesion unmet by prior methods. The method unfolds in four key phases: (1) Core Node Detection, employing a distinctive metric fusing LI and AAS to identify structurally significant nodes; (2) Label Diffusion, dynamically propagating labels from core nodes to neighbors for precise community formation; (3) Boundary Node Reassignment, using GraphSAGE to resolve ambiguities; and (4) Adaptive Community Merging, using an innovative local merging strategy to enhance cohesion. Evaluations on synthetic LFR benchmarks and real-world networks (e.g., Karate, Dolphins, DBLP, Amazon, LiveJournal, Orkut) demonstrate LDSC's superiority over baseline methods (e.g., LPA, CNM, WalkTrap, Louvain) and state-of-the-art approaches (e.g., Leiden, Infomap, LSMD, CLD_GE, FluidC, LCDR, LS), achieving perfect NMI/ARI (1.0) in Karate and Dolphins, top NMI in LiveJournal (0.92) and Orkut (0.65), average scores of 0.85 NMI and 0.75 ARI, and >15 % NMI improvement in large-scale networks like DBLP, showcasing unmatched accuracy, stability, and efficiency.
社区检测是社会网络分析中的一项重要任务,它可以提取隐藏的结构和关系。然而,现有的基于扩散的局部社区检测算法往往依赖于基于相似度的评分,往往无法识别有影响力的核心节点来扩展标签。为了解决这些缺点,我们提出了局部检测和构建社区(LDSC)方法,该方法将结构和关系洞察力与基于图的度量和深度学习相结合,以实现精细的社区检测。LDSC通过将局部影响(LI)和自适应吸收强度(AAS)指标与基于graphsage的边界细化和自适应社区合并相结合,独特地脱颖而出,解决了先前方法无法解决的可扩展性、边界模糊和结构内聚等持续挑战。该方法分为四个关键阶段:(1)核心节点检测,采用融合LI和AAS的独特度量来识别结构上重要的节点;(2)标签扩散,将标签从核心节点动态传播到相邻节点,以精确形成社区;(3)边界节点重新分配,使用GraphSAGE解决歧义;(4)适应性社区合并,采用创新的局部合并策略增强凝聚力。对合成LFR基准和现实世界网络(例如,空手道、海豚、DBLP、亚马逊、LiveJournal、Orkut)的评估表明,LDSC优于基线方法(例如,LPA、CNM、WalkTrap、Louvain)和最先进的方法(例如,Leiden、Infomap、LSMD、CLD_GE、FluidC、LCDR、LS),在空手道和海豚中实现了完美的NMI/ARI(1.0),在LiveJournal(0.92)和Orkut(0.65)中实现了最高的NMI,平均得分为0.85 NMI和0.75 ARI。在DBLP等大型网络中,NMI提高了15%,展示了无与伦比的准确性、稳定性和效率。
{"title":"Community detection via core node identification and local label diffusion with GraphSAGE boundary refinement in complex networks","authors":"Asgarali Bouyer ,&nbsp;Pouya Shahgholi ,&nbsp;Bahman Arasteh ,&nbsp;Amin Golzari Oskouei ,&nbsp;Xiaoyang Liu","doi":"10.1016/j.jnca.2025.104399","DOIUrl":"10.1016/j.jnca.2025.104399","url":null,"abstract":"<div><div>Community detection is a vital task in social network analysis, enabling the extraction of hidden structures and relationships. However, existing diffusion-based local community detection algorithms often depend on similarity-based scoring, which frequently failing to identify influential core nodes for expanding label. To address these shortcomings, we propose the local detecting and structuring communities (LDSC) method that integrates structural and relational insights with graph-based metrics and deep learning for refined community detection. LDSC uniquely stands out by combining Local Influence (LI) and Adaptive Absorbing Strength (AAS) metrics with GraphSAGE-based boundary refinement and adaptive community merging, tackling persistent challenges like scalability, boundary ambiguity, and structural cohesion unmet by prior methods. The method unfolds in four key phases: (1) Core Node Detection, employing a distinctive metric fusing LI and AAS to identify structurally significant nodes; (2) Label Diffusion, dynamically propagating labels from core nodes to neighbors for precise community formation; (3) Boundary Node Reassignment, using GraphSAGE to resolve ambiguities; and (4) Adaptive Community Merging, using an innovative local merging strategy to enhance cohesion. Evaluations on synthetic LFR benchmarks and real-world networks (e.g., Karate, Dolphins, DBLP, Amazon, LiveJournal, Orkut) demonstrate LDSC's superiority over baseline methods (e.g., LPA, CNM, WalkTrap, Louvain) and state-of-the-art approaches (e.g., Leiden, Infomap, LSMD, CLD_GE, FluidC, LCDR, LS), achieving perfect NMI/ARI (1.0) in Karate and Dolphins, top NMI in LiveJournal (0.92) and Orkut (0.65), average scores of 0.85 NMI and 0.75 ARI, and &gt;15 % NMI improvement in large-scale networks like DBLP, showcasing unmatched accuracy, stability, and efficiency.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104399"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Wi-Fi and VR streaming interplay: A comprehensible simulation and experimental study 了解Wi-Fi和VR流媒体的相互作用:一个可理解的模拟和实验研究
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-11-14 DOI: 10.1016/j.jnca.2025.104391
Boris Bellalta, Miguel Casasnovas, Ferran Maura, Alejandro Rodríguez, Juan S. Marquerie, Pablo L. García, Francesc Wilhelmi, Josep Blat
This paper evaluates the performance of Wi-Fi networks for interactive Virtual Reality (VR) streaming with adaptive bitrate control. It focuses on the interaction between VR traffic characteristics and Wi-Fi link-layer mechanisms, studying how this relationship impacts key performance indicators such as throughput, latency, and user scalability. We begin by outlining the architecture, operation, traffic patterns, and performance demands of cloud/edge split-rendering VR systems. Then, using simulations, we investigate both single-user scenarios — examining the effects of modulation and coding schemes (MCSs) and user-to-access point (AP) distance on bitrate sustainability and latency — and multi-user scenarios, assessing how many concurrent VR users a single AP can support. Results show that the use of adaptive bitrate (ABR) streaming, as exemplified by our NeSt-VR algorithm, significantly outperforms constant bitrate (CBR) approaches, enhancing user capacity and resilience to changing channel propagation conditions. To validate the simulation findings, we conduct an experimental evaluation using Rooms, an open-source eXtended Reality (XR) content creation platform. The experimental results closely match the simulations, reinforcing the conclusion that adaptive bitrate control substantially improves Wi-Fi’s ability to support reliable, multiuser interactive VR streaming.
本文评估了具有自适应比特率控制的交互式虚拟现实(VR)流的Wi-Fi网络的性能。它侧重于VR流量特征与Wi-Fi链路层机制之间的交互,研究这种关系如何影响吞吐量、延迟和用户可扩展性等关键性能指标。我们首先概述了云/边缘分割渲染VR系统的架构、操作、流量模式和性能需求。然后,通过模拟,我们研究了单用户场景(检查调制和编码方案(MCSs)和用户到接入点(AP)距离对比特率可持续性和延迟的影响)和多用户场景(评估单个AP可以支持多少并发VR用户)。结果表明,使用自适应比特率(ABR)流,如我们的NeSt-VR算法所示,显著优于恒定比特率(CBR)方法,增强了用户容量和对不断变化的信道传播条件的弹性。为了验证模拟结果,我们使用开源扩展现实(XR)内容创建平台Rooms进行了实验评估。实验结果与模拟结果非常吻合,强化了自适应比特率控制大大提高Wi-Fi支持可靠的多用户交互式VR流的能力的结论。
{"title":"Understanding the Wi-Fi and VR streaming interplay: A comprehensible simulation and experimental study","authors":"Boris Bellalta,&nbsp;Miguel Casasnovas,&nbsp;Ferran Maura,&nbsp;Alejandro Rodríguez,&nbsp;Juan S. Marquerie,&nbsp;Pablo L. García,&nbsp;Francesc Wilhelmi,&nbsp;Josep Blat","doi":"10.1016/j.jnca.2025.104391","DOIUrl":"10.1016/j.jnca.2025.104391","url":null,"abstract":"<div><div>This paper evaluates the performance of Wi-Fi networks for interactive Virtual Reality (VR) streaming with adaptive bitrate control. It focuses on the interaction between VR traffic characteristics and Wi-Fi link-layer mechanisms, studying how this relationship impacts key performance indicators such as throughput, latency, and user scalability. We begin by outlining the architecture, operation, traffic patterns, and performance demands of cloud/edge split-rendering VR systems. Then, using simulations, we investigate both single-user scenarios — examining the effects of modulation and coding schemes (MCSs) and user-to-access point (AP) distance on bitrate sustainability and latency — and multi-user scenarios, assessing how many concurrent VR users a single AP can support. Results show that the use of adaptive bitrate (ABR) streaming, as exemplified by our NeSt-VR algorithm, significantly outperforms constant bitrate (CBR) approaches, enhancing user capacity and resilience to changing channel propagation conditions. To validate the simulation findings, we conduct an experimental evaluation using Rooms, an open-source eXtended Reality (XR) content creation platform. The experimental results closely match the simulations, reinforcing the conclusion that adaptive bitrate control substantially improves Wi-Fi’s ability to support reliable, multiuser interactive VR streaming.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 ","pages":"Article 104391"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145531234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1