首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
FedCoRE: Effective Federated Learning for constrained RESTful environments in the Artificial Intelligence of Things FedCoRE:物联网人工智能中约束rest环境的有效联邦学习
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-10-08 DOI: 10.1016/j.jnca.2025.104357
Badis Djamaa, Habib Yekhlef, Mohamed Amine Kouda, Abbas Bradai
Federated Learning (FL) empowers Internet-of-Things (IoT) devices to train intelligent models without sharing sensitive data, facilitating the transition to an Artificial Intelligence of Things (AIoT) ecosystem. However, FL demands significant storage, computation, and communication resources, which often exceed the capabilities of resource-constrained IoT devices. In this work, we introduce FedCoRE, an effective and practical FL architecture tailored for IoT environments. FedCoRE leverages standards for constrained RESTful environments, such as the Constrained Application Protocol (CoAP), to optimize communication and applies model quantization to address computation and storage limitations. FedCoRE has been implemented on resource-constrained IoT devices with 256 KB of RAM and evaluated on a human activity recognition task using a deep neural network. Extensive evaluations conducted in a real-world IoT environment, comprising 10 Thunderboard Sense 2 nodes, demonstrate the feasibility and effectiveness of our proposal. Notably, compared to FL, FedCoRE achieves up to a 60% reduction in communication cost, while maintaining model accuracy and requiring only approximately 75 KB of RAM and 438 KB of ROM.
联邦学习(FL)使物联网(IoT)设备能够在不共享敏感数据的情况下训练智能模型,从而促进向人工智能(AIoT)生态系统的过渡。然而,FL需要大量的存储、计算和通信资源,这往往超出了资源受限的物联网设备的能力。在这项工作中,我们介绍了FedCoRE,这是一种为物联网环境量身定制的有效实用的FL架构。FedCoRE利用约束rest环境的标准,例如约束应用协议(constrained Application Protocol, CoAP),来优化通信,并应用模型量化来解决计算和存储限制。FedCoRE已经在具有256 KB RAM的资源受限物联网设备上实现,并使用深度神经网络在人类活动识别任务上进行了评估。在真实的物联网环境中进行了广泛的评估,包括10个Thunderboard Sense 2节点,证明了我们提议的可行性和有效性。值得注意的是,与FL相比,FedCoRE实现了高达60%的通信成本降低,同时保持模型精度,只需要大约75KB的RAM和438KB的ROM。
{"title":"FedCoRE: Effective Federated Learning for constrained RESTful environments in the Artificial Intelligence of Things","authors":"Badis Djamaa,&nbsp;Habib Yekhlef,&nbsp;Mohamed Amine Kouda,&nbsp;Abbas Bradai","doi":"10.1016/j.jnca.2025.104357","DOIUrl":"10.1016/j.jnca.2025.104357","url":null,"abstract":"<div><div>Federated Learning (FL) empowers Internet-of-Things (IoT) devices to train intelligent models without sharing sensitive data, facilitating the transition to an Artificial Intelligence of Things (AIoT) ecosystem. However, FL demands significant storage, computation, and communication resources, which often exceed the capabilities of resource-constrained IoT devices. In this work, we introduce FedCoRE, an effective and practical FL architecture tailored for IoT environments. FedCoRE leverages standards for constrained RESTful environments, such as the Constrained Application Protocol (CoAP), to optimize communication and applies model quantization to address computation and storage limitations. FedCoRE has been implemented on resource-constrained IoT devices with 256 KB of RAM and evaluated on a human activity recognition task using a deep neural network. Extensive evaluations conducted in a real-world IoT environment, comprising 10 Thunderboard Sense 2 nodes, demonstrate the feasibility and effectiveness of our proposal. Notably, compared to FL, FedCoRE achieves up to a 60% reduction in communication cost, while maintaining model accuracy and requiring only approximately 75<!--> <!-->KB of RAM and 438<!--> <!-->KB of ROM.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104357"},"PeriodicalIF":8.0,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145311718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for the metaverse: Recent advances, taxonomy, and future challenges 区块链:最近的进展、分类和未来的挑战
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-10-08 DOI: 10.1016/j.jnca.2025.104355
Abdullah Yousafzai , Muhammad Mohsan Sheeraz , Ganna Pogrebna , Jon Crowcroft , Ibrar Yaqoob
The metaverse is a shared virtual 3D space that combines immersive experiences with applications in gaming, social interactions, commerce, and more. It is rapidly becoming a reality, driven by advances in virtual reality, augmented reality, artificial intelligence, blockchain, and other emerging technologies. Among these, blockchain technology enables secure and decentralized ownership as well as seamless interoperability of virtual assets. Non-fungible tokens ensure verifiable ownership and fraud prevention, while smart contracts facilitate automated peer-to-peer transactions. Blockchain’s security and transparency promote trust and innovation, laying the foundation for a connected and user-driven metaverse ecosystem. In this paper, we explore the role of blockchain technology as a key enabler for the metaverse, providing solutions for decentralization, governance through decentralized autonomous organizations, interoperable mechanisms, digital asset ownership, traceability, auditing, and identity management. We present the key difference between traditional virtual worlds and the metaverse, and why blockchain is preferred over other decentralized technologies for the metaverse. We comprehensively review recent advances in metaverse system architectures, focusing on state-of-the-art solutions and lessons learned. We compare the existing literature based on key parameters; namely, contributions, advantages, limitations, and applications. We present key challenges, including deepfake threats, identity theft and brand infringement risks, mental health risks, digital safety and gambling risks, virtual world laws and regulations, and privacy and data security concerns. We outline future recommendations for enabling a sustainable and user-friendly metaverse ecosystem.
虚拟世界是一个共享的虚拟3D空间,将沉浸式体验与游戏、社交互动、商业等应用相结合。在虚拟现实、增强现实、人工智能、区块链和其他新兴技术的推动下,它正在迅速成为现实。其中,区块链技术实现了安全分散的所有权以及虚拟资产的无缝互操作性。不可替代的代币确保了可验证的所有权和防止欺诈,而智能合约促进了自动化的点对点交易。b区块链的安全性和透明度促进了信任和创新,为连接和用户驱动的元宇宙生态系统奠定了基础。在本文中,我们探讨了区块链技术作为虚拟世界的关键推动者的作用,为去中心化、通过去中心化自治组织进行治理、可互操作机制、数字资产所有权、可追溯性、审计和身份管理提供解决方案。我们介绍了传统虚拟世界和虚拟世界之间的关键区别,以及为什么区块链比其他去中心化技术更适合虚拟世界。我们全面回顾了元宇宙系统架构的最新进展,重点介绍了最先进的解决方案和经验教训。我们根据关键参数对现有文献进行比较;即贡献、优势、限制和应用。我们提出了主要挑战,包括深度假冒威胁、身份盗窃和品牌侵权风险、心理健康风险、数字安全和赌博风险、虚拟世界法律法规以及隐私和数据安全问题。我们概述了未来关于实现可持续和用户友好的元生态系统的建议。
{"title":"Blockchain for the metaverse: Recent advances, taxonomy, and future challenges","authors":"Abdullah Yousafzai ,&nbsp;Muhammad Mohsan Sheeraz ,&nbsp;Ganna Pogrebna ,&nbsp;Jon Crowcroft ,&nbsp;Ibrar Yaqoob","doi":"10.1016/j.jnca.2025.104355","DOIUrl":"10.1016/j.jnca.2025.104355","url":null,"abstract":"<div><div>The metaverse is a shared virtual 3D space that combines immersive experiences with applications in gaming, social interactions, commerce, and more. It is rapidly becoming a reality, driven by advances in virtual reality, augmented reality, artificial intelligence, blockchain, and other emerging technologies. Among these, blockchain technology enables secure and decentralized ownership as well as seamless interoperability of virtual assets. Non-fungible tokens ensure verifiable ownership and fraud prevention, while smart contracts facilitate automated peer-to-peer transactions. Blockchain’s security and transparency promote trust and innovation, laying the foundation for a connected and user-driven metaverse ecosystem. In this paper, we explore the role of blockchain technology as a key enabler for the metaverse, providing solutions for decentralization, governance through decentralized autonomous organizations, interoperable mechanisms, digital asset ownership, traceability, auditing, and identity management. We present the key difference between traditional virtual worlds and the metaverse, and why blockchain is preferred over other decentralized technologies for the metaverse. We comprehensively review recent advances in metaverse system architectures, focusing on state-of-the-art solutions and lessons learned. We compare the existing literature based on key parameters; namely, contributions, advantages, limitations, and applications. We present key challenges, including deepfake threats, identity theft and brand infringement risks, mental health risks, digital safety and gambling risks, virtual world laws and regulations, and privacy and data security concerns. We outline future recommendations for enabling a sustainable and user-friendly metaverse ecosystem.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104355"},"PeriodicalIF":8.0,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145261937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next-generation AI for advanced threat detection and security enhancement in DNS over HTTPS 下一代AI用于通过HTTPS在DNS中进行高级威胁检测和安全增强
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-10-03 DOI: 10.1016/j.jnca.2025.104326
Basharat Ali, Guihai Chen
The widespread adoption of DNS over HTTPS(DoH) has inaugurated a new paradigm of network privacy through the encryption of DNS queries; paradoxically, this very mechanism has been weaponized by malicious actors to orchestrate convert cyberattacks ranging from polymorphic malware delivery and data exfiltration to command-and-control (C2) operations. Classic signature-based solutions that rely on static security policies and packet-depth inspection are rendered useless in the face of encrypted DoH traffic, and today’s AI-driven defense solutions typically fail to achieve adversarial robustness, explainability, and real-time scalability. Bridging these gaps, this paper proposes an AI framework that integrates the best practices in machine learning together with secure execution environments to offer resilience, transparency, and low-latency DoH threat detection. Specifically, Capsule Networks (CapsNets) are used to learn hierarchical traffic flow patterns, Graph Transformers to uncover temporal anomalies, and Contrastive Self-Supervised Learning (CSSL) to leverage massive unlabeled datasets. Adversarial robustness is reinforced through perturbation-aware training and mutation-driven fuzzing simulations, while interpretability is enhanced via SHAP and LIME, rendering AI decision-making processes more intelligible to analysts. A distributed Apache Flink/Kafka pipeline enables real-time processing of DoH streams at scale, reducing detection latency by 50% compared to batch-oriented systems. Furthermore, Trusted Execution Environments(TEEs) safeguard model inference against tempering, mitigating insider threats and runtime exploitation. Empirical evaluation on the doh_real_world_2022 dataset demonstrates 99.1% detection accuracy with CapsNets, 98.8% with Graph Transformers, and an 80% improvement in adversarial resilience. These developments collectively propel the discipline of encrypted traffic analysis and establish a benchmark for safeguarding cybersecurity protocols such as QUIC and HTTP/3 that are gaining traction. The findings validate the feasibility of AI-driven, privacy-augmented security systems during an era of escalating cyber-attacks and demands algorithmic transparency.
通过对DNS查询进行加密,DNS over HTTPS(DoH)的广泛采用开创了一种新的网络隐私范式;矛盾的是,这种机制已经被恶意行为者武器化,以协调转换网络攻击,从多态恶意软件交付和数据泄露到指挥和控制(C2)操作。经典的基于签名的解决方案依赖于静态安全策略和包深度检测,在加密的DoH流量面前变得无用,而今天的人工智能驱动的防御解决方案通常无法实现对抗性的鲁棒性、可解释性和实时可扩展性。为了弥合这些差距,本文提出了一个人工智能框架,该框架将机器学习中的最佳实践与安全执行环境相结合,以提供弹性、透明度和低延迟DoH威胁检测。具体来说,胶囊网络(CapsNets)用于学习分层交通流模式,图形转换器用于发现时间异常,对比自监督学习(CSSL)用于利用大量未标记的数据集。对抗鲁棒性通过扰动感知训练和突变驱动的模糊模拟得到加强,而可解释性通过SHAP和LIME得到增强,使人工智能决策过程对分析师更容易理解。分布式Apache Flink/Kafka管道支持大规模实时处理DoH流,与面向批处理的系统相比,将检测延迟减少50%。此外,可信执行环境(tee)保护模型推理不受篡改,减轻内部威胁和运行时利用。对doh_real_world_2022数据集的实证评估表明,capnet的检测准确率为99.1%,Graph transformer的检测准确率为98.8%,对抗弹性提高了80%。这些发展共同推动了加密流量分析的发展,并为保护网络安全协议(如QUIC和HTTP/3)建立了基准。研究结果验证了在网络攻击不断升级的时代,人工智能驱动的、增强隐私的安全系统的可行性,并要求算法透明。
{"title":"Next-generation AI for advanced threat detection and security enhancement in DNS over HTTPS","authors":"Basharat Ali,&nbsp;Guihai Chen","doi":"10.1016/j.jnca.2025.104326","DOIUrl":"10.1016/j.jnca.2025.104326","url":null,"abstract":"<div><div>The widespread adoption of DNS over HTTPS(DoH) has inaugurated a new paradigm of network privacy through the encryption of DNS queries; paradoxically, this very mechanism has been weaponized by malicious actors to orchestrate convert cyberattacks ranging from polymorphic malware delivery and data exfiltration to command-and-control (C2) operations. Classic signature-based solutions that rely on static security policies and packet-depth inspection are rendered useless in the face of encrypted DoH traffic, and today’s AI-driven defense solutions typically fail to achieve adversarial robustness, explainability, and real-time scalability. Bridging these gaps, this paper proposes an AI framework that integrates the best practices in machine learning together with secure execution environments to offer resilience, transparency, and low-latency DoH threat detection. Specifically, Capsule Networks (CapsNets) are used to learn hierarchical traffic flow patterns, Graph Transformers to uncover temporal anomalies, and Contrastive Self-Supervised Learning (CSSL) to leverage massive unlabeled datasets. Adversarial robustness is reinforced through perturbation-aware training and mutation-driven fuzzing simulations, while interpretability is enhanced via SHAP and LIME, rendering AI decision-making processes more intelligible to analysts. A distributed Apache Flink/Kafka pipeline enables real-time processing of DoH streams at scale, reducing detection latency by 50% compared to batch-oriented systems. Furthermore, Trusted Execution Environments(TEEs) safeguard model inference against tempering, mitigating insider threats and runtime exploitation. Empirical evaluation on the doh_real_world_2022 dataset demonstrates 99.1% detection accuracy with CapsNets, 98.8% with Graph Transformers, and an 80% improvement in adversarial resilience. These developments collectively propel the discipline of encrypted traffic analysis and establish a benchmark for safeguarding cybersecurity protocols such as QUIC and HTTP/3 that are gaining traction. The findings validate the feasibility of AI-driven, privacy-augmented security systems during an era of escalating cyber-attacks and demands algorithmic transparency.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104326"},"PeriodicalIF":8.0,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145261665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based multi-agent system for smart microgrid 基于强化学习的智能微电网多智能体系统
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-30 DOI: 10.1016/j.jnca.2025.104339
Niharika Singh , Kishu Gupta , Ashutosh Kumar Singh , Perumal Nallagownden , Irraivan Elamvazuthi
Smart microgrid (SMG) communication networks face significant challenges in maintaining high Quality of Service (QoS) due to dynamic load variations, fluctuating network conditions, and potential component faults, which can increase latency, reduce throughput, and compromise fault recovery. The growing integration of distributed renewable energy resources demands adaptive and intelligent routing mechanisms capable of operating efficiently under such diverse and fault-prone conditions. This paper presents a Q-Reinforcement Learning-based Multi-Agent Bellman Routing (QRL-MABR) algorithm, which enhances the traditional MABR approach by embedding a Q-learning module within each network agent. Agents dynamically learn optimal routing policies, balance exploration and exploitation action selection with adaptive temperature scaling, and jointly optimize latency, throughput, jitter, convergence speed, and fault resilience.
Simulations on IEEE 9, 14, 34, 39, and 57 bus SMG testbeds demonstrate that QRL-MABR significantly outperforms conventional routing protocols (MABR, RIP, OLSR, OSPFv2) and advanced RL-based algorithms (SN-MAPPO, DDQL, MDDPG, SARSA-λ, TD3), achieving 16%–28% delay reduction, 14%–16% throughput gains, 17%–21% jitter improvement, and superior fault recovery. Thus, QRL-MABR provides a robust, scalable, and intelligent framework for next-generation smart microgrids.
由于动态负载变化、波动的网络条件和潜在的组件故障,智能微电网(SMG)通信网络在保持高服务质量(QoS)方面面临着重大挑战,这些故障会增加延迟、降低吞吐量并危及故障恢复。分布式可再生能源的日益整合需要自适应和智能的路由机制,能够在这种多样化和易故障的条件下有效运行。本文提出了一种基于q -强化学习的多智能体Bellman路由(QRL-MABR)算法,该算法通过在每个网络智能体中嵌入q -学习模块来改进传统的MABR方法。智能体动态学习最优路由策略,通过自适应温度缩放平衡探索和开发动作选择,共同优化延迟、吞吐量、抖动、收敛速度和故障恢复能力。在IEEE 9、14、34、39和57总线SMG测试台上的仿真结果表明,QRL-MABR显著优于传统路由协议(MABR、RIP、OLSR、OSPFv2)和基于路由的高级算法(SN-MAPPO、DDQL、MDDPG、SARSA-λ、TD3),时延降低16%-28%,吞吐量提高14%-16%,抖动改善17%-21%,故障恢复能力更强。因此,QRL-MABR为下一代智能微电网提供了一个强大、可扩展和智能的框架。
{"title":"Reinforcement learning based multi-agent system for smart microgrid","authors":"Niharika Singh ,&nbsp;Kishu Gupta ,&nbsp;Ashutosh Kumar Singh ,&nbsp;Perumal Nallagownden ,&nbsp;Irraivan Elamvazuthi","doi":"10.1016/j.jnca.2025.104339","DOIUrl":"10.1016/j.jnca.2025.104339","url":null,"abstract":"<div><div>Smart microgrid (SMG) communication networks face significant challenges in maintaining high Quality of Service (QoS) due to dynamic load variations, fluctuating network conditions, and potential component faults, which can increase latency, reduce throughput, and compromise fault recovery. The growing integration of distributed renewable energy resources demands adaptive and intelligent routing mechanisms capable of operating efficiently under such diverse and fault-prone conditions. This paper presents a Q-Reinforcement Learning-based Multi-Agent Bellman Routing (QRL-MABR) algorithm, which enhances the traditional MABR approach by embedding a Q-learning module within each network agent. Agents dynamically learn optimal routing policies, balance exploration and exploitation action selection with adaptive temperature scaling, and jointly optimize latency, throughput, jitter, convergence speed, and fault resilience.</div><div>Simulations on IEEE 9, 14, 34, 39, and 57 bus SMG testbeds demonstrate that QRL-MABR significantly outperforms conventional routing protocols (MABR, RIP, OLSR, OSPFv2) and advanced RL-based algorithms (SN-MAPPO, DDQL, MDDPG, SARSA-<span><math><mi>λ</mi></math></span>, TD3), achieving 16%–28% delay reduction, 14%–16% throughput gains, 17%–21% jitter improvement, and superior fault recovery. Thus, QRL-MABR provides a robust, scalable, and intelligent framework for next-generation smart microgrids.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104339"},"PeriodicalIF":8.0,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonyma: Anonymous invitation-only registration in malicious adversarial model 匿名:恶意对抗模式下的匿名邀请注册
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-29 DOI: 10.1016/j.jnca.2025.104337
Sanaz Taheri Boshrooyeh, Alpteki̇n Küpçü, Öznur Özkasap
In invitation-based systems, a new user can register only after obtaining a threshold number of invitations from existing members. The newcomer submits these invitations to the system administrator, who verifies their legitimacy. In doing so, the administrator inevitably learns who invited whom. This inviter–invitee relationship is itself privacy-sensitive information, since knowledge of it can enable inference attacks in which an invitee’s profile (e.g., political views or location) is deduced from the profiles of their inviters. To address this problem, we propose Anonyma, an anonymous invitation-based system in which even a corrupted administrator, colluding with a subset of members, cannot determine inviter–invitee relationships. We formally define the notions of inviter anonymity and invitation unforgeability, and provide formal proofs that Anonyma achieves both against a malicious and adaptive adversary. Our design ensures constant cost for authenticating new registrations, unlike existing approaches where invitation generation and verification incur overhead linear in the total number of members. Moreover, Anonyma scales efficiently: once a user joins, the administrator can immediately issue credentials enabling the newcomer to act as an inviter without re-keying existing members. We also design AnonymaX, a cross-network extension that supports anonymous third-party authentication, allowing invitations issued in one system to be used for registration in another.
在基于邀请的系统中,新用户只有在从现有成员那里获得一定数量的邀请后才能注册。新人将这些邀请提交给系统管理员,由系统管理员验证其合法性。这样,管理员就不可避免地知道是谁邀请了谁。这种邀请者与被邀请者的关系本身就是隐私敏感信息,因为了解它可以使推断攻击成为可能,在这种攻击中,被邀请者的个人资料(例如,政治观点或位置)可以从邀请者的个人资料中推断出来。为了解决这个问题,我们提出了匿名,这是一个基于匿名邀请的系统,在这个系统中,即使是一个腐败的管理员,与一部分成员勾结,也无法确定邀请者与被邀请者的关系。我们正式定义了邀请者匿名性和邀请不可伪造性的概念,并提供了匿名性在对抗恶意对手和自适应对手时实现的正式证明。我们的设计确保了认证新注册的恒定成本,不像现有的方法,邀请生成和验证会导致成员总数的线性开销。此外,anonymous还可以有效地扩展:一旦用户加入,管理员可以立即颁发凭据,使新用户能够充当邀请者,而无需为现有成员重新设置密钥。我们还设计了AnonymaX,这是一个支持匿名第三方认证的跨网络扩展,允许在一个系统中发出的邀请用于在另一个系统中注册。
{"title":"Anonyma: Anonymous invitation-only registration in malicious adversarial model","authors":"Sanaz Taheri Boshrooyeh,&nbsp;Alpteki̇n Küpçü,&nbsp;Öznur Özkasap","doi":"10.1016/j.jnca.2025.104337","DOIUrl":"10.1016/j.jnca.2025.104337","url":null,"abstract":"<div><div>In invitation-based systems, a new user can register only after obtaining a threshold number of invitations from existing members. The newcomer submits these invitations to the system administrator, who verifies their legitimacy. In doing so, the administrator inevitably learns who invited whom. This inviter–invitee relationship is itself privacy-sensitive information, since knowledge of it can enable inference attacks in which an invitee’s profile (e.g., political views or location) is deduced from the profiles of their inviters. To address this problem, we propose <span><math><mrow><mi>A</mi><mi>n</mi><mi>o</mi><mi>n</mi><mi>y</mi><mi>m</mi><mi>a</mi></mrow></math></span>, an anonymous invitation-based system in which even a corrupted administrator, colluding with a subset of members, cannot determine inviter–invitee relationships. We formally define the notions of <em>inviter anonymity</em> and <em>invitation unforgeability</em>, and provide formal proofs that <span><math><mrow><mi>A</mi><mi>n</mi><mi>o</mi><mi>n</mi><mi>y</mi><mi>m</mi><mi>a</mi></mrow></math></span> achieves both against a <em>malicious</em> and <em>adaptive adversary</em>. Our design ensures constant cost for authenticating new registrations, unlike existing approaches where invitation generation and verification incur overhead linear in the total number of members. Moreover, <span><math><mrow><mi>A</mi><mi>n</mi><mi>o</mi><mi>n</mi><mi>y</mi><mi>m</mi><mi>a</mi></mrow></math></span> scales efficiently: once a user joins, the administrator can immediately issue credentials enabling the newcomer to act as an inviter without re-keying existing members. We also design <span><math><mrow><mi>A</mi><mi>n</mi><mi>o</mi><mi>n</mi><mi>y</mi><mi>m</mi><mi>a</mi><mi>X</mi></mrow></math></span>, a cross-network extension that supports anonymous third-party authentication, allowing invitations issued in one system to be used for registration in another.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104337"},"PeriodicalIF":8.0,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HERALD: Hybrid Ensemble Approach for Robust Anomaly Detection in encrypted DNS traffic 基于混合集成的加密DNS流量鲁棒异常检测方法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-28 DOI: 10.1016/j.jnca.2025.104342
Umar Sa’ad , Demeke Shumeye Lakew , Nhu-Ngoc Dao , Sungrae Cho
The proliferation of encrypted Domain Name System (DNS) traffic through protocols like DNS over Hypertext Transfer Protocol Secure presents significant privacy advantages but creates new challenges for anomaly detection. Traditional security mechanisms that rely on payload inspection become ineffective, necessitating advanced strategies capable of detecting threats in encrypted traffic. This study introduces the Hybrid Ensemble Approach for Robust Anomaly Detection (HERALD), a novel framework designed to detect anomalies in encrypted DNS traffic. HERALD combines unsupervised base detectors, including Isolation Forest (IF), One-Class Support Vector Machine (OCSVM), and Local Outlier Factor (LOF), with a supervised Random Forest meta-model, leveraging the strengths of both paradigms. Our comprehensive evaluation demonstrates HERALD’s exceptional performance, achieving 99.99 percent accuracy, precision, recall, and F1-score on the CIRA-CIC-DoHBrw-2020 dataset, while maintaining competitive computational efficiency with 110s training time and 2.2ms inference time. HERALD also demonstrates superior generalization capabilities on cross-dataset evaluations, exhibiting minimal performance degradation of only 2-4 percent when tested on previously unseen attack patterns, outperforming purely supervised models, which showed 5-8 percent degradation. The interpretability analysis, incorporating feature importance, accumulated local effects, and local interpretable model-agnostic explanations, provides insights into the relative contributions of each base detector, with OCSVM emerging as the most influential component, followed by IF and LOF. This study advances the field of network security by offering a robust, interpretable, and adaptable solution for detecting anomalies in encrypted DNS traffic that balances a high detection rate with a low false-positive rate.
加密域名系统(DNS)流量的激增通过超文本传输协议安全DNS等协议提供了显著的隐私优势,但也为异常检测带来了新的挑战。依赖于有效负载检查的传统安全机制变得无效,需要能够检测加密流量中的威胁的高级策略。本研究介绍了用于鲁棒异常检测的混合集成方法(HERALD),这是一种用于检测加密DNS流量异常的新框架。HERALD将无监督基础检测器(包括隔离森林(IF)、一类支持向量机(OCSVM)和局部离群因子(LOF))与监督随机森林元模型相结合,利用了两种范式的优势。我们的综合评估证明了HERALD的卓越性能,在CIRA-CIC-DoHBrw-2020数据集上实现了99.99%的正确率、精密度、召回率和f1分数,同时保持了具有竞争力的计算效率,训练时间为110秒,推理时间为2.2毫秒。HERALD还在跨数据集评估中展示了卓越的泛化能力,在以前未见过的攻击模式上测试时,仅显示出最小的性能下降2- 4%,优于纯监督模型,后者显示出5- 8%的下降。可解释性分析,结合特征重要性、累积局部效应和局部可解释模型不可知的解释,提供了对每个基础检测器的相对贡献的见解,其中OCSVM成为最具影响力的组成部分,其次是IF和LOF。本研究通过提供一个健壮的、可解释的、适应性强的解决方案来检测加密DNS流量中的异常,从而在高检测率和低误报率之间取得平衡,从而推动了网络安全领域的发展。
{"title":"HERALD: Hybrid Ensemble Approach for Robust Anomaly Detection in encrypted DNS traffic","authors":"Umar Sa’ad ,&nbsp;Demeke Shumeye Lakew ,&nbsp;Nhu-Ngoc Dao ,&nbsp;Sungrae Cho","doi":"10.1016/j.jnca.2025.104342","DOIUrl":"10.1016/j.jnca.2025.104342","url":null,"abstract":"<div><div>The proliferation of encrypted Domain Name System (DNS) traffic through protocols like DNS over Hypertext Transfer Protocol Secure presents significant privacy advantages but creates new challenges for anomaly detection. Traditional security mechanisms that rely on payload inspection become ineffective, necessitating advanced strategies capable of detecting threats in encrypted traffic. This study introduces the Hybrid Ensemble Approach for Robust Anomaly Detection (HERALD), a novel framework designed to detect anomalies in encrypted DNS traffic. HERALD combines unsupervised base detectors, including Isolation Forest (IF), One-Class Support Vector Machine (OCSVM), and Local Outlier Factor (LOF), with a supervised Random Forest meta-model, leveraging the strengths of both paradigms. Our comprehensive evaluation demonstrates HERALD’s exceptional performance, achieving 99.99 percent accuracy, precision, recall, and F1-score on the CIRA-CIC-DoHBrw-2020 dataset, while maintaining competitive computational efficiency with 110s training time and 2.2ms inference time. HERALD also demonstrates superior generalization capabilities on cross-dataset evaluations, exhibiting minimal performance degradation of only 2-4 percent when tested on previously unseen attack patterns, outperforming purely supervised models, which showed 5-8 percent degradation. The interpretability analysis, incorporating feature importance, accumulated local effects, and local interpretable model-agnostic explanations, provides insights into the relative contributions of each base detector, with OCSVM emerging as the most influential component, followed by IF and LOF. This study advances the field of network security by offering a robust, interpretable, and adaptable solution for detecting anomalies in encrypted DNS traffic that balances a high detection rate with a low false-positive rate.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104342"},"PeriodicalIF":8.0,"publicationDate":"2025-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust fault-tolerant framework for VM failure predication and efficient task scheduling in dynamic cloud environments 动态云环境中虚拟机故障预测和高效任务调度的鲁棒容错框架
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-26 DOI: 10.1016/j.jnca.2025.104340
S. Sheeja Rani , Oruba Alfawaz , Ahmed M. Khedr
Due to the dynamic nature of cloud computing, maintaining fault-tolerance is essential to ensure the reliability and performance of virtualized environments. Failures in Virtual Machines (VMs) disrupt the seamless operation of cloud-based services, making it vital to implement a strong failure prediction system. As a solution, this work proposes a Segmented Regressive Learning-based Multivariate Raindrop Optimized Lottery Scheduling (SRL-MROLS) for dynamic cloud environments. Initially, the VM failure prediction is carried out using a Segmented Regressive Q-learning algorithm, where a set of VMs is provided as input. Segmented regression analyzes the average failure rate of VMs, while a reward-based framework guides the decision-making process for accurate failure prediction. Once a failure is predicted, a relocation process is triggered, involving the migration of workloads or tasks from the failing VM to an alternate VM. Next, a Multivariate Elitism Raindrop Optimization approach is employed to identify the optimal VM for task migration. Finally, a Deadline-Aware Stochastic Prioritized Lottery Scheduling is employed for efficient allocation of tasks to the selected VMs, maintaining seamless operations even in the event of VM failures. This process significantly improves task scheduling by maximizing throughput and minimizing response time in cloud environments. Experimental results demonstrate the superior performance of SRL-MROLS across different metrics. Specifically, it achieves an average improvement of 6.4% in failure prediction accuracy, 27.4% in throughput, and a 13% reduction in response time. Additionally, it reduces failure prediction time by 15%, migration cost by 14.3%, and makespan by 15%, significantly outperforming conventional techniques.
由于云计算的动态特性,维护容错性对于确保虚拟化环境的可靠性和性能至关重要。虚拟机(vm)中的故障会破坏基于云的服务的无缝运行,因此实现强大的故障预测系统至关重要。作为解决方案,本工作提出了一种基于分段回归学习的多元雨滴优化彩票调度(SRL-MROLS)的动态云环境。最初,使用分段回归q -学习算法进行虚拟机故障预测,其中提供一组虚拟机作为输入。分割回归分析虚拟机的平均故障率,而基于奖励的框架指导决策过程,以实现准确的故障预测。一旦预测到故障,就会触发重新定位过程,包括将工作负载或任务从故障VM迁移到备用VM。其次,采用多元精英雨滴优化方法确定任务迁移的最优虚拟机。最后,采用截止日期感知的随机优先抽签调度,将任务有效地分配给所选的虚拟机,即使在虚拟机故障的情况下也能保持无缝运行。此流程通过最大化吞吐量和最小化云环境中的响应时间来显著改进任务调度。实验结果表明,SRL-MROLS在不同指标上都具有优异的性能。具体来说,它在故障预测精度方面平均提高了6.4%,吞吐量提高了27.4%,响应时间减少了13%。此外,它将故障预测时间减少了15%,迁移成本减少了14.3%,完工时间减少了15%,显著优于传统技术。
{"title":"A robust fault-tolerant framework for VM failure predication and efficient task scheduling in dynamic cloud environments","authors":"S. Sheeja Rani ,&nbsp;Oruba Alfawaz ,&nbsp;Ahmed M. Khedr","doi":"10.1016/j.jnca.2025.104340","DOIUrl":"10.1016/j.jnca.2025.104340","url":null,"abstract":"<div><div>Due to the dynamic nature of cloud computing, maintaining fault-tolerance is essential to ensure the reliability and performance of virtualized environments. Failures in Virtual Machines (VMs) disrupt the seamless operation of cloud-based services, making it vital to implement a strong failure prediction system. As a solution, this work proposes a Segmented Regressive Learning-based Multivariate Raindrop Optimized Lottery Scheduling (SRL-MROLS) for dynamic cloud environments. Initially, the VM failure prediction is carried out using a Segmented Regressive Q-learning algorithm, where a set of VMs is provided as input. Segmented regression analyzes the average failure rate of VMs, while a reward-based framework guides the decision-making process for accurate failure prediction. Once a failure is predicted, a relocation process is triggered, involving the migration of workloads or tasks from the failing VM to an alternate VM. Next, a Multivariate Elitism Raindrop Optimization approach is employed to identify the optimal VM for task migration. Finally, a Deadline-Aware Stochastic Prioritized Lottery Scheduling is employed for efficient allocation of tasks to the selected VMs, maintaining seamless operations even in the event of VM failures. This process significantly improves task scheduling by maximizing throughput and minimizing response time in cloud environments. Experimental results demonstrate the superior performance of SRL-MROLS across different metrics. Specifically, it achieves an average improvement of 6.4% in failure prediction accuracy, 27.4% in throughput, and a 13% reduction in response time. Additionally, it reduces failure prediction time by 15%, migration cost by 14.3%, and makespan by 15%, significantly outperforming conventional techniques.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104340"},"PeriodicalIF":8.0,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145181227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing edge based smart city networks with software defined Networking and zero trust architecture 通过软件定义网络和零信任架构保护基于边缘的智能城市网络
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-25 DOI: 10.1016/j.jnca.2025.104341
Abeer Iftikhar , Faisal Bashir Hussain , Kashif Naseer Qureshi , Muhammad Shiraz , Mehdi Sookhak
Smart cities are rapidly evolving by adopting Internet of Things (IoT) devices, edge and cloud computing, and mobile connectivity. While these advancements enhance urban efficiency and connectivity, they also significantly increase the risk of cyber threats targeting critical infrastructure. Modern interdependent systems require flexible resilience, allowing them to adapt to changing conditions while maintaining core functions. Smart city networks, however, face unique security vulnerabilities due to their scale and heterogeneity. Altered to industry expectations and requirements, traditional security models are generally restrictive. With its "never trust, always verify' motto, the Zero Trust (ZT) security model starkly differs from traditional models. ZT builds on network design by mandating real time identity verification, giving minimum access permission and mandating respect for the principle of least privilege. Software Defined Networking (SDN) extends one step further by offering central control over the network, policy based autonomous application and immediate response to anomalies. To address these challenges, our proposed Trust-based Resilient Edge Networks (TREN) framework integrates ZT principles to enhance smart city security. Under the umbrella of SDN controllers, SPP, the underpinning component of TREN, performs real time trust analysis and autonomous policy enforcement, for instance, applying high level threat defense mechanisms. TREN dynamically defends against advanced threats like DDoS and Sybil attacks by isolating malicious nodes and adapting defense tactics based on real-time trust and traffic analysis. Trust analysis and policy control modules provide dynamic adaptive coverage, permitting effective proactive defense. Mininet-based simulations demonstrate TREN's efficacy, achieving 95 % detection accuracy, a 20 % latency reduction, and a 25 % increase in data throughput when compared to baseline models.
通过采用物联网(IoT)设备、边缘和云计算以及移动连接,智慧城市正在迅速发展。虽然这些进步提高了城市效率和连通性,但也显著增加了针对关键基础设施的网络威胁的风险。现代相互依存的系统需要灵活的弹性,使它们能够适应不断变化的条件,同时保持核心功能。然而,由于其规模和异质性,智慧城市网络面临着独特的安全漏洞。随着行业期望和需求的改变,传统的安全模型通常是限制性的。零信任(Zero trust, ZT)安全模型以“永不信任,始终验证”为座右铭,与传统模型截然不同。ZT建立在网络设计的基础上,通过强制实时身份验证,提供最小访问权限和强制遵守最小特权原则。软件定义网络(SDN)通过提供对网络的集中控制,基于策略的自治应用和对异常的即时响应,进一步扩展了一步。为了应对这些挑战,我们提出的基于信任的弹性边缘网络(TREN)框架整合了ZT原则,以增强智慧城市安全。在SDN控制器的保护伞下,TREN的基础组件SPP执行实时信任分析和自主策略实施,例如,应用高级威胁防御机制。TREN通过隔离恶意节点,并根据实时信任和流量分析调整防御策略,动态防御DDoS和Sybil攻击等高级威胁。信任分析和策略控制模块提供动态自适应覆盖,实现有效的主动防御。与基线模型相比,基于miniet的仿真证明了TREN的有效性,实现了95%的检测精度,减少了20%的延迟,并增加了25%的数据吞吐量。
{"title":"Securing edge based smart city networks with software defined Networking and zero trust architecture","authors":"Abeer Iftikhar ,&nbsp;Faisal Bashir Hussain ,&nbsp;Kashif Naseer Qureshi ,&nbsp;Muhammad Shiraz ,&nbsp;Mehdi Sookhak","doi":"10.1016/j.jnca.2025.104341","DOIUrl":"10.1016/j.jnca.2025.104341","url":null,"abstract":"<div><div>Smart cities are rapidly evolving by adopting Internet of Things (IoT) devices, edge and cloud computing, and mobile connectivity. While these advancements enhance urban efficiency and connectivity, they also significantly increase the risk of cyber threats targeting critical infrastructure. Modern interdependent systems require flexible resilience, allowing them to adapt to changing conditions while maintaining core functions. Smart city networks, however, face unique security vulnerabilities due to their scale and heterogeneity. Altered to industry expectations and requirements, traditional security models are generally restrictive. With its \"never trust, always verify' motto, the Zero Trust (ZT) security model starkly differs from traditional models. ZT builds on network design by mandating real time identity verification, giving minimum access permission and mandating respect for the principle of least privilege. Software Defined Networking (SDN) extends one step further by offering central control over the network, policy based autonomous application and immediate response to anomalies. To address these challenges, our proposed Trust-based Resilient Edge Networks (TREN) framework integrates ZT principles to enhance smart city security. Under the umbrella of SDN controllers, SPP, the underpinning component of TREN, performs real time trust analysis and autonomous policy enforcement, for instance, applying high level threat defense mechanisms. TREN dynamically defends against advanced threats like DDoS and Sybil attacks by isolating malicious nodes and adapting defense tactics based on real-time trust and traffic analysis. Trust analysis and policy control modules provide dynamic adaptive coverage, permitting effective proactive defense. Mininet-based simulations demonstrate TREN's efficacy, achieving 95 % detection accuracy, a 20 % latency reduction, and a 25 % increase in data throughput when compared to baseline models.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104341"},"PeriodicalIF":8.0,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145254748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A profit-effective function service pricing approach for serverless edge computing function offloading 无服务器边缘计算功能卸载的盈利函数服务定价方法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-25 DOI: 10.1016/j.jnca.2025.104338
Siyuan Liu , Li Pan , Shijun Liu
In recent years, edge computing services have continued to develop and have been better integrated with serverless computing, leading to the improvement of the performance and concurrent request handling capabilities of edge servers. Therefore, an increasing number of IoT devices are willing to pay a certain amount of service processing fees to offload some computing tasks to edge servers for execution, with the aim of meeting their latency requirements. However, the computing capacity and storage space of edge servers at a single base station are still limited. Therefore, base stations must decide which task images to cache for future execution and price these computing services to control the computing offloading of IoT devices, so as to maximize their expected profit under the constraints of limited computing capacity and memory space. In this paper, we stand from the perspective of base stations and formulate the caching and pricing of function images at a base station, as well as the function offloading process of IoT devices, as a Markov Decision Process (MDP). We adopt a Proximal Policy Optimization (PPO)-based function service pricing adjustment algorithm to optimize the profit of base stations. Finally, we evaluate our approach through simulation experiments and compare it with baseline methods. The results show that our approach can significantly improve base stations’ expected profit in various scenarios.
近年来,边缘计算服务不断发展,并与无服务器计算更好地集成在一起,使得边缘服务器的性能和并发请求处理能力不断提高。因此,越来越多的物联网设备愿意支付一定的服务处理费,将一些计算任务卸载给边缘服务器执行,以满足其延迟需求。但是,单个基站的边缘服务器的计算能力和存储空间仍然是有限的。因此,基站必须决定缓存哪些任务映像以供未来执行,并对这些计算服务进行定价,以控制物联网设备的计算卸载,从而在有限的计算能力和内存空间约束下实现预期利润最大化。本文从基站的角度出发,将基站功能映像的缓存和定价以及物联网设备的功能卸载过程表述为马尔可夫决策过程(Markov Decision process, MDP)。采用一种基于近端策略优化(PPO)的函数服务定价调整算法来优化基站的利润。最后,我们通过模拟实验来评估我们的方法,并将其与基线方法进行比较。结果表明,该方法可以显著提高基站在各种场景下的预期利润。
{"title":"A profit-effective function service pricing approach for serverless edge computing function offloading","authors":"Siyuan Liu ,&nbsp;Li Pan ,&nbsp;Shijun Liu","doi":"10.1016/j.jnca.2025.104338","DOIUrl":"10.1016/j.jnca.2025.104338","url":null,"abstract":"<div><div>In recent years, edge computing services have continued to develop and have been better integrated with serverless computing, leading to the improvement of the performance and concurrent request handling capabilities of edge servers. Therefore, an increasing number of IoT devices are willing to pay a certain amount of service processing fees to offload some computing tasks to edge servers for execution, with the aim of meeting their latency requirements. However, the computing capacity and storage space of edge servers at a single base station are still limited. Therefore, base stations must decide which task images to cache for future execution and price these computing services to control the computing offloading of IoT devices, so as to maximize their expected profit under the constraints of limited computing capacity and memory space. In this paper, we stand from the perspective of base stations and formulate the caching and pricing of function images at a base station, as well as the function offloading process of IoT devices, as a Markov Decision Process (MDP). We adopt a Proximal Policy Optimization (PPO)-based function service pricing adjustment algorithm to optimize the profit of base stations. Finally, we evaluate our approach through simulation experiments and compare it with baseline methods. The results show that our approach can significantly improve base stations’ expected profit in various scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104338"},"PeriodicalIF":8.0,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145160067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elastic RAN slicing technology with multi-timescale SLA assurances for heterogeneous services provision in 6G 具有多时间尺度SLA保证的6G异构业务弹性RAN切片技术
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-24 DOI: 10.1016/j.jnca.2025.104330
Yamin Shen , Ping Wang , Chiou-Jye Huang , Shenxu Kuang , Song Li , Zihan Li
Digital transformation brings diverse applications along with varying Quality of Service (QoS) and isolation requirements. Network slicing, a key 5G technology anticipated to persist in 6G, aims to meet these heterogeneous requirements. However, due to conflicting usage of scarce resources among services, especially with multi-timescale Service Level Agreement (SLA) requirements including QoS and isolation, implementing slicing in the Radio Access Network (RAN) domain is a significant challenge. Therefore, this paper formulates the radio resource allocation problem posed by the coexistence of multiple URLLC (Ultra-Reliable and Low-Latency Communications) with varying delay requirements and eMBB (Enhanced Mobile Broadband) as a multi-timescale optimization problem. Consequently, a novel MPC (Model Predictive Control)-based RAN slicing resource allocation model called MPC-RSS is proposed. Specifically, MPC-RSS ensures elastic QoS through delay-tracking mechanism and far-sighted schemes. Meanwhile, it maintains elastic isolation by introducing logical and physical isolation constraint terms. Compared with the existing state-of-the-art approaches, simulation results show that MPC-RSS can achieve better and more elastic SLA performance. Our proposal provides a choice for 6G RAN to empower vertical industries achieving digital upgrades.
数字转换带来了不同的应用程序以及不同的服务质量(QoS)和隔离要求。网络切片是5G的一项关键技术,预计将在6G中持续存在,旨在满足这些异构需求。然而,由于服务之间对稀缺资源的冲突使用,特别是在包括QoS和隔离在内的多时间尺度服务水平协议(SLA)要求下,在无线接入网(RAN)域中实现切片是一个重大挑战。因此,本文将多个具有不同延迟需求的URLLC (Ultra-Reliable and Low-Latency Communications)和eMBB (Enhanced Mobile Broadband)共存所带来的无线电资源分配问题表述为一个多时标优化问题。因此,提出了一种新的基于模型预测控制(MPC)的RAN切片资源分配模型MPC- rss。具体来说,MPC-RSS通过延迟跟踪机制和前瞻性方案来保证弹性QoS。同时,通过引入逻辑隔离约束项和物理隔离约束项来保持弹性隔离。仿真结果表明,MPC-RSS可以获得更好的弹性SLA性能。我们的提案为6G RAN提供了一种选择,使垂直行业能够实现数字升级。
{"title":"Elastic RAN slicing technology with multi-timescale SLA assurances for heterogeneous services provision in 6G","authors":"Yamin Shen ,&nbsp;Ping Wang ,&nbsp;Chiou-Jye Huang ,&nbsp;Shenxu Kuang ,&nbsp;Song Li ,&nbsp;Zihan Li","doi":"10.1016/j.jnca.2025.104330","DOIUrl":"10.1016/j.jnca.2025.104330","url":null,"abstract":"<div><div>Digital transformation brings diverse applications along with varying Quality of Service (QoS) and isolation requirements. Network slicing, a key 5G technology anticipated to persist in 6G, aims to meet these heterogeneous requirements. However, due to conflicting usage of scarce resources among services, especially with multi-timescale Service Level Agreement (SLA) requirements including QoS and isolation, implementing slicing in the Radio Access Network (RAN) domain is a significant challenge. Therefore, this paper formulates the radio resource allocation problem posed by the coexistence of multiple URLLC (Ultra-Reliable and Low-Latency Communications) with varying delay requirements and eMBB (Enhanced Mobile Broadband) as a multi-timescale optimization problem. Consequently, a novel MPC (Model Predictive Control)-based RAN slicing resource allocation model called MPC-RSS is proposed. Specifically, MPC-RSS ensures elastic QoS through delay-tracking mechanism and far-sighted schemes. Meanwhile, it maintains elastic isolation by introducing logical and physical isolation constraint terms. Compared with the existing state-of-the-art approaches, simulation results show that MPC-RSS can achieve better and more elastic SLA performance. Our proposal provides a choice for 6G RAN to empower vertical industries achieving digital upgrades.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"244 ","pages":"Article 104330"},"PeriodicalIF":8.0,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1