首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
Energy-efficient optimal relay design for wireless sensor network in underground mines 矿井无线传感器网络节能优化中继设计
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-06 DOI: 10.1016/j.jnca.2025.104303
Md Zahangir Alam , Mohamed Lassaad Ammari , Abbas Jamalipour , Paul Fortier
The transceiver design for multi-hop multiple-input multiple-output (MIMO) relay is very challenging, and for a large scale network, it is not economical to send the signal through all possible links. Instead, we can find the best path from source-to-destination that gives the highest end-to-end signal-to-noise ratio (SNR). In this paper, we provide a linear minimum mean squared error (MMSE) based multi-hop multi-terminal MIMO non-regenerative half-duplex amplify-and-forward (AF) parallel relay design for a wireless sensor network (WSN) in an underground mines. The transceiver design of such a network becomes very complex. We can simplify a complex multi-terminal parallel relay system into a series of links using selection relaying, where transmission from the source to the relay, relay to relay, and finally relay to the destination will take place using the best relay that provides the best link performance among others. The best relay selection using the traditional technique in our case is not easy, and we need a strategy to find the best path from a large number of hidden paths. We first find the set of simplified series multi-hop MIMO best relays from source to destination using the optimum path selection technique found in the literature. Then we develop a joint optimum design of the source precoder, the relay amplifier, and the receiver matrices using the full channel diagonalizing technique followed by the Lagrange strong duality principle with known channel state information (CSI). Finally, simulation results show an excellent agreement with numerical analysis demonstrating the effectiveness of the proposed framework.
多跳多输入多输出(MIMO)中继的收发器设计非常具有挑战性,对于大型网络来说,通过所有可能的链路发送信号是不经济的。相反,我们可以找到从源到目的地的最佳路径,从而获得最高的端到端信噪比(SNR)。本文提出了一种基于线性最小均方误差(MMSE)的多跳多终端MIMO非再生半双工放大转发(AF)并联中继设计方法,用于矿井无线传感器网络。这种网络的收发器设计变得非常复杂。我们可以使用选择中继将复杂的多终端并行中继系统简化为一系列链路,其中从源到中继,中继到中继,最后中继到目的地的传输将使用提供最佳链路性能的最佳中继进行。在这种情况下,使用传统方法进行最佳中继选择并不容易,我们需要一种从大量隐藏路径中找到最佳路径的策略。我们首先利用文献中发现的最优路径选择技术找到从源到目的的简化串联多跳MIMO最佳中继集。然后利用已知信道状态信息(CSI)的拉格朗日强对偶原理,利用全信道对角化技术对信源预编码器、中继放大器和接收机矩阵进行联合优化设计。最后,仿真结果与数值分析结果非常吻合,验证了所提框架的有效性。
{"title":"Energy-efficient optimal relay design for wireless sensor network in underground mines","authors":"Md Zahangir Alam ,&nbsp;Mohamed Lassaad Ammari ,&nbsp;Abbas Jamalipour ,&nbsp;Paul Fortier","doi":"10.1016/j.jnca.2025.104303","DOIUrl":"10.1016/j.jnca.2025.104303","url":null,"abstract":"<div><div>The transceiver design for multi-hop multiple-input multiple-output (MIMO) relay is very challenging, and for a large scale network, it is not economical to send the signal through all possible links. Instead, we can find the best path from source-to-destination that gives the highest end-to-end signal-to-noise ratio (SNR). In this paper, we provide a linear minimum mean squared error (MMSE) based multi-hop multi-terminal MIMO non-regenerative half-duplex amplify-and-forward (AF) parallel relay design for a wireless sensor network (WSN) in an underground mines. The transceiver design of such a network becomes very complex. We can simplify a complex multi-terminal parallel relay system into a series of links using selection relaying, where transmission from the source to the relay, relay to relay, and finally relay to the destination will take place using the best relay that provides the best link performance among others. The best relay selection using the traditional technique in our case is not easy, and we need a strategy to find the best path from a large number of hidden paths. We first find the set of simplified series multi-hop MIMO best relays from source to destination using the optimum path selection technique found in the literature. Then we develop a joint optimum design of the source precoder, the relay amplifier, and the receiver matrices using the full channel diagonalizing technique followed by the Lagrange strong duality principle with known channel state information (CSI). Finally, simulation results show an excellent agreement with numerical analysis demonstrating the effectiveness of the proposed framework.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104303"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive NDN caching: Leveraging dynamic behaviour for enhanced efficiency 自适应NDN缓存:利用动态行为来提高效率
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-08-19 DOI: 10.1016/j.jnca.2025.104288
Matta Krishna Kumari , Nikhil Tripathi
The TCP/IP architecture has been the backbone of the Internet for decades, but its host-centric design is becoming less suitable for the data-centric communication demands of today. As the demand for efficient content distribution and retrieval grows, Named Data Networking (NDN) emerges as a promising alternative. NDN shifts the focus from host-centric to data-centric networking, with packets routed based on content names rather than IP addresses. A key feature of NDN is in-network caching, which attempts to reduce latency, alleviate network congestion and enhance content availability. However, the known NDN caching schemes do not consider the dynamic content demand that changes with respect to time and location. This causes the end users to encounter relatively higher content access latency. To address this challenge, in this paper, we propose a novel dynamic behaviour strategy that can be integrated into the known NDN caching schemes. This strategy can enable the NDN routers to make cooperative decisions and move the content copy to an edge router that requests the content most frequently. We comprehensively evaluate the performance of state-of-the-art NDN caching schemes with and without our proposed dynamic strategy using several real-world topologies. Our experimental results show that incorporating dynamic behaviour into these schemes leads to significantly better outcomes in terms of CHR, content latency, and path stretch. Specifically, the best improvements include a threefold increase in CHR, an 80% reduction in content access latency, and nearly a 45% decrease in path stretch. As an aside, we also develop a framework for the Icarus simulator to automate the process of performance assessment of different NDN caching schemes on a large number of real-world topologies.
几十年来,TCP/IP体系结构一直是Internet的支柱,但其以主机为中心的设计越来越不适合当今以数据为中心的通信需求。随着对高效内容分发和检索需求的增长,命名数据网络(NDN)作为一种有前途的替代方案出现了。NDN将重点从以主机为中心的网络转移到以数据为中心的网络,数据包路由基于内容名称而不是IP地址。NDN的一个关键特性是网络内缓存,它试图减少延迟、缓解网络拥塞和增强内容可用性。然而,已知的NDN缓存方案没有考虑随时间和位置变化的动态内容需求。这将导致最终用户遇到相对较高的内容访问延迟。为了解决这一挑战,在本文中,我们提出了一种新的动态行为策略,可以集成到已知的NDN缓存方案中。该策略可以使NDN路由器做出协作决策,并将内容副本移动到请求内容最频繁的边缘路由器。我们全面评估了最先进的NDN缓存方案的性能,在使用和不使用我们提出的动态策略的情况下,使用几个真实世界的拓扑结构。我们的实验结果表明,将动态行为纳入这些方案在CHR、内容延迟和路径拉伸方面可以显著改善结果。具体来说,最好的改进包括CHR增加了三倍,内容访问延迟减少了80%,路径扩展减少了近45%。除此之外,我们还为伊卡洛斯模拟器开发了一个框架,用于在大量现实世界拓扑上自动化不同NDN缓存方案的性能评估过程。
{"title":"Adaptive NDN caching: Leveraging dynamic behaviour for enhanced efficiency","authors":"Matta Krishna Kumari ,&nbsp;Nikhil Tripathi","doi":"10.1016/j.jnca.2025.104288","DOIUrl":"10.1016/j.jnca.2025.104288","url":null,"abstract":"<div><div>The TCP/IP architecture has been the backbone of the Internet for decades, but its host-centric design is becoming less suitable for the data-centric communication demands of today. As the demand for efficient content distribution and retrieval grows, Named Data Networking (NDN) emerges as a promising alternative. NDN shifts the focus from host-centric to data-centric networking, with packets routed based on content names rather than IP addresses. A key feature of NDN is in-network caching, which attempts to reduce latency, alleviate network congestion and enhance content availability. However, the known NDN caching schemes do not consider the dynamic content demand that changes with respect to time and location. This causes the end users to encounter relatively higher content access latency. To address this challenge, in this paper, we propose a novel dynamic behaviour strategy that can be integrated into the known NDN caching schemes. This strategy can enable the NDN routers to make cooperative decisions and move the content copy to an edge router that requests the content most frequently. We comprehensively evaluate the performance of state-of-the-art NDN caching schemes with and without our proposed dynamic strategy using several real-world topologies. Our experimental results show that incorporating dynamic behaviour into these schemes leads to significantly better outcomes in terms of CHR, content latency, and path stretch. Specifically, the best improvements include a threefold increase in CHR, an 80% reduction in content access latency, and nearly a 45% decrease in path stretch. As an aside, we also develop a framework for the Icarus simulator to automate the process of performance assessment of different NDN caching schemes on a large number of real-world topologies.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104288"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144889351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRAETOR:Packet flow graph and dynamic spatio-temporal graph neural network-based flow table overflow attack detection method PRAETOR:基于数据包流图和动态时空图神经网络的流表溢出攻击检测方法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-17 DOI: 10.1016/j.jnca.2025.104333
Kaixi Wang , Yunhe Cui , Guowei Shen , Chun Guo , Yi Chen , Qing Qian
The flow table overflow attack on SDN switches is considered to be a destructive attack in SDN. By exhausting the computing and storage resources of SDN switches, this attack severely disrupts the normal communication functions of SDN networks. Graph neural networks are now being employed to detect flow table overflow attacks in SDN. When a flow graph is constructed, flow features are commonly utilized as nodes to represent the characteristics of flow table overflow attacks. However, a graph solely relying on these nodes and attributes may not fully encompass all the nuances of the flow table overflow attack. Additionally, GNN model may be difficult in capturing the graph information between different flow graphs over time, thus decreasing the detection accuracy of packet flow graph. To address these issues, we introduce PRAETOR, a detection method for flow table overflow attacks that leverages a packet flow graph and a dynamic spatio-temporal graph neural network. More particularly, The PaFlo-Graph algorithm and the EGST model are introduced by PRAETOR. The PaFlo-Graph algorithm generates a packet flow graph for each flow. It utilizes packet information to construct the graph with more detail, thereby better reflecting the characteristics of flow table overflow attacks. The EGST model is a dynamic spatio-temporal graph convolutional network designed to detect flow table overflow attacks by analyzing packet flow graphs. Experiments were conducted under two network topologies, where we used tcpreplay to replay packets from the bigFlow dataset to simulate SDN network flow. We also employed sFlow to sample packet features. Based on the sampled data, two datasets were constructed, each containing 1,760 network flows. For each packet, eight key features were extracted to represent its characteristics. The evaluation metrics include TPR, TNR, accuracy, precision, recall, F1-score, confusion matrix, ROC curves, and PR curves. Experimental results show that the proposed PaFlo-Graph algorithm generates more detailed flow graphs compared to KNN and CRAM, resulting in an average improvement of 6.49% in accuracy and 8.7% in precision. Furthermore, the overall detection framework, PRAETOR, achieves detection accuracies of 99.66% and 99.44% on Topo1 and Topo2, respectively. The precision scores reach 99.32% and 99.72%, and the F1-scores are 99.57% and 100%, respectively, indicating superior detection performance compared to other methods.
针对SDN交换机的流表溢出攻击被认为是SDN网络中的一种破坏性攻击。该攻击通过耗尽SDN交换机的计算和存储资源,严重破坏SDN网络的正常通信功能。图神经网络目前被用于检测SDN中的流表溢出攻击。在构建流图时,通常使用流特征作为节点来表示流表溢出攻击的特征。然而,仅仅依赖于这些节点和属性的图可能无法完全包含流表溢出攻击的所有细微差别。此外,随着时间的推移,GNN模型可能难以捕获不同流图之间的图形信息,从而降低了包流图的检测精度。为了解决这些问题,我们引入了PRAETOR,这是一种利用数据包流图和动态时空图神经网络的流表溢出攻击检测方法。具体地说,PRAETOR介绍了PaFlo-Graph算法和EGST模型。PaFlo-Graph算法为每个流生成数据包流图。它利用报文信息构造更详细的图,从而更好地反映了流表溢出攻击的特点。EGST模型是一个动态的时空图卷积网络,旨在通过分析数据包流图来检测流表溢出攻击。实验在两种网络拓扑下进行,其中我们使用tcpreplay来重播来自bigFlow数据集的数据包来模拟SDN网络流。我们还使用sFlow对数据包特征进行采样。基于采样数据,构建了两个数据集,每个数据集包含1760个网络流。对于每个数据包,提取8个关键特征来表示其特征。评价指标包括TPR、TNR、正确率、精密度、召回率、f1评分、混淆矩阵、ROC曲线、PR曲线。实验结果表明,与KNN和CRAM算法相比,本文提出的PaFlo-Graph算法生成的流图更加详细,准确率平均提高6.49%,精度平均提高8.7%。此外,整体检测框架PRAETOR在Topo1和Topo2上的检测准确率分别达到99.66%和99.44%。精密度得分达到99.32%、99.72%,f1得分分别达到99.57%、100%,检测性能优于其他方法。
{"title":"PRAETOR:Packet flow graph and dynamic spatio-temporal graph neural network-based flow table overflow attack detection method","authors":"Kaixi Wang ,&nbsp;Yunhe Cui ,&nbsp;Guowei Shen ,&nbsp;Chun Guo ,&nbsp;Yi Chen ,&nbsp;Qing Qian","doi":"10.1016/j.jnca.2025.104333","DOIUrl":"10.1016/j.jnca.2025.104333","url":null,"abstract":"<div><div>The flow table overflow attack on SDN switches is considered to be a destructive attack in SDN. By exhausting the computing and storage resources of SDN switches, this attack severely disrupts the normal communication functions of SDN networks. Graph neural networks are now being employed to detect flow table overflow attacks in SDN. When a flow graph is constructed, flow features are commonly utilized as nodes to represent the characteristics of flow table overflow attacks. However, a graph solely relying on these nodes and attributes may not fully encompass all the nuances of the flow table overflow attack. Additionally, GNN model may be difficult in capturing the graph information between different flow graphs over time, thus decreasing the detection accuracy of packet flow graph. To address these issues, we introduce PRAETOR, a detection method for flow table overflow attacks that leverages a packet flow graph and a dynamic spatio-temporal graph neural network. More particularly, The PaFlo-Graph algorithm and the EGST model are introduced by PRAETOR. The PaFlo-Graph algorithm generates a packet flow graph for each flow. It utilizes packet information to construct the graph with more detail, thereby better reflecting the characteristics of flow table overflow attacks. The EGST model is a dynamic spatio-temporal graph convolutional network designed to detect flow table overflow attacks by analyzing packet flow graphs. Experiments were conducted under two network topologies, where we used tcpreplay to replay packets from the bigFlow dataset to simulate SDN network flow. We also employed sFlow to sample packet features. Based on the sampled data, two datasets were constructed, each containing 1,760 network flows. For each packet, eight key features were extracted to represent its characteristics. The evaluation metrics include TPR, TNR, accuracy, precision, recall, F1-score, confusion matrix, ROC curves, and PR curves. Experimental results show that the proposed PaFlo-Graph algorithm generates more detailed flow graphs compared to KNN and CRAM, resulting in an average improvement of 6.49% in accuracy and 8.7% in precision. Furthermore, the overall detection framework, PRAETOR, achieves detection accuracies of 99.66% and 99.44% on Topo1 and Topo2, respectively. The precision scores reach 99.32% and 99.72%, and the F1-scores are 99.57% and 100%, respectively, indicating superior detection performance compared to other methods.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104333"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145121251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ST-MemA: Leveraging Swin Transformer and memory-enhanced LSTM for encrypted traffic classification ST-MemA:利用Swin Transformer和内存增强的LSTM进行加密流量分类
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-17 DOI: 10.1016/j.jnca.2025.104329
Zhiyuan Li , Yujie Jin
Traffic classification is essential for effective intrusion detection and network management. However, with the pervasive use of encryption technologies, traditional machine learning-based and deep learning-based methods often fall short in capturing the fine-grained details in encrypted traffic. To address these limitations, we propose a memory-enhanced LSTM model based on Swin Transformer for multi-class encrypted traffic classification. Our approach first reconstructs raw encrypted traffic by converting each flow into single-channel images. A hierarchical attention network, incorporating both byte-level and packet-level attention, then performs comprehensive feature extraction on these traffic images. The resulting feature maps are subsequently classified to identify traffic flow categories. By combining the long-term dependency capabilities of LSTM with the Swin Transformer’s strengths in feature extraction, our model effectively captures global features across diverse traffic types. Furthermore, we enhance LSTM with memory attention, enabling the model to focus on more fine-grained information. Experimental results on three public datasets—USTC-TFC2016, ISCX-VPN2016, and CIC-IoT2022 show that our model, ST-MemA, improves the classification accuracy to 99.43%, 98.96% and 98.21% and F1-score to 0.9936, 0.9826 and 0.9746, respectively. The results also demonstrate that our proposed model outperforms current state-of-the-art models in classification accuracy and computational efficiency.
流分类是有效的入侵检测和网络管理的基础。然而,随着加密技术的广泛使用,传统的基于机器学习和深度学习的方法往往无法捕获加密流量中的细粒度细节。为了解决这些限制,我们提出了一种基于Swin Transformer的内存增强LSTM模型,用于多类加密流分类。我们的方法首先通过将每个流转换为单通道图像来重建原始加密流量。然后,结合字节级和包级注意的分层注意网络对这些流量图像进行全面的特征提取。随后对得到的特征图进行分类,以确定交通流类别。通过将LSTM的长期依赖能力与Swin Transformer在特征提取方面的优势相结合,我们的模型有效地捕获了不同流量类型的全局特征。此外,我们通过内存关注来增强LSTM,使模型能够关注更细粒度的信息。在ustc - tfc2016、ISCX-VPN2016和CIC-IoT2022三个公共数据集上的实验结果表明,我们的ST-MemA模型将分类准确率分别提高到99.43%、98.96%和98.21%,f1得分分别提高到0.9936、0.9826和0.9746。结果还表明,我们提出的模型在分类精度和计算效率方面优于当前最先进的模型。
{"title":"ST-MemA: Leveraging Swin Transformer and memory-enhanced LSTM for encrypted traffic classification","authors":"Zhiyuan Li ,&nbsp;Yujie Jin","doi":"10.1016/j.jnca.2025.104329","DOIUrl":"10.1016/j.jnca.2025.104329","url":null,"abstract":"<div><div>Traffic classification is essential for effective intrusion detection and network management. However, with the pervasive use of encryption technologies, traditional machine learning-based and deep learning-based methods often fall short in capturing the fine-grained details in encrypted traffic. To address these limitations, we propose a memory-enhanced LSTM model based on Swin Transformer for multi-class encrypted traffic classification. Our approach first reconstructs raw encrypted traffic by converting each flow into single-channel images. A hierarchical attention network, incorporating both byte-level and packet-level attention, then performs comprehensive feature extraction on these traffic images. The resulting feature maps are subsequently classified to identify traffic flow categories. By combining the long-term dependency capabilities of LSTM with the Swin Transformer’s strengths in feature extraction, our model effectively captures global features across diverse traffic types. Furthermore, we enhance LSTM with memory attention, enabling the model to focus on more fine-grained information. Experimental results on three public datasets—USTC-TFC2016, ISCX-VPN2016, and CIC-IoT2022 show that our model, ST-MemA, improves the classification accuracy to 99.43%, 98.96% and 98.21% and <span><math><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-score to 0.9936, 0.9826 and 0.9746, respectively. The results also demonstrate that our proposed model outperforms current state-of-the-art models in classification accuracy and computational efficiency.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104329"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145094148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced RAN for future converged audiovisual services: The bcNode 面向未来融合视听业务的增强RAN: bcNode
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-07-18 DOI: 10.1016/j.jnca.2025.104274
Rufino Cabrera , Jon Montalban , Orlando Landrove , Erick Jimenez , Eneko Iradier , Pablo Angueira , Sung-Ik Park , Sunhyoung Kwon , Namho Hur
The current architecture of terrestrial broadcast network limits the evolution of terrestrial audiovisual services (broadcasting). A drastic change is required before the unavoidable future convergence with 5G/6G networks for more advanced services, including interactivity, 360°video, etc. Recent studies have explored the feasibility of incorporating a higher entity called a Broadcast Core Network (BCN) based on the equivalent model of mobile communication networks. This new paradigm requires upgrading the existing access network to manage both the modules of the new core network and those corresponding to the radio access technology. The present work proposes an intelligent software-based node (bcNode) that manages the Radio Access Network (RAN) and the BCN instructions after analyzing different aspects, such as the state of the art of CN-based RAN architectures and the challenges and limitations of the current broadcasting network. This manuscript details the main blocks of the Broadcast Node in relationship with transmitting facilities. The proposal also explains the necessary extensions to the ATSC 3.0 ALP protocol to support new services. Eventually, the paper presents numerical results to evaluate the performance of the proposal based on standard KPI parameters and compares it with the legacy infrastructure.
现有的地面广播网络结构限制了地面视听业务(广播)的发展。在未来不可避免地与5G/6G网络融合以实现更高级的业务(包括交互性、360°视频等)之前,需要进行重大变革。最近的研究已经探索了在移动通信网络等效模型的基础上合并称为广播核心网(BCN)的更高实体的可行性。这种新模式要求对现有接入网进行升级,以管理新核心网的模块和与无线接入技术相对应的模块。本研究在分析了无线接入网(RAN)和BCN指令的不同方面后,提出了一种基于软件的智能节点(bcNode),该节点可以管理无线接入网(RAN)和BCN指令,例如基于cn的RAN架构的现状以及当前广播网络的挑战和限制。这份手稿详细说明了广播节点的主要模块与传输设施的关系。该提案还解释了对ATSC 3.0 ALP协议的必要扩展,以支持新服务。最后,本文给出了基于标准KPI参数的数值结果来评估提案的性能,并将其与遗留基础架构进行了比较。
{"title":"An enhanced RAN for future converged audiovisual services: The bcNode","authors":"Rufino Cabrera ,&nbsp;Jon Montalban ,&nbsp;Orlando Landrove ,&nbsp;Erick Jimenez ,&nbsp;Eneko Iradier ,&nbsp;Pablo Angueira ,&nbsp;Sung-Ik Park ,&nbsp;Sunhyoung Kwon ,&nbsp;Namho Hur","doi":"10.1016/j.jnca.2025.104274","DOIUrl":"10.1016/j.jnca.2025.104274","url":null,"abstract":"<div><div>The current architecture of terrestrial broadcast network limits the evolution of terrestrial audiovisual services (broadcasting). A drastic change is required before the unavoidable future convergence with 5G/6G networks for more advanced services, including interactivity, 360°video, etc. Recent studies have explored the feasibility of incorporating a higher entity called a Broadcast Core Network (BCN) based on the equivalent model of mobile communication networks. This new paradigm requires upgrading the existing access network to manage both the modules of the new core network and those corresponding to the radio access technology. The present work proposes an intelligent software-based node (bcNode) that manages the Radio Access Network (RAN) and the BCN instructions after analyzing different aspects, such as the state of the art of CN-based RAN architectures and the challenges and limitations of the current broadcasting network. This manuscript details the main blocks of the Broadcast Node in relationship with transmitting facilities. The proposal also explains the necessary extensions to the ATSC 3.0 ALP protocol to support new services. Eventually, the paper presents numerical results to evaluate the performance of the proposal based on standard KPI parameters and compares it with the legacy infrastructure.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104274"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144664872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G slicing under the hood: An in-depth analysis of 5G RAN features and configurations 5G切片:5G RAN特性和配置的深入分析
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-13 DOI: 10.1016/j.jnca.2025.104298
André Perdigão, José Quevedo, Rui L. Aguiar
There has been extensive discussion on the benefits and improvements that 5G networks can bring to industry operations, particularly with network slicing. However, to fully realize network slices, it is essential to thoroughly understand the mechanisms available within a 5G network that can be used to adapt network performance. This paper surveys and describes existing 5G network configurations and assesses the performance impact of several configurations using a real-world commercial standalone (SA) 5G network, bringing the challenges between purely theoretical mathematical models into realizations with existing equipment. The paper discusses how these features impact communication performance according to industrial requirements.
The survey describes and demonstrates the performance impact of various 5G configurations, enabling readers to understand the capabilities of current 5G networks and learn how to leverage 5G technology to enhance industrial operations. This knowledge is also crucial to fully realize network slices tailored to industrial requirements.
关于5G网络可以给行业运营带来的好处和改进,特别是网络切片,人们进行了广泛的讨论。然而,要完全实现网络切片,必须彻底了解5G网络中可用的机制,这些机制可用于调整网络性能。本文调查和描述了现有的5G网络配置,并使用实际商用独立(SA) 5G网络评估了几种配置对性能的影响,将纯理论数学模型之间的挑战转化为现有设备的实现。本文根据工业需求,讨论了这些特性对通信性能的影响。
{"title":"5G slicing under the hood: An in-depth analysis of 5G RAN features and configurations","authors":"André Perdigão,&nbsp;José Quevedo,&nbsp;Rui L. Aguiar","doi":"10.1016/j.jnca.2025.104298","DOIUrl":"10.1016/j.jnca.2025.104298","url":null,"abstract":"<div><div>There has been extensive discussion on the benefits and improvements that 5G networks can bring to industry operations, particularly with network slicing. However, to fully realize network slices, it is essential to thoroughly understand the mechanisms available within a 5G network that can be used to adapt network performance. This paper surveys and describes existing 5G network configurations and assesses the performance impact of several configurations using a real-world commercial standalone (SA) 5G network, bringing the challenges between purely theoretical mathematical models into realizations with existing equipment. The paper discusses how these features impact communication performance according to industrial requirements.</div><div>The survey describes and demonstrates the performance impact of various 5G configurations, enabling readers to understand the capabilities of current 5G networks and learn how to leverage 5G technology to enhance industrial operations. This knowledge is also crucial to fully realize network slices tailored to industrial requirements.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104298"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145059766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTRC: A self-supervised network intrusion detection framework based on multiple Transformers enabled data reconstruction with contrastive learning MTRC:一个基于多个transformer的自监督网络入侵检测框架,支持对比学习的数据重建
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-08-25 DOI: 10.1016/j.jnca.2025.104300
Yufeng Wang , Hao Xu , Jianhua Ma , Qun jin
Nowadays, Network Intrusion Detection System (NIDS) is essential for identifying and mitigating network threats in increasingly complex and dynamic network environments. Due to the benefits of automatic feature extraction and powerful expressive capability, Deep Neural Networks (DNN) based NIDS has witnessed great deployment. Considering the extremely high annotation cost, i.e., the extreme difficulty of labeling anomalous samples in supervised DNN based NIDS schemes, practically, many NIDS schemes are unsupervised. which either use generative-based approaches, such as encoder-decoder structure to identify deviated samples without the labeled intrusion data, or employ discriminative-based methods by designing pretext tasks to construct additional supervisory signals from the given data. However, the former only generates a single reconstruction version for each input sample, lacking a holistic view of the latent distribution of input sample, while the latter focuses on learning the global perspective of samples, often neglecting internal structures. To address these issues, this paper proposes a novel self-supervised NIDS framework based on multiple Transformers enabled data reconstruction with contrastive learning, MTRC, through combining generative-based and discriminative-based paradigms. In detail, our paper's contributions are threefold. First, a cross-feature correlation module is proposed to convert each tabular network traffic record into an original data view that effectively captures the cross-feature correlations. Second, inspired by the idea of the multiple-view reconstruction and contrastive learning, multiple Encoder-Decoder structured Transformers are used to generate different views for each original data view, which intentionally make each reconstructed view semantically similar to the original data view, and while these reconstructed views diversified between each other, aiming to holistically capture the latent features of normal data samples. Experimental results on multiple real network traffic datasets demonstrate that MTRC outperforms state-of-the-art unsupervised and self-supervised NIDS schemes, achieving superior performance in terms of AUC-ROC, AUC-PR, and F1-score metrics. The MTRC source code is publicly available at: https://github.com/sunyifen/MTRC.
在日益复杂和动态的网络环境中,网络入侵检测系统(NIDS)是识别和缓解网络威胁的重要手段。基于深度神经网络(Deep Neural Networks, DNN)的网络入侵检测由于具有自动特征提取和强大的表达能力,得到了广泛的应用。考虑到极高的标注成本,即基于监督DNN的NIDS方案异常样本标注极其困难,实际上,许多NIDS方案都是无监督的。它们要么使用基于生成的方法,如编码器-解码器结构来识别没有标记入侵数据的偏离样本,要么采用基于判别的方法,通过设计借口任务来从给定数据构建额外的监督信号。然而,前者只对每个输入样本生成一个单一的重建版本,缺乏对输入样本潜在分布的整体视图,而后者侧重于学习样本的全局视图,往往忽略了内部结构。为了解决这些问题,本文通过结合基于生成和基于判别的范式,提出了一种新的自监督NIDS框架,该框架基于具有对比学习的多个transformer支持的数据重建,即MTRC。具体来说,我们论文的贡献有三个方面。首先,提出了一个跨特征关联模块,将每个表格网络流量记录转换为原始数据视图,有效捕获跨特征相关性。其次,受多视图重构和对比学习思想的启发,使用多个Encoder-Decoder结构化的transformer对每个原始数据视图生成不同的视图,有意使每个重构视图在语义上与原始数据视图相似,同时这些重构视图之间相互多样化,旨在整体捕捉正常数据样本的潜在特征。在多个真实网络流量数据集上的实验结果表明,MTRC优于最先进的无监督和自监督NIDS方案,在AUC-ROC、AUC-PR和f1得分指标方面取得了卓越的性能。MTRC的源代码可在:https://github.com/sunyifen/MTRC公开获取。
{"title":"MTRC: A self-supervised network intrusion detection framework based on multiple Transformers enabled data reconstruction with contrastive learning","authors":"Yufeng Wang ,&nbsp;Hao Xu ,&nbsp;Jianhua Ma ,&nbsp;Qun jin","doi":"10.1016/j.jnca.2025.104300","DOIUrl":"10.1016/j.jnca.2025.104300","url":null,"abstract":"<div><div>Nowadays, Network Intrusion Detection System (NIDS) is essential for identifying and mitigating network threats in increasingly complex and dynamic network environments. Due to the benefits of automatic feature extraction and powerful expressive capability, Deep Neural Networks (DNN) based NIDS has witnessed great deployment. Considering the extremely high annotation cost, i.e., the extreme difficulty of labeling anomalous samples in supervised DNN based NIDS schemes, practically, many NIDS schemes are unsupervised. which either use generative-based approaches, such as encoder-decoder structure to identify deviated samples without the labeled intrusion data, or employ discriminative-based methods by designing pretext tasks to construct additional supervisory signals from the given data. However, the former only generates a single reconstruction version for each input sample, lacking a holistic view of the latent distribution of input sample, while the latter focuses on learning the global perspective of samples, often neglecting internal structures. To address these issues, this paper proposes a novel self-supervised NIDS framework based on multiple Transformers enabled data reconstruction with contrastive learning, MTRC, through combining generative-based and discriminative-based paradigms. In detail, our paper's contributions are threefold. First, a cross-feature correlation module is proposed to convert each tabular network traffic record into an original data view that effectively captures the cross-feature correlations. Second, inspired by the idea of the multiple-view reconstruction and contrastive learning, multiple Encoder-Decoder structured Transformers are used to generate different views for each original data view, which intentionally make each reconstructed view semantically similar to the original data view, and while these reconstructed views diversified between each other, aiming to holistically capture the latent features of normal data samples. Experimental results on multiple real network traffic datasets demonstrate that MTRC outperforms state-of-the-art unsupervised and self-supervised NIDS schemes, achieving superior performance in terms of AUC-ROC, AUC-PR, and F1-score metrics. The MTRC source code is publicly available at: <span><span>https://github.com/sunyifen/MTRC</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104300"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based mobile charging sequence scheduling algorithm for optimal stochastic event detection in wireless rechargeable sensor networks 基于强化学习的无线可充电传感器网络随机事件最优检测移动充电序列调度算法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-13 DOI: 10.1016/j.jnca.2025.104301
Jinglin Li , Haoran Wang , Sen Zhang , Peng-Yong Kong , Wendong Xiao
Mobile charging provides a new way for energy replenishment in Wireless Rechargeable Sensor Network (WRSN), where the Mobile Charger (MC) is employed for charging sensor nodes sequentially according to the mobile charging sequence scheduling result. Event detection is an essential application of WRSN, but when the events occur stochastically, Mobile Charging Sequence Scheduling for Optimal Stochastic Event Detection (MCSS-OSED) is difficult and challenging, and the non-deterministic detection property of the sensor makes MCSS-OSED complicated further. This paper proposes a novel Multistage Exploration Q-learning Algorithm (MEQA) for MCSS-OSED based on reinforcement learning. In MEQA, MC is taken as the agent to explore the space of the mobile charging sequences via the interactions with the environment for the optimal Quality of Event Detection (QED) evaluated by both considering the sensing probability of the sensor and the probability that events may occur in the monitoring region. Particularly, a new multistage exploration policy is designed for MC to improve the exploration efficiency by selecting the current suboptimal actions with a certain probability, and a novel reward function is presented to evaluate the MC charging action according to the real-time detection contribution of the sensor. Simulation results show that MEQA is efficient for MCSS-OSED and superior to the existing classical algorithms.
移动充电为无线可充电传感器网络(WRSN)提供了一种新的能量补充方式,移动充电器(MC)根据移动充电顺序调度结果对传感器节点进行顺序充电。事件检测是WRSN的重要应用,但当事件随机发生时,针对最优随机事件检测的移动充电序列调度(MCSS-OSED)是一个难点和挑战,而传感器的不确定性检测特性使MCSS-OSED更加复杂。提出了一种基于强化学习的MCSS-OSED多阶段探索q学习算法。在MEQA中,MC作为智能体,通过与环境的相互作用来探索移动充电序列的空间,通过考虑传感器的感知概率和监测区域可能发生事件的概率来评估最优事件检测质量(QED)。设计了一种新的多阶段探索策略,通过选择具有一定概率的当前次优行为来提高MC的探索效率,并提出了一种新的奖励函数,根据传感器的实时检测贡献来评估MC的收费行为。仿真结果表明,MEQA算法在MCSS-OSED中是有效的,优于现有的经典算法。
{"title":"Reinforcement learning based mobile charging sequence scheduling algorithm for optimal stochastic event detection in wireless rechargeable sensor networks","authors":"Jinglin Li ,&nbsp;Haoran Wang ,&nbsp;Sen Zhang ,&nbsp;Peng-Yong Kong ,&nbsp;Wendong Xiao","doi":"10.1016/j.jnca.2025.104301","DOIUrl":"10.1016/j.jnca.2025.104301","url":null,"abstract":"<div><div>Mobile charging provides a new way for energy replenishment in Wireless Rechargeable Sensor Network (WRSN), where the Mobile Charger (MC) is employed for charging sensor nodes sequentially according to the mobile charging sequence scheduling result. Event detection is an essential application of WRSN, but when the events occur stochastically, Mobile Charging Sequence Scheduling for Optimal Stochastic Event Detection (MCSS-OSED) is difficult and challenging, and the non-deterministic detection property of the sensor makes MCSS-OSED complicated further. This paper proposes a novel Multistage Exploration Q-learning Algorithm (MEQA) for MCSS-OSED based on reinforcement learning. In MEQA, MC is taken as the agent to explore the space of the mobile charging sequences via the interactions with the environment for the optimal Quality of Event Detection (QED) evaluated by both considering the sensing probability of the sensor and the probability that events may occur in the monitoring region. Particularly, a new multistage exploration policy is designed for MC to improve the exploration efficiency by selecting the current suboptimal actions with a certain probability, and a novel reward function is presented to evaluate the MC charging action according to the real-time detection contribution of the sensor. Simulation results show that MEQA is efficient for MCSS-OSED and superior to the existing classical algorithms.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104301"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145120317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Deep Learning Models for Intrusion Detection in Industrial Control Systems: Frameworks and Open Issues 工业控制系统中基于区块链的入侵检测深度学习模型:框架和开放问题
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-01 DOI: 10.1016/j.jnca.2025.104286
Devi Priya V.S. , Sibi Chakkaravarthy Sethuraman , Muhammad Khurram Khan
Critical infrastructure and industrial systems are both becoming more and more networked and equipped with computing and communications tools. To manage processes and automate them where possible, Industrial Control Systems (ICS) manage a variety of components, including monitoring tools and software platforms. More complicated data is now being run on the networks, including data(past), money(present), and brains (future). In order to predictably detect specific services and patterns (deep learning) and automatically check authenticity and transfer value (blockchain), deep learning and blockchain are integrated into the ICS network. Hence, we conducted a thorough examination of the models published in the literature in order to comprehend how to integrate machine learning and blockchain efficiently and successfully for intrusion detection services. We also provide useful guidance for future research in this area by noting significant issues that must be addressed before substantial deployments of IDS models in ICS.
关键的基础设施和工业系统都变得越来越网络化,并配备了计算和通信工具。为了管理流程并在可能的情况下实现自动化,工业控制系统(ICS)管理各种组件,包括监控工具和软件平台。更复杂的数据现在正在网络上运行,包括数据(过去)、金钱(现在)和大脑(未来)。为了可预测地检测特定的服务和模式(深度学习),并自动检查真实性和传递价值(区块链),将深度学习和区块链集成到ICS网络中。因此,我们对文献中发表的模型进行了彻底的检查,以了解如何有效和成功地将机器学习和区块链集成到入侵检测服务中。通过指出在ICS中大量部署IDS模型之前必须解决的重要问题,我们还为该领域的未来研究提供了有用的指导。
{"title":"Blockchain-based Deep Learning Models for Intrusion Detection in Industrial Control Systems: Frameworks and Open Issues","authors":"Devi Priya V.S. ,&nbsp;Sibi Chakkaravarthy Sethuraman ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.jnca.2025.104286","DOIUrl":"10.1016/j.jnca.2025.104286","url":null,"abstract":"<div><div>Critical infrastructure and industrial systems are both becoming more and more networked and equipped with computing and communications tools. To manage processes and automate them where possible, Industrial Control Systems (ICS) manage a variety of components, including monitoring tools and software platforms. More complicated data is now being run on the networks, including data(past), money(present), and brains (future). In order to predictably detect specific services and patterns (deep learning) and automatically check authenticity and transfer value (blockchain), deep learning and blockchain are integrated into the ICS network. Hence, we conducted a thorough examination of the models published in the literature in order to comprehend how to integrate machine learning and blockchain efficiently and successfully for intrusion detection services. We also provide useful guidance for future research in this area by noting significant issues that must be addressed before substantial deployments of IDS models in ICS.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104286"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145108681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NoRDEx: A decentralized optimistic non-repudiation protocol for data exchanges NoRDEx:用于数据交换的去中心化乐观不可否认协议
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-11-01 Epub Date: 2025-09-02 DOI: 10.1016/j.jnca.2025.104291
Fernando Román-García, Juan Hernández-Serrano, Oscar Esparza
This article introduces the Non-Repudiable Data Exchange (NoRDEx) protocol, designed to ensure non-repudiation in data exchanges. Unlike traditional non-repudiation and fair exchange protocols, NoRDEx can be considered decentralized as it eliminates the need for a centralized Trusted Third Party (TTP) by using a Distributed Ledger Technology (DLT) to store cryptographic proofs without revealing the exchanged message. NoRDEx is an optimistic non-repudiation protocol, as it only uses the DLT in case of a dispute. The protocol has been implemented and tested in real-world environments, with performance assessments covering cost, overhead, and execution time. A formal security analysis using the Syverson Van Oorschot (SVO) logical model demonstrates NoRDEx’s ability to resolve disputes securely.
本文介绍了不可抵赖数据交换(NoRDEx)协议,旨在确保数据交换中的不可抵赖性。与传统的不可否认和公平交换协议不同,NoRDEx可以被认为是去中心化的,因为它通过使用分布式账本技术(DLT)来存储加密证明而不泄露交换消息,从而消除了对中心化可信第三方(TTP)的需求。NoRDEx是一个乐观的不可否认协议,因为它只在发生争议的情况下使用DLT。该协议已经在实际环境中实现和测试,性能评估涵盖了成本、开销和执行时间。使用Syverson Van Oorschot (SVO)逻辑模型的正式安全性分析证明了NoRDEx安全解决争议的能力。
{"title":"NoRDEx: A decentralized optimistic non-repudiation protocol for data exchanges","authors":"Fernando Román-García,&nbsp;Juan Hernández-Serrano,&nbsp;Oscar Esparza","doi":"10.1016/j.jnca.2025.104291","DOIUrl":"10.1016/j.jnca.2025.104291","url":null,"abstract":"<div><div>This article introduces the Non-Repudiable Data Exchange (NoRDEx) protocol, designed to ensure non-repudiation in data exchanges. Unlike traditional non-repudiation and fair exchange protocols, NoRDEx can be considered decentralized as it eliminates the need for a centralized Trusted Third Party (TTP) by using a Distributed Ledger Technology (DLT) to store cryptographic proofs without revealing the exchanged message. NoRDEx is an optimistic non-repudiation protocol, as it only uses the DLT in case of a dispute. The protocol has been implemented and tested in real-world environments, with performance assessments covering cost, overhead, and execution time. A formal security analysis using the Syverson Van Oorschot (SVO) logical model demonstrates NoRDEx’s ability to resolve disputes securely.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104291"},"PeriodicalIF":8.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145059796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1