An Electroencephalogram (EEG) signal plays a vital role in a healthcare communication system for recording the electrical activities of the human brain from the scalp. In recent times, the conventional IoT-based healthcare system uses the cloud computing paradigm to manage time-critical healthcare data. Moreover, switching to the fog computing, the fog-assisted EEG systems are for single EEG applications. However, the use of a fog computing paradigm for a single EEG system is not an efficient solution in terms of resource management and time consumption. Therefore, we introduce a Fog-enabled EEG architecture where multiple fog devices collaboratively process the data in a single integrated IoT platform. As the proposed architecture is new, we focus on developing the mathematical model of the architecture and discuss the crucial aspects. Additionally, we devise a dynamic optimal fog head selection within the network using a weighted multi-criteria decision-making approach. From the simulation, we observe that the average propagation delay is reduced by approximately 95% using 6G-enabled fog computing as compared to the cloud. Further, our method reduces the total delay by 83.87% compared to the existing baseline KCHE technique, showing the effectiveness of this work.
{"title":"An efficient master head selection for multi-EEG to multi-fog IoT network using 6G-driven FaaS","authors":"Rupalin Nanda , Sakthivel P. , Rama Krushna Rath , Abhishek Hazra","doi":"10.1016/j.comcom.2026.108429","DOIUrl":"10.1016/j.comcom.2026.108429","url":null,"abstract":"<div><div>An Electroencephalogram (EEG) signal plays a vital role in a healthcare communication system for recording the electrical activities of the human brain from the scalp. In recent times, the conventional IoT-based healthcare system uses the cloud computing paradigm to manage time-critical healthcare data. Moreover, switching to the fog computing, the fog-assisted EEG systems are for single EEG applications. However, the use of a fog computing paradigm for a single EEG system is not an efficient solution in terms of resource management and time consumption. Therefore, we introduce a Fog-enabled EEG architecture where multiple fog devices collaboratively process the data in a single integrated IoT platform. As the proposed architecture is new, we focus on developing the mathematical model of the architecture and discuss the crucial aspects. Additionally, we devise a dynamic optimal fog head selection within the network using a weighted multi-criteria decision-making approach. From the simulation, we observe that the average propagation delay is reduced by approximately 95% using 6G-enabled fog computing as compared to the cloud. Further, our method reduces the total delay by 83.87% compared to the existing baseline KCHE technique, showing the effectiveness of this work.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"248 ","pages":"Article 108429"},"PeriodicalIF":4.3,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-15Epub Date: 2026-01-20DOI: 10.1016/j.comcom.2026.108427
Yongcong Mou , Yinghui Tang , Miaomiao Yu
To effectively conserve energy in wireless sensor networks (WSNs) and reduce packet delay, we propose a ()-policy sleep scheme for each sensor node, functioning in four distinct states. We model the sensor node, which incorporates the sleep mechanism, as a discrete-time vacation queueing system that accounts for startup times and an activation threshold. We first employ a probabilistic analysis technique to conduct a transient analysis of the system, aiming to derive recursive formulas for the steady-state distribution of the number of packets. We further obtain explicit expressions for several essential system performance metrics, including the expected number of packets, mean delay, and average energy cost of the node. The simulation experiments on models with various service time distributions confirm the analytical results, and extensive numerical experiments evaluate the sensitivity of system performance to several parameters. A weighted-sum cost function integrating mean delay and average energy consumption is formulated, and optimal sleep-wake strategies that minimise the weighted sum cost are evaluated across diverse sleep time distributions, service time distributions, weight coefficients, and delay constraints. The results demonstrate the advantages of the -policy in achieving an ideal equilibrium between energy efficiency and mean delay in WSNs.
{"title":"Performance analysis and optimisation of wireless sensor networks with startup times and (V,N)-policy sleep scheduling","authors":"Yongcong Mou , Yinghui Tang , Miaomiao Yu","doi":"10.1016/j.comcom.2026.108427","DOIUrl":"10.1016/j.comcom.2026.108427","url":null,"abstract":"<div><div>To effectively conserve energy in wireless sensor networks (WSNs) and reduce packet delay, we propose a (<span><math><mrow><mi>V</mi><mo>,</mo><mi>N</mi></mrow></math></span>)-policy sleep scheme for each sensor node, functioning in four distinct states. We model the sensor node, which incorporates the sleep mechanism, as a discrete-time <span><math><mrow><mi>G</mi><mi>e</mi><mi>o</mi><mo>/</mo><mi>G</mi><mo>/</mo><mn>1</mn></mrow></math></span> vacation queueing system that accounts for startup times and an activation threshold. We first employ a probabilistic analysis technique to conduct a transient analysis of the system, aiming to derive recursive formulas for the steady-state distribution of the number of packets. We further obtain explicit expressions for several essential system performance metrics, including the expected number of packets, mean delay, and average energy cost of the node. The simulation experiments on models with various service time distributions confirm the analytical results, and extensive numerical experiments evaluate the sensitivity of system performance to several parameters. A weighted-sum cost function integrating mean delay and average energy consumption is formulated, and optimal sleep-wake strategies that minimise the weighted sum cost are evaluated across diverse sleep time distributions, service time distributions, weight coefficients, and delay constraints. The results demonstrate the advantages of the <span><math><mrow><mo>(</mo><mi>V</mi><mo>,</mo><mi>N</mi><mo>)</mo></mrow></math></span>-policy in achieving an ideal equilibrium between energy efficiency and mean delay in WSNs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"248 ","pages":"Article 108427"},"PeriodicalIF":4.3,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-15Epub Date: 2026-01-10DOI: 10.1016/j.comcom.2026.108423
Antonio M. Alberti , Epper Bonomo , Rodrigo H. Santos , Victor A. de J. Alberti , Marcelo E. Pellenz , Rodrigo da Rosa Righi
This work integrates NovaGenesis (NG), a clean-slate IoT architecture, with LoRa technology within low-power wide-area networks (LPWAN), extending previous efforts on NG connectivity with Wi-Fi. The research aims to update the embedded version of NG and develop devices for seamless LoRa and Wi-Fi IoT operation. It evaluates NG’s performance on LoRa and Wi-Fi, focusing on throughput, delay, and packet loss. Despite LPWAN limitations, the results show that the NG deployment is feasible, validating its self-organizing IoT life cycle to maintain service continuity between an ESP-32 and a data client. Performance meets the needs of IoT applications in agribusiness, logistics, and smart monitoring. In addition, a 24-hour environmental monitoring experiment was conducted in Santa Rita do Sapucaí(SRS), Minas Gerais, Brazil, where a commercial weather station was modified to integrate NG, allowing accurate collection of temperature, humidity, atmospheric pressure, wind conditions, solar radiation and UV index. The results met expected diurnal patterns in SRS, proving the reliability and precision of the sensors and communication infrastructure. This solution overcomes common IETF IoT stack limitations in devices naming, information provenance, entities identification, programmability via digital twins, programmability, services and devices self-organization, and trust formation, offering a robust platform for varied IoT scenarios in LPWAN environments. These are the key benefits of applying NovaGenesis for LoRa and Wi-Fi-based environmental monitoring.
这项工作将NovaGenesis (NG)这一全新的物联网架构与低功耗广域网(LPWAN)中的LoRa技术集成在一起,扩展了之前在NG连接Wi-Fi方面的努力。该研究旨在更新NG的嵌入式版本,并开发无缝LoRa和Wi-Fi物联网操作的设备。它评估了NG在LoRa和Wi-Fi上的性能,重点关注吞吐量、延迟和数据包丢失。尽管有LPWAN的限制,但结果表明,NG部署是可行的,验证了其自组织物联网生命周期,以保持ESP-32和数据客户端之间的服务连续性。性能满足物联网在农业综合企业、物流和智能监控领域的应用需求。此外,在巴西米纳斯吉拉斯州Santa Rita do Sapucaí(SRS)进行了一项24小时环境监测实验,在那里对一个商业气象站进行了改造,以整合NG,从而能够准确收集温度、湿度、大气压、风况、太阳辐射和紫外线指数。结果符合SRS的预期日模式,证明了传感器和通信基础设施的可靠性和精度。该解决方案克服了常见的IETF物联网堆栈在设备命名、信息来源、实体识别、通过数字双胞胎可编程性、可编程性、服务和设备自组织以及信任形成方面的限制,为LPWAN环境中的各种物联网场景提供了一个强大的平台。这些是将NovaGenesis应用于LoRa和基于wi - fi的环境监测的主要好处。
{"title":"Applying NovaGenesis: A service-oriented, self-organizing, and programmable IoT architecture for LoRa and Wi-Fi-based environmental monitoring","authors":"Antonio M. Alberti , Epper Bonomo , Rodrigo H. Santos , Victor A. de J. Alberti , Marcelo E. Pellenz , Rodrigo da Rosa Righi","doi":"10.1016/j.comcom.2026.108423","DOIUrl":"10.1016/j.comcom.2026.108423","url":null,"abstract":"<div><div>This work integrates NovaGenesis (NG), a clean-slate IoT architecture, with LoRa technology within low-power wide-area networks (LPWAN), extending previous efforts on NG connectivity with Wi-Fi. The research aims to update the embedded version of NG and develop devices for seamless LoRa and Wi-Fi IoT operation. It evaluates NG’s performance on LoRa and Wi-Fi, focusing on throughput, delay, and packet loss. Despite LPWAN limitations, the results show that the NG deployment is feasible, validating its self-organizing IoT life cycle to maintain service continuity between an ESP-32 and a data client. Performance meets the needs of IoT applications in agribusiness, logistics, and smart monitoring. In addition, a 24-hour environmental monitoring experiment was conducted in Santa Rita do Sapucaí(SRS), Minas Gerais, Brazil, where a commercial weather station was modified to integrate NG, allowing accurate collection of temperature, humidity, atmospheric pressure, wind conditions, solar radiation and UV index. The results met expected diurnal patterns in SRS, proving the reliability and precision of the sensors and communication infrastructure. This solution overcomes common IETF IoT stack limitations in devices naming, information provenance, entities identification, programmability via digital twins, programmability, services and devices self-organization, and trust formation, offering a robust platform for varied IoT scenarios in LPWAN environments. These are the key benefits of applying NovaGenesis for LoRa and Wi-Fi-based environmental monitoring.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"248 ","pages":"Article 108423"},"PeriodicalIF":4.3,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-11-22DOI: 10.1016/j.comcom.2025.108371
Lina Magoula, Nikolaos Koursioumpas, Ioannis Stavrakakis, Nancy Alonistioti
As we progress toward a new era of Artificial Intelligence (AI)-enabled wireless networks, the focus shifts to deploying distributed intelligence to enhance network automation, scalability, and responsiveness. Despite its merits, it often leads to resource-intensive deployments, which raise energy concerns. These concerns are further amplified by the limited availability of resource orchestration strategies capable of addressing the multi-faceted nature of distributed AI. This work targets energy consumption minimization of distributed AI services by proposing a custom meta-heuristic, two-tier hierarchical genetic algorithm (HGA) that integrates a divide-and-conquer strategy to provide effective chained decision-making. The first tier of HGA determines the optimal placement of model partitions within an AI service on the underlying network, while the second tier focuses on strategic resource allocation for each partition, ensuring that service latency requirements are met. A safe strategy selection is proposed, applying a custom repair mechanism and a penalty function that discourages constraints violation. Evaluation results show the effectiveness and robustness of the proposed HGA, compared to two state-of-the-art baseline solutions, on different network environments and evaluation scenarios. HGA achieves up to 94.1% decrease in the total energy consumption per service compared to the baselines, while entirely eliminating infeasible strategies.
{"title":"E-SPLIT: A hierarchical genetic algorithm for energy-efficient distributed AI services","authors":"Lina Magoula, Nikolaos Koursioumpas, Ioannis Stavrakakis, Nancy Alonistioti","doi":"10.1016/j.comcom.2025.108371","DOIUrl":"10.1016/j.comcom.2025.108371","url":null,"abstract":"<div><div>As we progress toward a new era of Artificial Intelligence (AI)-enabled wireless networks, the focus shifts to deploying distributed intelligence to enhance network automation, scalability, and responsiveness. Despite its merits, it often leads to resource-intensive deployments, which raise energy concerns. These concerns are further amplified by the limited availability of resource orchestration strategies capable of addressing the multi-faceted nature of distributed AI. This work targets energy consumption minimization of distributed AI services by proposing a custom meta-heuristic, two-tier hierarchical genetic algorithm (HGA) that integrates a divide-and-conquer strategy to provide effective chained decision-making. The first tier of HGA determines the optimal placement of model partitions within an AI service on the underlying network, while the second tier focuses on strategic resource allocation for each partition, ensuring that service latency requirements are met. A safe strategy selection is proposed, applying a custom repair mechanism and a penalty function that discourages constraints violation. Evaluation results show the effectiveness and robustness of the proposed HGA, compared to two state-of-the-art baseline solutions, on different network environments and evaluation scenarios. HGA achieves up to 94.1% decrease in the total energy consumption per service compared to the baselines, while entirely eliminating infeasible strategies.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"246 ","pages":"Article 108371"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-11-29DOI: 10.1016/j.comcom.2025.108374
Qian Kong , Jianning Su , Xiaowei Lu , Liming Liu , Guiyuan Zhang , Haijun Yuan
To address the growing traffic demands and scalability challenges in next-generation Data Center Networks (DCNs), this paper proposes and validates a scalable multi-layer topology enhanced with Free-Space Optical (FSO) links and introduces a hybrid strategy framework for its optimization. This framework integrates two complementary strategies: a Deep Reinforcement Learning (DRL)-based Dynamic Degree-Aware Free-Space Optics (DDA-FSO) policy and a greedy heuristic. Building upon this topology and framework, we establish and validate an “Optimal Expansion Path”, a data-driven roadmap for the scalable expansion of DCNs. Packet-level simulations in OMNeT++ confirm that following this path significantly reduces network delay. By validating that the Average Shortest Path Length (ASPL) can serve as an effective proxy for network delay, this study provides a theoretical value for the design and optimization of reconfigurable and scalable DCNs.
{"title":"Scalable FSO-enhanced data center networks: A hybrid-optimized topology and expansion path","authors":"Qian Kong , Jianning Su , Xiaowei Lu , Liming Liu , Guiyuan Zhang , Haijun Yuan","doi":"10.1016/j.comcom.2025.108374","DOIUrl":"10.1016/j.comcom.2025.108374","url":null,"abstract":"<div><div>To address the growing traffic demands and scalability challenges in next-generation Data Center Networks (DCNs), this paper proposes and validates a scalable multi-layer topology enhanced with Free-Space Optical (FSO) links and introduces a hybrid strategy framework for its optimization. This framework integrates two complementary strategies: a Deep Reinforcement Learning (DRL)-based Dynamic Degree-Aware Free-Space Optics (DDA-FSO) policy and a greedy heuristic. Building upon this topology and framework, we establish and validate an “Optimal Expansion Path”, a data-driven roadmap for the scalable expansion of DCNs. Packet-level simulations in OMNeT++ confirm that following this path significantly reduces network delay. By validating that the Average Shortest Path Length (ASPL) can serve as an effective proxy for network delay, this study provides a theoretical value for the design and optimization of reconfigurable and scalable DCNs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108374"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145658793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emerging applications such as autonomous driving, virtual reality, and smart factories place greater demands on the Quality of Service of existing network infrastructure, particularly radio networks. The current 5th and new 6th generation of cellular networks aim to meet these requirements and provide ubiquitous connectivity to devices with diverse demands. These networks comprise a control plane and a user plane. While the control plane is responsible for managing the network and its devices, the user plane forwards data and directly influences the experienced Quality of Service. A key network function in the user plane is the User Plane Function (UPF), which forwards packets between cellular network devices and the data network, such as the Internet or an edge data center. However, the extent to which existing UPF implementations can provide sufficient Quality of Service for emerging applications remains largely unexplored. In this work, we analyze and compare various UPF implementations from both theoretical and practical perspectives. We consider both software-based and hardware-accelerated implementations and compare them in terms of performance and latency under load. The setup enables up to 10,000 subscriber sessions while enforcing QoS mechanisms such as rate limiting. The evaluation demonstrates that three of the four investigated UPFs provide QoS enforcement, while their latency behavior differs by orders of magnitude depending on the employed technology.
{"title":"User Plane Performance in Beyond 5G Networks: Comprehensive Analysis and Evaluation","authors":"Fridolin Siegmund , Ralf Kundel , Tobias Meuser , Ralf Steinmetz","doi":"10.1016/j.comcom.2025.108397","DOIUrl":"10.1016/j.comcom.2025.108397","url":null,"abstract":"<div><div>Emerging applications such as autonomous driving, virtual reality, and smart factories place greater demands on the Quality of Service of existing network infrastructure, particularly radio networks. The current 5th and new 6th generation of cellular networks aim to meet these requirements and provide ubiquitous connectivity to devices with diverse demands. These networks comprise a control plane and a user plane. While the control plane is responsible for managing the network and its devices, the user plane forwards data and directly influences the experienced Quality of Service. A key network function in the user plane is the User Plane Function (UPF), which forwards packets between cellular network devices and the data network, such as the Internet or an edge data center. However, the extent to which existing UPF implementations can provide sufficient Quality of Service for emerging applications remains largely unexplored. In this work, we analyze and compare various UPF implementations from both theoretical and practical perspectives. We consider both software-based and hardware-accelerated implementations and compare them in terms of performance and latency under load. The setup enables up to 10,000 subscriber sessions while enforcing QoS mechanisms such as rate limiting. The evaluation demonstrates that three of the four investigated UPFs provide QoS enforcement, while their latency behavior differs by orders of magnitude depending on the employed technology.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108397"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-12-20DOI: 10.1016/j.comcom.2025.108403
Fabrizio Messina , Domenico Rosaci
This paper proposes a cooperative and distributed framework to evaluate and optimize task offloading in Mobile Edge Computing (MEC). Each agent, representing either a user device or an edge domain, autonomously interacts with others through trust-driven recommendations and cluster formation. The proposed algorithm exploits this information to iteratively increase – and asymptotically converge over time to – the configuration that maximizes the collective utility of edge servers and user devices, i.e., the Average Performance (), which corresponds to a Nash equilibrium where only reliable agents are rewarded. Two synthetic indicators are introduced to model the main aspects of MEC collaboration: the Quality of Experience (), representing the perceived user-side performance, and the Convenience (), expressing the server-side efficiency and resource cost. Experimental validation, performed over a simulated MEC environment with up to 1000 agents, shows a rapid convergence (within 20 iterations), a stable equilibrium with , and robustness to variations in the simulated values of agents’ reliability. The results demonstrate that the proposed distributed algorithm achieves efficient, self-organized coordination among heterogeneous edge entities while maintaining scalability and fairness.
{"title":"A cooperative distributed model to evaluate and optimize task offloading in Mobile Edge Computing","authors":"Fabrizio Messina , Domenico Rosaci","doi":"10.1016/j.comcom.2025.108403","DOIUrl":"10.1016/j.comcom.2025.108403","url":null,"abstract":"<div><div>This paper proposes a cooperative and distributed framework to evaluate and optimize task offloading in Mobile Edge Computing (MEC). Each agent, representing either a user device or an edge domain, autonomously interacts with others through trust-driven recommendations and cluster formation. The proposed algorithm exploits this information to iteratively increase – and asymptotically converge over time to – the configuration that maximizes the collective utility of edge servers and user devices, i.e., the Average Performance (<span><math><mrow><mi>A</mi><mi>P</mi></mrow></math></span>), which corresponds to a Nash equilibrium where only reliable agents are rewarded. Two synthetic indicators are introduced to model the main aspects of MEC collaboration: the Quality of Experience (<span><math><mrow><mi>Q</mi><mi>o</mi><mi>E</mi></mrow></math></span>), representing the perceived user-side performance, and the Convenience (<span><math><mi>C</mi></math></span>), expressing the server-side efficiency and resource cost. Experimental validation, performed over a simulated MEC environment with up to 1000 agents, shows a rapid convergence (within 20 iterations), a stable equilibrium with <span><math><mrow><mi>A</mi><mi>P</mi><mo>≈</mo><mn>0</mn><mo>.</mo><mn>92</mn></mrow></math></span>, and robustness to variations in the simulated values of agents’ reliability. The results demonstrate that the proposed distributed algorithm achieves efficient, self-organized coordination among heterogeneous edge entities while maintaining scalability and fairness.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108403"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2026-01-02DOI: 10.1016/j.comcom.2025.108408
Xuefeng Du , Yanqi Cheng , Li Yin , Ning Tong , Fengqiang Xu , Fengqi Li
In disaster response scenarios, distributed unmanned aerial vehicle (UAV) swarms face substantial challenges in maintaining real-time information consistency due to network instability, communication delays, and potential Byzantine faults. Traditional approaches often fail to balance fault tolerance, communication latency, and task execution efficiency under such dynamic and adversarial conditions. This paper proposes the Consensus-based Information Sharing Framework (CISF), a novel solution specifically designed to ensure information consistency in dynamic disaster environments. CISF integrates a Stratified Parallel Byzantine Fault Tolerance (SPBFT) mechanism — optimized via a dynamic capability-reputation evaluation model — with a Multi-Round Search and Patrol Model (MSPM) based on an improved Cuckoo Search algorithm. MSPM employs a multi-objective fitness function to jointly optimize temporal efficiency, spatial coverage, and task priority, enabling comprehensive area exploration and continuous information validation. Theoretical analysis derives the optimal hierarchical ratio and the maximum fault tolerance threshold for CISF. Simulation results show that CISF maintains 93.8% consistency under Byzantine interference and reduces consensus latency by up to 56.2%, while remaining effective in highly dynamic environments. Overall, this study establishes a robust and efficient framework for achieving real-time, fault-tolerant information consistency in interference-prone UAV networks, offering broad applicability for future swarm-based disaster response systems.
{"title":"CISF: Consensus-based Information Sharing Framework for robust consistency in UAVs swarm disaster response","authors":"Xuefeng Du , Yanqi Cheng , Li Yin , Ning Tong , Fengqiang Xu , Fengqi Li","doi":"10.1016/j.comcom.2025.108408","DOIUrl":"10.1016/j.comcom.2025.108408","url":null,"abstract":"<div><div>In disaster response scenarios, distributed unmanned aerial vehicle (UAV) swarms face substantial challenges in maintaining real-time information consistency due to network instability, communication delays, and potential Byzantine faults. Traditional approaches often fail to balance fault tolerance, communication latency, and task execution efficiency under such dynamic and adversarial conditions. This paper proposes the Consensus-based Information Sharing Framework (CISF), a novel solution specifically designed to ensure information consistency in dynamic disaster environments. CISF integrates a Stratified Parallel Byzantine Fault Tolerance (SPBFT) mechanism — optimized via a dynamic capability-reputation evaluation model — with a Multi-Round Search and Patrol Model (MSPM) based on an improved Cuckoo Search algorithm. MSPM employs a multi-objective fitness function to jointly optimize temporal efficiency, spatial coverage, and task priority, enabling comprehensive area exploration and continuous information validation. Theoretical analysis derives the optimal hierarchical ratio and the maximum fault tolerance threshold for CISF. Simulation results show that CISF maintains 93.8% consistency under Byzantine interference and reduces consensus latency by up to 56.2%, while remaining effective in highly dynamic environments. Overall, this study establishes a robust and efficient framework for achieving real-time, fault-tolerant information consistency in interference-prone UAV networks, offering broad applicability for future swarm-based disaster response systems.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108408"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145925932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-12-27DOI: 10.1016/j.comcom.2025.108405
Dora Zivanovic , Jy-Chin Liao , Zhambyl Shaikhanov , Hou-Tong Chen , Chun-Chieh Chang , Sadhvikas Addamane , Daniel M. Mittleman , Edward W. Knightly
Privacy-invading biometrics monitoring is becoming a prominent security threat as modern sensing systems move to higher operating frequencies (mmWave, sub-THz), increasing sensing resolution and accuracy. As such, developing systems that can protect or obfuscate biometrics from adversarial intrusion becomes pivotal to preserving user privacy. In this work, we develop and implement MetaHeart, a real-time biometrics misinformation system based on reflective, programmable metasurfaces and dynamic phase-front manipulation of radar inferences. MetaHeart’s key goal is to prevent the leakage of a legitimate user’s heartbeat biometrics by spoofing fake heartbeat signals at a malicious, radar-equipped, heart rate sensing intruder. We experimentally demonstrate MetaHeart’s ability to fake Alice’s presence when she is not there and to fool Trudy’s inferences even when Alice is present, achieving an overall accuracy above 98%. Finally, we conduct a robustness analysis to determine MetaHeart’s required spatial placement within the intruder’s monitoring area that would allow for effective spoofing.
{"title":"MetaHeart: Metasurface enabled biometrics camouflage","authors":"Dora Zivanovic , Jy-Chin Liao , Zhambyl Shaikhanov , Hou-Tong Chen , Chun-Chieh Chang , Sadhvikas Addamane , Daniel M. Mittleman , Edward W. Knightly","doi":"10.1016/j.comcom.2025.108405","DOIUrl":"10.1016/j.comcom.2025.108405","url":null,"abstract":"<div><div>Privacy-invading biometrics monitoring is becoming a prominent security threat as modern sensing systems move to higher operating frequencies (mmWave, sub-THz), increasing sensing resolution and accuracy. As such, developing systems that can protect or obfuscate biometrics from adversarial intrusion becomes pivotal to preserving user privacy. In this work, we develop and implement MetaHeart, a real-time biometrics misinformation system based on reflective, programmable metasurfaces and dynamic phase-front manipulation of radar inferences. MetaHeart’s key goal is to prevent the leakage of a legitimate user’s heartbeat biometrics by spoofing fake heartbeat signals at a malicious, radar-equipped, heart rate sensing intruder. We experimentally demonstrate MetaHeart’s ability to fake Alice’s presence when she is not there and to fool Trudy’s inferences even when Alice is present, achieving an overall accuracy above 98%. Finally, we conduct a robustness analysis to determine MetaHeart’s required spatial placement within the intruder’s monitoring area that would allow for effective spoofing.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108405"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-12-30DOI: 10.1016/j.comcom.2025.108409
Zhongyu Wang , Yanan Lian , Jie Zeng , Zheng Chang , Tiejun Lv
We investigate the challenges of user pairing, power allocation, and bandwidth allocation problems in unmanned aerial vehicle (UAV) systems that employ nonorthogonal multiple access (NOMA) for communication with multiple ground users. The primary objective is to maximize the system’s achievable transmission rate while ensuring the users’ quality of service (QoS) requirements under a constrained total power budget. Considering the nonconvexity of the original problem and the interdependencies among multiple optimization variables, the problem is decomposed into three subproblems to optimize power and bandwidth allocation. To increase resource utilization and address user pairing challenges, a serial-optimized communication scheme is proposed, which leverages an optimized block coordinate descent (OP-BCD) method to sequentially solve the subproblems. Specifically, the power allocation strategy is optimized using an optimized deep Q-network (DQN) combined with a gradient ascent approach, whereas the intergroup bandwidth is optimized via a sequential least squares programming (SLSQP). Simulation results demonstrate that the proposed group matching method significantly enhances resource utilization and fairness compared to other user pairing strategies. Moreover, the proposed scheme effectively increases the system transmission rate and resource efficiency.
{"title":"Joint design of resource allocation and QoS enhancement via serial optimization in UAV-NOMA communications","authors":"Zhongyu Wang , Yanan Lian , Jie Zeng , Zheng Chang , Tiejun Lv","doi":"10.1016/j.comcom.2025.108409","DOIUrl":"10.1016/j.comcom.2025.108409","url":null,"abstract":"<div><div>We investigate the challenges of user pairing, power allocation, and bandwidth allocation problems in unmanned aerial vehicle (UAV) systems that employ nonorthogonal multiple access (NOMA) for communication with multiple ground users. The primary objective is to maximize the system’s achievable transmission rate while ensuring the users’ quality of service (QoS) requirements under a constrained total power budget. Considering the nonconvexity of the original problem and the interdependencies among multiple optimization variables, the problem is decomposed into three subproblems to optimize power and bandwidth allocation. To increase resource utilization and address user pairing challenges, a serial-optimized communication scheme is proposed, which leverages an optimized block coordinate descent (OP-BCD) method to sequentially solve the subproblems. Specifically, the power allocation strategy is optimized using an optimized deep Q-network (DQN) combined with a gradient ascent approach, whereas the intergroup bandwidth is optimized via a sequential least squares programming (SLSQP). Simulation results demonstrate that the proposed group matching method significantly enhances resource utilization and fairness compared to other user pairing strategies. Moreover, the proposed scheme effectively increases the system transmission rate and resource efficiency.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108409"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}