首页 > 最新文献

Computer Communications最新文献

英文 中文
Collaborative IoT learning with secure peer-to-peer federated approach 采用安全的点对点联盟方式进行物联网协作学习
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.comcom.2024.107948
Neveen Mohammad Hijazi, Moayad Aloqaily, Mohsen Guizani

Federated Learning (FL) has emerged as a powerful model for training collaborative machine learning (ML) models while maintaining the privacy of participants’ data. However, traditional FL methods can exhibit limitations such as increased communication overhead, vulnerability to poisoning attacks, and reliance on a central server, which can impede their practicality in certain IoT applications. In such cases, the necessity of a central server to oversee the learning process may be infeasible, particularly in situations with limited connectivity and energy management. To address these challenges, peer-to-peer FL (P2PFL) offers an alternative approach, providing greater adaptability by enabling participants to collaboratively train their own models alongside their peers. This paper introduces an original framework that combines P2PFL and Homomorphic Encryption (HE), enabling secure computations on encrypted data. Furthermore, a defense approach against poisoning attacks based on cosine similarity is introduced These techniques enable users to collectively learn while preserving data privacy and accounting for ideal energy optimization. The proposed approach has demonstrated superior performance metrics in terms of accuracy, F-scores, and loss when compared to other similar approaches. Furthermore, it offers robust privacy and security measures, leading to an enhanced security level, with improvements ranging from 5.5% to 14.6%. Moreover, we demonstrate that the proposed approach effectively reduces the communication overhead. The proposed approach resulted in impressive reductions in communication overhead ranging from 63.8% to 79.6%. The implementation of these security models was cumbersome, but we have made the code publicly available for your reference 1.

联盟学习(FL)已成为训练协作式机器学习(ML)模型的一种强大模式,同时还能维护参与者的数据隐私。然而,传统的联合学习方法可能会表现出一些局限性,例如通信开销增加、易受中毒攻击以及依赖中央服务器,这可能会阻碍其在某些物联网应用中的实用性。在这种情况下,需要中央服务器来监督学习过程可能是不可行的,尤其是在连接和能源管理有限的情况下。为应对这些挑战,点对点 FL(P2PFL)提供了另一种方法,通过让参与者与同伴一起协作训练自己的模型,提供更强的适应性。本文介绍了一个将 P2PFL 和同态加密(HE)相结合的原创框架,从而实现对加密数据的安全计算。此外,本文还介绍了一种基于余弦相似性的中毒攻击防御方法。这些技术使用户能够在集体学习的同时保护数据隐私并实现理想的能量优化。与其他类似方法相比,所提出的方法在准确性、F 分数和损失方面都表现出了卓越的性能指标。此外,它还提供了强大的隐私和安全措施,从而提高了安全级别,改进幅度从 5.5% 到 14.6%。此外,我们还证明了所提出的方法能有效减少通信开销。所提出的方法显著降低了 63.8% 到 79.6% 的通信开销。这些安全模型的实现过程非常繁琐,但我们已经公开了代码,供大家参考1。
{"title":"Collaborative IoT learning with secure peer-to-peer federated approach","authors":"Neveen Mohammad Hijazi,&nbsp;Moayad Aloqaily,&nbsp;Mohsen Guizani","doi":"10.1016/j.comcom.2024.107948","DOIUrl":"10.1016/j.comcom.2024.107948","url":null,"abstract":"<div><p>Federated Learning (FL) has emerged as a powerful model for training collaborative machine learning (ML) models while maintaining the privacy of participants’ data. However, traditional FL methods can exhibit limitations such as increased communication overhead, vulnerability to poisoning attacks, and reliance on a central server, which can impede their practicality in certain IoT applications. In such cases, the necessity of a central server to oversee the learning process may be infeasible, particularly in situations with limited connectivity and energy management. To address these challenges, peer-to-peer FL (P2PFL) offers an alternative approach, providing greater adaptability by enabling participants to collaboratively train their own models alongside their peers. This paper introduces an original framework that combines P2PFL and Homomorphic Encryption (HE), enabling secure computations on encrypted data. Furthermore, a defense approach against poisoning attacks based on cosine similarity is introduced These techniques enable users to collectively learn while preserving data privacy and accounting for ideal energy optimization. The proposed approach has demonstrated superior performance metrics in terms of accuracy, F-scores, and loss when compared to other similar approaches. Furthermore, it offers robust privacy and security measures, leading to an enhanced security level, with improvements ranging from 5.5% to 14.6%. Moreover, we demonstrate that the proposed approach effectively reduces the communication overhead. The proposed approach resulted in impressive reductions in communication overhead ranging from 63.8% to 79.6%. The implementation of these security models was cumbersome, but we have made the code publicly available for your reference <span><span><sup>1</sup></span></span>.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107948"},"PeriodicalIF":4.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation in RISs-assisted UAV-enabled MEC network with computation capacity improvement 提高计算能力的 RISs 辅助无人机 MEC 网络的资源分配
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.comcom.2024.107953
Long Jiao , Ling Gao , Jie Zheng , Peiqing Yang , Wei Xue

Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) networks have recently been considered to be a support for ground MEC networks to enhance their computation capability. However, the line-of-sight (LOS) channels between the UAV and Internet of Things (IoT) devices can be interfered by various obstacles, such as trees and buildings, resulting in a considerable reduction in the capacity of MEC networks. To solve this issue, a system that combines multiple reconfigurable intelligence surfaces (RISs) with a UAV-enabled MEC network is proposed in this study. A UAV equipped with edge servers is treated as an aerial computing platform for IoT devices, and multi-RISs are utilized to simultaneously improve the communication quality between enhanced UAV and IoT devices. To maximize the sum computation bits of the system, a problem that jointly optimizes the time slot partition, local computation frequency, transmit power of the devices, UAV receive beamforming vectors, phase shifts of the RISs, and the trajectory of the UAV is formulated. The problem is a typical nonconvex optimization problem; therefore, we propose a recursive algorithm based on the successive convex approximation (SCA) and block coordinate descent (BCD) technology to find an approximate optimal solution. Simulation results demonstrate the effectiveness of the proposed algorithm compared with various benchmark schemes.

支持无人飞行器(UAV)的移动边缘计算(MEC)网络最近被认为是对地面 MEC 网络的支持,以增强其计算能力。然而,无人飞行器与物联网(IoT)设备之间的视线(LOS)信道可能会受到树木和建筑物等各种障碍物的干扰,导致 MEC 网络的容量大大降低。为解决这一问题,本研究提出了一种将多个可重构智能表面(RIS)与无人机支持的 MEC 网络相结合的系统。配备边缘服务器的无人机被视为物联网设备的空中计算平台,利用多个可重构智能表面可同时提高增强型无人机与物联网设备之间的通信质量。为了最大化系统的总计算比特,提出了一个联合优化时隙划分、本地计算频率、设备发射功率、无人机接收波束成形向量、RIS 相移和无人机轨迹的问题。该问题是一个典型的非凸优化问题;因此,我们提出了一种基于连续凸近似(SCA)和块坐标下降(BCD)技术的递归算法,以找到近似最优解。仿真结果表明,与各种基准方案相比,所提算法非常有效。
{"title":"Resource allocation in RISs-assisted UAV-enabled MEC network with computation capacity improvement","authors":"Long Jiao ,&nbsp;Ling Gao ,&nbsp;Jie Zheng ,&nbsp;Peiqing Yang ,&nbsp;Wei Xue","doi":"10.1016/j.comcom.2024.107953","DOIUrl":"10.1016/j.comcom.2024.107953","url":null,"abstract":"<div><p>Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) networks have recently been considered to be a support for ground MEC networks to enhance their computation capability. However, the line-of-sight (LOS) channels between the UAV and Internet of Things (IoT) devices can be interfered by various obstacles, such as trees and buildings, resulting in a considerable reduction in the capacity of MEC networks. To solve this issue, a system that combines multiple reconfigurable intelligence surfaces (RISs) with a UAV-enabled MEC network is proposed in this study. A UAV equipped with edge servers is treated as an aerial computing platform for IoT devices, and multi-RISs are utilized to simultaneously improve the communication quality between enhanced UAV and IoT devices. To maximize the sum computation bits of the system, a problem that jointly optimizes the time slot partition, local computation frequency, transmit power of the devices, UAV receive beamforming vectors, phase shifts of the RISs, and the trajectory of the UAV is formulated. The problem is a typical nonconvex optimization problem; therefore, we propose a recursive algorithm based on the successive convex approximation (SCA) and block coordinate descent (BCD) technology to find an approximate optimal solution. Simulation results demonstrate the effectiveness of the proposed algorithm compared with various benchmark schemes.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107953"},"PeriodicalIF":4.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware containment with immediate response in IoT networks: An optimal control approach 物联网网络中即时响应的恶意软件遏制:优化控制方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.comcom.2024.107951
Mousa Tayseer Jafar , Lu-Xing Yang , Gang Li , Qingyi Zhu , Chenquan Gan , Xiaofan Yang

The exponential growth of Internet of Things (IoT) devices has triggered a substantial increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 percent in such attacks, underscoring the urgent need for robust cybersecurity measures. When a cyber-attack breaches an IoT network, it initiates the dissemination of malware across the network. However, to counteract this threat, an immediate installation of a new patch becomes imperative. The time frame for developing and deploying the patch can vary significantly, contingent upon the specifics of the cyber-attack. This paper aims to address the challenge of pre-emptively mitigating cyber-attacks prior to the installation of a new patch. The main novelties of our work include: (1) A well-designed node-level model known as Susceptible, Infected High, Infected Low, Recover First, and Recover Complete (SIHILRFRC). It categorizes the infected node states into infected high and infected low, according to the categorization of infection states for IoT devices, to accelerate containment strategies for malware propagation and improve mitigation of cyber-attacks targeting IoT networks by incorporating immediate response within a restricted environment. (2) Development of an optimal immediate response strategy (IRS) by modeling and analyzing the associated optimal control problem. This model aims to enhance the containment of malware propagation across IoT networks by swiftly responding to cyber threats. Finally, several numerical analyses were performed to fully illustrate the main findings. In addition, a dataset has been constructed for experimental purposes to simulate real-world scenarios within IoT networks, particularly in smart home environments.

物联网(IoT)设备的指数式增长引发了针对这些系统的网络攻击大幅增加。最近的统计数据显示,此类攻击激增了 100%以上,突出表明迫切需要采取强有力的网络安全措施。当网络攻击侵入物联网网络时,就会在整个网络中传播恶意软件。然而,要应对这种威胁,必须立即安装新补丁。根据网络攻击的具体情况,开发和部署补丁的时间框架可能会有很大差异。本文旨在解决在安装新补丁之前先发制人地减轻网络攻击的难题。我们工作的主要创新点包括(1) 一个精心设计的节点级模型,称为 "易受感染、高感染、低感染、先恢复和完全恢复(SIHILRFRC)"。该模型根据物联网设备感染状态的分类,将受感染节点状态分为高感染和低感染,通过在受限环境中纳入即时响应,加快遏制恶意软件传播的策略,改善针对物联网网络攻击的缓解效果。(2) 通过对相关最优控制问题进行建模和分析,制定最优即时响应策略(IRS)。该模型旨在通过快速响应网络威胁,加强遏制恶意软件在物联网网络中的传播。最后,还进行了几项数值分析,以充分说明主要发现。此外,还构建了一个数据集,用于模拟物联网网络中的真实场景,尤其是智能家居环境中的真实场景。
{"title":"Malware containment with immediate response in IoT networks: An optimal control approach","authors":"Mousa Tayseer Jafar ,&nbsp;Lu-Xing Yang ,&nbsp;Gang Li ,&nbsp;Qingyi Zhu ,&nbsp;Chenquan Gan ,&nbsp;Xiaofan Yang","doi":"10.1016/j.comcom.2024.107951","DOIUrl":"10.1016/j.comcom.2024.107951","url":null,"abstract":"<div><p>The exponential growth of Internet of Things (IoT) devices has triggered a substantial increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 percent in such attacks, underscoring the urgent need for robust cybersecurity measures. When a cyber-attack breaches an IoT network, it initiates the dissemination of malware across the network. However, to counteract this threat, an immediate installation of a new patch becomes imperative. The time frame for developing and deploying the patch can vary significantly, contingent upon the specifics of the cyber-attack. This paper aims to address the challenge of pre-emptively mitigating cyber-attacks prior to the installation of a new patch. The main novelties of our work include: (1) A well-designed node-level model known as Susceptible, Infected High, Infected Low, Recover First, and Recover Complete <span><math><mrow><mo>(</mo><msub><mrow><mi>SI</mi></mrow><mrow><mi>H</mi></mrow></msub><msub><mrow><mi>I</mi></mrow><mrow><mi>L</mi></mrow></msub><msub><mrow><mi>R</mi></mrow><mrow><mi>F</mi></mrow></msub><msub><mrow><mi>R</mi></mrow><mrow><mi>C</mi></mrow></msub><mo>)</mo></mrow></math></span>. It categorizes the infected node states into infected high and infected low, according to the categorization of infection states for IoT devices, to accelerate containment strategies for malware propagation and improve mitigation of cyber-attacks targeting IoT networks by incorporating immediate response within a restricted environment. (2) Development of an optimal immediate response strategy (IRS) by modeling and analyzing the associated optimal control problem. This model aims to enhance the containment of malware propagation across IoT networks by swiftly responding to cyber threats. Finally, several numerical analyses were performed to fully illustrate the main findings. In addition, a dataset has been constructed for experimental purposes to simulate real-world scenarios within IoT networks, particularly in smart home environments.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107951"},"PeriodicalIF":4.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On construction of quality virtual backbone in wireless networks using cooperative communication 论利用合作通信在无线网络中构建高质量虚拟骨干网
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.comcom.2024.107952
Junhao Wang , Jiarong Liang , Qingnian Li

An extended connected dominating set (ECDS) in a wireless network with cooperative communication (CC) is a subset of nodes such that its induced subgraph is connected and each node outside the ECDS is covered by either one neighbor or several quasineighbors in the ECDS. Traditionality, the size of virtual backbone (VB) is the only factor considered in the problem of CDS construction. However, diameter is also an important factor to evaluate VB. In this paper we consider the problem of constructing quality ECDSs in unit disk graphs under CC with both of these two factors. We propose a two-phase centralized algorithm BD-ECDS to construct an ECDS for a given UDG with CC, which has a constant performance ratio (PR) and diameter. To obtain the PR of this two-phase centralized algorithm, we first give an upper bound of the EDS and use this upper bound to prove that the size of the ECDS under CC generated by the centralized algorithm is no greater than 120|ECDSopt|2, where ECDSopt is the size of the minimum ECDS. Furthermore, our theoretical analysis and simulation results show that our algorithm BD-ECDS is superior to previous approaches.

合作通信(CC)无线网络中的扩展连通支配集(ECDS)是这样一个节点子集:它的诱导子图是连通的,ECDS 以外的每个节点都被 ECDS 中的一个邻居或几个准邻居覆盖。传统上,虚拟骨干网(VB)的大小是 CDS 构建问题中唯一要考虑的因素。然而,直径也是评估 VB 的一个重要因素。在本文中,我们考虑了在 CC 下的单位盘图中构建高质量 ECDS 的问题,同时考虑了这两个因素。我们提出了一种两阶段集中算法 BD-ECDS,用于为具有 CC 的给定 UDG 构建具有恒定性能比(PR)和直径的 ECDS。为了得到这种两阶段集中算法的 PR,我们首先给出了 EDS 的上界,并利用这个上界证明了集中算法生成的 CC 下 ECDS 的大小不大于 120|ECDSopt|-2,其中 ECDSopt 是最小 ECDS 的大小。此外,我们的理论分析和仿真结果表明,我们的算法 BD-ECDS 优于之前的方法。
{"title":"On construction of quality virtual backbone in wireless networks using cooperative communication","authors":"Junhao Wang ,&nbsp;Jiarong Liang ,&nbsp;Qingnian Li","doi":"10.1016/j.comcom.2024.107952","DOIUrl":"10.1016/j.comcom.2024.107952","url":null,"abstract":"<div><p>An extended connected dominating set (ECDS) in a wireless network with cooperative communication (CC) is a subset of nodes such that its induced subgraph is connected and each node outside the ECDS is covered by either one neighbor or several quasineighbors in the ECDS. Traditionality, the size of virtual backbone (VB) is the only factor considered in the problem of CDS construction. However, diameter is also an important factor to evaluate VB. In this paper we consider the problem of constructing quality ECDSs in unit disk graphs under CC with both of these two factors. We propose a two-phase centralized algorithm BD-ECDS to construct an ECDS for a given UDG with CC, which has a constant performance ratio (PR) and diameter. To obtain the PR of this two-phase centralized algorithm, we first give an upper bound of the EDS and use this upper bound to prove that the size of the ECDS under CC generated by the centralized algorithm is no greater than <span><math><mrow><mn>120</mn><mrow><mo>|</mo><mi>E</mi><mi>C</mi><mi>D</mi><msub><mrow><mi>S</mi></mrow><mrow><mi>o</mi><mi>p</mi><mi>t</mi></mrow></msub><mo>|</mo></mrow><mo>−</mo><mn>2</mn></mrow></math></span>, where <span><math><mrow><mi>E</mi><mi>C</mi><mi>D</mi><msub><mrow><mi>S</mi></mrow><mrow><mi>o</mi><mi>p</mi><mi>t</mi></mrow></msub></mrow></math></span> is the size of the minimum ECDS. Furthermore, our theoretical analysis and simulation results show that our algorithm BD-ECDS is superior to previous approaches.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107952"},"PeriodicalIF":4.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142272491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A certificateless designated verifier sanitizable signature in e-health intelligent mobile communication system 电子健康智能移动通信系统中的无证书指定验证器可消毒签名
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.comcom.2024.107935
Yonghua Zhan , Yang Yang , Bixia Yi , Renjie He , Rui Shi , Xianghan Zheng

With the widespread use of mobile communication and smart devices in the medical field, mobile healthcare has gained significant attention due to its ability to overcome geographical limitations and provide more efficient and high-quality medical services. In mobile healthcare, various instruments and wearable device data are collected, encrypted, and uploaded to the cloud, accessible to medical professionals, researchers, and insurance companies, among others. However, ensuring the security and privacy of healthcare data in the context of mobile networks has been a highly challenging issue. Certificateless signature schemes allow patients to conceal their respective privacy information for different sharing needs. Nevertheless, existing mobile healthcare data protection solutions suffer from costly certificate management and the inability to restrict signature verifiers. This paper proposes a certificateless designated verifier sanitizable signature for mobile healthcare scenarios, aiming to enhance the security and privacy of mobile healthcare data. This scheme enables the sanitization of sensitive data without the need for certificate management and allows for the specification of signature verifiers. This ensures the confidentiality of medical data, protects patient privacy, and prevents unauthorized access to healthcare data. Through security analysis and experimental comparisons, it is demonstrated that the proposed scheme is both efficient and effectively ensures data security and user privacy. Therefore, it is well-suited for privacy protection in mobile healthcare data.

随着移动通信和智能设备在医疗领域的广泛应用,移动医疗因其能够克服地域限制、提供更高效优质的医疗服务而备受关注。在移动医疗中,各种仪器和可穿戴设备的数据被收集、加密并上传到云端,供医疗专业人员、研究人员和保险公司等访问。然而,如何确保移动网络中医疗数据的安全性和隐私性一直是一个极具挑战性的问题。无证书签名方案允许患者隐藏各自的隐私信息,以满足不同的共享需求。然而,现有的移动医疗数据保护解决方案存在证书管理成本高昂、无法限制签名验证者等问题。本文提出了一种针对移动医疗场景的无证书指定验证器可消毒签名,旨在提高移动医疗数据的安全性和隐私性。该方案无需证书管理即可对敏感数据进行消毒,并允许指定签名验证器。这确保了医疗数据的保密性,保护了患者隐私,并防止了对医疗数据的未经授权的访问。通过安全分析和实验比较,证明所提出的方案既高效又能有效确保数据安全和用户隐私。因此,它非常适合移动医疗数据的隐私保护。
{"title":"A certificateless designated verifier sanitizable signature in e-health intelligent mobile communication system","authors":"Yonghua Zhan ,&nbsp;Yang Yang ,&nbsp;Bixia Yi ,&nbsp;Renjie He ,&nbsp;Rui Shi ,&nbsp;Xianghan Zheng","doi":"10.1016/j.comcom.2024.107935","DOIUrl":"10.1016/j.comcom.2024.107935","url":null,"abstract":"<div><p>With the widespread use of mobile communication and smart devices in the medical field, mobile healthcare has gained significant attention due to its ability to overcome geographical limitations and provide more efficient and high-quality medical services. In mobile healthcare, various instruments and wearable device data are collected, encrypted, and uploaded to the cloud, accessible to medical professionals, researchers, and insurance companies, among others. However, ensuring the security and privacy of healthcare data in the context of mobile networks has been a highly challenging issue. Certificateless signature schemes allow patients to conceal their respective privacy information for different sharing needs. Nevertheless, existing mobile healthcare data protection solutions suffer from costly certificate management and the inability to restrict signature verifiers. This paper proposes a certificateless designated verifier sanitizable signature for mobile healthcare scenarios, aiming to enhance the security and privacy of mobile healthcare data. This scheme enables the sanitization of sensitive data without the need for certificate management and allows for the specification of signature verifiers. This ensures the confidentiality of medical data, protects patient privacy, and prevents unauthorized access to healthcare data. Through security analysis and experimental comparisons, it is demonstrated that the proposed scheme is both efficient and effectively ensures data security and user privacy. Therefore, it is well-suited for privacy protection in mobile healthcare data.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107935"},"PeriodicalIF":4.5,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer learning-accelerated network slice management for next generation services 转移学习--加速下一代服务的网络切片管理
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.comcom.2024.107937
Sam Aleyadeh, Ibrahim Tamim, Abdallah Shami

The current trend in user services places an ever-growing demand for higher data rates, near-real-time latencies, and near-perfect quality of service. To meet such demands, fundamental changes were made to the traditional radio access network (RAN), introducing Open RAN (O-RAN). This new paradigm is based on a virtualized and intelligent RAN architecture. However, with the increased complexity of 5G applications, traditional application-specific placement techniques have reached a bottleneck. Our paper presents a Transfer Learning (TL) augmented Reinforcement Learning (RL) based networking slicing (NS) solution targeting more effective placement and improving downtime for prolonged slice deployments. To achieve this, we propose an approach based on creating a robust and dynamic repository of specialized RL agents and network slices geared towards popular user service types such as eMBB, URLLC, and mMTC. The proposed solution consists of a heuristic-controlled two-module-based ML Engine and a repository. The objective function is formulated to minimize the downtime incurred by the VNFs hosted on the commercial-off-the-shelf (COTS) servers. The performance of the proposed system is evaluated compared to traditional approaches using industry-standard 5G traffic datasets. The evaluation results show that the proposed solution consistently achieves lower downtime than the traditional algorithms.

当前的用户服务趋势对更高的数据传输速率、近乎实时的延迟和近乎完美的服务质量提出了越来越高的要求。为了满足这些需求,传统的无线接入网(RAN)发生了根本性的变化,引入了开放式无线接入网(O-RAN)。这种新模式基于虚拟化和智能化的 RAN 架构。然而,随着 5G 应用复杂性的增加,传统的特定于应用的放置技术遇到了瓶颈。我们的论文提出了一种基于迁移学习(TL)增强强化学习(RL)的网络切片(NS)解决方案,其目标是更有效地安置和改善长时间切片部署的停机时间。为实现这一目标,我们提出了一种方法,该方法的基础是创建一个稳健、动态的专门 RL 代理和网络切片资源库,该资源库面向 eMBB、URLLC 和 mMTC 等流行的用户服务类型。建议的解决方案由启发式控制的基于两个模块的多语言引擎和资源库组成。目标函数的制定是为了最大限度地减少商业现货(COTS)服务器上托管的 VNF 的停机时间。利用行业标准的 5G 流量数据集,对拟议系统的性能与传统方法进行了比较评估。评估结果表明,与传统算法相比,所提出的解决方案始终能实现更低的停机时间。
{"title":"Transfer learning-accelerated network slice management for next generation services","authors":"Sam Aleyadeh,&nbsp;Ibrahim Tamim,&nbsp;Abdallah Shami","doi":"10.1016/j.comcom.2024.107937","DOIUrl":"10.1016/j.comcom.2024.107937","url":null,"abstract":"<div><p>The current trend in user services places an ever-growing demand for higher data rates, near-real-time latencies, and near-perfect quality of service. To meet such demands, fundamental changes were made to the traditional radio access network (RAN), introducing Open RAN (O-RAN). This new paradigm is based on a virtualized and intelligent RAN architecture. However, with the increased complexity of 5G applications, traditional application-specific placement techniques have reached a bottleneck. Our paper presents a Transfer Learning (TL) augmented Reinforcement Learning (RL) based networking slicing (NS) solution targeting more effective placement and improving downtime for prolonged slice deployments. To achieve this, we propose an approach based on creating a robust and dynamic repository of specialized RL agents and network slices geared towards popular user service types such as eMBB, URLLC, and mMTC. The proposed solution consists of a heuristic-controlled two-module-based ML Engine and a repository. The objective function is formulated to minimize the downtime incurred by the VNFs hosted on the commercial-off-the-shelf (COTS) servers. The performance of the proposed system is evaluated compared to traditional approaches using industry-standard 5G traffic datasets. The evaluation results show that the proposed solution consistently achieves lower downtime than the traditional algorithms.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107937"},"PeriodicalIF":4.5,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002846/pdfft?md5=7a05cd348598b5d1f0ffd799ed601eb5&pid=1-s2.0-S0140366424002846-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting and mitigating cyber threats through data mining and machine learning 通过数据挖掘和机器学习预测和减轻网络威胁
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1016/j.comcom.2024.107949
Nusrat Samia , Sajal Saha , Anwar Haque

With cyber threats evolving alongside technological progress, strengthening network resilience to combat security vulnerabilities is crucial. This research extends cyber-crime analysis with an innovative approach, utilizing data mining and machine learning to not only predict cyber incidents but also reinforce network robustness. We introduce a real-time data collection framework to provide up-to-date cyberattack data, addressing current research limitations. By analyzing collected attack data, we identified temporal correlations in attack volumes across consecutive time frames. Our predictive model, developed using advanced machine learning and deep learning techniques, forecasts the frequency of cyber-attacks within specific time windows, demonstrating over a 15% improvement in accuracy compared to conventional baseline models. The methodologies employed include the use of Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN) for capturing complex patterns in time series data, and the integration of a sliding window technique to transform raw data into a format suitable for supervised learning. Our experiments evaluated the performance of various models, including ARIMA, Random Forest, Support Vector Regression, and K-Nearest Neighbors Regression, across multiple scenarios. Furthermore, we developed a Power BI platform for visualizing global cyber-attack trends, providing valuable insights for enhancing cybersecurity defences. Our research demonstrates that cyber incidents are not entirely random, and advanced AI tools can significantly enhance cybersecurity defences by analyzing patterns and trends from previous instances. This comprehensive approach not only improves prediction accuracy but also offers a robust framework for reducing the risk and impact of future cyber-crimes through enhanced detection and prediction capabilities.

随着技术的进步,网络威胁也在不断演变,因此加强网络复原力以应对安全漏洞至关重要。本研究采用创新方法扩展了网络犯罪分析,利用数据挖掘和机器学习不仅能预测网络事件,还能加强网络的稳健性。我们引入了一个实时数据收集框架,以提供最新的网络攻击数据,解决当前研究的局限性。通过分析收集到的攻击数据,我们确定了连续时间段内攻击量的时间相关性。我们的预测模型是利用先进的机器学习和深度学习技术开发的,可预测特定时间窗口内的网络攻击频率,与传统基线模型相比,准确率提高了 15%。所采用的方法包括使用循环神经网络(RNN)和卷积神经网络(CNN)捕捉时间序列数据中的复杂模式,以及整合滑动窗口技术将原始数据转换为适合监督学习的格式。我们的实验评估了 ARIMA、随机森林、支持向量回归和 K-Nearest Neighbors 回归等各种模型在多种情况下的性能。此外,我们还开发了一个 Power BI 平台,用于可视化全球网络攻击趋势,为加强网络安全防御提供有价值的见解。我们的研究表明,网络事件并非完全随机,先进的人工智能工具可以通过分析以往事件的模式和趋势,显著增强网络安全防御能力。这种综合方法不仅能提高预测准确性,还能提供一个强大的框架,通过增强检测和预测能力来降低未来网络犯罪的风险和影响。
{"title":"Predicting and mitigating cyber threats through data mining and machine learning","authors":"Nusrat Samia ,&nbsp;Sajal Saha ,&nbsp;Anwar Haque","doi":"10.1016/j.comcom.2024.107949","DOIUrl":"10.1016/j.comcom.2024.107949","url":null,"abstract":"<div><p>With cyber threats evolving alongside technological progress, strengthening network resilience to combat security vulnerabilities is crucial. This research extends cyber-crime analysis with an innovative approach, utilizing data mining and machine learning to not only predict cyber incidents but also reinforce network robustness. We introduce a real-time data collection framework to provide up-to-date cyberattack data, addressing current research limitations. By analyzing collected attack data, we identified temporal correlations in attack volumes across consecutive time frames. Our predictive model, developed using advanced machine learning and deep learning techniques, forecasts the frequency of cyber-attacks within specific time windows, demonstrating over a 15% improvement in accuracy compared to conventional baseline models. The methodologies employed include the use of Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN) for capturing complex patterns in time series data, and the integration of a sliding window technique to transform raw data into a format suitable for supervised learning. Our experiments evaluated the performance of various models, including ARIMA, Random Forest, Support Vector Regression, and K-Nearest Neighbors Regression, across multiple scenarios. Furthermore, we developed a Power BI platform for visualizing global cyber-attack trends, providing valuable insights for enhancing cybersecurity defences. Our research demonstrates that cyber incidents are not entirely random, and advanced AI tools can significantly enhance cybersecurity defences by analyzing patterns and trends from previous instances. This comprehensive approach not only improves prediction accuracy but also offers a robust framework for reducing the risk and impact of future cyber-crimes through enhanced detection and prediction capabilities.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107949"},"PeriodicalIF":4.5,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002962/pdfft?md5=120f2fc09cd6cbe01db3a435ba36943a&pid=1-s2.0-S0140366424002962-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel OTFS-based directional transmission scheme for airborne networks with ISAC technology 基于 OTFS 的新型定向传输方案,用于采用 ISAC 技术的机载网络
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.comcom.2024.107941
Xinyu Hong, Na Lv, Xiang Wang, Zhiyuan You

This paper investigates the directional transmission scheme for airborne networks (ANs) with orthogonal time frequency space (OTFS) modulation, to cope with the degradations of communication performance due to the aircraft’s uncertain and high-speed mobilities. Besides showing better communication performance in high mobility scenarios such as AN, OTFS has also been verified for realizing the integrated sensing and communication (ISAC) systems. In this case, this paper proposes a sensing-assisted beam prediction method by exploiting echoes to predict the next locations of moving aircraft, solving the beam rendezvous problem at the transmitter. Besides, for the data detection problem at the receiver, this paper proposes a novel pilot placement scheme relying on the predicted delays and Dopplers, realizing accurate channel estimation with lower overheads. Simulation results show that the proposed OTFS-based directional transmission scheme can achieve reliable communication performance with a low bit error rate.

本文研究了采用正交时频空间(OTFS)调制的机载网络(ANs)定向传输方案,以应对飞机不确定的高速移动所导致的通信性能下降。除了在 AN 等高移动性场景中显示出更好的通信性能外,OTFS 在实现集成传感和通信(ISAC)系统方面也得到了验证。在这种情况下,本文提出了一种传感辅助波束预测方法,利用回波预测移动飞机的下一个位置,解决发射机的波束会合问题。此外,针对接收器的数据检测问题,本文提出了一种新颖的先导放置方案,该方案依赖于预测的延迟和多普勒,以较低的开销实现了精确的信道估计。仿真结果表明,所提出的基于 OTFS 的定向传输方案能以较低的误码率实现可靠的通信性能。
{"title":"A novel OTFS-based directional transmission scheme for airborne networks with ISAC technology","authors":"Xinyu Hong,&nbsp;Na Lv,&nbsp;Xiang Wang,&nbsp;Zhiyuan You","doi":"10.1016/j.comcom.2024.107941","DOIUrl":"10.1016/j.comcom.2024.107941","url":null,"abstract":"<div><p>This paper investigates the directional transmission scheme for airborne networks (ANs) with orthogonal time frequency space (OTFS) modulation, to cope with the degradations of communication performance due to the aircraft’s uncertain and high-speed mobilities. Besides showing better communication performance in high mobility scenarios such as AN, OTFS has also been verified for realizing the integrated sensing and communication (ISAC) systems. In this case, this paper proposes a sensing-assisted beam prediction method by exploiting echoes to predict the next locations of moving aircraft, solving the beam rendezvous problem at the transmitter. Besides, for the data detection problem at the receiver, this paper proposes a novel pilot placement scheme relying on the predicted delays and Dopplers, realizing accurate channel estimation with lower overheads. Simulation results show that the proposed OTFS-based directional transmission scheme can achieve reliable communication performance with a low bit error rate.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107941"},"PeriodicalIF":4.5,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a novel service broker policy for choosing the appropriate data center in cloud environments 为在云环境中选择合适的数据中心制定新颖的服务代理政策
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.comcom.2024.107939
Lin Shan , Li Sun , Amin Rezaeipanah

Providing cloud computing services leads to quick access of users to dynamic and distributed resources. Increasing demand has created challenges such as resource availability, privacy, and security to provide efficient services in cloud computing. Cloud environments contain various computing resources, and allocating a suitable node to process a request can improve the quality of service on a large scale. Load balancing is one of the strategies to improve service quality and resource utilization, which refers to the distribution of load among different nodes in a distributed system. The cloud application service broker is responsible for load balancing by choosing the appropriate geo-distributed datacenter to process the requests of each end user. Parameters such as transmission delay, network delay, processing time, number of servers, workload, and service cost can be considered to select a suitable datacenter in close proximity. To reduce the adverse effects of choosing a datacenter by a service broker, this paper presents Rank-based Load Balancing in Geo-Distributed datacenters (RLBGD) as an effective service broker strategy in cloud environments. RLBGD uses a weighted combination of several criteria such as processing time, number of servers, workload, processing speed, service cost, and response time for dynamic ranking and determining the appropriate datacenter. CloudAnalyst tool is used to simulate and analyze the performance of the proposed method. The results of experiments show the effectiveness of RLBGD in terms of metrics such as service cost and processing time in different scenarios.

提供云计算服务可使用户快速访问动态和分布式资源。与日俱增的需求带来了资源可用性、隐私和安全等挑战,以便在云计算中提供高效服务。云环境包含各种计算资源,分配合适的节点处理请求可以大规模提高服务质量。负载均衡是提高服务质量和资源利用率的策略之一,是指在分布式系统中不同节点之间分配负载。云应用服务代理负责负载平衡,选择合适的地理分布数据中心来处理每个终端用户的请求。可以考虑传输延迟、网络延迟、处理时间、服务器数量、工作量和服务成本等参数,以就近选择合适的数据中心。为了减少服务代理在选择数据中心时产生的不利影响,本文提出了基于地理分布数据中心排名的负载平衡(RLBGD),作为云环境中一种有效的服务代理策略。RLBGD 使用处理时间、服务器数量、工作量、处理速度、服务成本和响应时间等多个标准的加权组合进行动态排名,并确定合适的数据中心。CloudAnalyst 工具用于模拟和分析拟议方法的性能。实验结果表明,RLBGD 在不同场景下的服务成本和处理时间等指标方面都很有效。
{"title":"Towards a novel service broker policy for choosing the appropriate data center in cloud environments","authors":"Lin Shan ,&nbsp;Li Sun ,&nbsp;Amin Rezaeipanah","doi":"10.1016/j.comcom.2024.107939","DOIUrl":"10.1016/j.comcom.2024.107939","url":null,"abstract":"<div><p>Providing cloud computing services leads to quick access of users to dynamic and distributed resources. Increasing demand has created challenges such as resource availability, privacy, and security to provide efficient services in cloud computing. Cloud environments contain various computing resources, and allocating a suitable node to process a request can improve the quality of service on a large scale. Load balancing is one of the strategies to improve service quality and resource utilization, which refers to the distribution of load among different nodes in a distributed system. The cloud application service broker is responsible for load balancing by choosing the appropriate geo-distributed datacenter to process the requests of each end user. Parameters such as transmission delay, network delay, processing time, number of servers, workload, and service cost can be considered to select a suitable datacenter in close proximity. To reduce the adverse effects of choosing a datacenter by a service broker, this paper presents Rank-based Load Balancing in Geo-Distributed datacenters (RLBGD) as an effective service broker strategy in cloud environments. RLBGD uses a weighted combination of several criteria such as processing time, number of servers, workload, processing speed, service cost, and response time for dynamic ranking and determining the appropriate datacenter. CloudAnalyst tool is used to simulate and analyze the performance of the proposed method. The results of experiments show the effectiveness of RLBGD in terms of metrics such as service cost and processing time in different scenarios.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107939"},"PeriodicalIF":4.5,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing MRAI on large scale BGP networks: An emulation-based approach 在大规模 BGP 网络上优化 MRAI:基于仿真的方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1016/j.comcom.2024.107940
Mattia Milani , Michele Segata , Luca Baldesi , Marco Nesler , Renato Lo Cigno , Leonardo Maccari
Modifying protocols that pertain to global Internet control is extremely challenging, because experimentation is almost impossible and both analytic and simulation models are not detailed and accurate enough to guarantee that changes will not affect negatively the Internet. Federated testbeds like the ones offered by the Fed4FIRE+ project offer a different solution: off-line Internet-scale experiments with thousands of Autonomous Systems (ASs). This work exploits Fed4FIRE+ for a large-scale experimental analysis of Border Gateway Protocol (BGP) convergence time under different hypotheses of Minimum Route Advertisement Interval (MRAI) setting, including an original proposal to improve its management by dynamically setting MRAI based on the topological position of the ASs in relation to the specific route being advertised with the UPDATE messages. MRAI is a timer that regulates the frequency of successive UPDATE messages sent by a BGP router to a specific peer for a given destination. Its large default value significantly slows down convergence after path changes, but its uncoordinated reduction can trigger storms of UPDATE messages, and set off unstable behaviors known as route flapping. The work is based on standard-compliant modifications of the BIRD BGP daemon and shows the tradeoffs between convergence time and signaling overhead with different management techniques.
修改涉及全球互联网控制的协议极具挑战性,因为实验几乎是不可能的,而且分析和模拟模型都不够详细和准确,无法保证修改不会对互联网产生负面影响。像 Fed4FIRE+ 项目提供的联合测试平台提供了一种不同的解决方案:由数千个自治系统(AS)进行离线互联网规模的实验。这项工作利用 Fed4FIRE+,对边界网关协议(BGP)在不同的最小路由广告间隔(MRAI)设置假设下的收敛时间进行了大规模实验分析,其中包括一项原创建议,即根据 AS 与 UPDATE 消息中广告的特定路由相关的拓扑位置动态设置 MRAI,从而改进路由广告间隔的管理。MRAI 是一个计时器,用于调节 BGP 路由器针对给定目的地向特定对等节点连续发送 UPDATE 消息的频率。它的默认值很大,会大大减缓路径变化后的收敛速度,但不协调地减少它可能会引发 UPDATE 消息风暴,并引发不稳定行为,即路由拍击(route flapping)。这项工作基于 BIRD BGP 守护进程的标准兼容修改,并展示了不同管理技术在收敛时间和信令开销之间的权衡。
{"title":"Optimizing MRAI on large scale BGP networks: An emulation-based approach","authors":"Mattia Milani ,&nbsp;Michele Segata ,&nbsp;Luca Baldesi ,&nbsp;Marco Nesler ,&nbsp;Renato Lo Cigno ,&nbsp;Leonardo Maccari","doi":"10.1016/j.comcom.2024.107940","DOIUrl":"10.1016/j.comcom.2024.107940","url":null,"abstract":"<div><div>Modifying protocols that pertain to global Internet control is extremely challenging, because experimentation is almost impossible and both analytic and simulation models are not detailed and accurate enough to guarantee that changes will not affect negatively the Internet. Federated testbeds like the ones offered by the Fed4FIRE+ project offer a different solution: off-line Internet-scale experiments with thousands of Autonomous Systems (ASs). This work exploits Fed4FIRE+ for a large-scale experimental analysis of Border Gateway Protocol (BGP) convergence time under different hypotheses of Minimum Route Advertisement Interval (MRAI) setting, including an original proposal to improve its management by dynamically setting MRAI based on the topological position of the ASs in relation to the specific route being advertised with the <span>UPDATE</span> messages. MRAI is a timer that regulates the frequency of successive <span>UPDATE</span> messages sent by a BGP router to a specific peer for a given destination. Its large default value significantly slows down convergence after path changes, but its uncoordinated reduction can trigger storms of <span>UPDATE</span> messages, and set off unstable behaviors known as route flapping. The work is based on standard-compliant modifications of the BIRD BGP daemon and shows the tradeoffs between convergence time and signaling overhead with different management techniques.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107940"},"PeriodicalIF":4.5,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1