Showing papers in "Computer Communications in 2019"
••
TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.
355 citations
••
TL;DR: This survey delves into the topic of Network Service Orchestration (NSO) by reviewing the historical background, relevant research projects, enabling technologies, and standardization activities, and proposes a taxonomy of NSO approaches and solutions to pave the way towards a common understanding of the various ongoing efforts around the realization of diverse NSO application scenarios.
126 citations
••
TL;DR: The fundamentals of SIoT are presented, thrust areas of it are identified (as service discovery and composition, network navigability, relationship management, and trustworthiness management) and several prerequisites, challenges and use case scenarios based on them are presented.
125 citations
••
TL;DR: This paper investigates ICN as communication enabler for IoT domain specific use cases, and the use of ICN features for the benefit of IoT networks, including IoT device & content naming, discovery, and caching.
113 citations
••
TL;DR: This survey covers technologies that allow privacy-aware outsourcing of storage and processing of sensitive data to public clouds and reviews masking methods for outsourced data based on data splitting and anonymization, in addition to cryptographic methods covered in other surveys.
105 citations
••
TL;DR: The enhancement of performance operation efficiency of submarine optical communication systems toward multi Tb/s and the importance of minimizing dispersion slope within choosing suitable hybrid commercial submarine optical fibers to ensure good channel performance and wide system bandwidth is shown.
81 citations
••
TL;DR: Simulation results show that outage performance is till remained by using NOMA compared to the conventional orthogonal multiple access (OMA), and it is indicated that the performance of Opportunistic Relay Selection (ORS) is better than Partial Relay selection (PRS) scheme.
68 citations
••
TL;DR: It is found that the model built increases the security of IoD, and there are some shortcomings in the experimental process, but it still provides experimental basis for the later development of IoB.
67 citations
••
TL;DR: This paper proposes a solution that uses packet length statistics from encrypted traffic to characterize the behavior of IoT devices and events in a smart home scenario, making the use of TCP vectors unnecessary.
66 citations
••
TL;DR: Numerical results are presented to validate the effectiveness of the proposed D2D transmission strategies and analysis on non-linear energy harvesting policy and multiple NOMA far users which are deployed in such D1D transmission is extended.
65 citations
••
TL;DR: X60 is introduced, the first SDR-based testbed for 60 GHz WLANs, featuring fully programmable MAC/PHY/Network layers, multi-Gbps rates, and a user-configurable 12-element phased antenna array, and it is found that a one-to-one MCS to SNR mapping is hard to obtain in typical indoor environments.
••
TL;DR: The proposed categorization in this paper helps researchers achieve a comprehensive view of dynamic key management schemes in wireless sensor networks based on the type of keys, key distribution mechanisms, key cryptography methods and network models.
••
TL;DR: An intelligent scheme based on AHP-TOPSIS method and Q-learning approach is proposed for handover optimization and results show that the proposed scheme minimizes the Handover Failure Rate (HFR) and Handover Ping-Pong (HPP), effectively to 28%, 25% and 35%, 33% as compared to conventional method and Fuzzy Multiple-Criteria Cell Selection (FMCCS) scheme.
••
TL;DR: This manuscript is an attempt to identify the possibilities of Wireless Sensor Networks and Unmanned Aerial Vehicles (UAVs) in the applications of disaster management and develop a system that serves accurate detection along with its confirmation through real time images from UAVs.
••
TL;DR: Comparisons of VARMAN under similar attack scenarios and test environment, with related recent works that utilized ML-based NIDS, demonstrate that the scheme offers higher accuracy, less than 5% false positive rate for various attack intensities and significant training space/time reduction.
••
TL;DR: In this paper, robust traffic classification system using Principal Component Analysis (PCA) and Artificial Neural Network (ANN) is proposed for providing extreme surveillance, which aims to expose various AI based cyber-attacks with their present-day impact, and their fortune in the future.
••
TL;DR: Gaussian Mixture Models, an ML based soft clustering mechanism, is used to develop the proposed routing protocol called GMMR, a routing protocol that combines the advantages of both context-aware and context-free routing protocols.
••
TL;DR: The main concentration of this work is to survey IBFD Cognitive Radio Networks (IBFD–CRNs) from the perspective of each layer, namely the Physical (PHY), Medium Access Control (MAC) and network layers.
••
TL;DR: This article proposes Threshold Percentage Dependent Interference Graph (TPDIG) using Deep Learning-based resource allocation algorithm for city buses mounted with moving small cells (mSCs), and long–Short Term Memory based neural networks are considered to predict city buses locations for interference determination between mSCs.
••
TL;DR: A novel routing protocol, namely, Direction Aware Best Forwarder Selection (DABFS), is presented, which takes into account directions and relative positions of nodes, besides the distance parameter, to determine a node’s movement direction.
••
TL;DR: The results indicate that proposed algorithms can effectively reduce network delay and enhance QoS in the cloud–edge environment.
••
TL;DR: This paper calls it the MOM of context-aware systems: generic and effective context Modeling, an efficient context Organization, and a robust context Middleware, and outlines the basic components required and essential for the same.
••
TL;DR: In this paper, propagation delay, hop count and link utilization are considered for such assignment and a new Analytic Hierarchy Process (AHP) technique is presented to perform the multi criteria assignment process.
••
TL;DR: This paper proposes a new behavioral model based on a conditioned graph structure, H t e s t , to select the most discriminative sub-graphs of conditioned behavioral models as the unique signature for the malware family.
••
TL;DR: A parallel cumulative ranker algorithm to rank the attributes of a dataset for cost-effective classification of network traffic and provides better accuracy in classification with fewer training samples.
••
TL;DR: This work provides an integer linear programming formulation of VNF placement that leverages a layered auxiliary graph built for each request in a set that allows to differentiate service requests in priority levels and guarantees that Quality of Service objectives for accepted service requests are fulfilled.
••
TL;DR: This paper attempts to narrow the target searching space of V NF placement by introducing a smaller accessible scope where the locations of VNFs are confined by introducing the accessible scope constraint under medium and large scales of scenarios.
••
TL;DR: A framework to analyze different congestion control algorithms using network emulation to analyze the bottleneck bandwidth and round-trip time (BBR) congestion control algorithm, which was published by Google in 2016 and results show that BBR flows on their own have difficulty to reach a fairness equilibrium and suppress other congestion Control algorithms.
••
TL;DR: This paper suggests a three-factor elliptic curve cryptography based protocol that can withstand the well-known attacks with a comparable performance and demonstrates that the presented scheme is safe and robust against various attacks.
••
TL;DR: This paper quantifies the security risks for DoS attacks on Intelligent Electronic Devices (IEDs) and the IEC 61850 network and illustrates how SDN relieves the smart grid network of congestion and improves timing performance of IEC61850 type messages, making them time compliant.