scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 2019"


Journal ArticleDOI
TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.

355 citations


Journal ArticleDOI
TL;DR: This survey delves into the topic of Network Service Orchestration (NSO) by reviewing the historical background, relevant research projects, enabling technologies, and standardization activities, and proposes a taxonomy of NSO approaches and solutions to pave the way towards a common understanding of the various ongoing efforts around the realization of diverse NSO application scenarios.

126 citations


Journal ArticleDOI
TL;DR: The fundamentals of SIoT are presented, thrust areas of it are identified (as service discovery and composition, network navigability, relationship management, and trustworthiness management) and several prerequisites, challenges and use case scenarios based on them are presented.

125 citations


Journal ArticleDOI
TL;DR: This paper investigates ICN as communication enabler for IoT domain specific use cases, and the use of ICN features for the benefit of IoT networks, including IoT device & content naming, discovery, and caching.

113 citations


Journal ArticleDOI
TL;DR: This survey covers technologies that allow privacy-aware outsourcing of storage and processing of sensitive data to public clouds and reviews masking methods for outsourced data based on data splitting and anonymization, in addition to cryptographic methods covered in other surveys.

105 citations


Journal ArticleDOI
TL;DR: The enhancement of performance operation efficiency of submarine optical communication systems toward multi Tb/s and the importance of minimizing dispersion slope within choosing suitable hybrid commercial submarine optical fibers to ensure good channel performance and wide system bandwidth is shown.

81 citations


Journal ArticleDOI
TL;DR: Simulation results show that outage performance is till remained by using NOMA compared to the conventional orthogonal multiple access (OMA), and it is indicated that the performance of Opportunistic Relay Selection (ORS) is better than Partial Relay selection (PRS) scheme.

68 citations


Journal ArticleDOI
Zhihan Lv1
TL;DR: It is found that the model built increases the security of IoD, and there are some shortcomings in the experimental process, but it still provides experimental basis for the later development of IoB.

67 citations


Journal ArticleDOI
TL;DR: This paper proposes a solution that uses packet length statistics from encrypted traffic to characterize the behavior of IoT devices and events in a smart home scenario, making the use of TCP vectors unnecessary.

66 citations


Journal ArticleDOI
TL;DR: Numerical results are presented to validate the effectiveness of the proposed D2D transmission strategies and analysis on non-linear energy harvesting policy and multiple NOMA far users which are deployed in such D1D transmission is extended.

65 citations


Journal ArticleDOI
TL;DR: X60 is introduced, the first SDR-based testbed for 60 GHz WLANs, featuring fully programmable MAC/PHY/Network layers, multi-Gbps rates, and a user-configurable 12-element phased antenna array, and it is found that a one-to-one MCS to SNR mapping is hard to obtain in typical indoor environments.

Journal ArticleDOI
TL;DR: The proposed categorization in this paper helps researchers achieve a comprehensive view of dynamic key management schemes in wireless sensor networks based on the type of keys, key distribution mechanisms, key cryptography methods and network models.

Journal ArticleDOI
TL;DR: An intelligent scheme based on AHP-TOPSIS method and Q-learning approach is proposed for handover optimization and results show that the proposed scheme minimizes the Handover Failure Rate (HFR) and Handover Ping-Pong (HPP), effectively to 28%, 25% and 35%, 33% as compared to conventional method and Fuzzy Multiple-Criteria Cell Selection (FMCCS) scheme.

Journal ArticleDOI
TL;DR: This manuscript is an attempt to identify the possibilities of Wireless Sensor Networks and Unmanned Aerial Vehicles (UAVs) in the applications of disaster management and develop a system that serves accurate detection along with its confirmation through real time images from UAVs.

Journal ArticleDOI
TL;DR: Comparisons of VARMAN under similar attack scenarios and test environment, with related recent works that utilized ML-based NIDS, demonstrate that the scheme offers higher accuracy, less than 5% false positive rate for various attack intensities and significant training space/time reduction.

Journal ArticleDOI
TL;DR: In this paper, robust traffic classification system using Principal Component Analysis (PCA) and Artificial Neural Network (ANN) is proposed for providing extreme surveillance, which aims to expose various AI based cyber-attacks with their present-day impact, and their fortune in the future.

Journal ArticleDOI
TL;DR: Gaussian Mixture Models, an ML based soft clustering mechanism, is used to develop the proposed routing protocol called GMMR, a routing protocol that combines the advantages of both context-aware and context-free routing protocols.

Journal ArticleDOI
TL;DR: The main concentration of this work is to survey IBFD Cognitive Radio Networks (IBFD–CRNs) from the perspective of each layer, namely the Physical (PHY), Medium Access Control (MAC) and network layers.

Journal ArticleDOI
TL;DR: This article proposes Threshold Percentage Dependent Interference Graph (TPDIG) using Deep Learning-based resource allocation algorithm for city buses mounted with moving small cells (mSCs), and long–Short Term Memory based neural networks are considered to predict city buses locations for interference determination between mSCs.

Journal ArticleDOI
TL;DR: A novel routing protocol, namely, Direction Aware Best Forwarder Selection (DABFS), is presented, which takes into account directions and relative positions of nodes, besides the distance parameter, to determine a node’s movement direction.

Journal ArticleDOI
TL;DR: The results indicate that proposed algorithms can effectively reduce network delay and enhance QoS in the cloud–edge environment.

Journal ArticleDOI
TL;DR: This paper calls it the MOM of context-aware systems: generic and effective context Modeling, an efficient context Organization, and a robust context Middleware, and outlines the basic components required and essential for the same.

Journal ArticleDOI
TL;DR: In this paper, propagation delay, hop count and link utilization are considered for such assignment and a new Analytic Hierarchy Process (AHP) technique is presented to perform the multi criteria assignment process.

Journal ArticleDOI
TL;DR: This paper proposes a new behavioral model based on a conditioned graph structure, H t e s t , to select the most discriminative sub-graphs of conditioned behavioral models as the unique signature for the malware family.

Journal ArticleDOI
TL;DR: A parallel cumulative ranker algorithm to rank the attributes of a dataset for cost-effective classification of network traffic and provides better accuracy in classification with fewer training samples.

Journal ArticleDOI
TL;DR: This work provides an integer linear programming formulation of VNF placement that leverages a layered auxiliary graph built for each request in a set that allows to differentiate service requests in priority levels and guarantees that Quality of Service objectives for accepted service requests are fulfilled.

Journal ArticleDOI
TL;DR: This paper attempts to narrow the target searching space of V NF placement by introducing a smaller accessible scope where the locations of VNFs are confined by introducing the accessible scope constraint under medium and large scales of scenarios.

Journal ArticleDOI
TL;DR: A framework to analyze different congestion control algorithms using network emulation to analyze the bottleneck bandwidth and round-trip time (BBR) congestion control algorithm, which was published by Google in 2016 and results show that BBR flows on their own have difficulty to reach a fairness equilibrium and suppress other congestion Control algorithms.

Journal ArticleDOI
TL;DR: This paper suggests a three-factor elliptic curve cryptography based protocol that can withstand the well-known attacks with a comparable performance and demonstrates that the presented scheme is safe and robust against various attacks.

Journal ArticleDOI
TL;DR: This paper quantifies the security risks for DoS attacks on Intelligent Electronic Devices (IEDs) and the IEC 61850 network and illustrates how SDN relieves the smart grid network of congestion and improves timing performance of IEC61850 type messages, making them time compliant.