scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 2022"


Journal ArticleDOI
TL;DR: In this article, the authors proposed a new routing protocol with the cluster structure for IoT networks using blockchain-based architecture for SDN controller, which obviates proof-of-work (PoW) with private and public blockchains for peer-to-peer (P2P) communication between SDN controllers and IoT devices.

64 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed a new routing protocol with the cluster structure for IoT networks using blockchain-based architecture for SDN controller, which obviates proof-of-work (PoW) with private and public blockchains for peer-to-peer (P2P) communication between SDN controllers and IoT devices.

64 citations


Journal ArticleDOI
Tilahun Muluneh1
TL;DR: In this paper , an improved caching scheme named robot helper aided caching (RHAC) is proposed to optimize the system performance by moving the robot helpers to the optimal positions, which can bring significant performance improvements in terms of hitting probability, cost, delay and energy consumption.

54 citations


Journal ArticleDOI
TL;DR: In this article, an improved caching scheme named robot helper aided caching (RHAC) is proposed to optimize the system performance by moving the robot helpers to the optimal positions, which can bring significant performance improvements in terms of hitting probability, cost, delay and energy consumption.

54 citations


Journal ArticleDOI
TL;DR: In this paper , a survey of graph-based deep learning methods for communication networks involving both wired and wireless scenarios is presented. But, the authors focus on the application of graphbased methods in wireless networks.

51 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a triad-based social network evolution analysis method (SNEA), which includes a prediction algorithm that learns the evolution of the triad transition probability matrix through time series and a quantization algorithm (TTHQA) that quantifies the impact of triad transformations on the network based on random walks.

43 citations


Journal ArticleDOI
Wenjuan Sun1
TL;DR: Wang et al. as mentioned in this paper proposed a triad-based social network evolution analysis method (SNEA), which includes a prediction algorithm that learns the evolution of the triad transition probability matrix through time series and a quantization algorithm (TTHQA) that quantifies the impact of triad transformations on the network based on random walks.

41 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed a real-time surveillance helmet that incorporates IoT Sensors that can rescue with early warning intelligence on the presence of fire, silicosis dust particles, temperature, harmful gases, and others that will reduce worker health risks.

33 citations


Journal ArticleDOI
TL;DR: In this paper , an effective batch authentication and key exchange technique was proposed to avoid contact with hostile vehicle users. And three types of systems were proposed: PKI, ID-based, and MAC-based.

32 citations


Journal ArticleDOI
TL;DR: In this article , a hybrid whale optimization algorithm-based MBA algorithm is proposed for solving the multi-objective task scheduling problems in cloud computing environments, which decreases the makespan by maximizing the resource utilization.

25 citations


Journal ArticleDOI
TL;DR: In this paper , a comprehensive study on watermarking using trending technologies, such as artificial intelligence, machine learning and deep learning, is presented, which briefly discusses the introduction of watermark, background information and the most interesting and utilized applications.

Journal ArticleDOI
TL;DR: In this article , a hybrid whale optimization algorithm-based MBA algorithm is proposed for solving the multi-objective task scheduling problems in cloud computing environments, which decreases the makespan by maximizing the resource utilization.

Journal ArticleDOI
TL;DR: In this paper , an anomaly detection approach by integration of intelligent deep learning technique named Convolutional Neural Network (CNN) with Kalman Filter (KF) based Gaussian-Mixture Model (GMM).

Journal ArticleDOI
TL;DR: In this paper , a secure mobile edge computing (MEC) for emerging cyber physical systems (CPS), where there exist K eavesdroppers in the network, which can threaten the task offloading, is studied.

Journal ArticleDOI
TL;DR: A lattice-based two-party authenticated key agreement (LB-ID-2PAKA) protocol using identity-based cryptography (IBC) is proposed, which could resist the quantum computers and IBC could remove the overhead of certificate management.

Journal ArticleDOI
TL;DR: In this article , a hybrid of Decision Table and Naive Bayes models were combined to train and detect intrusions, which achieved an accuracy of 96.8% using five features of CICIDS2017, which is higher than the accuracy of methods discussed in the literatures.

Journal ArticleDOI
TL;DR: In this article , a self-adjusting stratified sampling algorithm is proposed for real-time data stream processing of the Internet of Things (IoT), which adjusts the size of the sample stratums according to the variance of each stratum while maintaining the given memory budget.

Journal ArticleDOI
TL;DR: In this article , the authors present an extensive and exhaustive review on the use of FL in intrusion detection system, including various types of IDS, relevant ML approaches and its associated issues.

Journal ArticleDOI
TL;DR: In this paper , the authors developed Deep Convolutional Neural Network (DCNN) and Distributed Particle Filtering Evaluation Scheme (DPFES) for constructing a secure and cooperative multi-watchdog system.

Journal ArticleDOI
TL;DR: In this article , a mathematical model for scheduling tasks that are being executed at low-power devices and concurrently on the cloud edge is presented, which is intended to distribute resources among devices optimally while minimizing network overhead.

Journal ArticleDOI
TL;DR: In this article , a joint task and energy offloading problem is studied under a UAV-aided and energy-constrained intelligent edge network, consisting of a high altitude platform (HAP), multiple UAVs, and on-ground fog computing nodes (FCNs).

Journal ArticleDOI
TL;DR: In this article , a fly-and-communicate protocol for the UAV is considered, where a UAV sweeps a large rectangular area to disperse a common file to ground nodes with obscure positions.

Journal ArticleDOI
TL;DR: In this paper , the authors presented an efficient packet-based botnet detection system based on explainable machine learning and feature selection to produce a data set with only seven features to train a machine learning classifier that achieves very high accuracy.

Journal ArticleDOI
TL;DR: In this article , the authors proposed an ultra-lightweight RFID security authentication protocol utilizing a cloud server named CRUSAP, which is based on Bit-Crossing XOR rearrangement operations that can effectively resist forgery attacks, replay attacks, desynchronization attacks, and denial of service attacks while certifying the cloud server.

Journal ArticleDOI
TL;DR: In this paper , the authors proposed a lattice-based two-party authenticated key agreement (LB-ID-2PAKA) protocol using identity-based cryptography (IBC).

Journal ArticleDOI
TL;DR: In this paper , the authors integrate Graph Neural Networks (GNN) into DRL agents and design a problem specific action space to enable generalization, which allows the proposed GNN-based DRL agent to learn and generalize over arbitrary network topologies.

Journal ArticleDOI
TL;DR: New Radio flexibility (NRflex) provides a solution that dynamically assigns BWP to the running slices and their associated User Equipment (UE), aiming to fulfill the slices’ required QoS.

Journal ArticleDOI
TL;DR: In this article , an IDS framework using Machine Learning (ML) techniques is implemented, which uses different types of Recurrent Neural Networks (RNNs), namely, Long Short Term Memory (LSTM), Gated Recurrent Unit (GRU), and Simple RNN.

Journal ArticleDOI
TL;DR: In this paper , the authors proposed an algorithm that prioritizes the tasks regarding their execution deadline and reduce the consumed energy of the machines processing the low-priority tasks using the DVFS method.

Journal ArticleDOI
TL;DR: This paper provides a thorough analysis of the influence of using the different SUMO’s traffic demand generation tools on mobility and node connectivity and proposes an automatized tool that facilitates researchers the generation of synthetic traffic based on real data.