scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2018"


Journal ArticleDOI
TL;DR: This exhaustive survey provides insights into the state-of-the-art of IoT enabling and emerging technologies and brings order in the existing literature by classifying contributions according to different research topics.

510 citations


Journal ArticleDOI
TL;DR: A comprehensive top down survey of the most recent proposed security and privacy solutions in IoT in terms of flexibility and scalability and a general classification of existing solutions is given.

432 citations


Journal ArticleDOI
TL;DR: A comprehensive survey on NFV is presented, which starts from the introduction of NFV motivations, and provides an extensive and in-depth discussion on state-of-the-art VNF algorithms including VNF placement, scheduling, migration, chaining and multicast.

361 citations


Journal ArticleDOI
TL;DR: This survey presents a detailed overview of potentials, trends, and challenges of edge Computing, and illustrates a list of most significant applications and potentials in the area of edge computing.

252 citations


Journal ArticleDOI
TL;DR: A new hybrid classification method based on Artificial Bee Colony (ABC) and Artificial Fish Swarm (AFS) algorithms is proposed that outperforms in terms of performance metrics and can achieve 99% detection rate and 0.01% false positive rate.

175 citations


Journal ArticleDOI
TL;DR: By analyzing the existing traffic models, this work found that Vehicular Cloud computing is technologically feasible not just in the static environment, like a parking lot or garage where vehicles are stationary, but also the dynamic scenarios, such as highways or streets where vehicles move.

166 citations


Journal ArticleDOI
TL;DR: This paper critically review the SDN and fog computing-based solutions to overcome the IoT main challenges, highlighting their advantages, and exposing their weaknesses and makes recommendations for the upcoming research work.

151 citations


Journal ArticleDOI
TL;DR: This article introduces blockchain technology to build trust and reliability in peer-to-peer networks with topologies similar to IV communication, and proposes a blockchain-technology-enabled IV communication use case that is evaluated with emphasis on real-time traffic scenarios.

148 citations


Journal ArticleDOI
TL;DR: PHOABE, a Policy-Hidden Outsourced ABE scheme, is introduced and is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model, and estimation of the processing overhead proves its feasibility in IoT constrained environments.

121 citations


Journal ArticleDOI
TL;DR: A bio-inspired and trust-based cluster head selection approach for WSN adopted in ITS applications and the results demonstrated that the proposed model achieved longer network lifetime, i.e., nodes are kept alive longer than what LEACH, SEP and DEEC can achieve.

117 citations


Journal ArticleDOI
TL;DR: The improved two-stage auction algorithm based on trust degree and privacy sensibility (TATP) and k − ɛ -differential privacy-preserving is proposed to prevent users’ location information from being leaked.

Journal ArticleDOI
TL;DR: The experimental results proved the good performance of the proposed IoV based route selection method, which is compared with the existing shortest path selection algorithms such as Dijikstra algorithm, Kruskal's algorithm and Prim's algorithm.

Journal ArticleDOI
TL;DR: This is the first survey that addresses the use of big data analytics techniques for the design of a broad range of networks, and identifies the challenges confronting the utilization ofbig data analytics in network design.

Journal ArticleDOI
TL;DR: Simulation results prove that proposed congestion control algorithm based on the multi-objective optimization algorithm named PSOGSA for rate optimization and regulating arrival rate of data from every child node to the parent node has better results than existing approaches.

Journal ArticleDOI
TL;DR: Results show that the proposed approach achieves the best classification performance and relatively higher runtime performance and can not only efficiently reduce the dimension of feature space, but also overcome the negative impacts of multi-class imbalance and concept drift problems on ML techniques.

Journal ArticleDOI
TL;DR: A new authentication scheme which provides secure communications in VANET is proposed which is a combination of Road Side Unit Based (RSUB) and Tamper Proof Device Based (TPDB) schemes and is much more cost efficient compare to other on-line RSUB schemes.

Journal ArticleDOI
TL;DR: A summary of the methods used in the area of IoT-big data and IoT-data mining is presented in three categories to provide a starting point for researchers in the future to identify subjects that must be emphasized more in current and future research paths.

Journal ArticleDOI
TL;DR: A distributed Minimum-Delay Energy-efficient flooding Tree (MDET) algorithm to construct an energy optimal tree with flooding delay bounding is designed and demonstrated that MDET achieves a comparable delivery latency with the minimum-delay flooding, and incurs only 10% more transmission cost than the lower bound, which yields a good balance between flooding delay and energy efficiency.

Journal ArticleDOI
TL;DR: A deep overview of the current state of the art of wireless sensor nodes with enough background is provided to allow to design evolutionary nodes and to analyze thoroughly the node design components and application trends.

Journal ArticleDOI
TL;DR: A new service provision scheme to provide continuous availability of diversified cloud services targeting vehicular cloud users through a cluster-based trusted third party (TTP) framework that can adequately discover and deliver cloud services with increased QoE results, minimal overhead burden and reduced end-to-end latency is introduced.

Journal ArticleDOI
TL;DR: A novel controller placement model based on the p-median facility location problem with the delay and the significance of the RSU location as the factors to achieve the optimization heuristically as an integer quadratic programming problem is presented.

Journal ArticleDOI
TL;DR: A solution, named REATO, for actively and dynamically detecting and facing DoS attacks within a running IoT middleware, and a real prototype has been realized in order to validate the proposed method, by assessing different relevant parameters.

Journal ArticleDOI
TL;DR: This paper analyses and summarizes the role of softwarization and virtualization in enhancing the network architecture and functionalities of mobile systems, and analyzes several 5G application scenarios in order to derive and classify the requirements to be taken into account in the design process of 5G network.

Journal ArticleDOI
TL;DR: This article presents a brief planar overview of a smart city system architecture by introducing the application, sensing, communication, data, and security/privacy planes and provides insights for open issues and opportunities in these planes.

Journal ArticleDOI
TL;DR: A hybrid anonymous authentication and key agreement scheme using the physiological signal to overcome the shortcomings in Li et al.

Journal ArticleDOI
TL;DR: The use of a powerful machine learning technique called the Restricted Boltzmann Machine (RBM) to distinguish between normal and anomalous NetFlow traffic is demonstrated and results indicate that RBMs can be trained successfully to classify normal and anomalies in network traffic.

Journal ArticleDOI
TL;DR: This paper demonstrates a detailed design and prototype implementation of AAoT, a lightweight and practical mechanism for Attestation and Authentication of Things that can provide software integrity, mutual authentication and tamper-proof feature for smart embedded devices.

Journal ArticleDOI
TL;DR: This paper presents an expressive CP-ABE scheme supporting partially hidden access structures in the prime-order groups with improved efficiency.

Journal ArticleDOI
TL;DR: A novel end-to-end deep network that extracts region proposals by a two-stages adjusting strategy for traffic signs detection by adding a deconvolutional structure to convolutional layers to fit the small size of targets.

Journal ArticleDOI
TL;DR: To simulate the PGRP, an integrated simulation model, a NS-2.35 based model and Simulator of Urban Mobility (SUMO) were used and simulation results showed that PGRR outperformed PDGR, GPSR and GPCR in terms of packet delivery ratio, end-to-end delay, and average hops.