Article
Computer Science, Hardware & Architecture
Nikos Fotiou, Yannis Thomas, Vasilios A. Siris, George Xylomenos, George C. Polyzos
Summary: We propose a self-sovereign and decentralized naming scheme for ICN architectures based on DIDs. Content items in our scheme have tamper-proof metadata that can be verified based solely on the content's name. DIDs can be used as content name prefixes and act as the root of trust for namespaces.
Article
Chemistry, Analytical
Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Sanaa Ghouzali, Zobia Rehman, Wadood Abdul
Summary: VANET applications have multiple needs in terms of delivery effectiveness, and NDN has attracted attention for effective content retrieval. Context-aware PIT entry management protocol can achieve low latency and effective content dissemination.
Article
Computer Science, Hardware & Architecture
Quang Tung Thai, Namseok Ko, Sung Hyuk Byun, Sun-Me Kim
Summary: Blockchain technology has the potential to enhance efficiency and security in the field of networking, and the use of Named Data Networking (NDN) can further optimize these benefits. The development of an NDN-based Ethereum blockchain platform demonstrates the successful integration of these technologies.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2022)
Article
Chemistry, Analytical
Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Byung-Seo Kim, Zobia Rehman
Summary: Vehicular ad-hoc network (VANET) allows vehicles to interact and cooperate with each other, with different needs for applications, while named data networking (NDN) has gained attention for effective content retrieval and dissemination in mobile environments like VANETs. In this context, context-aware content-naming schemes and decentralized context-aware notification protocols have been proposed to improve transmission efficiency.
Article
Computer Science, Information Systems
Zheng Xue, Yang Liu, Guojun Han, Ferheen Ayaz, Zhengguo Sheng, Yonghua Wang
Summary: In this article, a two-layer distributed content caching scheme for VANETs is proposed, which utilizes the cache at both vehicles and RSUs to minimize transmission delay and cost. By using an alternate dynamic programming search-based algorithm and cooperation-based greedy algorithm, the large-scale problem can be effectively solved, achieving better performance compared to existing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Naeem Ali Askar, Adib Habbal, Feras Zen Alden, Xian Wei, Hashem Alaidaros, Jielong Guo, Hui Yu
Summary: The Internet of Things (IoT) aims to efficiently connect various entities, including humans, machines, smart devices, physical environments, and others, so they can communicate and exchange data in real time. NDN, a viable networking design for the future Internet, has been proposed as an efficient solution to disseminate the enormous volume of automated data in IoT. Forwarding strategies play an important role in the successful deployment of NDN-based IoT. This article introduces NDN-based IoT forwarding, classifies strategies, compares current methods, and outlines open research issues in this area.
Article
Computer Science, Hardware & Architecture
Cenk Guendogan, Peter Kietzmann, Thomas C. Schmidt, Matthias Waehlisch
Summary: The research focuses on the interaction between possibly mobile sensors and actuators in constrained IoT environments. It argues that the request-driven networking paradigm can limit the attack surface and that unsolicited link-local signaling can accelerate responses.
Article
Computer Science, Theory & Methods
Nitul Dutta
Summary: This paper proposes a scheme for FIB construction and Interest packet forwarding in ICN, aiming to improve performance by utilizing Bloom Filter for content advertisement control and information gradient for forwarding guidance. Experimental results show that the proposed scheme outperforms other approaches in terms of convergence rate, network load, and content retrieval delay.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Hardware & Architecture
C. N. Pruthvi, H. S. Vimala, J. Shreyas
Summary: Due to the expansion of IoT applications, data traffic has increased in recent years, and most IoT applications follow a content-oriented paradigm. The existing host-to-host internet architecture is inefficient for content distribution and information sharing. Information Centric Network (ICN) is a content-centric network that provides guaranteed solutions for data transfer and enables caching to enhance network performance.
Article
Computer Science, Hardware & Architecture
Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Rehmat Ullah, Ghulam Abbas, Abid Khan
Summary: This paper discusses the importance of inter-vehicle communication in VANETs and the use of NDN as the underlying protocol. It proposes a decentralized receiver-based link stability-aware forwarding (DRLSF) protocol to address the challenges faced. The DRLSF protocol is suitable for pull-based applications.
Article
Computer Science, Hardware & Architecture
Ravneet Kaur, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra
Summary: Named Data Networking (NDN) has become increasingly important due to a shift in Internet usage pattern towards content-centric approach. Content Store (CS), Pending Interest Table (PIT), and Forwarding Information Base (FIB) are three key data structures in NDN. The search time of PIT is high as it grows with the addition of new content names, requiring scanning millions of existing entries. In this paper, we propose S-PIT, a Stable Bloom Filter (SBF) based PIT, which improves search time by identifying query content existence through SBF. Experimental results demonstrate that S-PIT outperforms existing data structures in memory consumption, content insertion time, search time, and false positive rate.
Article
Computer Science, Hardware & Architecture
Marzieh Sadat Zahedinia, Mohammad Reza Khayyambashi, Ali Bohlooli
Summary: This paper introduces a data prioritization-based approach to improve cache efficiency in ICN networks. By utilizing fog computing as an intermediate layer, the speed limits of decision-making are resolved and cache performance is enhanced. Prioritization based on the popularity and freshness of data objects, along with the removal of low-priority data, reduces the total number of cached data and improves caching performance.
Article
Computer Science, Information Systems
Feri Fahrianto, Noriaki Kamiyama
Summary: Information-Centric Networking (ICN) and Named-Data Networking (NDN) are novel network designs that efficiently transfer content objects. However, replacing all routers with NDN routers during the migration from IP to NDN is costly. To address this problem, we propose a dual-channel IP-to-NDN translation gateway that utilizes two unique IP addresses as channels to maintain the semantics of the IP protocol and conducts seamless packet transmission between IP and NDN hosts using a name binding mechanism.
Article
Computer Science, Hardware & Architecture
Nitul Dutta
Summary: This paper describes an interest forwarding technique in Information Centric Network (ICN) using Named Data Network (NDN) architecture, aiming at minimizing content retrieval time and network overhead. The technique models the process as a bargain game between a data seeker and a content provider, with different types of intermediate Content Routers (CRs) being classified and rewarded accordingly. The integration of the proposed scheme significantly improves the performance in terms of content search latency, server hit ratio, network load, overhead, and throughput.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Chemistry, Analytical
Muhammad Imran, Muhammad Salah Ud Din, Muhammad Atif Ur Rehman, Byung-Seo Kim
Summary: This paper proposes a mechanism for interest aggregation and PIT lifetime management in microservice-centric in-network computation based on Named Data Networking (NDN). By designing microservice-centric interest naming and a dynamic PIT timer mechanism, the challenges in interest aggregation and PIT table management are addressed.
Article
Computer Science, Theory & Methods
Rodolfo W. L. Coutinho, Azzedine Boukerche, Luiz F. M. Vieira, Antonio A. F. Loureiro
ACM COMPUTING SURVEYS
(2018)
Article
Engineering, Electrical & Electronic
Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro
IEEE COMMUNICATIONS MAGAZINE
(2018)
Article
Engineering, Electrical & Electronic
Azzedine Boukerche, Rodolfo W. L. Coutinho
IEEE COMMUNICATIONS MAGAZINE
(2019)
Article
Computer Science, Hardware & Architecture
Azzedine Boukerche, Rodolfo W. L. Coutinho, Antonio A. F. Loureiro
Article
Computer Science, Hardware & Architecture
Rodolfo W. L. Coutinho, Azzedine Boukerche
IEEE WIRELESS COMMUNICATIONS
(2019)
Article
Computer Science, Information Systems
Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro
COMPUTER COMMUNICATIONS
(2020)
Article
Automation & Control Systems
Rodolfo W. L. Coutinho, Azzedine Boukerche
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2020)
Article
Automation & Control Systems
Rodolfo W. L. Coutinho, Azzedine Boukerche
Summary: Internet of things (IoT) and 5G network are essential for industrial IoT (IIoT), which can improve the efficiency and safety of industrial activities. However, machine learning (ML) requires a large amount of high-quality data samples for training, which is difficult to obtain in IIoT applications. This article discusses the design of transfer learning (TL)-based systems to address the data scarcity issue in IIoT and explores the applications and challenges of TL in IIoT machinery and networking levels.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Automation & Control Systems
Rodolfo W. L. Coutinho, Azzedine Boukerche
Summary: Advancements in IoT, 5G networks, and AI are empowering Industry 4.0. This article focuses on the design of UAV-assisted systems for emergency response in multiplant and industrial zones, highlighting the important contributions of UAV-mounted cloudlet systems and discussing current challenges and future research directions.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Proceedings Paper
Engineering, Electrical & Electronic
Rodolfo W. L. Coutinho, Azzedine Boukerche, Sergio Guercin
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
(2019)
Article
Computer Science, Hardware & Architecture
Rodolfo W. L. Coutinho, Azzedine Boukerche, Luiz F. M. Vieira, Antonio A. F. Loureiro
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
(2019)
Proceedings Paper
Computer Science, Hardware & Architecture
Rodolfo W. L. Coutinho, Azzedine Boukerche
PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18)
(2018)
Proceedings Paper
Computer Science, Hardware & Architecture
Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Rodolfo W. L. Coutinho, Azzedine Boukerche
PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON MODELLING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS (MSWIM'17)
(2017)
Article
Computer Science, Information Systems
Muna Al-Hawawreh, Nour Moustafa
Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.
Article
Computer Science, Information Systems
Youcef Azzoug, Abdelmadjid Boukra
Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.
Article
Computer Science, Information Systems
Paulo Cesar Prandel, Priscila Solis Barreto
Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.
Article
Computer Science, Information Systems
Michele Girolami, Davide La Rosa, Paolo Barsocchi
Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.
Review
Computer Science, Information Systems
Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor
Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.
Article
Computer Science, Information Systems
Yangyang Li, Lei Feng, Yang Yang, Wenjing Li
Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.
Article
Computer Science, Information Systems
Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo
Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Article
Computer Science, Information Systems
Shahaf Yamin, Haim H. Permuter
Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.
Article
Computer Science, Information Systems
Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang
Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.
Article
Computer Science, Information Systems
Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane
Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.
Article
Computer Science, Information Systems
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli
Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.
Article
Computer Science, Information Systems
Xue Li, Xiaojuan Chen, Guohua Li
Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.
Article
Computer Science, Information Systems
Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song
Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.