BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control
With the development of smart healthcare, eliminating information silos through trusted data sharing has become a social consensus, but there are still many problems that need to be solved. The multi-party sharing process of medical data usually ...
Tethering Layer 2 solutions to the blockchain: A survey on proving schemes
A blockchain is a data structure consisting of a list of blocks containing transactions and maintained by a network of nodes in a decentralized manner. In permissionless blockchains, anyone can contribute to the decentralization and security of ...
Interference aware path planning for mobile robots under joint communication and sensing in mmWave networks
The beyond fifth-generation (B5G) and emerging sixth-generation (6G) wireless networks are considered as key enablers in supporting a diversified set of applications for industrial mobile robots (MRs). In this paper, we consider mobile robots ...
Using ranging for collision-immune IEEE 802.11 rate selection with statistical learning
- Wojciech Ciezobka,
- Maksymilian Wojnar,
- Krzysztof Rusek,
- Katarzyna Kosek-Szott,
- Szymon Szott,
- Anatolij Zubow,
- Falko Dressler
Appropriate data rate selection at the physical layer is crucial for Wi-Fi network performance: too high rates lead to loss of data frames, while too low rates cause increased latency and inefficient channel use. Most existing methods adopt a ...
Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach
Vehicular Edge Computing (VEC) provides a flexible distributed computing paradigm for offloading computations to the vehicular network, which can effectively solve the problem of limited vehicle computing resources and meet the on-vehicle ...
Highlights
- A MORL algorithm, EMOTO, is proposed to optimize user QoE and provider revenue.
- Prioritized preference sampling strategy is proposed for effective joint optimization.
- The proposed model-augmented environment estimator ensures ...
Hybrid CSMA/CA and HCCA uplink medium access control protocol for VLC based heterogeneous users
Light fidelity (LiFi) is an emerging wireless networking technology of visible light communication (VLC) paradigm for multiuser communication. This technology enables high data rates due to the availability of large visible light spectrum. While ...
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark
The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating social contexts. However, this approach encounters various challenges that impact its ...
Highlights
- Elaborating a new trust management mechanism that leverages blockchain technology with a new consensus protocol based on Apache Spark. Through integrating these technologies, we aim to prevent trust-related attacks and create a secure ...
Optimization of 5G base station coverage based on self-adaptive mutation genetic algorithm
In communication network planning, a rational base station layout plays a crucial role in improving communication speed, ensuring service quality, and reducing investment costs. To address this, the article calibrated the urban microcell (UMa) ...
Resource allocation-aware efficient interference management technique for ultra-dense Femto environment
Addressing the challenge of severe inter-layer and intra-layer interference in densely deployed Femtocells, we introduce an efficient resource allocation strategy centered on clustering. Initially, we employ the Fractional Frequency Reuse (FFR) ...
Locating multiple rumor sources in social networks using partial information of monitors
Rumors in social media platforms and the identification of their sources is a challenging issue in modern-day computer communication. Existing approaches mostly fail to localize the source node accurately due to the lack of complete network ...
Highlights
- Developed an algorithm named MSPT to locate multiple rumor sources in social networks.
- Introduced a novel partial timestamp based snowballing technique for the MSPT algorithm.
- The time complexity of MSPT algorithm is O ( N S ∗ ( N ...
Making stateless and stateful network performance measurements unbiased
The Benchmarking Working Group (BMWG) of the Internet Engineering Task Force (IETF) has defined a series of Requests for Comments (RFC) to standardize the benchmarking of network interconnect devices (e.g., bridges, routers, different IPv6 ...
Training a Graph Neural Network to solve URLLC and eMBB coexisting in 5G networks
Coexistence of enhanced mobile broadband and ultra-reliable low latency communication in 5G networks is a challenging problem due to the conflicting requirements. In this paper, we decompose the problem into eMBB and URLLC resource allocation ...
A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data
Innovation in medical technology and communication has rapidly empowered the development of smart healthcare devices. This has led to privacy breaches, threats and vulnerabilities to sensitive patient data that result in unwanted or targeted ...
Secure communication of intelligent reflecting surface-aided NOMA in massive MIMO networks
A Non-Orthogonal Multiple Access (NOMA) network, in which the base station (BS) incorporates massive Multiple-Input Multiple-Output (MIMO) technology, is considered in this paper. This research study focuses on investigating physical layer ...
Highlights
- Utilizing a BS equipped with massive antenna arrays to communicate with a pair of NOMA users.
- Utilizing the IRS to establish a communication link between the BS and a far user.
- Analyzing reflected links in terms of LoS and NLoS ...
SDNRoute: Proactive routing optimization in Software Defined Networks
- Piotr Boryło,
- Piotr Chołda,
- Jerzy Domżał,
- Piotr Jaglarz,
- Piotr Jurkiewicz,
- Michał Rzepka,
- Grzegorz Rzym,
- Robert Wójcik
Despite opening attractive perspectives, the concept of Software Defined Networking raises doubts about the performance and practical feasibility. To contradict these concerns, we propose a deployment-ready system aimed at proactive and periodic ...
Hybrid aggregation for federated learning under blockchain framework
Federated learning based on local differential privacy and blockchain can effectively mitigate the privacy issues of server and provide strong privacy against multiple kinds of attack. However, the actual privacy of users gradually decreases with ...
Highlights
- The use of differential privacy and blockchain in federated learning can defend against multiple privacy attacks. However, differential privacy introduces a lot of noise to the updates, which reduces the accuracy of model training. ...
Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks
- Mashael Maashi,
- Eatedal Alabdulkreem,
- Noha Negm,
- Abdulbasit A. Darem,
- Mesfer Al Duhayyim,
- Ashit Kumar Dutta,
- Wali Ullah Khan,
- Ali Nauman
Intelligent Reflecting Surfaces (IRS), software-controlled metasurfaces, have emerged as an upcoming sixth-generation (6G) wireless communication technology. IRS intelligently manipulates and optimizes signal propagation using a large-scale array ...
Exploring Data Plane Updates on P4 Switches with P4Runtime
The development and roll-out of new Ethernet standards increase the available bandwidths in computer networks. This growth presents significant advantages, enabling novel applications. At the same time, the increase introduces new challenges; ...
Progressive updates of convolutional neural networks for enhanced reliability in small satellite applications
Small satellites enable many important applications for both economic and scientific purposes. Many of these applications are inherently data-centric and rely on large amounts of high-resolution satellite imagery to be delivered in a timely ...
The evolution of detection systems and their application for intelligent transportation systems: From solo to symphony
The emergence of autonomous driving technologies has been significantly influenced by advancements in perception systems. Traditional single-agent detection models, while effective in certain scenarios, exhibit limitations in complex environments,...
Eco-FL: Enhancing Federated Learning sustainability in edge computing through energy-efficient client selection
In the realm of edge cloud computing (ECC), Federated Learning (FL) revolutionizes the decentralization of machine learning (ML) models by enabling their training across multiple devices. In this way, FL preserves privacy and minimizes the need ...
Mission-critical UAV swarm coordination and cooperative positioning using an integrated ROS-LoRa-based communications architecture
Over the recent years unmanned aerial vehicles (UAVs) have been utilized extensively in mission-critical operations, especially as it relates to disaster management scenarios. Clearly, during these missions, the UAVs should be able to communicate ...
A parallel machine learning-based approach for tsunami waves forecasting using regression trees
Following a seismic event, tsunami early warning systems (TEWSs) try to provide precise forecasts of the maximum height of incoming waves at designated target points along the coast. This information is crucial to trigger early warnings in areas ...
QUIC Congestion Control Algorithm characteristics in mixed satellite–terrestrial emergency communication scenarios
Reliable communications play a pivotal role in ensuring an efficient response and the coordination of recovery and rescue efforts. However, conventional communication methods may not always be accessible or dependable in such situations. In such ...
Privacy-preserving WiFi fingerprint-based people counting for crowd management
The practice of people counting serves as an indispensable tool for meticulously monitoring crowd dynamics, enabling informed decision-making in critical situations, and optimizing the management of urban spaces, facilities, and services. Beyond ...
Learning optimal edge processing with offloading and energy harvesting
Modern portable devices can execute increasingly sophisticated AI models on sensed data. The complexity of such processing tasks is data-dependent and has relevant energy cost. This work develops an Age of Information Markovian model for a system ...