Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107500AbstractEdge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, e.g., for police and rescue personnel. Enriched situational awareness, ...
Highlights- Analysis of security requirements for tactical networks and edge in the 6G era.
- Assessing feasibility of security analysis methods for a mission-critical use case.
- Results from a risk prioritization study based on the Delphi ...
- research-articleNovember 2024
CSMD: Container state management for deployment in cloud data centers
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107495AbstractAs the containers are lightweight in resource usage, they are preferred for cloud and edge computing service deployment. Containers serve the requests whenever a user sends a query; however, they remain idle when no user request comes. Again, ...
Highlights- Improving the consolidation ratio in cloud data centers by an efficient state management of the containers.
- Proposing a system architecture along with problem formulation for performing the state checkpointing and resumption of the ...
- research-articleNovember 2024
Finite-horizon energy allocation scheme in energy harvesting-based linear wireless sensor network
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107493AbstractLinear wireless sensor networks (LWSNs) are a specialized topology of wireless sensor networks (WSNs) widely used for environmental monitoring. Traditional WSNs rely on batteries for energy supply, limiting their performance due to battery ...
Highlights- The throughput of energy harvesting-based wireless sensor networks is maximized.
- An iterative energy allocation algorithm is proposed and its optimality is proved.
- A distributed version of the proposed algorithm is designed.
- ...
- research-articleNovember 2024
Global reduction for geo-distributed MapReduce across cloud federation
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107492AbstractGeo-distributed Bigdata processing is increasing day by day, resulting in the origins of data that are geographically distributed in different countries and hold datacenters (DCs) across the globe, and also the applications that use different ...
Highlights- An heuristic algorithm GResearch is proposed to choose the best clusters as global reducers.
- An heuristic scheduling algorithm Geo-MR is proposed to ensure the scheduling of only the relevant data to selected global reducers that ...
- research-articleNovember 2024
LSTM-Oppurs: Opportunistic user recruitment strategy based on deep learning in mobile crowdsensing system
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107490AbstractAs the scale of Mobile CrowdSensing (MCS) system expands, effective mobile user allocation and recruitment system design becomes crucial. Mobile users can be divided into opportunistic users and participatory ones. Most of the existing ...
Highlights- A User Recruitment problem based on User Comprehensive Capabilities (urUCC) is proposed.
- A user Location Prediction algorithm based on Deep Learning (LPDL) is proposed.
- A User Comprehensive Evaluation algorithm based on Topsis (...
-
- research-articleNovember 2024
Load-aware switch migration for controller load balancing in edge–cloud architectures
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107489AbstractAs the fundamental infrastructure for edge–cloud architectures, the inter-datacenter elastic optical network is used for data analysis and processing. As the demand for applications increases, the large number of service requests increases the ...
Highlights- To address the controller load imbalance problem, we propose a novel load-aware switch migration (LASM) mechanism for edge–cloud architectures.
- Based on the migration cost metrics, we construct a switch selection optimization model for ...
- research-articleNovember 2024
SFML: A personalized, efficient, and privacy-preserving collaborative traffic classification architecture based on split learning and mutual learning
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107487AbstractTraffic classification is essential for network management and optimization, enhancing user experience, network performance, and security. However, evolving technologies and complex network environments pose challenges. Recently, researchers have ...
Highlights- A federated learning framework that combines split learning with mutual learning.
- Applicable for traffic classification and compatible with model heterogeneity.
- Reduction of computational and storage overhead on the client side.
- research-articleNovember 2024
Enhancing IoT device security in Kubernetes: An approach adopted for network policies and the SARIK framework
- Jonathan G.P. dos Santos,
- Geraldo P. Rocha Filho,
- Rodolfo I. Meneguette,
- Rodrigo Bonacin,
- Gustavo Pessin,
- Vinícius P. Gonçalves
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.107485AbstractThe Internet of Things (IoT) has ushered in an era of connected devices that, while facilitating real-time data collection and sharing, also exposes these devices to significant security risks. This study addresses the challenges of security ...
Highlights- SARIK Framework: ”Introducing the SARIK Framework for Enhancing Kubernetes Cluster Security.”
- Experimentation Insights: ”In-Depth Analysis of Network Policy Effects in Kubernetes: Experimentation and Insights.”
- Latency Evaluation: ”...
- research-articleNovember 2024
Context aware clustering and meta-heuristic resource allocation for NB-IoT D2D devices in smart healthcare applications
- Nahar Sultana,
- Farhana Huq,
- Palash Roy,
- Md. Abdur Razzaque,
- Md. Mustafizur Rahman,
- Taiyeba Akter,
- Mohammad Mehedi Hassan
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.08.001AbstractThe utilization of Device-to-Device (D2D) communication among Narrowband Internet of Things (NB-IoT) devices offers significant potential for advancing intelligent healthcare systems due to its superior data rates, low power consumption, and ...
Highlights- Developed iRASH: a solution for smart healthcare using NB-IoT devices.
- Integrated D2D and NB-IoT to enhance coverage and connectivity.
- Ensured reliable healthcare data transmission and smart resource allocation.
- Integrated ...
- articleNovember 2024
A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platforms
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.051AbstractDrone swarms are increasingly being used for critical missions and need to be protected against malicious users. Intrusion Detection Systems (IDS) are used to analyze network traffic in order to detect possible threats. Modern IDSs rely on ...
Highlights- Random Forest models should be avoided when storage space is constrained.
- GPU reaches energy efficiency when its speedup is beyond a given threshold.
- IDS on FPGA offers the best energy/latency trade-off at the cost of an accuracy ...
- research-articleNovember 2024
IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.049AbstractWith the vigorous development of Internet technology, the scale of systems in the network has increased sharply, which provides a great opportunity for potential attacks, especially the Distributed Denial of Service (DDoS) attack. In this case, ...
Highlights- We propose a denoising algorithm based on IDTT, which solve the inefficiency of traditional TT decomposition through low-rank estimation and distributed computing.
- We propose a framework for DDoS attack detection by combining three ...
- research-articleNovember 2024
Deadline-constrained security-aware workflow scheduling in hybrid cloud architecture
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.044AbstractA hybrid cloud is an efficient solution to deal with the problem of insufficient resources of a private cloud when computing demands increase beyond its resource capacities. Cost-efficient workflow scheduling, considering security requirements ...
Highlights- Formulation of workflow scheduling as a mathematical programming model.
- Consideration of the deadline and security requirements.
- Formulation of data dependency among dependent tasks.
- Implement of the MILP model with the CPLEX ...
- research-articleNovember 2024
DIDS: A distributed inference framework with dynamic scheduling capability
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.037AbstractDistributed inference is a promising solution for deploying Deep Neural Network (DNN) applications in resource-constrained edge environments. However, due to the complexity and variability of edge scenarios, efficiently completing DNN inference ...
Highlights- Static inference cannot adapt to the dynamic changes in the edge environment.
- Two basic scheduling strategies: Re-Partition and Complete-Push.
- Dynamic Push is the proposed 3-stages runtime scheduler.
- DIDS achieves a noticeable ...
- research-articleNovember 2024
Energy-efficiency optimization for heterogeneous computing-assisted NOMA-MEC edge AI tasks
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.036AbstractEdge artificial intelligence (AI) is an emerging paradigm that leverages edge computing to pave the last-mile delivery of AI. To satisfy the increasing demand for high-performance computing and low latency of edge service, heterogeneous computing ...
- research-articleNovember 2024
DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.07.007AbstractThe Internet of Things (IoT) is composed of smart devices connected to a network that can send and receive large amounts of data with other devices, generating a lot of data for processing and analysis. Due to the fact that every transaction in ...
Highlights- A new type of IoT system architecture that meets the needs of complex information communication.
- Research on Double Chain Consensus Mechanism.
- Research new reputation value points to select the main node.
- Low communication ...
- research-articleNovember 2024
Speeding up the communications on a cluster using MPI by means of Software Defined Networks
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 614–624https://doi.org/10.1016/j.future.2024.07.047AbstractThe Open MPI library is widely employed for implementing the message-passing programming model on parallel applications running on distributed memory computer systems, such as large data centers. These applications aim to utilize the highest ...
Highlights- Software Defined Network environment integration into Open MPI library.
- Open MPI processes initialization time on Ethernet networks.
- Impact of communication time in Open MPI processes.
- Reduction of execution time in Open MPI ...
- editorialNovember 2024
Serverless computing in the cloud-to-edge continuum
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 514–517https://doi.org/10.1016/j.future.2024.07.043AbstractServerless computing is establishing itself as a way to efficiently run cloud applications while abstracting the underlying infrastructure complexity away from application developers. At the same time, edge computing provides cloud-like ...
- research-articleNovember 2024
ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 559–571https://doi.org/10.1016/j.future.2024.07.040AbstractAttribute-based encryption that supports computation outsourcing has been a promising approach to implement fine-grained access control in the Internet of Things (IoT). However, existing outsourcing schemes only focus on minimizing computation on ...
Highlights- An outsourced CP-ABE scheme optimized for efficiency via decryption result reuse.
- Named Data Networking for streamlined decryption result caching and reuse.
- Mechanisms to ensure feasible and secure reuse of outsourcing decryption ...
- research-articleNovember 2024
IoT-driven blockchain to manage the healthcare supply chain and protect medical records
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 415–431https://doi.org/10.1016/j.future.2024.07.039AbstractHealthcare supply chain domain and medical records’ management face numerous challenges that come with new demands, such as customer dissatisfaction, rising healthcare costs, tracking and traceability of drugs, and security and privacy related to ...
Highlights- IoT blockchain architecture for preventing access violations in health supply chain.
- Blockchain combined with IoT offers a reliable way to protect medical data.
- Hyperledger Fabric protects sensitive data in a P2P distributed and ...
- research-articleNovember 2024
MURE: Multi-layer real-time livestock management architecture with unmanned aerial vehicles using deep reinforcement learning
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 454–466https://doi.org/10.1016/j.future.2024.07.038AbstractIn recent years, the combination of unmanned aerial vehicles (UAVs) and wireless sensor networks (WSNs) has gained popularity in livestock management (LM) due to energy constraints and network instability. Limited energy storage of sensor nodes (...
Highlights- Dividing UAVs functionally boosts efficiency through increased parallelism.
- Dynamic optimization leads to significant performance gains when considering livestock movement.
- Outperformed GPSO, MCFO, and RRT in efficiency and ...