Skip Content
You are currently on the new version of our website. Access the old version .

Most Recent

  • Article
  • Open Access
164 Views
20 Pages

Round-Trip Time Estimation Using Enhanced Regularized Extreme Learning Machine

  • Hassan Rizky Putra Sailellah,
  • Hilal Hudan Nuha and
  • Aji Gautama Putrada

29 January 2026

Reliable Internet connectivity is essential for latency-sensitive services such as video conferencing, media streaming, and online gaming. Round-trip time (RTT) is a key indicator of network performance and is central to setting retransmission timeou...

  • Article
  • Open Access
131 Views
53 Pages

29 January 2026

Network operators increasingly rely on abstracted telemetry (e.g., flow records and time-aggregated statistics) to achieve scalable monitoring of high-speed networks, but this abstraction fundamentally constrains the forensic and security inferences...

  • Article
  • Open Access
290 Views
22 Pages

14 January 2026

In recent years, with the improvement of unmanned aerial vehicle (UAV) performance, various applications have been explored. In environments such as disaster areas, where existing infrastructure may be damaged, alternative uplink communication for tr...

  • Article
  • Open Access
285 Views
30 Pages

Securing IoT Networks Using Machine Learning-Resistant Physical Unclonable Functions (PUFs) on Edge Devices

  • Abdul Manan Sheikh,
  • Md. Rafiqul Islam,
  • Mohamed Hadi Habaebi,
  • Suriza Ahmad Zabidi,
  • Athaur Rahman bin Najeeb and
  • Mazhar Baloch

12 January 2026

The Internet of Things (IoT) has transformed global connectivity by linking people, smart devices, and data. However, as the number of connected devices continues to grow, ensuring secure data transmission and communication has become increasingly ch...

  • Article
  • Open Access
274 Views
25 Pages

Enhanced Wireless Sensor Network Lifetime Using EGWO-Optimized Neural Network Approach

  • Mohamad Nurkamal Fauzan,
  • Rendy Munadi,
  • Sony Sumaryo and
  • Hilal Hudan Nuha

4 January 2026

Efficient clustering is essential for reducing energy consumption and extending the operational lifetime of Wireless Sensor Networks. Classical protocols such as LEACH, PEGASIS, HEED, and EEHC frequently exhibit unbalanced energy usage, resulting in...

  • Article
  • Open Access
340 Views
16 Pages

31 December 2025

One of the main sources of entertainment is live video streaming platforms, which allow viewers to watch video streams in real time. However, because of the increasing demand for high quality content, the vulnerability of streaming systems against cy...

  • Article
  • Open Access
433 Views
26 Pages

Adaptive Real-Time Risk and Impact Assessment for 5G Network Security

  • Dionysia Varvarigou,
  • Kostas Lampropoulos,
  • Spyros Denazis and
  • Paris Kitsos

24 December 2025

The expansion of 5G networks has led to larger attack surfaces due to more applications and use cases, more IoT connections, and the distributed 5G system architecture. Existing security frameworks often lack the ability to perform real-time, context...

  • Review
  • Open Access
520 Views
34 Pages

24 December 2025

Underwater networks are crucial for monitoring the marine ecosystem, enabling data collection to support the preservation and protection of natural resources. Among the various technologies available, acoustic and optical communications stand out for...

  • Article
  • Open Access
303 Views
25 Pages

Authentication and Authorisation Method for a Cloud Side Static IoT Application

  • Jose Alvarez,
  • Matheus Santos,
  • David May and
  • Gerard Dooly

19 December 2025

IoT applications are increasingly common, yet they often rely on expensive, externally managed authentication services. This paper introduces a novel, self-contained authentication method for IoT applications which leverages fog computing principles...

  • Article
  • Open Access
518 Views
23 Pages

12 December 2025

Future programmable networks such as 5G/6G and large-scale IoT deployments demand dynamic and intelligent bandwidth control mechanisms to ensure stable Quality of Service (QoS) under highly variable traffic conditions. Conventional queue-based schedu...

  • Communication
  • Open Access
422 Views
8 Pages

Design and Performance Evaluation of HEPS Data Center Network

  • Shan Zeng,
  • Tao Cui,
  • Yanming Wang,
  • Mengyao Qi and
  • Fazhi Qi

5 December 2025

Among the 15 beamlines in the first phase of the High-Energy Photon Source (HEPS) in China, the maximum peak data generation volume can reach 1 PB per day, with the maximum peak data generation rate reaching 3.2 Tb/s. This poses significant challenge...

  • Article
  • Open Access
780 Views
31 Pages

Dynamic Multi-Objective Controller Placement in SD-WAN: A GMM-MARL Hybrid Framework

  • Abdulrahman M. Abdulghani,
  • Azizol Abdullah,
  • A. R. Rahiman,
  • Nor Asilah Wati Abdul Hamid and
  • Bilal Omar Akram

11 November 2025

Modern Software-Defined Wide Area Networks (SD-WANs) require adaptive controller placement addressing multi-objective optimization where latency minimization, load balancing, and fault tolerance must be simultaneously optimized. Traditional static ap...

  • Article
  • Open Access
663 Views
28 Pages

4 November 2025

Heterogeneous wireless sensor networks (HWSNs), comprising super nodes and normal sensors, offer a promising solution for monitoring diverse environments. However, their deployment is constrained by the limited battery life of sensors. To address thi...

  • Article
  • Open Access
1,396 Views
27 Pages

Real-Time Handover in LEO Satellite Networks via Markov Chain-Guided Simulated Annealing

  • Mohammad A. Massad,
  • Abdallah Y. Alma’aitah and
  • Hossam S. Hassanein

3 November 2025

This paper presents a real-time handover and link assignment framework for low-Earth-orbit (LEO) satellite networks operating in dense urban canyons. The proposed Markov chain-guided simulated annealing (MCSA) algorithm optimizes user-to-satellite as...

  • Article
  • Open Access
565 Views
14 Pages

30 October 2025

Orbital angular momentum (OAM) beams exhibit divergence during transmission, which constrains the capacity of communication system channels. To address these challenges, intelligent reflecting surfaces (IRSs), which can independently manipulate incid...

  • Article
  • Open Access
1 Citations
1,291 Views
15 Pages

Adaptive Context-Aware VANET Routing Protocol for Intelligent Transportation Systems

  • Abdul Karim Kazi,
  • Muhammad Umer Farooq,
  • Raheela Asif and
  • Saman Hina

27 October 2025

Vehicular Ad-Hoc Networks (VANETs) play a critical role in Intelligent Transportation Systems (ITS), enabling communication between vehicles and roadside infrastructure. This paper proposes an Adaptive Context-Aware VANET Routing (ACAVR) protocol des...

  • Article
  • Open Access
796 Views
26 Pages

A Game-Theoretic Analysis of Cooperation Among Autonomous Systems in Network Federations

  • Rudolf Kovacs,
  • Bogdan Iancu,
  • Vasile Dadarlat and
  • Adrian Peculea

15 October 2025

This paper investigates cooperative behavior among Autonomous Systems (ASs) within a federated network environment designed to support collaborative shared-technology deployment. It makes use of the concept of an AS federation, where independently ma...

  • Article
  • Open Access
1 Citations
751 Views
15 Pages

9 October 2025

As network automation and self-organizing networks (SONs) rapidly evolve, edge devices increasingly demand lightweight, real-time, and high-precision classification algorithms to support critical tasks such as traffic identification, intrusion detect...

  • Article
  • Open Access
1,338 Views
23 Pages

7 October 2025

Elastic optical networks (EONs) must allocate resources dynamically to accommodate heterogeneous, high-bandwidth demands. However, the continuous setup and teardown of connections with different bit rates can fragment the spectrum and lead to blockin...

  • Article
  • Open Access
1,206 Views
18 Pages

Optimized Hybrid Ensemble Intrusion Detection for VANET-Based Autonomous Vehicle Security

  • Ahmad Aloqaily,
  • Emad E. Abdallah,
  • Aladdin Baarah,
  • Mohammad Alnabhan,
  • Esra’a Alshdaifat and
  • Hind Milhem

3 October 2025

Connected and Autonomous Vehicles are promising for advancing traffic safety and efficiency. However, the increased connectivity makes these vehicles vulnerable to a broad array of cyber threats. This paper presents a novel hybrid approach for intrus...

  • Article
  • Open Access
1,094 Views
29 Pages

25 September 2025

As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the us...

  • Article
  • Open Access
2 Citations
1,126 Views
37 Pages

17 September 2025

The successful integration of Terrestrial and Non-Terrestrial Networks (T/NTNs) in 6G is poised to revolutionize demanding domains like Earth Observation (EO) and Intelligent Transportation Systems (ITSs). Still, it requires Distributed Machine Learn...

  • Article
  • Open Access
722 Views
22 Pages

17 September 2025

The Internet of Things allows us to implement concepts such as Education 4.0 by connecting sensors, actuators, and applications. In the case of direct and explicit connections, we refer to ensembles that can consist of devices and applications. When...

  • Article
  • Open Access
3,237 Views
20 Pages

16 September 2025

The rapid expansion of communication networks and increasingly complex service demands have presented significant challenges to the intelligent management of network resources. To address these challenges, we have proposed a network self-optimization...

  • Review
  • Open Access
1,220 Views
15 Pages

Hybrid NFC-VLC Systems: Integration Strategies, Applications, and Future Directions

  • Vindula L. Jayaweera,
  • Chamodi Peiris,
  • Dhanushika Darshani,
  • Sampath Edirisinghe,
  • Nishan Dharmaweera and
  • Uditha Wijewardhana

15 September 2025

The hybridization of Near-Field Communication (NFC) with Visible Light Communication (VLC) presents a promising framework for robust, secure, and efficient wireless transmission. By combining proximity-based authentication of NFC with high-speed and...

  • Article
  • Open Access
1 Citations
2,386 Views
22 Pages

10 September 2025

In this paper, we introduce a novel, self-hosted Syslog collection platform designed specifically to address the challenges that small and medium enterprises (SMEs) face in implementing comprehensive syslog monitoring solutions. Our analysis begins w...

  • Article
  • Open Access
1 Citations
976 Views
20 Pages

3 September 2025

Cascading link failures continue to imperil power grids, transport networks, and cyber-physical systems, yet the relationship between a network’s robustness at the moment of attack and its subsequent resiliency remains poorly understood. We int...

  • Review
  • Open Access
3 Citations
9,922 Views
40 Pages

26 August 2025

Blockchain’s decentralized, immutable, and transparent nature offers a promising solution to enhance security, trust, and efficiency in supply chains. While integrating blockchain into the SCM process poses significant challenges, including tec...

  • Article
  • Open Access
1,332 Views
11 Pages

25 August 2025

This paper presents a long-range experimental demonstration of multi-mode multiple-input multiple-output (MIMO) transmission using orbital angular momentum (OAM) waves for Line-of-Sight (LoS) wireless backhaul applications. A 4 × 4 MIMO system...

  • Review
  • Open Access
5,921 Views
21 Pages

20 August 2025

Nowadays, internet connectivity suffers from instability and slowness due to optical fiber cable attacks across the seas and oceans. The optimal solution to this problem is using the Low Earth Orbit (LEO) satellite network, which can resolve the prob...

  • Article
  • Open Access
1,156 Views
28 Pages

13 August 2025

Cloud computing has increasingly adopted multi-tenant infrastructures to enhance cost efficiency and resource utilization by enabling the shared use of computational resources. However, this shared model introduces several security and privacy concer...

  • Article
  • Open Access
5,305 Views
13 Pages

Encrypted Client Hello Is Coming: A View from Passive Measurements

  • Gabriele Merlach,
  • Martino Trevisan and
  • Danilo Giordano

8 August 2025

The Encrypted Client Hello (ECH) extension to Transport Layer Security (TLS) and the new type of Domain Name System (DNS) records called HTTPS represent the latest efforts to improve user privacy by encrypting the server’s domain name during th...

  • Article
  • Open Access
1 Citations
1,105 Views
24 Pages

5 August 2025

Critical Internet of Things (IoT) data in Fifth Generation Vehicular Ad Hoc Networks (5G VANETs) demands Ultra-Reliable Low-Latency Communication (URLLC) to support mission-critical vehicular applications such as autonomous driving and collision avoi...

  • Article
  • Open Access
702 Views
15 Pages

A Novel Cloud Energy Consumption Heuristic Based on a Network Slicing–Ring Fencing Ratio

  • Vinay Sriram Iyer,
  • Yasantha Samarawickrama and
  • Giovani Estrada

25 July 2025

The widespread adoption of cloud computing has amplified the demand for electric power. It is strategically important to address the limitations of reliable sources and sustainability of power. Research and investment in data centres and power infras...

  • Article
  • Open Access
2 Citations
1,036 Views
23 Pages

24 July 2025

Wireless Sensor Networks (WSNs) are specialised ad hoc networks composed of small, low-power, and often battery-operated sensor nodes with various sensors and wireless communication capabilities. These nodes collaborate to monitor and collect data fr...

  • Article
  • Open Access
3 Citations
3,344 Views
23 Pages

18 July 2025

The evolution of 3GPP non-terrestrial networks (NTNs) is enabling new avenues for broadband connectivity via satellite, especially within the scope of 5G. The parallel rise in satellite mega-constellations has further fueled efforts toward ubiquitous...

  • Systematic Review
  • Open Access
2,113 Views
22 Pages

IoT Applications in Agriculture and Environment: A Systematic Review Based on Bibliometric Study in West Africa

  • Michel Dossou,
  • Steaven Chédé,
  • Anne-Carole Honfoga,
  • Marianne Balogoun,
  • Péniel Dassi and
  • François Rottenberg

The Internet of Things (IoT) is an upcoming technology that is increasingly being used for monitoring and analysing environmental parameters and supports the progress of farm machinery. Agriculture is the main source of living for many people, includ...

  • Article
  • Open Access
1 Citations
1,192 Views
13 Pages

In this study, to address the problems of high feedback latency and redundant codebook traversal in traditional Reconfigurable Intelligent Surface (RIS) beam tracking systems, two novel experimental schemes are proposed: the Edge-Integrated RIS Contr...

  • Article
  • Open Access
1 Citations
2,379 Views
28 Pages

A Performance Evaluation for Software Defined Networks with P4

  • Omesh A. Fernando,
  • Hannan Xiao,
  • Joseph Spring and
  • Xianhui Che

11 June 2025

The exponential growth in the number of devices connected via the internet has led to the need to achieve granular programmability for increased performance, resilience, reduced latency, and jitter. Software Defined Networking (SDN) and Programming P...

  • Article
  • Open Access
4 Citations
3,482 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
2 Citations
1,208 Views
34 Pages

Cloud computing has witnessed rapid growth and notable technological progress in recent years. Nevertheless, it is still regarded as being in its early developmental phase, with substantial potential remaining to be explored—particularly throug...

  • Article
  • Open Access
743 Views
12 Pages

As optical networks operate using light-based transmission, assigning wavelengths to the paths taken by traffic demands is a key aspect of their design. This paper revisits the wavelength assignment problem in optical backbone networks, focusing on s...

  • Article
  • Open Access
4 Citations
3,986 Views
24 Pages

Cloud computing faces growing challenges in energy consumption due to the increasing demand for services and resource usage in data centers. To address this issue, we propose a novel energy-efficient virtual machine (VM) placement strategy that integ...

  • Review
  • Open Access
6 Citations
6,138 Views
28 Pages

A Survey on Software Defined Network-Enabled Edge Cloud Networks: Challenges and Future Research Directions

  • Baha Uddin Kazi,
  • Md Kawsarul Islam,
  • Muhammad Mahmudul Haque Siddiqui and
  • Muhammad Jaseemuddin

The explosion of connected devices and data transmission in the Internet of Things (IoT) era brings substantial burden on the capability of cloud computing. Moreover, these IoT devices are mostly positioned at the edge of a network and limited in res...

  • Article
  • Open Access
1 Citations
2,186 Views
29 Pages

Evaluation of TOPSIS Algorithm for Multi-Criteria Handover in LEO Satellite Networks: A Sensitivity Analysis

  • Pascal Buhinyori Ngango,
  • Marie-Line Lufua Binda,
  • Michel Matalatala Tamasala,
  • Pierre Sedi Nzakuna,
  • Vincenzo Paciello and
  • Angelo Kuti Lusala

The Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is widely recognized as an effective multi-criteria decision-making algorithm for handover management in terrestrial cellular networks, especially in scenarios involving dyna...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Network - ISSN 2673-8732