Skip Content
You are currently on the new version of our website. Access the old version .

Most Viewed

  • Review
  • Open Access
60 Citations
40,102 Views
29 Pages

12 September 2023

The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions. This research provides greater knowledge of the various fra...

  • Review
  • Open Access
33 Citations
15,295 Views
45 Pages

6 January 2025

Artificial intelligence (AI) transforms communication networks by enabling more efficient data management, enhanced security, and optimized performance across diverse environments, from dense urban 5G/6G networks to expansive IoT and cloud-based syst...

  • Review
  • Open Access
37 Citations
12,587 Views
29 Pages

Recent Development of Emerging Indoor Wireless Networks towards 6G

  • Sampath Edirisinghe,
  • Orga Galagedarage,
  • Imali Dias and
  • Chathurika Ranaweera

12 May 2023

Sixth-generation (6G) mobile technology is currently under development, and is envisioned to fulfill the requirements of a fully connected world, providing ubiquitous wireless connectivity for diverse users and emerging applications. Transformative s...

  • Review
  • Open Access
40 Citations
11,987 Views
79 Pages

A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges

  • Patikiri Arachchige Don Shehan Nilmantha Wijesekara and
  • Subodha Gunawardena

30 August 2023

Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the generation of knowledge, typically using machine learning techniques, and the dissemination of knowledge, in order to make knowledge-driven intelligent network decis...

  • Article
  • Open Access
9 Citations
10,405 Views
17 Pages

Blockchain-Based E-Voting Mechanisms: A Survey and a Proposal

  • Matthew Sharp,
  • Laurent Njilla,
  • Chin-Tser Huang and
  • Tieming Geng

26 September 2024

Advancements in blockchain technology and network technology are bringing in a new era in electronic voting systems. These systems are characterized by enhanced security, efficiency, and accessibility. In this paper, we compose a comparative analysis...

  • Review
  • Open Access
3 Citations
9,922 Views
40 Pages

26 August 2025

Blockchain’s decentralized, immutable, and transparent nature offers a promising solution to enhance security, trust, and efficiency in supply chains. While integrating blockchain into the SCM process poses significant challenges, including tec...

  • Review
  • Open Access
8 Citations
7,509 Views
22 Pages

29 November 2024

High-precision indoor positioning is essential for various applications, such as the Internet of Things, robotics, and smart manufacturing, requiring accuracy better than 1 m. Conventional indoor positioning methods, like Wi-Fi or Bluetooth fingerpri...

  • Feature Paper
  • Article
  • Open Access
9 Citations
6,527 Views
23 Pages

21 December 2024

This paper presents the development of an advanced battery management system (BMS) for electric vehicles (EVs), designed to enhance battery performance, safety, and longevity. Central to the BMS is its precise monitoring of critical parameters, inclu...

  • Review
  • Open Access
6 Citations
6,138 Views
28 Pages

A Survey on Software Defined Network-Enabled Edge Cloud Networks: Challenges and Future Research Directions

  • Baha Uddin Kazi,
  • Md Kawsarul Islam,
  • Muhammad Mahmudul Haque Siddiqui and
  • Muhammad Jaseemuddin

The explosion of connected devices and data transmission in the Internet of Things (IoT) era brings substantial burden on the capability of cloud computing. Moreover, these IoT devices are mostly positioned at the edge of a network and limited in res...

  • Article
  • Open Access
6 Citations
6,008 Views
23 Pages

11 February 2024

An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analyzed and triaged by...

  • Review
  • Open Access
5,921 Views
21 Pages

20 August 2025

Nowadays, internet connectivity suffers from instability and slowness due to optical fiber cable attacks across the seas and oceans. The optimal solution to this problem is using the Low Earth Orbit (LEO) satellite network, which can resolve the prob...

  • Article
  • Open Access
2 Citations
5,909 Views
21 Pages

Localization of a BLE Device Based on Single-Device RSSI and DOA Measurements

  • Harsha Kandula,
  • Veena Chidurala,
  • Yuan Cao and
  • Xinrong Li

21 May 2024

Indoor location services often use Bluetooth low energy (BLE) devices for their low energy consumption and easy implementation. Applications like device monitoring, ranging, and asset tracking utilize the received signal strength (RSS) of the BLE sig...

  • Review
  • Open Access
6 Citations
5,734 Views
22 Pages

Maritime Communications—Current State and the Future Potential with SDN and SDR

  • Nadia Niknami,
  • Avinash Srinivasan,
  • Ken St. Germain and
  • Jie Wu

14 December 2023

The rise of the Internet of Things (IoT) has opened up exciting possibilities for new applications. One such novel application is the modernization of maritime communications. Effective maritime communication is vital for ensuring the safety of crew...

  • Review
  • Open Access
10 Citations
5,610 Views
23 Pages

1 July 2024

Delay and Disruption Tolerant Networking (DTN) is a network architecture created basically to overcome non-continuing connectivity. There has been a great deal of research on this topic, from space communication to terrestrial applications. Since the...

  • Article
  • Open Access
5,305 Views
13 Pages

Encrypted Client Hello Is Coming: A View from Passive Measurements

  • Gabriele Merlach,
  • Martino Trevisan and
  • Danilo Giordano

8 August 2025

The Encrypted Client Hello (ECH) extension to Transport Layer Security (TLS) and the new type of Domain Name System (DNS) records called HTTPS represent the latest efforts to improve user privacy by encrypting the server’s domain name during th...

  • Article
  • Open Access
10 Citations
4,875 Views
21 Pages

SDN-Based Routing Framework for Elephant and Mice Flows Using Unsupervised Machine Learning

  • Muna Al-Saadi,
  • Asiya Khan,
  • Vasilios Kelefouras,
  • David J. Walker and
  • Bushra Al-Saadi

2 March 2023

Software-defined networks (SDNs) have the capabilities of controlling the efficient movement of data flows through a network to fulfill sufficient flow management and effective usage of network resources. Currently, most data center networks (DCNs) s...

  • Feature Paper
  • Article
  • Open Access
11 Citations
4,806 Views
17 Pages

9 April 2024

Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording...

  • Article
  • Open Access
36 Citations
4,723 Views
25 Pages

Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment

  • Mohamed Ali Setitra,
  • Mingyu Fan,
  • Bless Lord Y. Agbley and
  • Zine El Abidine Bensalem

1 December 2023

In the contemporary landscape, Distributed Denial of Service (DDoS) attacks have emerged as an exceedingly pernicious threat, particularly in the context of network management centered around technologies like Software-Defined Networking (SDN). With...

  • Article
  • Open Access
4 Citations
4,664 Views
23 Pages

1 March 2024

Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how import...

  • Article
  • Open Access
3 Citations
4,627 Views
15 Pages

26 January 2024

With the ever-increasing advancement in blockchain technology, security is a significant concern when substantial investments are involved. This paper explores known smart contract exploits used in previous and current years. The purpose of this rese...

  • Article
  • Open Access
1 Citations
4,507 Views
14 Pages

4 April 2023

In recent years, Internet traffic has increased due to its widespread use. This can be attributed to the growth of social games on smartphones and video distribution services with increasingly high image quality. In these situations, a routing mechan...

  • Review
  • Open Access
9 Citations
4,336 Views
32 Pages

15 January 2024

Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, heal...

  • Article
  • Open Access
4 Citations
4,236 Views
28 Pages

Arithmetic Study about Efficiency in Network Topologies for Data Centers

  • Pedro Juan Roig,
  • Salvador Alcaraz,
  • Katja Gilly,
  • Cristina Bernad and
  • Carlos Juiz

26 June 2023

Data centers are getting more and more attention due the rapid increase of IoT deployments, which may result in the implementation of smaller facilities being closer to the end users as well as larger facilities up in the cloud. In this paper, an ari...

  • Article
  • Open Access
4 Citations
3,986 Views
24 Pages

Cloud computing faces growing challenges in energy consumption due to the increasing demand for services and resource usage in data centers. To address this issue, we propose a novel energy-efficient virtual machine (VM) placement strategy that integ...

  • Article
  • Open Access
10 Citations
3,813 Views
19 Pages

9 February 2023

In the area of low-power wireless networks, one technology that many researchers are focusing on relates to positioning methods such as fingerprinting in densely populated urban areas. This work presents an experimental study aimed at quantifying mea...

  • Article
  • Open Access
2 Citations
3,783 Views
14 Pages

6 September 2024

Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which...

  • Article
  • Open Access
3,575 Views
10 Pages

1 October 2024

It is well known that simulation tools are essential for the design and optimization of wireless communication systems. This paper proposes a Python script that can be used for planning and predicting a connection link budget by analyzing its basic p...

  • Article
  • Open Access
2 Citations
3,555 Views
18 Pages

18 September 2023

New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such...

  • Article
  • Open Access
3,554 Views
20 Pages

Network Tower Sharing Analysis in Greece: A Structure–Conduct–Performance Approach

  • Vasileios Argyroulis,
  • Antonios Kargas and
  • Dimitris Varoutas

20 February 2025

The paper intends to contribute to readers’ comprehension of the Greek telecommunications market, focusing on the strategic decisions associated with network tower-sharing analysis in Greece. The Greek telecommunications industry is described f...

  • Article
  • Open Access
5 Citations
3,546 Views
35 Pages

19 July 2024

Persistent security challenges in Industry 4.0 due to the limited resources of IoT devices necessitate innovative solutions. Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enh...

  • Article
  • Open Access
4 Citations
3,482 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
3 Citations
3,344 Views
23 Pages

18 July 2025

The evolution of 3GPP non-terrestrial networks (NTNs) is enabling new avenues for broadband connectivity via satellite, especially within the scope of 5G. The parallel rise in satellite mega-constellations has further fueled efforts toward ubiquitous...

  • Article
  • Open Access
4 Citations
3,309 Views
25 Pages

17 February 2025

Machine learning (ML) promises advances in automation and threat detection for the future generations of communication networks. However, new threats are introduced, as adversaries target ML systems with malicious data. Adversarial attacks on tree-ba...

  • Article
  • Open Access
5 Citations
3,243 Views
15 Pages

23 October 2024

This paper presents an advanced framework for securing 6G communication by integrating deep learning and physical layer security (PLS). The proposed model incorporates multi-stage detection mechanisms to enhance security against various attacks on th...

  • Article
  • Open Access
3,237 Views
20 Pages

16 September 2025

The rapid expansion of communication networks and increasingly complex service demands have presented significant challenges to the intelligent management of network resources. To address these challenges, we have proposed a network self-optimization...

  • Review
  • Open Access
2 Citations
3,236 Views
29 Pages

14 April 2025

Information-centric networking (ICN) is a promising approach to address the limitations of current host-centric IP-based networking. ICN models feature ubiquitous in-network caching to provide faster and more reliable content delivery, name-based rou...

  • Feature Paper
  • Article
  • Open Access
8 Citations
3,211 Views
20 Pages

Survey for Soil Sensing with IOT and Traditional Systems

  • Juexing Wang,
  • Xiao Zhang,
  • Li Xiao and
  • Tianxing Li

8 October 2023

Smart Agriculture has gained significant attention in recent years due to its benefits for both humans and the environment. However, the high costs associated with commercial devices have prevented some agricultural lands from reaping the advantages...

  • Article
  • Open Access
5 Citations
3,132 Views
24 Pages

10 January 2025

In a global context where reducing the carbon footprint has become an urgent necessity, this article presents a hybrid CNN-LSTM prediction model to estimate CO2 emission rates of Paris road traffic using spatio-temporal data. Our hybrid prediction mo...

  • Review
  • Open Access
8 Citations
3,123 Views
40 Pages

21 April 2025

The integration of Internet of Things (IoT) technology into the agricultural sector enables the collection and analysis of large amounts of data, facilitating greater control over internal processes, resulting in cost reduction and improved quality o...

  • Article
  • Open Access
5 Citations
2,953 Views
16 Pages

16 November 2023

With the expansion of the digital world, the number of Internet of things (IoT) devices is evolving dramatically. IoT devices have limited computational power and a small memory. Consequently, existing and complex security methods are not suitable to...

  • Article
  • Open Access
7 Citations
2,880 Views
25 Pages

23 April 2024

Fault tolerance is a critical aspect for any wireless sensor network (WSN), which can be defined in plain terms as the quality of being dependable or performing consistently well. In other words, it may be described as the effectiveness of fault tole...

  • Article
  • Open Access
2 Citations
2,762 Views
29 Pages

14 August 2024

The majority of local IPv6 networks continue to remain insecure and vulnerable to neighbor spoofing attacks. The Secure Neighbor Discovery (SEND) standard and its concomitant Cryptographically Generated Addressing (CGA) scheme were accepted by large...

  • Article
  • Open Access
7 Citations
2,742 Views
18 Pages

A User Location Reset Method through Object Recognition in Indoor Navigation System Using Unity and a Smartphone (INSUS)

  • Evianita Dewi Fajrianti,
  • Yohanes Yohanie Fridelin Panduman,
  • Nobuo Funabiki,
  • Amma Liesvarastranta Haz,
  • Komang Candra Brata and
  • Sritrusta Sukaridhoto

22 July 2024

To enhance user experiences of reaching destinations in large, complex buildings, we have developed a indoor navigation system using Unity and a smartphone called INSUS. It can reset the user location using a quick response (QR) code to reduce the lo...

  • Article
  • Open Access
3 Citations
2,665 Views
25 Pages

6 November 2024

Edge computing has emerged as a critical technology for meeting the needs of latency-sensitive applications and reducing network congestion. This goal is achieved mainly by distributing computational resources closer to end users and away from tradit...

  • Article
  • Open Access
1 Citations
2,573 Views
29 Pages

Bounce: A High Performance Satellite-Based Blockchain System

  • Xiaoteng Liu,
  • Taegyun Kim and
  • Dennis E. Shasha

31 March 2025

Blockchains are designed to produce a secure, append-only sequence of transactions. Establishing transaction sequentiality is typically achieved by underlying consensus protocols that either prevent forks entirely (no-forking-ever) or make forks shor...

  • Article
  • Open Access
1 Citations
2,561 Views
20 Pages

1 November 2023

Information-Centric Networking (ICN) is a new paradigm of network architecture that focuses on content rather than hosts as first-class citizens of the network. As part of these architectures, in-network storage devices are essential to provide end u...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Network - ISSN 2673-8732