Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (789)

Search Parameters:
Keywords = traffic packet

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
55 pages, 3089 KB  
Review
A Survey on Green Wireless Sensing: Energy-Efficient Sensing via WiFi CSI and Lightweight Learning
by Rod Koo, Xihao Liang, Deepak Mishra and Aruna Seneviratne
Energies 2026, 19(2), 573; https://doi.org/10.3390/en19020573 - 22 Jan 2026
Viewed by 29
Abstract
Conventional sensing expends energy at three stages: powering dedicated sensors, transmitting measurements, and executing computationally intensive inference. Wireless sensing re-purposes WiFi channel state information (CSI) inherent in every packet, eliminating extra sensors and uplink traffic, though reliance on deep neural networks (DNNs) often [...] Read more.
Conventional sensing expends energy at three stages: powering dedicated sensors, transmitting measurements, and executing computationally intensive inference. Wireless sensing re-purposes WiFi channel state information (CSI) inherent in every packet, eliminating extra sensors and uplink traffic, though reliance on deep neural networks (DNNs) often trained and run on graphics processing units (GPUs) can negate these gains. This review highlights two core energy efficiency levers in CSI-based wireless sensing. First ambient CSI harvesting cuts power use by an order of magnitude compared to radar and active Internet of Things (IoT) sensors. Second, integrated sensing and communication (ISAC) embeds sensing functionality into existing WiFi links, thereby reducing device count, battery waste, and carbon impact. We review conventional handcrafted and accuracy-first methods to set the stage for surveying green learning strategies and lightweight learning techniques, including compact hybrid neural architectures, pruning, knowledge distillation, quantisation, and semi-supervised training that preserve accuracy while reducing model size and memory footprint. We also discuss hardware co-design from low-power microcontrollers to edge application-specific integrated circuits (ASICs) and WiFi firmware extensions that align computation with platform constraints. Finally, we identify open challenges in domain-robust compression, multi-antenna calibration, energy-proportionate model scaling, and standardised joules per inference metrics. Our aim is a practical battery-friendly wireless sensing stack ready for smart home and 6G era deployments. Full article
Show Figures

Graphical abstract

22 pages, 2627 KB  
Article
FANET Routing Protocol for Prioritizing Data Transmission to the Ground Station
by Kaoru Takabatake and Tomofumi Matsuzawa
Network 2026, 6(1), 7; https://doi.org/10.3390/network6010007 - 14 Jan 2026
Viewed by 181
Abstract
In recent years, with the improvement of unmanned aerial vehicle (UAV) performance, various applications have been explored. In environments such as disaster areas, where existing infrastructure may be damaged, alternative uplink communication for transmitting observation data from UAVs to the ground station (GS) [...] Read more.
In recent years, with the improvement of unmanned aerial vehicle (UAV) performance, various applications have been explored. In environments such as disaster areas, where existing infrastructure may be damaged, alternative uplink communication for transmitting observation data from UAVs to the ground station (GS) is critical. However, conventional mobile ad hoc network (MANET) routing protocols do not sufficiently account for GS-oriented traffic or the highly mobile UAV topology. This study proposed a flying ad hoc network (FANET) routing protocol that introduces a control option called GS flood, where the GS periodically disseminates routing information, enabling each UAV to efficiently acquire fresh source routes to the GS. Evaluation using NS-3 in a disaster scenario confirmed that the proposed method achieves a higher packet delivery ratio and practical latency compared to the representative MANET routing protocols, namely DSR, AODV, and OLSR, while operating with fewer control IP packets than existing methods. Furthermore, although the multihop throughput between UAVs and the GS in the proposed method plateaued at approximately 40% of the physical-layer maximum, it demonstrated performance exceeding realistic satellite uplink capacities ranging from several hundred kbps to several Mbps. Full article
Show Figures

Figure 1

28 pages, 5948 KB  
Article
Probability-Based Forwarding Scheme with Boundary Optimization for C-V2X Multi-Hop Communication
by Zhonghui Pei, Long Xie, Jingbin Lu, Liyuan Zheng and Huiheng Liu
Sensors 2026, 26(1), 350; https://doi.org/10.3390/s26010350 - 5 Jan 2026
Viewed by 314
Abstract
The Internet of Vehicles (IoV) can transmit the status information of vehicles and roads through single-hop or multi-hop broadcast communication, which is a key technology for building intelligent transportation systems and enhancing road safety. However, in dense traffic environments, broadcasting Emergency messages via [...] Read more.
The Internet of Vehicles (IoV) can transmit the status information of vehicles and roads through single-hop or multi-hop broadcast communication, which is a key technology for building intelligent transportation systems and enhancing road safety. However, in dense traffic environments, broadcasting Emergency messages via vehicles can easily trigger massive forwarding redundancy, leading to channel resource selection conflicts between vehicles and affecting the reliability of inter-vehicle communication. This paper analyzes the forwarding near the single-hop transmission radius boundary of the sending node in a probability-based inter-vehicle multi-hop forwarding scheme, pointing out the existence of the boundary forwarding redundancy problem. To address this problem, this paper proposes two probability-based schemes with boundary optimization: (1) By optimizing the forwarding probability distribution outside the transmission radius boundary of the sending node, the forwarding nodes outside the boundary can be effectively utilized while effectively reducing the forwarding redundancy they bring. (2) Additional forwarding backoff timers are allocated to nodes outside the transmission radius boundary of the sending node based on the distance to further reduce the forwarding redundancy outside the boundary. Experimental results show that, compared with the reference schemes without boundary forwarding probability optimization, the proposed schemes significantly reduce forwarding redundancy of Emergency messages while maintaining good single-hop and multi-hop transmission performance. When the reference transmission radius is 300 m and the vehicle density is 0.18 veh/m, compared with the probability-based forwarding scheme without boundary optimization, the proposed schemes (1) and (2) improve the single-hop packet delivery ratio by an average of about 5.41% and 11.83% and reduce the multi-hop forwarding ratio by about 18.07% and 36.07%, respectively. Full article
(This article belongs to the Special Issue Vehicle-to-Everything (V2X) Communication Networks 2024–2025)
Show Figures

Graphical abstract

19 pages, 3255 KB  
Article
AgentRed: Towards an Agent-Based Approach to Automated Network Attack Traffic Generation
by Koffi Anderson Koffi, Kyle Lucke, Elijah Danquah Darko, Tollan Berhanu, Robert Angelo Borrelli and Constantinos Kolias
Algorithms 2026, 19(1), 43; https://doi.org/10.3390/a19010043 - 4 Jan 2026
Viewed by 219
Abstract
Network security tools are indispensable in testing and evaluating the security of computer networks. Existing tools, such as Hping3, however, offer a limited set of options and attack-specific configurations, which restrict their use solely to well-known attack patterns. Although highly parameterizable libraries, such [...] Read more.
Network security tools are indispensable in testing and evaluating the security of computer networks. Existing tools, such as Hping3, however, offer a limited set of options and attack-specific configurations, which restrict their use solely to well-known attack patterns. Although highly parameterizable libraries, such as Scapy, provide more options and scripting capabilities, they require extensive manual setup and often a steep learning curve. The development of powerful AI models, capitalizing on the transformer architecture, has enabled cybersecurity researchers to develop or incorporate these models into existing cyber-defense systems and red-team assessments. Prominent models such as NetGPT, TrafficFormer, and TrafficGPT can be effective, but require extensive computational resources for fine-tuning and a complex setup to adapt to proprietary networking environments and protocols. In this work, we propose AgentRed, a lightweight tool for generating network attack traffic with minimal human configuration and setup. Our tool integrates an AI agent and a large language model with fewer than a billion parameters into the network traffic generation process. Our method creates lightweight Low-Rank Adaptation (LoRA) adapters that can learn specific traffic patterns in a particular network environment. Our agent can autonomously train the LoRA adapters, search online documentation for attack patterns and parameters, and select appropriate adapters to generate network traffic specific to the user’s needs. It utilizes the LoRA adapters to create an intermediate traffic representation that can be parsed and executed by tools such as Scapy to generate malicious traffic in a virtualized test environment. We assess the performance of the proposed approach on six popular network attacks, including flooding attacks, Smurf, Ping-of-Death, and normal ICMP ping traffic. Our results validate the ability of the proposed tool to efficiently generate network packets with 97.9% accuracy using the LoRA adapters, compared to 95.4% accuracy using the base pre-trained Qwen3 0.6B model. When the AI agent performs online searches to enrich the LoRA adapters’ context during traffic generation, our method maintains an accuracy of 96.0% across all tested traffic patterns. Full article
Show Figures

Figure 1

67 pages, 7998 KB  
Article
Neural Network Method for Detecting UDP Flood Attacks in Critical Infrastructure Microgrid Protection Systems with Law Enforcement Agencies’ Rapid Response
by Serhii Vladov, Łukasz Ścisło, Anatoliy Sachenko, Jan Krupiński, Victoria Vysotska, Maksym Korniienko, Oleh Uhrovetskyi, Vyacheslav Krykun, Kateryna Levchenko and Alina Sachenko
Energies 2026, 19(1), 209; https://doi.org/10.3390/en19010209 - 30 Dec 2025
Viewed by 336
Abstract
This article develops a hybrid neural network method for detecting UDP flooding in critical infrastructure microgrid protection systems. This method combines sequential statistics (CUSUM) and a multimodal convolutional 1D-CNN architecture with a composite scoring criterion. Input features are generated using packet-aggregated one-minute vectors [...] Read more.
This article develops a hybrid neural network method for detecting UDP flooding in critical infrastructure microgrid protection systems. This method combines sequential statistics (CUSUM) and a multimodal convolutional 1D-CNN architecture with a composite scoring criterion. Input features are generated using packet-aggregated one-minute vectors with metrics for packet count, average size, source entropy, and HHI concentration index, as well as compact sketches of top sources. To ensure forensically relevant incident recording, a greedy artefact selection policy based on the knapsack problem with a limited forensic buffer is implemented. The developed method is theoretically justified using a likelihood ratio criterion and adaptive threshold tuning, which ensures control over the false alarm probability. Experimental validation on traffic datasets demonstrated high efficiency, with an overall accuracy of 98.7%, a sensitivity of 97.4%, an average model inference time of 5.3 ms (2.5 times faster than its LSTM counterpart), a controlled FPR of 0.96%, and a reduction in asymptotic detection latency with an increase in intensity from 35 to 12 s. Moreover, with a storage budget of 10 MB, 28 priority bins were selected (their total size was 7.39 MB), ensuring the approximate preservation of 85% of the most informative packets for subsequent examination. This research contribution involves the creation of a ready-to-deploy, resource-efficient detector with low latency, explainable statistical layers, and a built-in mechanism for generating a standardized evidence package to facilitate rapid law enforcement response. Full article
(This article belongs to the Special Issue Cyber Security in Microgrids and Smart Grids—2nd Edition)
Show Figures

Figure 1

12 pages, 467 KB  
Article
Optimal Control for Networked Control Systems with Stochastic Transmission Delay and Packet Dropouts
by Jingmei Liu, Boqun Tan and Xiaojian Mu
Electronics 2026, 15(1), 180; https://doi.org/10.3390/electronics15010180 - 30 Dec 2025
Viewed by 217
Abstract
This paper investigates an optimal decision-making and optimization framework for networked systems operating under the coupled effects of stochastic transmission delays, packet dropouts, and input delays, which is a critical unresolved challenge in data-driven intelligent systems deployed over shared communication networks. Such uncertainty-aware [...] Read more.
This paper investigates an optimal decision-making and optimization framework for networked systems operating under the coupled effects of stochastic transmission delays, packet dropouts, and input delays, which is a critical unresolved challenge in data-driven intelligent systems deployed over shared communication networks. Such uncertainty-aware optimization problems exhibit strong similarities to modern recommender and decision support systems, where multiple performance criteria must be balanced under dynamic and resource-constrained environments while addressing the disruptive impact of coupled network-induced uncertainties. By explicitly modeling stochastic transmission delays and packet losses in the sensor to controller channel, together with input delays in the actuation loop, the problem is formulated as a stochastic optimal control task with multi-stage decision coupling that captures the interdependency of communication uncertainties and system performance. An optimal feedback policy is derived based on a discrete time Riccati recursion explicitly quantifying and mitigating the cumulative impact of network-induced uncertainties on the expected performance cost, which is a capability lacking in existing frameworks that treat uncertainties separately. Numerical simulations using realistic traffic models validate the effectiveness of the proposed framework. The results demonstrate that the proposed decision optimization approach offers a principled foundation for uncertainty-aware optimization with potential applicability to data-driven recommender and intelligent decision systems where coupled uncertainties and multi-criteria trade-offs are pervasive. Full article
Show Figures

Figure 1

22 pages, 1014 KB  
Article
A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation
by Maksim Iavich, Vladimer Svanadze and Oksana Kovalchuk
Future Internet 2026, 18(1), 19; https://doi.org/10.3390/fi18010019 - 29 Dec 2025
Viewed by 817
Abstract
Anomalous IP packet fragmentation, whether caused by evasion attacks, misconfigurations, or network policy interference, presents a measurable threat to network integrity and intrusion detection systems. This paper introduces a lightweight, rule-based framework for detecting and classifying fragmented IP traffic. Unlike complex machine learning [...] Read more.
Anomalous IP packet fragmentation, whether caused by evasion attacks, misconfigurations, or network policy interference, presents a measurable threat to network integrity and intrusion detection systems. This paper introduces a lightweight, rule-based framework for detecting and classifying fragmented IP traffic. Unlike complex machine learning models that operate as “black boxes,” our model leverages the deterministic semantics of RFC 791 to inspect structural packet characteristics—such as offset alignment, Time-to-Live (TTL) consistency, and payload regularity—and classifies traffic into three transparent categories: normal (NONE), misconfigured (MISCONFIG), and adversarial (ATTACK). We generate an open-source and synthetic dataset of 10,000 packets, meticulously engineered to simulate a wide spectrum of benign and malicious fragmentation scenarios. Evaluation demonstrates high accuracy (99.23% overall) on this controlled dataset. Crucially, validation on the CIC-IDS-2017 real-world dataset confirms the model’s practical utility, showing a low false-positive rate (0.8%) on normal traffic and a significant increase in detectable anomalies during attack periods. This work provides a reproducible, interpretable, and efficient tool for forensic analysis and intrusion detection, enabling the precise diagnostics of packet-level fragmentation anomalies in operational networks. Full article
Show Figures

Figure 1

25 pages, 7901 KB  
Article
Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation
by Chen-Yu Li
Future Internet 2026, 18(1), 12; https://doi.org/10.3390/fi18010012 - 26 Dec 2025
Viewed by 308
Abstract
Instant messaging (IM) applications are ubiquitous, and while end-to-end encryption protects message content, traffic metadata remains observable. This paper proposes a traffic correlation framework for IM call services under a passive ISP-level threat model to infer communication parties from encrypted traffic. The framework [...] Read more.
Instant messaging (IM) applications are ubiquitous, and while end-to-end encryption protects message content, traffic metadata remains observable. This paper proposes a traffic correlation framework for IM call services under a passive ISP-level threat model to infer communication parties from encrypted traffic. The framework extracts and matches metadata from sustained, bidirectional call flows and jointly analyzes endpoint identifiability, shared server connectivity, symmetry in call duration and traffic volume, and service type indicators to derive correlation artifacts for matching. The framework is instantiated and evaluated on WhatsApp, Facebook Messenger, and Snapchat across diverse user behavior scenarios and commonly deployed network settings. Experimental results show that the method reliably links caller and callee flows, revealing edges in users’ social graphs without decrypting any packets. Under typical data retention regimes, these findings indicate that metadata-based correlation provides a practical basis for deanonymization and represents a persistent privacy risk for users of IM calling. Full article
(This article belongs to the Special Issue Information Communication Technologies and Social Media)
Show Figures

Graphical abstract

27 pages, 3290 KB  
Article
Intelligent Routing Optimization via GCN-Transformer Hybrid Encoder and Reinforcement Learning in Space–Air–Ground Integrated Networks
by Jinling Liu, Song Li, Xun Li, Fan Zhang and Jinghan Wang
Electronics 2026, 15(1), 14; https://doi.org/10.3390/electronics15010014 - 19 Dec 2025
Viewed by 378
Abstract
The Space–Air–Ground Integrated Network (SAGIN), a core architecture for 6G, faces formidable routing challenges stemming from its high-dynamic topological evolution and strong heterogeneous resource characteristics. Traditional protocols like OSPF suffer from excessive convergence latency due to frequent topology updates, while existing intelligent methods [...] Read more.
The Space–Air–Ground Integrated Network (SAGIN), a core architecture for 6G, faces formidable routing challenges stemming from its high-dynamic topological evolution and strong heterogeneous resource characteristics. Traditional protocols like OSPF suffer from excessive convergence latency due to frequent topology updates, while existing intelligent methods such as DQN remain confined to a passive reactive decision-making paradigm, failing to leverage spatiotemporal predictability of network dynamics. To address these gaps, this study proposes an adaptive routing algorithm (GCN-T-PPO) integrating a GCN-Transformer hybrid encoder, Particle Swarm Optimization (PSO), and Proximal Policy Optimization (PPO) with spatiotemporal attention. Specifically, the GCN-Transformer encoder captures spatial topological dependencies and long-term temporal traffic evolution, with PSO optimizing hyperparameters to enhance prediction accuracy. The PPO agent makes proactive routing decisions based on predicted network states (next K time steps) to adapt to both topological and traffic dynamics. Extensive simulations on real dataset-parameterized environments (CelesTrak TLE data, CAIDA 100G traffic statistics, CRAWDAD UAV mobility models) demonstrate that under 80% high load and bursty Pareto traffic, GCN-T-PPO reduces end-to-end latency by 42.4% and packet loss rate by 75.6%, while improving QoS satisfaction rate by 36.9% compared to DQN. It also outperforms SOTA baselines including OSPF, DDPG, D2-RMRL, and Graph-Mamba. Ablation studies validate the statistical significance (p < 0.05) of key components, confirming the synergistic gains from spatiotemporal joint modeling and proactive decision-making. This work advances SAGIN routing from passive response to active prediction, significantly enhancing network stability, resource utilization efficiency, and QoS guarantees, providing an innovative solution for 6G global seamless coverage and intelligent connectivity. Full article
Show Figures

Figure 1

20 pages, 3209 KB  
Article
Hybrid Time–Frequency Analysis for Micromobility-Based Indirect Bridge Health Monitoring
by Premjeet Singh, Harsha Agarwal and Ayan Sadhu
Sensors 2025, 25(24), 7482; https://doi.org/10.3390/s25247482 - 9 Dec 2025
Viewed by 426
Abstract
Bridges serve as vital connectors in the transportation network and infrastructure. Given their significance, it is crucial to continuously monitor bridge conditions to ensure the efficient operation of transportation systems. With advancements in sensing technologies, transportation infrastructure assessment has evolved through the integration [...] Read more.
Bridges serve as vital connectors in the transportation network and infrastructure. Given their significance, it is crucial to continuously monitor bridge conditions to ensure the efficient operation of transportation systems. With advancements in sensing technologies, transportation infrastructure assessment has evolved through the integration of structural health monitoring (SHM) methodologies. Traditionally, bridge monitoring has relied on direct sensor instrumentation; however, this method encounters practical obstacles, including traffic disruptions and limited sensor availability. In contrast, indirect bridge health monitoring (iBHM) utilizes data from moving traffic on the bridge itself. This innovative approach eliminates the need for embedded instrumentation, as sensors on vehicles traverse the bridge, capturing the dynamic characteristics of the bridge. In this paper, system identification methods are explored to analyze the acceleration data gathered using a bicycle-mounted sensor traversing the bridge. To explore the feasibility of this micromobility-based approach, bridge responses are measured under varying traversing conditions combined with dynamic rider–bicycle–bridge interaction for comprehensive evaluation. The proposed method involves a hybrid approach combining Wavelet Packet Transform (WPT) with Synchro-extracting Transform (SET), which are employed to analyze the time–frequency characteristics of the acceleration signals of bike-based iBHM. The results indicate that the combination of WPT-SET demonstrates superior robustness and accuracy in isolating dominant nonstationary frequencies. The performance of the proposed method is compared with another prominent signal processing algorithm known as Time-Varying Filtering Empirical Mode Decomposition (TVF-EMD). Ultimately, this study underscores the potential of bicycles as low-cost, mobile sensing platforms for iBHM that are otherwise inaccessible to motorized vehicles. Full article
Show Figures

Figure 1

29 pages, 4247 KB  
Article
Zone-AGF: An O-RAN-Based Local Breakout and Handover Mechanism for Non-5G Capable Devices in Private 5G Networks
by Antoine Hitayezu, Jui-Tang Wang and Saffana Zyan Dini
Electronics 2025, 14(24), 4794; https://doi.org/10.3390/electronics14244794 - 5 Dec 2025
Viewed by 521
Abstract
The growing demand for ultra-reliable and low-latency communication (URLLC) in private 5G environments, such as smart campuses and industrial networks, has highlighted the limitations of conventional Wireline access gateway function (W-AGF) architectures that depend heavily on centralized 5G core (5GC) processing. This paper [...] Read more.
The growing demand for ultra-reliable and low-latency communication (URLLC) in private 5G environments, such as smart campuses and industrial networks, has highlighted the limitations of conventional Wireline access gateway function (W-AGF) architectures that depend heavily on centralized 5G core (5GC) processing. This paper introduces a novel Centralized Unit (CU)-based Zone-Access Gateway Function (Z-AGF) architecture designed to enhance handover performance and enable Local Breakout (LBO) within Non-Public Networks (NPNs) for non-5G capable (N5GC) devices. The proposed design integrates W-AGF functionalities with the Open Radio Access Network (O-RAN) framework, leveraging the F1 Application Protocol (F1AP) as the primary interface between Z-AGF and CU. By performing local breakout (LBO) locally at the Z-AGF, latency-sensitive traffic is processed closer to the edge, reducing the backhaul load and improving end-to-end latency, throughput, and jitter performance. The experimental results demonstrate that Z-AGF achieves up to 45.6% latency reduction, 69% packet loss improvement, 85.6% reduction of round-trip time (RTT) for local communications under LBO, effective local offloading with quantified throughput compared to conventional W-AGF implementations. This study provides a scalable and interoperable approach for integrating wireline and wireless domains, supporting low-latency, highly reliable services within the O-RAN ecosystem and accelerating the adoption of localized next-generation 5G services. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

26 pages, 6495 KB  
Article
Shaping Multi-Dimensional Traffic Features for Covert Communication in QUIC Streaming
by Dongfang Zhang, Dongxu Liu, Jianan Huang, Lei Guan and Xiaotian Yin
Mathematics 2025, 13(23), 3879; https://doi.org/10.3390/math13233879 - 3 Dec 2025
Viewed by 732
Abstract
Network covert channels embed secret data into legitimate traffic, but existing methods struggle to balance undetectability, robustness, and throughput. Application-independent channels at lower protocol layers are easily normalized or disrupted by network noise, while application-dependent streaming schemes rely on handcrafted traffic manipulations that [...] Read more.
Network covert channels embed secret data into legitimate traffic, but existing methods struggle to balance undetectability, robustness, and throughput. Application-independent channels at lower protocol layers are easily normalized or disrupted by network noise, while application-dependent streaming schemes rely on handcrafted traffic manipulations that fail to preserve the spatio-temporal dynamics of real encrypted flows and thus remain detectable by modern machine learning (ML)-based classifiers. Meanwhile, with the rapid adoption of HTTP/3, Quick UDP Internet Connections (QUIC) has become the dominant transport for streaming services, offering stable long-lived flows with rich spatio-temporal structure that create new opportunities for constructing resilient covert channels. In this paper, a QUIC streaming-based Covert Channel framework, QuicCC-SMD, is proposed that dynamically Shapes Multi-Dimensional traffic features to identify and exploit redundancy spaces for secret data embedding. QuicCC-SMD models the statistical and temporal dependencies of QUIC flows via Markov chain-based state representations and employs convex optimization to derive an optimal deformation matrix that maps source traffic to legitimate target distributions. Guided by this matrix, a packet-level modulation performs through packet padding, insertion, and delay operations under a periodic online optimization strategy. Evaluations on a real-world HTTP/3 over QUIC (HTTP/3-QUIC) dataset containing 18,000 samples across four video resolutions demonstrate that QuicCC-SMD achieves an average F1 score of 56% at a 1.5% embedding rate, improving detection resistance by at least 7% compared with three representative baselines. Full article
Show Figures

Figure 1

23 pages, 5654 KB  
Article
Performance Analysis of Data-Driven and Deterministic Latency Models in Dynamic Packet-Switched Xhaul Networks
by Mirosław Klinkowski and Dariusz Więcek
Appl. Sci. 2025, 15(23), 12487; https://doi.org/10.3390/app152312487 - 25 Nov 2025
Viewed by 519
Abstract
Accurate prediction of maximum flow latency is crucial for ensuring the efficient transport of latency-sensitive fronthaul traffic in packet-switched Xhaul networks while maintaining the reliable operation of 5G and beyond Radio Access Networks (RANs). Deterministic worst-case (WC) models provide strict latency guarantees but [...] Read more.
Accurate prediction of maximum flow latency is crucial for ensuring the efficient transport of latency-sensitive fronthaul traffic in packet-switched Xhaul networks while maintaining the reliable operation of 5G and beyond Radio Access Networks (RANs). Deterministic worst-case (WC) models provide strict latency guarantees but tend to overestimate actual delays, resulting in resource over-provisioning and inefficient network utilization. To address this limitation, this study evaluates a data-driven Quantile Regression (QR) model for latency prediction in Time-Sensitive Networking (TSN)-enabled packet-switched Xhaul networks operating under dynamic traffic conditions. The proposed QR model estimates high-percentile (tail) latency values by leveraging both deterministic and queuing-related data features. Its performance is quantitatively compared with the WC estimator across diverse network topologies and traffic load scenarios. The results demonstrate that the QR model achieves significantly higher prediction accuracy—particularly for midhaul flows—while still maintaining compliance with latency constraints. Furthermore, when applied to dynamic Xhaul network operation, QR-based latency predictions enable a reduction in active processing-node utilization compared with WC-based estimations. These findings confirm that data-driven models can effectively complement deterministic methods in supporting latency-aware optimization and adaptive operation of 5G/6G Xhaul networks. Full article
Show Figures

Figure 1

25 pages, 5245 KB  
Article
Hybrid GA-PSO Optimization for Controller Placement in Large-Scale Smart City IoT Networks
by Sheeraz Ali Memon, Darius Andriukaitis, Dangirutis Navikas, Vytautas Markevičius, Algimantas Valinevičius, Mindaugas Žilys, Michal Prauzek, Jaromir Konecny, Zhixiong Li, Tomyslav Sledevič, Michal Frivaldsky and Dardan Klimenta
Sensors 2025, 25(23), 7119; https://doi.org/10.3390/s25237119 - 21 Nov 2025
Cited by 1 | Viewed by 561
Abstract
The Internet of Things (IoT) plays an important role in the development of smart cities. IoT forms a large network, and optimal controller placement plays a crucial role in ensuring network performance and resilience. This paper proposes a hybrid optimization approach that combines [...] Read more.
The Internet of Things (IoT) plays an important role in the development of smart cities. IoT forms a large network, and optimal controller placement plays a crucial role in ensuring network performance and resilience. This paper proposes a hybrid optimization approach that combines Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to strategically place controllers. Kaunas (Lithuania) was selected as a real-world smart city model. A large-scale Narrowband Internet of Things (NB-IoT) network with 2000 nodes was simulated, and 10 controllers were optimally placed in the network to minimize latency, balance load, enhance energy efficiency, and redundancy. The performance of the proposed hybrid GA-PSO algorithm was compared with random and K-Means clustering placements under three scenarios: normal operation, node failures, and traffic spikes. Simulation results demonstrate that the hybrid approach outperforms the other two methods in terms of load balancing, packet loss, energy efficiency, scalability, and redundancy. These findings highlight the robustness and effectiveness of the proposed hybrid algorithm in optimizing controller placement for smart city environments. Full article
(This article belongs to the Special Issue Wireless Sensor Network and IoT Technologies for Smart Cities)
Show Figures

Figure 1

24 pages, 9193 KB  
Article
Leveraging Software-Defined Networking for Secure and Resilient Real-Time Power Sharing in Multi-Microgrid Systems
by Rawan A. Taha, Ahmed Aghmadi, Sara H. Moustafa and Osama A. Mohammed
Electronics 2025, 14(22), 4518; https://doi.org/10.3390/electronics14224518 - 19 Nov 2025
Viewed by 515
Abstract
Cyber-physical power systems integrate sensing, communication, and control, ensuring power system resiliency and security, particularly in clustered networked microgrids. Software-Defined Networking (SDN) provides a suitable foundation by centralizing policy, enforcing traffic isolation, and adopting a deny-by-default policy in which only explicitly authorized flows [...] Read more.
Cyber-physical power systems integrate sensing, communication, and control, ensuring power system resiliency and security, particularly in clustered networked microgrids. Software-Defined Networking (SDN) provides a suitable foundation by centralizing policy, enforcing traffic isolation, and adopting a deny-by-default policy in which only explicitly authorized flows are admitted. This paper proposes and experimentally validates a cyber-physical architecture that couples three DC microgrids through an SDN backbone to deliver rapid, reliable, and secure power sharing under highly dynamic conditions, including pulsed-load disturbances. The cyber layer comprises four SDN switches that establish dedicated paths for protection messages, supervisory control commands, and high-rate sensor data streams. An OpenFlow controller administers flow-rule priorities, link monitoring, and automatic failover to preserve control command paths during disturbances and communication faults. Resiliency is further assessed by subjecting the network to a deliberate denial-of-service (DoS) attack, where deny-by-default policies prevent unauthorized traffic while maintaining essential control flows. Performance is quantified through packet captures, which include end-to-end delay, jitter, and packet loss percentage, alongside synchronized electrical measurements from high-resolution instrumentation. Results show that SDN-enforced paths, combined with coordinated multi-microgrid control, maintain accurate power sharing. A validated, hardware testbed demonstration substantiates a scalable, co-designed communication-and-control framework for next-generation cyber-physical DC multi-microgrid deployments. Full article
(This article belongs to the Special Issue Efficient and Resilient DC Energy Distribution Systems)
Show Figures

Figure 1

Back to TopTop