Current Issue : April-June Volume : 2026 Issue Number : 2 Articles : 5 Articles
The rapid growth of Internet of Things (IoT) deployments has created an urgent need for energy-efficient communication strategies that can adapt to dynamic operational conditions. This study presents a novel adaptive protocol selection framework that dynamically optimizes IoT communication energy consumption through context-aware decision making, achieving up to 34% energy reduction compared to static protocol selection. The framework is grounded in a comprehensive empirical evaluation of three widely used IoT communication protocols—MQTT, CoAP, and HTTP—using Intel’s Running Average Power Limit (RAPL) for precise energy measurement across varied network conditions including packet loss (0–20%) and latency variations (1–200 ms). Our key contribution is the design and validation of an adaptive selection mechanism that employs multi-criteria decision making with hysteresis control to prevent oscillation, dynamically switching between protocols based on six runtime metrics: message frequency, payload size, network conditions, packet loss rate, available energy budget, and QoS requirements. Results show MQTT consumes only 40% of HTTP’s energy per byte at high volumes (>10,000 messages), while HTTP remains practical for low-volume traffic (<10 msg/min). A novel finding reveals receiver nodes consistently consume 15–20% more energy than senders, requiring new design considerations for IoT gateways. The framework demonstrates robust performance across simulated real-world conditions, maintaining 92% of optimal performance while requiring 85% less computation than machine learning approaches. These findings offer actionable guidance for IoT architects and developers, positioning this work as a practical solution for energy-aware IoT communication in production environments....
Man-in-the-middle (MITM) attacks represent a significant threat to the confidentiality and integrity of data communications within computer networks. Such attacks occur when an attacker intercepts and potentially alters the data being exchanged between two communicating parties, thereby compromising sensitive information and transactions. Many cryptographic systems lacking robust authentication measures are susceptible to MITM attacks, underscoring the pressing need for effective security solutions.This study presents the EL_ALBI framework, an innovative approach that combines the strengths of Intrusion Prevention System (IPS) rules with DHCP Snooping protocols to detect and prevent MITM attacks in computer networks. The IPS rule component continuously analyzes network traffic, employing predefined rules and signatures to identify and block malicious activities and patterns associated with MITM attacks. At the same time, the DHCP Snooping protocol maintains a binding table of valid IP address, MAC address, and port mappings, ensuring that only authorized devices can obtain IP addresses from legitimate DHCP servers, thereby preventing unauthorized network access. The proposed framework was implemented and evaluated through simulations using Packet Tracer 8.1 network simulation software. The simulation environment consisted of network devices such as switches and routers, with designated devices acting as attackers and servers to replicate real-world MITM attack scenarios. The framework's performance was assessed based on key metrics, including packet loss, network availability, and the mitigation of denial-of-service (DoS) attacks. The results demonstrated the effectiveness of the EL_ALBI framework in reducing packet loss, maintaining network availability, and mitigating DoS attacks related to MITM incidents, surpassing the efficacy of traditional security measures. These findings highlight the potential of the proposed framework to enhance network security and protect sensitive information from unauthorized access and modification....
As a key 6G candidate technology, reconfigurable intelligent surface (RIS) integrates into sensor-communication systems, supporting positioning and sensing as environmental sensor nodes or anchors. To address efficient RIS deployment under constraints and mitigate wireless communication blind spots, this paper proposes a hybrid optimization algorithm. It decomposes the NP-hard combinatorial optimization problem into two stages: (1) a greedy strategy ensures coverage completeness by allocating one locally optimal RIS to each independent shadow area; (2) a Branch-and-Bound (BnB) algorithm optimizes global deployment to maximize overall signal gain in shadow areas. This decoupling reduces computational complexity for large-scale problems. Simulation results show the algorithm’s superiority: the greedy phase guarantees fair coverage, and the BnB-based global optimization achieves up to 56.85% higher average Signal-to-Interference-plus-Noise Ratio (SINR) gain in shadow areas than random deployment, improving both shadow-area user communication quality and overall network performance....
The paper examines the feasibility and implications of Man-in-the-Middle (MitM) attacks on the Packet Forwarding Control Protocol (PFCP) within the 5G Core Network. The study demonstrates how PFCP control messages exchanged between the Session Management Function (SMF) and the User Plane Function (UPF) can be intercepted and modified, enabling an adversary to disrupt or manipulate PDU session establishment and maintenance. Practical implementations of such attacks are presented, illustrating the potential impact on network operation and user data flows. In addition, the paper investigates methods for detecting these threats using log-based analysis. Logs collected from SMF and UPF components were processed and examined to identify anomalies indicative of protocol misuse or unexpected module behaviour. The results highlight critical security vulnerabilities resulting from insufficient PFCP signalling protection and highlight the effectiveness of log-based monitoring techniques in identifying threats in 5G core networks....
For solving assignment problems of staff, equipment and task in engineering support action, a 3-Dimensional assignment model is established, which contains staff skill level, equipment technique condition and collaboration efficiency factor. The task preparedness requires multi-skilled staff and multi-purposed equipment, and mission principle requires equipment no halt but staff halt. All these above are abstracted and viewed as constraint conditions in the assignment model. Based on form of objective function and constraint conditions, a fast solution algorithm is designed, in which multi-function equipment is decomposed into a combination of single-function equipment, here, called virtual equipment method. Finally, an introduction to the application of the assignment model in a certain example is presented in detail, and practicability of the assignment model and the fast solution algorithm is verified as well. The results of this paper are aimed at helping the field commander during making operational plans....
Loading....