The 5th International Conference on Future Networks &Amp; Distributed Systems 2021
DOI: 10.1145/3508072.3508092
|View full text |Cite
|
Sign up to set email alerts
|

Two routers network architecture and scheduling algorithms under packet category classification constraint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Thus, if an adversary could capture one highly secure packet at one point through one router, it would not be able to capture a second one simultaneously since our architecture promotes transmitting classified packets with multiple levels of security. Additionally, a review of the literature showed the lack of research on this NP-Hard problem, and we were the first to present it in [53]. Finally, we introduced several heuristics that can help reach metaheuristics or an exact solution for the problem in the future.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Thus, if an adversary could capture one highly secure packet at one point through one router, it would not be able to capture a second one simultaneously since our architecture promotes transmitting classified packets with multiple levels of security. Additionally, a review of the literature showed the lack of research on this NP-Hard problem, and we were the first to present it in [53]. Finally, we introduced several heuristics that can help reach metaheuristics or an exact solution for the problem in the future.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Unlike many researches that focused on solving the problem of exchanging or outsourcing data securely and privately at the application layer and try to solve it using known techniques or traditional methods to protect outsourced information, our innovative approach addresses the problem from a different point of view and study the problem at the network layer and propose heuristics solution reduced from known NP-Hard problem and apply in the network security field. Furthermore, the presented algorithms in [53] were based only on the dispatching rules; however, this paper uses several techniques for the problem, such as dispatching rules, the local insertion search, the randomization method, and the lifting procedure.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…These algorithms can be exploited to give a new solutions for the presented problem. In [29], authors developed algorithms for the category constraint into network based on scheduling problem. Authors in [30] developed algorithms for the read frequency of data.…”
Section: Introductionmentioning
confidence: 99%