← Back

Computer Networks and Communications

The design and analysis of communication systems and networks, including protocols, wireless networks, Internet architecture, network security, distributed systems, and emerging networking technologies

11 papers

Papers

Designing Ethereum's Geographical (De)Centralization Beyond the Atlantic

This simulation study explored how Ethereum's block-building paradigms (Single-Source Paradigm akin to MEV-Boost, and Multi-Source Paradigm) and network latency shape the geographical distribution of validators. Findings indicate that validators tend to cluster in regions with latency advantages, primarily North America, with the Multi-Source Paradigm leading to faster centralization than the Single-Source Paradigm. The research highlights how protocol design significantly influences validator geography and could be adjusted to promote greater decentralization.

Computer Networks and Communications Oct 05, 02:41 PM

On the design of an energy-harvesting protocol stack for Body Area Nano-NETworks

This paper proposes a network architecture and energy-harvesting protocols for Body Area Nano-NETworks (BANNETs), aiming to improve energy efficiency for medical applications within the human body. Simulation results suggest the proposed energy-aware strategies outperform traditional flooding-based communication, leading to increased energy availability, reduced packet loss, and higher active node percentages.

Computer Networks and Communications Sep 11, 09:48 PM

Bitcoin as an Interplanetary Monetary Standard with Proof-of-Transit Timestamping

This paper proposes a way to use Bitcoin for payments between Earth and Mars, taking into account the long communication delays. It introduces "Proof-of-Transit Timestamping" (PoTT) to track Bitcoin transactions between planets and suggests using existing technologies like the Lightning Network and sidechains to make payments faster and more efficient.

Computer Networks and Communications Sep 11, 12:17 PM

Impact of Network Topologies on Blockchain Performance

This study evaluated the performance of five different blockchains across five network topologies using a controlled cluster environment. The results show that full mesh, hypercube, and torus topologies improve performance, especially under heavy workloads. While Algorand and Diem demonstrated consistent performance across all tested topologies, the study was limited by the size of the cluster and could not test extremely large, real-world blockchain network sizes.

Computer Networks and Communications Aug 21, 01:50 PM

Bitcoin: A Peer-to-Peer Electronic Cash System

This paper proposes a peer-to-peer electronic cash system called "Bitcoin" that eliminates the need for a trusted third party like a bank. The system relies on cryptographic proof and a distributed timestamp server to record transactions in a public, tamper-proof ledger called a blockchain. The system's security relies on the assumption that the majority of computational power in the network remains controlled by honest participants.

Computer Networks and Communications Aug 20, 05:00 PM

Flood & Loot: A Systemic Attack On The Lightning Network

This paper describes a "Flood & Loot" attack on Bitcoin's Lightning Network where attackers overload the system to steal funds. The attacker opens channels with victims, floods the network with transactions, and then exploits the delay in transaction confirmation to steal the victims' funds. Several mitigation strategies are proposed, including reducing the maximum number of unresolved transactions and improving reputation-based behavior.

Computer Networks and Communications Aug 11, 01:22 PM

Integrated Sensing and Communications: Toward Dual-Functional Wireless Networks for 6G and Beyond

This paper reviews the emerging field of Integrated Sensing and Communications (ISAC), where wireless networks simultaneously transmit data and sense the environment. It explores various applications, performance trade-offs, signal processing techniques, and the integration of ISAC with other emerging technologies like edge intelligence and RIS.

Computer Networks and Communications Jul 14, 05:13 PM

Context-Aware Security for 6G Wireless: The Role of Physical Layer Security

The paper proposes a context-aware security framework for 6G wireless, leveraging physical layer security (PLS) and AI to adapt security measures based on the communication context. This framework aims to address emerging challenges in 6G, such as increased latency constraints and the proliferation of IoT devices, by incorporating factors like location, time, and environmental conditions into security protocols.

Computer Networks and Communications Jul 14, 05:10 PM

The EC-Earth3 Earth system model for the Coupled Model Intercomparison Project 6

EC-Earth3, a new Earth system model developed by a European consortium, shows improved performance compared to its predecessor in simulating key climate variables, including atmospheric circulation, sea ice, and the Atlantic Meridional Overturning Circulation. However, biases remain, especially a warm Southern Ocean and underestimated Antarctic sea ice, which require further investigation.

Computer Networks and Communications Jul 14, 07:02 AM