{"id":"https://openalex.org/W4414170702","doi":"https://doi.org/10.1109/iwqos65803.2025.11143436","title":"NET-SM4: A High-Performance Secure Encryption Mechanism Based on In-Network Computing","display_name":"NET-SM4: A High-Performance Secure Encryption Mechanism Based on In-Network Computing","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4414170702","doi":"https://doi.org/10.1109/iwqos65803.2025.11143436"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos65803.2025.11143436","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143436","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100396381","display_name":"Wen Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wen Wang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075950926","display_name":"Shuyong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuyong Zhu","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111342971","display_name":"Tianyu Zuo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyu Zuo","raw_affiliation_strings":["University of Chinese Academy of Sciences,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043939891","display_name":"Zhiyuan Wu","orcid":"https://orcid.org/0000-0003-0365-6294"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan Wu","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100751748","display_name":"Yujun Zhang","orcid":"https://orcid.org/0000-0003-2807-7096"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujun Zhang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100396381"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27508199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.835099995136261},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4952000081539154},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.46309998631477356},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.46239998936653137},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.445499986410141},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.37369999289512634},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.3711000084877014},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.37040001153945923},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.36640000343322754}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.835099995136261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7972999811172485},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5896000266075134},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4952000081539154},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.46309998631477356},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.46239998936653137},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.445499986410141},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3919999897480011},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3711000084877014},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.37040001153945923},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.36640000343322754},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.366100013256073},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3578999936580658},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.351500004529953},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.35040000081062317},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3407999873161316},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.30790001153945923},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.29499998688697815},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.28870001435279846},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos65803.2025.11143436","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143436","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3656178442","display_name":null,"funder_award_id":"U24B6012,U2333201,62372429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1572300106","https://openalex.org/W1973730821","https://openalex.org/W1994926493","https://openalex.org/W2498764059","https://openalex.org/W2797991997","https://openalex.org/W2900600414","https://openalex.org/W2915352631","https://openalex.org/W2940582210","https://openalex.org/W3042591335","https://openalex.org/W3044930318","https://openalex.org/W3046351827","https://openalex.org/W3048933267","https://openalex.org/W3152554900","https://openalex.org/W4200087606","https://openalex.org/W4309675765","https://openalex.org/W4311137574","https://openalex.org/W4319430635","https://openalex.org/W4320075936","https://openalex.org/W4366556210","https://openalex.org/W4382931639","https://openalex.org/W4385329455","https://openalex.org/W4386260561","https://openalex.org/W4387969477","https://openalex.org/W4389370671","https://openalex.org/W4389989221","https://openalex.org/W4391528168","https://openalex.org/W4396240007","https://openalex.org/W4401908411","https://openalex.org/W4402155884","https://openalex.org/W4402896955","https://openalex.org/W4405098104"],"related_works":[],"abstract_inverted_index":{"Encryption":[0],"is":[1],"crucial":[2],"for":[3,44,141],"securing":[4],"critical":[5],"network":[6,80],"infrastructures,":[7],"including":[8],"datacenter":[9],"networks,":[10,13],"5":[11],"G":[12],"and":[14,69,82,108,128,137,155,162,186],"the":[15,34,42,56,105],"Internet":[16],"of":[17,31,59,148],"Things":[18],"(IoT).":[19],"In-network":[20],"encryption":[21,30,97,111,131,177],"(INE)":[22],"offers":[23],"a":[24,94,118,146,151,163],"promising":[25],"solution":[26],"by":[27,181],"enabling":[28],"direct":[29],"data":[32,36,190],"on":[33,100,150],"network's":[35],"plane":[37],"during":[38],"transmission,":[39],"thereby":[40,133],"eliminating":[41],"need":[43],"host-side":[45],"hardware":[46],"encryption.":[47,143],"However,":[48],"existing":[49],"INE":[50],"solutions":[51,178],"fail":[52],"to":[53,63,113,183],"fully":[54],"leverage":[55],"processing":[57],"capabilities":[58],"programmable":[60,114],"switches,":[61],"leading":[62],"low":[64,138],"throughput,":[65],"high":[66,135],"resource":[67,139],"overhead,":[68],"limited":[70],"key":[71],"flexibility.":[72],"These":[73],"limitations":[74],"hinder":[75],"their":[76,84],"compatibility":[77],"with":[78,192],"other":[79],"functions":[81],"restrict":[83],"real-world":[85,164,202],"deployment.":[86],"To":[87],"address":[88],"these":[89],"challenges,":[90],"we":[91],"introduce":[92],"NET-SM4,":[93],"high-performance":[95],"secure":[96,107],"mechanism":[98],"based":[99],"in-network":[101,142,176],"computing.":[102],"NET-SM4":[103,123,172],"offloads":[104],"highly":[106],"pipeline-optimized":[109],"SM4":[110],"algorithm":[112],"switches.":[115],"By":[116],"employing":[117],"hardwarefriendly":[119],"table":[120],"lookup":[121],"approach,":[122],"reduces":[124],"computation":[125],"dependency":[126],"chains":[127],"supports":[129],"parallel":[130],"inherently,":[132],"achieving":[134],"throughput":[136,180],"overhead":[140,200],"We":[144],"implement":[145],"prototype":[147],"NETSM4":[149],"commercial":[152],"Tofino":[153],"switch":[154],"evaluate":[156],"its":[157],"performance":[158],"through":[159],"testbed":[160],"experiments":[161],"RDMA-based":[165],"case":[166],"study.":[167],"The":[168],"results":[169],"demonstrate":[170],"that":[171],"(1)":[173],"outperforms":[174],"state-of-the-art":[175],"in":[179,201],"up":[182],"293.85":[184],"%,":[185],"(2)":[187],"ensures":[188],"link-speed":[189],"transmission":[191],"less":[193],"than":[194],"<tex":[195],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[196],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$20":[197],"\\mu$</tex>":[198],"s":[199],"scenarios.":[203]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
