Pub Date : 2023-12-28DOI: 10.1016/j.hcc.2023.100197
Jing Liu, Limiao Deng, Zhongzhi Han
In the field of food safety testing, variety, brand, origin, and adulteration are four important factors. In this study, a novel food safety testing method based on infrared spectroscopy is proposed to investigate these factors. Fourier transform infrared spectroscopy data are analyzed using negentropy-sorted kernel independent component analysis (NS-kICA) as the feature optimization method. To rank the components, negentropy is performed to measure the non-Gaussian independent components. In our experiment, the proposed method was run on four datasets to comprehensively investigate the variety, brand, origin, and adulteration of agricultural products. The experimental results show that NS-kICA outperforms conventional feature selection methods. The support vector machine model outperforms the backpropagation artificial neural network and partial least squares models. The combination of NS-kICA and support vector machine (SVM) is the best method for achieving high, stable, and efficient recognition performance. These findings are of great importance for food safety testing.
{"title":"Food safety testing by negentropy-sorted kernel independent component analysis based on infrared spectroscopy","authors":"Jing Liu, Limiao Deng, Zhongzhi Han","doi":"10.1016/j.hcc.2023.100197","DOIUrl":"10.1016/j.hcc.2023.100197","url":null,"abstract":"<div><p>In the field of food safety testing, variety, brand, origin, and adulteration are four important factors. In this study, a novel food safety testing method based on infrared spectroscopy is proposed to investigate these factors. Fourier transform infrared spectroscopy data are analyzed using negentropy-sorted kernel independent component analysis (NS-kICA) as the feature optimization method. To rank the components, negentropy is performed to measure the non-Gaussian independent components. In our experiment, the proposed method was run on four datasets to comprehensively investigate the variety, brand, origin, and adulteration of agricultural products. The experimental results show that NS-kICA outperforms conventional feature selection methods. The support vector machine model outperforms the backpropagation artificial neural network and partial least squares models. The combination of NS-kICA and support vector machine (SVM) is the best method for achieving high, stable, and efficient recognition performance. These findings are of great importance for food safety testing.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100197"},"PeriodicalIF":0.0,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000958/pdfft?md5=b8bd33e2cea03cbd8890ca8538dee20c&pid=1-s2.0-S2667295223000958-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139188126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.
{"title":"A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things","authors":"Rongxin Guo , Zhenping Guo , Zerui Lin , Wenxian Jiang","doi":"10.1016/j.hcc.2023.100196","DOIUrl":"10.1016/j.hcc.2023.100196","url":null,"abstract":"<div><p>The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100196"},"PeriodicalIF":3.2,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000946/pdfft?md5=319d5156a64f46754b47a19c3c570818&pid=1-s2.0-S2667295223000946-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-13DOI: 10.1016/j.hcc.2023.100194
Shaohu Li, Bei Gong
Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.
移动特设网络(MANET)是一种新型无线技术,被广泛应用于无人机、无线传感器网络、军事或救灾通信等物联网(IoT)系统中。从通信和数据收集的角度来看,移动 ad hoc 网络中节点间协作的成功率和数据收集的可靠性主要取决于网络中的节点是否正常运行,即是否按照既定的网络规则运行。然而,移动特设网络由于其动态演进、开放性和分布式等特点,很容易受到针对传输信道和节点的攻击。因此,在网络运行过程中,有必要对每个节点的行为和特征进行分类和检测。然而,现有研究大多只分析和考虑针对单一或少量攻击的应对措施。针对这些问题,本文首先对城域网中常见的主动攻击进行了系统分析和分类。然后,根据各种攻击的特点提出了节点信任模型;随后,提出了一种新的安全路由协议,即 TC-AODV。该协议对原有通信动态影响极小,能有效应对掉包、虫洞、会话劫持等城域网中的主要攻击。NS3 仿真结果表明,所提出的路由协议具有良好的传输性能,能有效识别各种攻击并绕过恶意节点,安全地完成通信过程。
{"title":"Developing a reliable route protocol for mobile self-organization networks","authors":"Shaohu Li, Bei Gong","doi":"10.1016/j.hcc.2023.100194","DOIUrl":"10.1016/j.hcc.2023.100194","url":null,"abstract":"<div><p>Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100194"},"PeriodicalIF":3.2,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000922/pdfft?md5=53b7d00856a2e91f112b906eb37efea9&pid=1-s2.0-S2667295223000922-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-24DOI: 10.1016/j.hcc.2023.100193
Hang Zhao, Shengling Wang, Hongwei Shi
Mobile networks are facing unprecedented challenges due to the traits of large scale, heterogeneity, and high mobility. Fortunately, the emergence of fog computing offers surprisingly perfect solutions considering the features of consumer proximity, wide-spread geographical distribution, and elastic resource sharing. In this paper, we propose a novel mobile networking framework based on fog computing which outperforms others in resilience. Our scheme is constituted of two parts: the personalized customization mobility management (MM) and the market-driven resource management (RM). The former provides a dynamically customized MM framework for any specific mobile node to optimize the handoff performance according to its traffic and mobility traits; the latter makes room for economic tussles to find out the competitive service providers offering a high level of service quality at sound prices. Synergistically, our proposed MM and RM schemes can holistically support a full-fledged resilient mobile network, which has been practically corroborated by numerical experiments.
移动网络因其大规模、异构性和高流动性等特点而面临着前所未有的挑战。幸运的是,雾计算的出现提供了令人惊喜的完美解决方案,它考虑到了消费者就近、广泛的地理分布和弹性资源共享等特点。在本文中,我们提出了一种基于雾计算的新型移动网络框架,该框架在弹性方面优于其他框架。我们的方案由两部分组成:个性化定制移动管理(MM)和市场驱动资源管理(RM)。前者为任何特定移动节点提供动态定制的移动性管理框架,以根据其流量和移动性特征优化切换性能;后者为经济角力留出空间,以找出以合理价格提供高水平服务质量的有竞争力的服务提供商。通过协同作用,我们提出的 MM 和 RM 方案可全面支持成熟的弹性移动网络,这一点已通过数值实验得到实际证实。
{"title":"Fog-computing based mobility and resource management for resilient mobile networks","authors":"Hang Zhao, Shengling Wang, Hongwei Shi","doi":"10.1016/j.hcc.2023.100193","DOIUrl":"10.1016/j.hcc.2023.100193","url":null,"abstract":"<div><p>Mobile networks are facing unprecedented challenges due to the traits of large scale, heterogeneity, and high mobility. Fortunately, the emergence of fog computing offers surprisingly perfect solutions considering the features of consumer proximity, wide-spread geographical distribution, and elastic resource sharing. In this paper, we propose a novel mobile networking framework based on fog computing which outperforms others in resilience. Our scheme is constituted of two parts: the personalized customization mobility management (MM) and the market-driven resource management (RM). The former provides a dynamically customized MM framework for any specific mobile node to optimize the handoff performance according to its traffic and mobility traits; the latter makes room for economic tussles to find out the competitive service providers offering a high level of service quality at sound prices. Synergistically, our proposed MM and RM schemes can holistically support a full-fledged resilient mobile network, which has been practically corroborated by numerical experiments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100193"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000910/pdfft?md5=14166eeafd4e4d042e4b4bbd39b389c3&pid=1-s2.0-S2667295223000910-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-24DOI: 10.1016/j.hcc.2023.100178
Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar
Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.
无线传感器网络已被部署在医疗保健、军事、交通和家庭自动化等领域,用于收集数据并转发给远程用户进行进一步处理。由于数据传输使用的是开放式无线通信信道,交换的信息很容易受到窃听和信息伪造等各种威胁。因此,许多安全解决方案被引入以应对这些挑战。然而,由于传感器节点的资源有限,部署传统安全方案的效率很低,因为传统安全方案需要较长的密钥才能提高安全性。因此,轻量级认证协议应运而生。遗憾的是,这些方案大多仍不安全,而其他方案则会产生相对较高的能源、计算、通信和存储复杂性。本文介绍了一种仅部署轻量级单向散列和排他性 OR 操作的协议。利用实或随机(ROR)模型对其进行的正式安全性分析表明,该协议有能力维护衍生会话密钥的安全性。此外,其语义安全性评估表明,它提供了用户隐私、匿名性、不可追踪性、身份验证、会话密钥协议和密钥保密性。此外,它还能抵御侧信道、物理捕获、窃听、离线猜测、欺骗、密码丢失、会话密钥泄露、伪造和假冒等攻击。在性能方面,它的通信开销相对较低,计算成本和支持的安全特性分别提高了 31.56% 和 33.33%。
{"title":"Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks","authors":"Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar","doi":"10.1016/j.hcc.2023.100178","DOIUrl":"10.1016/j.hcc.2023.100178","url":null,"abstract":"<div><p>Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100178"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000764/pdfft?md5=d761183b678601441d00478ed3ce897b&pid=1-s2.0-S2667295223000764-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-24DOI: 10.1016/j.hcc.2023.100190
Tianyou Zhu, Shi Liu, Bo Li, Junjian Liu, Pufan Liu, Fei Zheng
Multi-hop reasoning over language or graphs represents a significant challenge in contemporary research, particularly with the reliance on deep neural networks. These networks are integral to text reasoning processes, yet they present challenges in extracting and representing domain or commonsense knowledge, and they often lack robust logical reasoning capabilities. To address these issues, we introduce an innovative text reasoning framework. This framework is grounded in the use of a semantic relation graph and a graph neural network, designed to enhance the model’s ability to encapsulate knowledge and facilitate complex multi-hop reasoning.
Our framework operates by extracting knowledge from a broad range of texts. It constructs a semantic relationship graph based on the logical relationships inherent in the reasoning process. Beginning with the core question, the framework methodically deduces key knowledge, using it as a guide to iteratively establish a complete evidence chain, thereby determining the final answer. Leveraging the advanced reasoning capabilities of the graph neural network, this approach is adept at multi-hop logical reasoning. It demonstrates strong performance in tasks like machine reading comprehension and question answering, while also clearly delineating the path of logical reasoning.
{"title":"Graph reasoning over explicit semantic relation","authors":"Tianyou Zhu, Shi Liu, Bo Li, Junjian Liu, Pufan Liu, Fei Zheng","doi":"10.1016/j.hcc.2023.100190","DOIUrl":"10.1016/j.hcc.2023.100190","url":null,"abstract":"<div><p>Multi-hop reasoning over language or graphs represents a significant challenge in contemporary research, particularly with the reliance on deep neural networks. These networks are integral to text reasoning processes, yet they present challenges in extracting and representing domain or commonsense knowledge, and they often lack robust logical reasoning capabilities. To address these issues, we introduce an innovative text reasoning framework. This framework is grounded in the use of a semantic relation graph and a graph neural network, designed to enhance the model’s ability to encapsulate knowledge and facilitate complex multi-hop reasoning.</p><p>Our framework operates by extracting knowledge from a broad range of texts. It constructs a semantic relationship graph based on the logical relationships inherent in the reasoning process. Beginning with the core question, the framework methodically deduces key knowledge, using it as a guide to iteratively establish a complete evidence chain, thereby determining the final answer. Leveraging the advanced reasoning capabilities of the graph neural network, this approach is adept at multi-hop logical reasoning. It demonstrates strong performance in tasks like machine reading comprehension and question answering, while also clearly delineating the path of logical reasoning.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100190"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000880/pdfft?md5=828625193dc2302f5c9c29c69fed0f34&pid=1-s2.0-S2667295223000880-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-24DOI: 10.1016/j.hcc.2023.100181
Chuanwen Luo , Jian Zhang , Jin Qian , Yi Hong , Zhibo Chen , Yunan Hou , Xiujuan Zhang , Yuqing Zhu
Unmanned Aerial Vehicle (UAV) can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks (WSNs), which is crucial for providing seamless services and improving the performance in the next generation wireless networks. However, since the UAV are powered by batteries with limited energy capacity, the UAV cannot complete data collection tasks of all sensors without energy replenishment when a large number of sensors are deployed over large monitoring areas. To overcome this problem, we study the Real-time Data Collection with Laser-charging UAV (RDCL) problem, where the UAV is utilized to collect data from a specified WSN and is recharged using Laser Beam Directors (LBDs). This problem aims to collect all sensory data from the WSN and transport it to the base station by optimizing the flight trajectory of UAV such that real-time data performance is ensured It has been proven that the RDCL problem is NP-hard. To address this, we initially focus on studying two sub-problems, the Trajectory Optimization of UAV for Data Collection (TODC) problem and the Charging Trajectory Optimization of UAV (CTO) problem, whose objectives are to find the optimal flight plans of UAV in the data collection areas and charging areas, respectively. Then we propose an approximation algorithm to solve each of them with the constant factor. Subsequently, we present an approximation algorithm that utilizes the solutions obtained from TODC and CTO problems to address the RDCL problem. Finally, the proposed algorithm is verified by extensive simulations.
{"title":"Data collection of wireless sensor network based on trajectory optimization of laser-charged UAV","authors":"Chuanwen Luo , Jian Zhang , Jin Qian , Yi Hong , Zhibo Chen , Yunan Hou , Xiujuan Zhang , Yuqing Zhu","doi":"10.1016/j.hcc.2023.100181","DOIUrl":"10.1016/j.hcc.2023.100181","url":null,"abstract":"<div><p>Unmanned Aerial Vehicle (UAV) can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks (WSNs), which is crucial for providing seamless services and improving the performance in the next generation wireless networks. However, since the UAV are powered by batteries with limited energy capacity, the UAV cannot complete data collection tasks of all sensors without energy replenishment when a large number of sensors are deployed over large monitoring areas. To overcome this problem, we study the Real-time Data Collection with Laser-charging UAV (RDCL) problem, where the UAV is utilized to collect data from a specified WSN and is recharged using Laser Beam Directors (LBDs). This problem aims to collect all sensory data from the WSN and transport it to the base station by optimizing the flight trajectory of UAV such that real-time data performance is ensured It has been proven that the RDCL problem is NP-hard. To address this, we initially focus on studying two sub-problems, the Trajectory Optimization of UAV for Data Collection (TODC) problem and the Charging Trajectory Optimization of UAV (CTO) problem, whose objectives are to find the optimal flight plans of UAV in the data collection areas and charging areas, respectively. Then we propose an approximation algorithm to solve each of them with the constant factor. Subsequently, we present an approximation algorithm that utilizes the solutions obtained from TODC and CTO problems to address the RDCL problem. Finally, the proposed algorithm is verified by extensive simulations.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100181"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522300079X/pdfft?md5=3775a80148dcbf7a3e65166e29bb5334&pid=1-s2.0-S266729522300079X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since the data samples on client devices are usually non-independent and non-identically distributed (non-IID), this will challenge the convergence of federated learning (FL) and reduce communication efficiency. This paper proposes FedQMIX, a node selection algorithm based on multi-agent reinforcement learning(MARL), to address these challenges. Firstly, we observe a connection between model weights and data distribution, and a clustering algorithm can group clients with similar data distribution into the same cluster. Secondly, we propose a QMIX-based mechanism that learns to select devices from clustering results in each communication round to maximize the reward, penalizing the use of more communication rounds and thereby improving the communication efficiency of FL. Finally, experiments show that FedQMIX can reduce the number of communication rounds by 11% and 30% on the MNIST and CIFAR-10 datasets, respectively, compared to the baseline algorithm (Favor).
{"title":"FedQMIX: Communication-efficient federated learning via multi-agent reinforcement learning","authors":"Shaohua Cao , Hanqing Zhang , Tian Wen , Hongwei Zhao , Quancheng Zheng , Weishan Zhang , Danyang Zheng","doi":"10.1016/j.hcc.2023.100179","DOIUrl":"10.1016/j.hcc.2023.100179","url":null,"abstract":"<div><p>Since the data samples on client devices are usually non-independent and non-identically distributed (non-IID), this will challenge the convergence of federated learning (FL) and reduce communication efficiency. This paper proposes FedQMIX, a node selection algorithm based on multi-agent reinforcement learning(MARL), to address these challenges. Firstly, we observe a connection between model weights and data distribution, and a clustering algorithm can group clients with similar data distribution into the same cluster. Secondly, we propose a QMIX-based mechanism that learns to select devices from clustering results in each communication round to maximize the reward, penalizing the use of more communication rounds and thereby improving the communication efficiency of FL. Finally, experiments show that FedQMIX can reduce the number of communication rounds by 11% and 30% on the MNIST and CIFAR-10 datasets, respectively, compared to the baseline algorithm (Favor).</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100179"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000776/pdfft?md5=9424588f5b02e7d1cae86ff00cee768b&pid=1-s2.0-S2667295223000776-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139293479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1016/j.hcc.2023.100183
Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng
The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and universally applicable privacy-preserving smart contract (PPSC) schemes. However, the existing research in this area is fragmented and lacks a comprehensive system overview. This paper aims to bridge the existing research gap on PPSC schemes by systematizing previous studies in this field. The primary focus is on two categories: PPSC schemes based on cryptographic tools like zero-knowledge proofs, as well as schemes based on trusted execution environments. In doing so, we aim to provide a condensed summary of the different approaches taken in constructing PPSC schemes. Additionally, we also offer a comparative analysis of these approaches, highlighting the similarities and differences between them. Furthermore, we shed light on the challenges that developers face when designing and implementing PPSC schemes. Finally, we delve into potential future directions for improving and advancing these schemes, discussing possible avenues for further research and development.
{"title":"SoK: Privacy-preserving smart contract","authors":"Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng","doi":"10.1016/j.hcc.2023.100183","DOIUrl":"10.1016/j.hcc.2023.100183","url":null,"abstract":"<div><p>The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and universally applicable privacy-preserving smart contract (PPSC) schemes. However, the existing research in this area is fragmented and lacks a comprehensive system overview. This paper aims to bridge the existing research gap on PPSC schemes by systematizing previous studies in this field. The primary focus is on two categories: PPSC schemes based on cryptographic tools like zero-knowledge proofs, as well as schemes based on trusted execution environments. In doing so, we aim to provide a condensed summary of the different approaches taken in constructing PPSC schemes. Additionally, we also offer a comparative analysis of these approaches, highlighting the similarities and differences between them. Furthermore, we shed light on the challenges that developers face when designing and implementing PPSC schemes. Finally, we delve into potential future directions for improving and advancing these schemes, discussing possible avenues for further research and development.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100183"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000818/pdfft?md5=96a73c8999524817c0dd436879500b02&pid=1-s2.0-S2667295223000818-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139296441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1016/j.hcc.2023.100185
Yanan Jiang, Hui Xia
Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance. At the same time, current adversarial attack schemes are implemented on static graphs, and the variability of attack models prevents these schemes from transferring to dynamic graphs. In this paper, we use the diffused attack of node injection to attack the DGNNs, and first propose the node injection attack based on structural fragility against DGNNs, named Structural Fragility-based Dynamic Graph Node Injection Attack (SFIA). SFIA firstly determines the target time based on the period weight. Then, it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject. Finally, an optimization function is designed to generate adversarial features for malicious nodes. Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches. When the graph is injected with 1% of the original total number of nodes through SFIA, the link prediction Recall and MRR of the target DGNN link decrease by 17.4% and 14.3% respectively, and the accuracy of node classification decreases by 8.7%.
{"title":"Adversarial attacks against dynamic graph neural networks via node injection","authors":"Yanan Jiang, Hui Xia","doi":"10.1016/j.hcc.2023.100185","DOIUrl":"10.1016/j.hcc.2023.100185","url":null,"abstract":"<div><p>Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance. At the same time, current adversarial attack schemes are implemented on static graphs, and the variability of attack models prevents these schemes from transferring to dynamic graphs. In this paper, we use the diffused attack of node injection to attack the DGNNs, and first propose the node injection attack based on structural fragility against DGNNs, named Structural Fragility-based Dynamic Graph Node Injection Attack (SFIA). SFIA firstly determines the target time based on the period weight. Then, it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject. Finally, an optimization function is designed to generate adversarial features for malicious nodes. Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches. When the graph is injected with 1% of the original total number of nodes through SFIA, the link prediction Recall and MRR of the target DGNN link decrease by 17.4% and 14.3% respectively, and the accuracy of node classification decreases by 8.7%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100185"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000831/pdfft?md5=63dbda3afe972e585f8cc26ab595cb00&pid=1-s2.0-S2667295223000831-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}