Pub Date : 2024-02-16DOI: 10.1007/s00607-024-01260-7
Yuan-Ko Huang, Chien-Pang Lee
We present a new type of location-based queries, namely the Budget Range-based All Neighboring Object Group Query (BR-ANOGQ for short), to offer spatial object information while respecting distance and budget range constraints. This query type finds utility in numerous practical scenarios, such as assisting travelers in selecting fitting destinations for their journeys. To support the BR-ANOGQ, we develop data structures for efficient representation of road networks and employ two index structures, the (R^{cC})-tree and the grid index, for managing spatial objects based on their locations and costs. We introduce two pruning criteria to filter out object sets that do not meet the specified distance d and budget range ([bgt_m, bgt_M]) constraints. We also devise a road network traversal method that selectively accesses a small fraction of objects while generating the query result. The BR-ANOGQ algorithm effectively utilizes index structures and pruning criteria for query processing. Through a series of comprehensive experiments, we demonstrate its efficiency in terms of CPU time and index node accesses, providing valuable insights for location-based queries with constraints.
我们提出了一种新型基于位置的查询,即基于预算范围的所有邻近对象组查询(简称 BR-ANOGQ),在尊重距离和预算范围限制的同时提供空间对象信息。这种查询类型在许多实际场景中都很有用,例如帮助旅行者选择合适的旅行目的地。为了支持BR-ANOGQ,我们开发了高效表示道路网络的数据结构,并采用了两种索引结构--(R^{c})树和网格索引--来根据空间对象的位置和成本管理它们。我们引入了两个剪枝标准来过滤不符合指定距离 d 和预算范围 ([bgt_m, bgt_M]) 约束的对象集。我们还设计了一种路网遍历方法,在生成查询结果时选择性地访问一小部分对象。BR-ANOGQ 算法有效地利用了索引结构和剪枝标准进行查询处理。通过一系列综合实验,我们证明了该算法在 CPU 时间和索引节点访问方面的效率,为基于位置的约束查询提供了有价值的见解。
{"title":"Efficient processing of all neighboring object group queries with budget range constraint in road networks","authors":"Yuan-Ko Huang, Chien-Pang Lee","doi":"10.1007/s00607-024-01260-7","DOIUrl":"https://doi.org/10.1007/s00607-024-01260-7","url":null,"abstract":"<p>We present a new type of location-based queries, namely the <i>Budget Range-based All Neighboring Object Group Query</i> (<i>BR</i>-<i>ANOGQ</i> for short), to offer spatial object information while respecting distance and budget range constraints. This query type finds utility in numerous practical scenarios, such as assisting travelers in selecting fitting destinations for their journeys. To support the <i>BR</i>-<i>ANOGQ</i>, we develop data structures for efficient representation of road networks and employ two index structures, the <span>(R^{cC})</span>-tree and the <i>grid index</i>, for managing spatial objects based on their locations and costs. We introduce two pruning criteria to filter out object sets that do not meet the specified distance <i>d</i> and budget range <span>([bgt_m, bgt_M])</span> constraints. We also devise a road network traversal method that selectively accesses a small fraction of objects while generating the query result. The <i>BR</i>-<i>ANOGQ algorithm</i> effectively utilizes index structures and pruning criteria for query processing. Through a series of comprehensive experiments, we demonstrate its efficiency in terms of CPU time and index node accesses, providing valuable insights for location-based queries with constraints.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"44 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139903247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-08DOI: 10.1007/s00607-024-01259-0
Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu
Many modern day cloud hosted applications such as virtual reality, real time games require low latency data access and computation to improve response time. So it is essential to bring the computation and data storage edge servers closer to the user’s geographical location to improve response times and save bandwidth. In particulars, in online gaming and on demand video services, the required application data present at cloud servers need to be placed on the edge servers to provide low latency app-functionalities. The transfer of huge amount of data from cloud server to edge server incurs high cost and time penalties. Thus, we need an efficient way to solve edge data distribution (EDD) problem which distribute the application data to the edge servers that minimizes transfer cost. In this work, we provide a refined formulation of an optimal approach to solve the EDD problem using integer linear programming (ILP) technique. Due to the time complexity limitation of the ILP approach, we propose an O(k) approximation algorithm based on network Steiner tree estimation (EDD-NSTE) for estimating solutions to dense large-scale EDD problem. The proposed approach is analyzed to be 11/6 approximation which is better than the state-of-the-art 2 approximation EDD-A approach. The experimental evaluation through simulation using real world EUA data set demonstrate that the EDD-NSTE outperform state-of-the-art approach and other representative approaches.
{"title":"Edge data distribution as a network Steiner tree estimation in edge computing","authors":"Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu","doi":"10.1007/s00607-024-01259-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01259-0","url":null,"abstract":"<p>Many modern day cloud hosted applications such as virtual reality, real time games require low latency data access and computation to improve response time. So it is essential to bring the computation and data storage edge servers closer to the user’s geographical location to improve response times and save bandwidth. In particulars, in online gaming and on demand video services, the required application data present at cloud servers need to be placed on the edge servers to provide low latency app-functionalities. The transfer of huge amount of data from cloud server to edge server incurs high cost and time penalties. Thus, we need an efficient way to solve edge data distribution (EDD) problem which distribute the application data to the edge servers that minimizes transfer cost. In this work, we provide a refined formulation of an optimal approach to solve the EDD problem using integer linear programming (ILP) technique. Due to the time complexity limitation of the ILP approach, we propose an O(k) approximation algorithm based on network Steiner tree estimation (EDD-NSTE) for estimating solutions to dense large-scale EDD problem. The proposed approach is analyzed to be 11/6 approximation which is better than the state-of-the-art 2 approximation EDD-A approach. The experimental evaluation through simulation using real world EUA data set demonstrate that the EDD-NSTE outperform state-of-the-art approach and other representative approaches.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"9 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-06DOI: 10.1007/s00607-024-01258-1
Abstract
In this paper, we develop computing machinery within the framework of the String Multiset Rewriting calculus (SMSR), as defined by Barbuti et al. [4], to solve the SAT problem in linear time regarding the number of variables of a given conjunctive normal form. This shows that SMSR can be considered a computational model capable of significantly reducing the time requirement of classical decision problems.
摘要 本文在 Barbuti 等人[4]定义的字符串多集重写微积分(SMSR)框架内开发了一种计算机制,可以在线性时间内求解关于给定连接正则表达式的变量数的 SAT 问题。这表明,SMSR 可以被视为一种计算模型,能够显著降低经典决策问题的时间要求。
{"title":"Solving the SAT problem with the string multiset rewriting calculus","authors":"","doi":"10.1007/s00607-024-01258-1","DOIUrl":"https://doi.org/10.1007/s00607-024-01258-1","url":null,"abstract":"<h3>Abstract</h3> <p>In this paper, we develop computing machinery within the framework of the String Multiset Rewriting calculus (SMSR), as defined by Barbuti et al. [<span>4</span>], to solve the SAT problem in linear time regarding the number of variables of a given conjunctive normal form. This shows that SMSR can be considered a computational model capable of significantly reducing the time requirement of classical decision problems. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"60 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-05DOI: 10.1007/s00607-023-01248-9
Abstract
Internet of Vehicles (IoV) aka V2X is a growing area of research that aims at information exchange between vehicles and all other related objects to develop intelligent transportation systems. IoVs are characterized by high mobility, high-speed internet, varying node density, and dynamic topology and aim to minimize and communicate situations like traffic congestion, accidents, etc. Discovering a routing path in a highly unstable network environment to ensure the successful delivery of packets with minimal overheads. Finding reliable routing links as against shortest path routing is a necessity in IoV networks. In this paper, a routing protocol coined as the dynamic opportunistic routing protocol for IoV (DORP-IoV) is presented. DORP-IoV is an on-demand position-based protocol that seeks the advantage of wireless broadcast advantage to select a hop close to the virtual line of sight between source and destination for communicating the information to the destination. Vehicle movement direction and vehicle density around the ideal hop location are also considered while selecting the next hop for information forwarding. Communicating the information through an optimal number of intermediate nodes is the novelty of the work which ensures better packet delivery with minimized delay and routing overheads. The performance of DORP-IoV is evaluated and results are compared with the performance of Weighted- Greedy Perimeter Coordinator Routing (W-GPCR), Greedy Perimeter Coordinator Routing, and Greedy Perimeter Stateless Routing for varying node density and network connections for various metrics. DORP-IoV shows an improved performance in the range of 8–12% for packet delivery with similar performance for average end-to-end delay compared to W-GPCR. The optimal hop selection mechanism in DORP-IoV reduces the number of hops by 10–30% compared to W-GPCR.
{"title":"Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV)","authors":"","doi":"10.1007/s00607-023-01248-9","DOIUrl":"https://doi.org/10.1007/s00607-023-01248-9","url":null,"abstract":"<h3>Abstract</h3> <p>Internet of Vehicles (IoV) aka V2X is a growing area of research that aims at information exchange between vehicles and all other related objects to develop intelligent transportation systems. IoVs are characterized by high mobility, high-speed internet, varying node density, and dynamic topology and aim to minimize and communicate situations like traffic congestion, accidents, etc. Discovering a routing path in a highly unstable network environment to ensure the successful delivery of packets with minimal overheads. Finding reliable routing links as against shortest path routing is a necessity in IoV networks. In this paper, a routing protocol coined as the dynamic opportunistic routing protocol for IoV (DORP-IoV) is presented. DORP-IoV is an on-demand position-based protocol that seeks the advantage of wireless broadcast advantage to select a hop close to the virtual line of sight between source and destination for communicating the information to the destination. Vehicle movement direction and vehicle density around the ideal hop location are also considered while selecting the next hop for information forwarding. Communicating the information through an optimal number of intermediate nodes is the novelty of the work which ensures better packet delivery with minimized delay and routing overheads. The performance of DORP-IoV is evaluated and results are compared with the performance of Weighted- Greedy Perimeter Coordinator Routing (W-GPCR), Greedy Perimeter Coordinator Routing, and Greedy Perimeter Stateless Routing for varying node density and network connections for various metrics. DORP-IoV shows an improved performance in the range of 8–12% for packet delivery with similar performance for average end-to-end delay compared to W-GPCR. The optimal hop selection mechanism in DORP-IoV reduces the number of hops by 10–30% compared to W-GPCR. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"19 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-03DOI: 10.1007/s00607-023-01252-z
Ehsan Heidari
Smart objects in the Internet of Things (IoT) communicate with one another, gather information, and respond to users requests. In these systems, wireless sensors are used to collect data and monitor the environment at the lowest level. In IoT applications, wireless sensor networks play a pivotal role. Since IoT devices often use batteries, efficiency is important to them such that IoT-related standards and research efforts focus more on energy saving or conservation. In this paper, we have used two meta-heuristics algorithm for clustering and routing in IoT. We cluster the network using a clustering method called WOA-clustering based on the meta-heuristic Whale Optimization Algorithm (WOA) and select the optimal cluster heads. We then use a routing method called HHO-Routing based on the Harris Hawks Optimization (HHO) algorithm, a novel meta-heuristic algorithm, to route the cluster heads to BS. The use of the above methods results in reduced power consumption for reaching the base station (BS). Also, to prove the optimal performance of the proposed methods, these methods were simulated and compared with five different methods in a similar context. It was observed that the consumed energy, the number of survival cycles for the death of the first node, and the data transmission rate were improved. The proposed method is simulated in cooja simulator, and for a more accurate evaluation, we compare it with UCCGRA, PSO-SD, PUDCRP, EECRA, EEMRP algorithms. We see that the proposed method performs better than other methods in terms of energy consumption and network lifespan.
{"title":"A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization","authors":"Ehsan Heidari","doi":"10.1007/s00607-023-01252-z","DOIUrl":"https://doi.org/10.1007/s00607-023-01252-z","url":null,"abstract":"<p>Smart objects in the Internet of Things (IoT) communicate with one another, gather information, and respond to users requests. In these systems, wireless sensors are used to collect data and monitor the environment at the lowest level. In IoT applications, wireless sensor networks play a pivotal role. Since IoT devices often use batteries, efficiency is important to them such that IoT-related standards and research efforts focus more on energy saving or conservation. In this paper, we have used two meta-heuristics algorithm for clustering and routing in IoT. We cluster the network using a clustering method called WOA-clustering based on the meta-heuristic Whale Optimization Algorithm (WOA) and select the optimal cluster heads. We then use a routing method called HHO-Routing based on the Harris Hawks Optimization (HHO) algorithm, a novel meta-heuristic algorithm, to route the cluster heads to BS. The use of the above methods results in reduced power consumption for reaching the base station (BS). Also, to prove the optimal performance of the proposed methods, these methods were simulated and compared with five different methods in a similar context. It was observed that the consumed energy, the number of survival cycles for the death of the first node, and the data transmission rate were improved. The proposed method is simulated in cooja simulator, and for a more accurate evaluation, we compare it with UCCGRA, PSO-SD, PUDCRP, EECRA, EEMRP algorithms. We see that the proposed method performs better than other methods in terms of energy consumption and network lifespan.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"223 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139679379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s neighborhood defined by its transmission range can request for it. In Local Mutual Exclusion (LME), two nodes in the same neighborhood cannot execute the Critical Section (CS) simultaneously, but two non-neighboring nodes can be in the CS at the same time. This is a variation of traditional Mutual Exclusion (ME). The proposed Priority Aware - Request Collector Local Mutual Exclusion (PA-RCLME) algorithm ensures prioritized LME in such FANET structures. The proposed PA-RCLME algorithm is token-based and takes into account the priority of CS requests. It leverages a slow ageing technique to prevent starvation, to avoid a profusion of priority inversions, and to ensure the bounded waiting property of mutual exclusion algorithms. This algorithm introduces a neighborhood search technique that makes the token holder a secondary request collector, thereby reducing average request latency and increasing efficiency. The rapid movement of UAVs and other user nodes makes FANET topology highly dynamic and fault-prone. PA-RCLME algorithm handles it gracefully. Opportunistic Node Simulator (ONE) is used to simulate the algorithm and appropriate performance metrics have been recorded. A comparative analysis with the existing algorithm in the literature is also presented, and the proposed algorithm performs better.
在飞行 Ad Hoc 网络(FANET)中,关键资源位于无人飞行器(UAV)中,UAV 传输范围所定义的邻域内的用户节点可以请求获得关键资源。在本地互斥(LME)中,同一邻域内的两个节点不能同时执行关键部分(CS),但两个非邻域节点可以同时执行关键部分。这是传统互斥(ME)的一种变体。所提出的优先级感知-请求收集器本地互斥(PA-RCLME)算法可确保这种 FANET 结构中的优先级 LME。拟议的 PA-RCLME 算法基于令牌,并考虑了 CS 请求的优先级。它利用缓慢的老化技术来防止饥饿,避免大量优先级倒置,并确保互斥算法的有界等待属性。该算法引入了邻域搜索技术,使令牌持有者成为二级请求收集者,从而减少了平均请求延迟并提高了效率。无人机和其他用户节点的快速移动使得 FANET 拓扑高度动态且易出错。PA-RCLME 算法可从容应对。机会节点模拟器(ONE)用于模拟该算法,并记录了适当的性能指标。此外,还与文献中的现有算法进行了比较分析,结果表明所提出的算法性能更好。
{"title":"A priority aware local mutual exclusion algorithm for flying ad hoc networks","authors":"Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam","doi":"10.1007/s00607-023-01250-1","DOIUrl":"https://doi.org/10.1007/s00607-023-01250-1","url":null,"abstract":"<p>In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s neighborhood defined by its transmission range can request for it. In Local Mutual Exclusion (LME), two nodes in the same neighborhood cannot execute the Critical Section (CS) simultaneously, but two non-neighboring nodes can be in the CS at the same time. This is a variation of traditional Mutual Exclusion (ME). The proposed Priority Aware - Request Collector Local Mutual Exclusion (PA-RCLME) algorithm ensures prioritized LME in such FANET structures. The proposed PA-RCLME algorithm is token-based and takes into account the priority of CS requests. It leverages a slow ageing technique to prevent starvation, to avoid a profusion of priority inversions, and to ensure the bounded waiting property of mutual exclusion algorithms. This algorithm introduces a neighborhood search technique that makes the token holder a secondary request collector, thereby reducing average request latency and increasing efficiency. The rapid movement of UAVs and other user nodes makes FANET topology highly dynamic and fault-prone. PA-RCLME algorithm handles it gracefully. Opportunistic Node Simulator (ONE) is used to simulate the algorithm and appropriate performance metrics have been recorded. A comparative analysis with the existing algorithm in the literature is also presented, and the proposed algorithm performs better.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"40 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139647833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-29DOI: 10.1007/s00607-023-01249-8
Ahmadi Hasan, Ahmad Kamal
The K-means algorithm has been successfully applied to many complex network analysis problems. However, this method is sensitive to how the first cluster centers are chosen. It is possible to minimize superfluous runs by choosing the first cluster center in advance because each run produces a unique set of results. To overcome this issue, an algorithm for Community Detection based on Transitive Closure (CoDTC) has been introduced. In this algorithm, the initial cluster center is provided by degree centrality and T-transitive closure. The algorithm initializes with the calculation of the similarity relation matrix. Then, to avoid the limitation of sparse problems in complex network analysis, we offer the idea of transitive closure on weighted networks to solve the sparsity issue. This notion is based on imposing a t-norm inequality on the connection weights and providing a method to compute them. Finally, based on T-transitive closure, new cluster centers are calculated iteratively to avoid random selection of cluster centers. In this paper, we demonstrate the efficacy of the CoDTC approach on a diverse range of real and artificial networks, encompassing both big and small communities.
K-means 算法已成功应用于许多复杂的网络分析问题。不过,这种方法对如何选择第一个聚类中心很敏感。由于每次运行都会产生一组唯一的结果,因此可以通过提前选择第一个聚类中心来尽量减少多余的运行。为了克服这个问题,我们引入了一种基于 Transitive Closure 的群落检测算法(CoDTC)。在该算法中,初始聚类中心由度中心性和 T 传递闭合提供。该算法通过计算相似性关系矩阵进行初始化。然后,为了避免复杂网络分析中稀疏问题的限制,我们提出了在加权网络上进行传递封闭的想法,以解决稀疏问题。这一概念基于对连接权重施加 t-norm 不等式,并提供了一种计算方法。最后,在 T 传递闭合的基础上,迭代计算新的聚类中心,以避免随机选择聚类中心。在本文中,我们展示了 CoDTC 方法在各种真实和人工网络中的有效性,包括大型和小型社区。
{"title":"Community detection of weighted complex networks via transitive closure","authors":"Ahmadi Hasan, Ahmad Kamal","doi":"10.1007/s00607-023-01249-8","DOIUrl":"https://doi.org/10.1007/s00607-023-01249-8","url":null,"abstract":"<p>The K-means algorithm has been successfully applied to many complex network analysis problems. However, this method is sensitive to how the first cluster centers are chosen. It is possible to minimize superfluous runs by choosing the first cluster center in advance because each run produces a unique set of results. To overcome this issue, an algorithm for Community Detection based on Transitive Closure (CoDTC) has been introduced. In this algorithm, the initial cluster center is provided by degree centrality and T-transitive closure. The algorithm initializes with the calculation of the similarity relation matrix. Then, to avoid the limitation of sparse problems in complex network analysis, we offer the idea of transitive closure on weighted networks to solve the sparsity issue. This notion is based on imposing a t-norm inequality on the connection weights and providing a method to compute them. Finally, based on T-transitive closure, new cluster centers are calculated iteratively to avoid random selection of cluster centers. In this paper, we demonstrate the efficacy of the CoDTC approach on a diverse range of real and artificial networks, encompassing both big and small communities.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"398 1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-26DOI: 10.1007/s00607-023-01253-y
Abstract
With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84(times ) and 1.07(times ) than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94(times ) and 0.90(times ) than that of TEDA without SGX, which indicate TEDA has a good performance.
摘要 随着物联网(IoT)的普及,每秒钟都会产生大量数据。通过分析这些数据,攻击者可以发起各种攻击以谋取利益,如数据篡改、恶意数据注入、身份欺骗等。为了解决这些问题,本文提出了基于可信执行环境和区块链的数据保护架构(TEDA)。在 TEDA 中,不同物联网的边缘设备维护一个联盟区块链,与云端一起实现数据的安全读写操作和验证。此外,为了确保边缘设备本地数据处理的安全,并管理内部轻量级设备,设计了基于英特尔 SGX 的模块。此外,还引入了一种新的事务结构来保护用户的访问模式。实验结果表明,与不带SGX的TEDA相比,带SGX的TEDA写入和读取的空间占用率分别为0.84(次)和1.07(次);与不带SGX的TEDA相比,带SGX的TEDA写入和读取的时间占用率分别为0.94(次)和0.90(次),这表明TEDA具有良好的性能。
{"title":"TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things","authors":"","doi":"10.1007/s00607-023-01253-y","DOIUrl":"https://doi.org/10.1007/s00607-023-01253-y","url":null,"abstract":"<h3>Abstract</h3> <p>With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84<span> <span>(times )</span> </span> and 1.07<span> <span>(times )</span> </span> than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94<span> <span>(times )</span> </span> and 0.90<span> <span>(times )</span> </span> than that of TEDA without SGX, which indicate TEDA has a good performance. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"65 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.1007/s00607-023-01247-w
Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun
The incompleteness of the knowledge graph limits its applications to various downstream tasks. To this end, numerous influential knowledge graph embedding models have been presented and have made great achievements in the domain of knowledge graph completion. However, most of these models only pay attention to the extraction of latent knowledge or translational features, and cannot comprehensively capture the surface semantics, latent interactions, and translational characteristics of triples. In this paper, a novel multi-channel convolutional model, MConvKGC, is presented for knowledge graph completion, which has three feature extraction channels and employs them to simultaneously extract shallow semantics, latent interactions, and translational characteristics, respectively. In addition, MConvKGC adopts an asymmetric convolutional block to comprehensively extract the latent interactions from triples, and process the generated feature maps with various attention mechanisms to further learn local dependencies between entities and relations. The results of the conducted link prediction experiments on FB15k-237, WN18RR, and UMLS indicate that our proposed MConvKGC shows excellent performance and outperforms previous state-of-the-art KGE models in the majority of cases.
{"title":"Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion","authors":"Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun","doi":"10.1007/s00607-023-01247-w","DOIUrl":"https://doi.org/10.1007/s00607-023-01247-w","url":null,"abstract":"<p>The incompleteness of the knowledge graph limits its applications to various downstream tasks. To this end, numerous influential knowledge graph embedding models have been presented and have made great achievements in the domain of knowledge graph completion. However, most of these models only pay attention to the extraction of latent knowledge or translational features, and cannot comprehensively capture the surface semantics, latent interactions, and translational characteristics of triples. In this paper, a novel multi-channel convolutional model, MConvKGC, is presented for knowledge graph completion, which has three feature extraction channels and employs them to simultaneously extract shallow semantics, latent interactions, and translational characteristics, respectively. In addition, MConvKGC adopts an asymmetric convolutional block to comprehensively extract the latent interactions from triples, and process the generated feature maps with various attention mechanisms to further learn local dependencies between entities and relations. The results of the conducted link prediction experiments on FB15k-237, WN18RR, and UMLS indicate that our proposed MConvKGC shows excellent performance and outperforms previous state-of-the-art KGE models in the majority of cases.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"3 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-24DOI: 10.1007/s00607-023-01254-x
Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás
Smartphones have become highly personalized interfaces between people and the technology ecosystem around them. In this sense, they play a key role for a technology shift from the current Internet of Things to a future human-centric paradigm of an Internet of People, automatically adapting smart things and services to the preferences and context of their users. In this paper, we propose the use of Complex Event Processing (CEP) engines deployed in the users’ smartphones granting them context-awareness capabilities in order to react to external stimulus, and enabling them to interact both with smart things and services in the surroundings of the users. With that purpose, we have designed a communication architecture that interconnects CEP engines running on smartphones, providing a framework for building applications for Mobile-based Collaborative Social Computing (MCSC). For that, we make use of previous works of the authors with Digital Avatars, a framework which promotes the use of smartphones for inferring and sharing a unique digital avatar or virtual profile of each user. The resulting framework, which we have called Collaborative CEP, allows to implement complex interactions among users, and between them and the IoT, a common need in Collaborative Social Computing applications. We provide a proof of concept based on the implementation of a Cops and Robbers game to test the expressiveness and correct functioning of the framework, and we evaluate its performance and efficiency.
{"title":"Distributed mobile CEP for collaborative social computing","authors":"Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás","doi":"10.1007/s00607-023-01254-x","DOIUrl":"https://doi.org/10.1007/s00607-023-01254-x","url":null,"abstract":"<p>Smartphones have become highly personalized interfaces between people and the technology ecosystem around them. In this sense, they play a key role for a technology shift from the current Internet of Things to a future human-centric paradigm of an Internet of People, automatically adapting smart things and services to the preferences and context of their users. In this paper, we propose the use of Complex Event Processing (CEP) engines deployed in the users’ smartphones granting them context-awareness capabilities in order to react to external stimulus, and enabling them to interact both with smart things and services in the surroundings of the users. With that purpose, we have designed a communication architecture that interconnects CEP engines running on smartphones, providing a framework for building applications for Mobile-based Collaborative Social Computing (MCSC). For that, we make use of previous works of the authors with Digital Avatars, a framework which promotes the use of smartphones for inferring and sharing a unique digital avatar or virtual profile of each user. The resulting framework, which we have called Collaborative CEP, allows to implement complex interactions among users, and between them and the IoT, a common need in Collaborative Social Computing applications. We provide a proof of concept based on the implementation of a Cops and Robbers game to test the expressiveness and correct functioning of the framework, and we evaluate its performance and efficiency.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}