首页 > 最新文献

EURASIP Journal on Wireless Communications and Networking最新文献

英文 中文
Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach 利用堆叠尔伯格博弈辅助 DSSS 方法为认知无线电网络抗干扰
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-17 DOI: 10.1186/s13638-024-02397-x
Muhammad Imran, Pan Zhiwen, Liu Nan, Muhammad Sajjad, Faisal Mehmood Butt

The proposed study introduces a novel anti-jamming approach for cognitive radio networks (CRNs) by integrating the Stackelberg game model with direct sequence spread spectrum (DSSS) techniques. This innovative combination enhances the security and performance of CRNs by optimizing resource allocation and fortifying network resilience against jamming attacks. The Stackelberg game model provides a strategic framework where the Defender and Adversary dynamically adjust their strategies to achieve Nash equilibrium, ensuring strategic stability. The application of DSSS further improves signal robustness, mitigating interference from jamming attempts. Simulation results demonstrate significant improvements in network security, resource utilization, and overall performance, validating the efficacy and advantages of the proposed scheme in maintaining reliable communication in the presence of adversarial threats.

本研究通过整合斯塔克尔伯格博弈模型和直接序列扩频(DSSS)技术,为认知无线电网络(CRN)引入了一种新型抗干扰方法。这种创新的组合优化了资源分配,增强了网络抵御干扰攻击的能力,从而提高了 CRN 的安全性和性能。斯塔克尔伯格博弈模型提供了一个战略框架,在此框架下,防御方和对抗方可动态调整策略以实现纳什均衡,从而确保战略稳定性。DSSS 的应用进一步提高了信号的鲁棒性,减轻了干扰企图的干扰。仿真结果表明,该方案在网络安全、资源利用率和整体性能方面都有明显改善,验证了该方案在面对对抗威胁时保持可靠通信的功效和优势。
{"title":"Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach","authors":"Muhammad Imran, Pan Zhiwen, Liu Nan, Muhammad Sajjad, Faisal Mehmood Butt","doi":"10.1186/s13638-024-02397-x","DOIUrl":"https://doi.org/10.1186/s13638-024-02397-x","url":null,"abstract":"<p>The proposed study introduces a novel anti-jamming approach for cognitive radio networks (CRNs) by integrating the Stackelberg game model with direct sequence spread spectrum (DSSS) techniques. This innovative combination enhances the security and performance of CRNs by optimizing resource allocation and fortifying network resilience against jamming attacks. The Stackelberg game model provides a strategic framework where the Defender and Adversary dynamically adjust their strategies to achieve Nash equilibrium, ensuring strategic stability. The application of DSSS further improves signal robustness, mitigating interference from jamming attempts. Simulation results demonstrate significant improvements in network security, resource utilization, and overall performance, validating the efficacy and advantages of the proposed scheme in maintaining reliable communication in the presence of adversarial threats.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"32 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SAR analysis of hexagonal-shaped UWB antenna for healthcare applications 用于医疗保健应用的六角形 UWB 天线的 SAR 分析
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-15 DOI: 10.1186/s13638-024-02405-0
Kailash V. Karad, Vaibhav S. Hendre, Jaswantsing L. Rajput, Vivek Kadam, Vaibhav E. Narawade, Ravindra Bakale, Gayatri D. Londhe

This paper comprehensively analyses the specific absorption rate (SAR) for an ultra-wideband (UWB) wearable antenna designed for body-centric communication applications. The study is motivated by the extent of electromagnetic radiation in our surroundings, raising worries about health for wireless device users and wearable devices that utilize UWB technology. The proposed antenna is made of a foam substrate having a dielectric constant of 1.07, a thickness of 2 mm with a dimension of (36times 48times 2 {text{mm}}^{3}). The designed structure optimizes UWB (3.1–10.6 GHz) in connotation with the ISM band of 2.4 GHz. The proposed antenna works well over the wide frequency range resulting in a bandwidth of 11.53 GHz and a total gain of 8.05 dBi. An excellent impedance matching is obtained by creating a stub at the feed point which gives the maximum value of S11 as − 44.88 dB. The analysis focuses on the SAR values to measure the rate of electromagnetic energy absorption by human tissues over 1 and 10 g by constructing an equivalent three-layer body phantom model. The results indicate that the proposed antenna exhibits SAR values well within the limits set by international standards of 1.6 W/kg averaged over 1 g of tissue and 2 W/kg for 10 g of tissue, while maintaining efficient radiation characteristics across the UWB spectrum.

本文全面分析了为以身体为中心的通信应用而设计的超宽带(UWB)可穿戴天线的比吸收率(SAR)。这项研究的动机是我们周围环境中的电磁辐射程度,引起了无线设备用户和使用 UWB 技术的可穿戴设备对健康的担忧。所提出的天线是由介电常数为 1.07、厚度为 2 毫米、尺寸为 (36times 48times 2 {text{mm}}^{3})的泡沫基板制成的。所设计的结构优化了 UWB(3.1-10.6 GHz)与 2.4 GHz ISM 波段的内涵。拟议的天线在很宽的频率范围内工作良好,带宽为 11.53 GHz,总增益为 8.05 dBi。通过在馈电点创建一个存根,实现了极佳的阻抗匹配,使 S11 的最大值达到 - 44.88 dB。分析的重点是 SAR 值,通过构建一个等效三层人体模型来测量人体组织对 1 和 10 g 电磁能量的吸收率。结果表明,拟议天线的 SAR 值完全符合国际标准规定的限值,即平均 1 克组织为 1.6 W/kg,10 克组织为 2 W/kg,同时在整个 UWB 频谱中保持高效的辐射特性。
{"title":"A SAR analysis of hexagonal-shaped UWB antenna for healthcare applications","authors":"Kailash V. Karad, Vaibhav S. Hendre, Jaswantsing L. Rajput, Vivek Kadam, Vaibhav E. Narawade, Ravindra Bakale, Gayatri D. Londhe","doi":"10.1186/s13638-024-02405-0","DOIUrl":"https://doi.org/10.1186/s13638-024-02405-0","url":null,"abstract":"<p>This paper comprehensively analyses the specific absorption rate (SAR) for an ultra-wideband (UWB) wearable antenna designed for body-centric communication applications. The study is motivated by the extent of electromagnetic radiation in our surroundings, raising worries about health for wireless device users and wearable devices that utilize UWB technology. The proposed antenna is made of a foam substrate having a dielectric constant of 1.07, a thickness of 2 mm with a dimension of <span>(36times 48times 2 {text{mm}}^{3})</span>. The designed structure optimizes UWB (3.1–10.6 GHz) in connotation with the ISM band of 2.4 GHz. The proposed antenna works well over the wide frequency range resulting in a bandwidth of 11.53 GHz and a total gain of 8.05 dBi. An excellent impedance matching is obtained by creating a stub at the feed point which gives the maximum value of S<sub>11</sub> as − 44.88 dB. The analysis focuses on the SAR values to measure the rate of electromagnetic energy absorption by human tissues over 1 and 10 g by constructing an equivalent three-layer body phantom model. The results indicate that the proposed antenna exhibits SAR values well within the limits set by international standards of 1.6 W/kg averaged over 1 g of tissue and 2 W/kg for 10 g of tissue, while maintaining efficient radiation characteristics across the UWB spectrum.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"16 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Successive interference cancellation with multiple feedback in NOMA-enabled massive IoT network 在支持 NOMA 的大规模物联网网络中利用多重反馈消除连续干扰
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-13 DOI: 10.1186/s13638-024-02404-1
Shubham Bisen, Vimal Bhatia, Peter Brida

In this work, we propose a multiple feedback-based successive interference cancellation (SIC) scheme for an ultra-dense Internet of Things (IoT) device network. Non-orthogonal multiple access (NOMA) enables massive connectivity with improved user fairness and spectral efficiency and is envisaged as a multiple access technique for IoT devices. NOMA simultaneously serves multiple users within a single resource block, leading to unbounded yet regulated multi-user interference. SIC is widely adopted in the NOMA system to detect users’ symbols. Nevertheless, multi-user interference and error propagation in the SIC layer are inherent challenges in NOMA. Recent studies have aimed to minimize interference and error propagation, imposing stringent conditions on the number of users and power allocation. Thus, this paper proposes novel multiple feedback-based SIC algorithms for the uplink multi-user NOMA scenarios that outperform the conventional SIC. Further, the proposed algorithm’s performance is analyzed under the practical case of imperfect channel state information at the receiver node to validate the robustness. The computational complexity of multiple feedback SIC is compared with the conventional SIC.

在这项工作中,我们为超密集物联网(IoT)设备网络提出了一种基于多重反馈的连续干扰消除(SIC)方案。非正交多址接入(NOMA)可实现大规模连接,提高用户公平性和频谱效率,被视为物联网设备的多址接入技术。NOMA 在单个资源块内同时为多个用户提供服务,从而导致无限制但可调节的多用户干扰。NOMA 系统广泛采用 SIC 来检测用户符号。然而,多用户干扰和 SIC 层的错误传播是 NOMA 系统面临的固有挑战。近期的研究旨在通过对用户数量和功率分配施加严格的条件,最大限度地减少干扰和误差传播。因此,本文针对上行多用户 NOMA 场景提出了新型基于多重反馈的 SIC 算法,其性能优于传统 SIC。此外,本文还分析了在接收节点信道状态信息不完善的实际情况下所提出算法的性能,以验证其鲁棒性。多重反馈 SIC 的计算复杂度与传统 SIC 进行了比较。
{"title":"Successive interference cancellation with multiple feedback in NOMA-enabled massive IoT network","authors":"Shubham Bisen, Vimal Bhatia, Peter Brida","doi":"10.1186/s13638-024-02404-1","DOIUrl":"https://doi.org/10.1186/s13638-024-02404-1","url":null,"abstract":"<p>In this work, we propose a multiple feedback-based successive interference cancellation (SIC) scheme for an ultra-dense Internet of Things (IoT) device network. Non-orthogonal multiple access (NOMA) enables massive connectivity with improved user fairness and spectral efficiency and is envisaged as a multiple access technique for IoT devices. NOMA simultaneously serves multiple users within a single resource block, leading to unbounded yet regulated multi-user interference. SIC is widely adopted in the NOMA system to detect users’ symbols. Nevertheless, multi-user interference and error propagation in the SIC layer are inherent challenges in NOMA. Recent studies have aimed to minimize interference and error propagation, imposing stringent conditions on the number of users and power allocation. Thus, this paper proposes novel multiple feedback-based SIC algorithms for the uplink multi-user NOMA scenarios that outperform the conventional SIC. Further, the proposed algorithm’s performance is analyzed under the practical case of imperfect channel state information at the receiver node to validate the robustness. The computational complexity of multiple feedback SIC is compared with the conventional SIC.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"7 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of shared relay CR-NOMA network based on SWIPT 基于 SWIPT 的共享中继 CR-NOMA 网络性能分析
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-09 DOI: 10.1186/s13638-024-02398-w
Chuanwang Song, Yuanjun Wang, Yuanteng Zhou, Yinghao Ma, Enyu Li, Keyong Hu

With the development of wireless communication technology, the number of devices accessing the communication network is increasing. This paper addresses critical issues such as low spectrum resource utilization and the energy constraints of devices. The investigation focuses on the system performance of the shared relay Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) network based on Simultaneous Wireless Information and Power Transfer (SWIPT) network model. Unlike the existing CR-NOMA model in which the secondary network user do not participate in the transmission of information from the primary network, we consider the secondary network near user as shared relay. The shared relay utilizes SWIPT technology to harvest energy using a nonlinear energy harvesting model. Additionally, the shared relay assists in transmitting information from the primary network base station to primary user, as well as from the secondary network base station to far user of the secondary network. Subsequently, we conduct a series of simulations to analyze the effects of Signal-to-Noise Ratio (SNR), power distribution factor, interference threshold, and time-switching (TS) factor on system performance. Furthermore, we compare and analyze the performance of our proposed network model against CR-NOMA network across three dimensions: outage probability, throughput, and energy efficiency. Our results demonstrate that the proposed network model exhibits superior outage performance and enhances user throughput compared to the CR-NOMA network. Additionally, it demonstrates improved energy efficiency compared to the shared relay CR-NOMA network, leading to an overall improvement in network performance.

随着无线通信技术的发展,接入通信网络的设备数量不断增加。本文探讨了频谱资源利用率低和设备能量限制等关键问题。研究重点是基于同步无线信息和功率传输(SWIPT)网络模型的共享中继认知无线电非正交多址(CR-NOMA)网络的系统性能。在现有的 CR-NOMA 模型中,二级网络用户不参与一级网络的信息传输,与此不同,我们将二级网络附近的用户视为共享中继。共享中继利用 SWIPT 技术,通过非线性能量收集模型收集能量。此外,共享中继还协助从主网络基站向主用户传输信息,以及从辅助网络基站向辅助网络远端用户传输信息。随后,我们进行了一系列模拟,分析信噪比(SNR)、功率分配系数、干扰阈值和时间切换(TS)系数对系统性能的影响。此外,我们还从中断概率、吞吐量和能效三个维度比较和分析了我们提出的网络模型与 CR-NOMA 网络的性能。我们的结果表明,与 CR-NOMA 网络相比,我们提出的网络模型表现出更优越的中断性能,并提高了用户吞吐量。此外,与共享中继 CR-NOMA 网络相比,它还提高了能效,从而全面改善了网络性能。
{"title":"Performance analysis of shared relay CR-NOMA network based on SWIPT","authors":"Chuanwang Song, Yuanjun Wang, Yuanteng Zhou, Yinghao Ma, Enyu Li, Keyong Hu","doi":"10.1186/s13638-024-02398-w","DOIUrl":"https://doi.org/10.1186/s13638-024-02398-w","url":null,"abstract":"<p>With the development of wireless communication technology, the number of devices accessing the communication network is increasing. This paper addresses critical issues such as low spectrum resource utilization and the energy constraints of devices. The investigation focuses on the system performance of the shared relay Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) network based on Simultaneous Wireless Information and Power Transfer (SWIPT) network model. Unlike the existing CR-NOMA model in which the secondary network user do not participate in the transmission of information from the primary network, we consider the secondary network near user as shared relay. The shared relay utilizes SWIPT technology to harvest energy using a nonlinear energy harvesting model. Additionally, the shared relay assists in transmitting information from the primary network base station to primary user, as well as from the secondary network base station to far user of the secondary network. Subsequently, we conduct a series of simulations to analyze the effects of Signal-to-Noise Ratio (SNR), power distribution factor, interference threshold, and time-switching (TS) factor on system performance. Furthermore, we compare and analyze the performance of our proposed network model against CR-NOMA network across three dimensions: outage probability, throughput, and energy efficiency. Our results demonstrate that the proposed network model exhibits superior outage performance and enhances user throughput compared to the CR-NOMA network. Additionally, it demonstrates improved energy efficiency compared to the shared relay CR-NOMA network, leading to an overall improvement in network performance.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"4 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational offloading into UAV swarm networks: a systematic literature review 无人机蜂群网络的计算卸载:系统文献综述
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-07 DOI: 10.1186/s13638-024-02401-4
Asrar Ahmed Baktayan, Ammar Thabit Zahary, Axel Sikora, Dominik Welte

Unmanned Aerial Vehicle (UAV) swarms have emerged as a promising technology for various applications, such as delivery, surveillance, and infrastructure inspection. An additional feature of deploying large UAV swarms is their use in mobile offloading networking. At the same time, this implies a key challenge in the efficient management of the computational and networking requirements for these offloading processes. This paper aims to fill this gap through a systematic literature review (SLR) analysing the research on distributed task offloading in UAV swarms. We conducted a systematic search of major scientific databases to identify relevant literature published between 2019 and 2023. A total of 63 papers were selected through a multistage screening process and their key contributions. This SLR aims to provide the current state of research on UAV swarm task offloading, including considerations for computation offloading, the role of UAV swarms, different aspects of UAV swarms, the number of UAVs in swarms impacting performance, and open issues. Our review also highlights UAV swarm offloading in various domains and discusses the challenges and limitations that must be addressed to ensure the widespread adoption of this technology. We outline the future research directions and potential applications of UAV swarm offloading, including its integration with other technologies.

无人驾驶飞行器(UAV)群已成为一种前景广阔的技术,可用于各种应用领域,如投递、监控和基础设施检测。部署大型无人机群的另一个特点是将其用于移动卸载网络。与此同时,这也意味着在有效管理这些卸载过程的计算和网络需求方面存在关键挑战。本文旨在通过系统文献综述(SLR)分析无人机群分布式任务卸载研究,填补这一空白。我们对主要科学数据库进行了系统检索,以确定 2019 年至 2023 年间发表的相关文献。经过多阶段筛选,共选出 63 篇论文及其主要贡献。本SLR旨在提供无人机群任务卸载的研究现状,包括计算卸载的考虑因素、无人机群的作用、无人机群的不同方面、影响性能的无人机群数量以及开放性问题。我们的综述还重点介绍了不同领域的无人机群卸载,并讨论了为确保该技术得到广泛应用而必须应对的挑战和限制。我们概述了无人机群卸载的未来研究方向和潜在应用,包括与其他技术的整合。
{"title":"Computational offloading into UAV swarm networks: a systematic literature review","authors":"Asrar Ahmed Baktayan, Ammar Thabit Zahary, Axel Sikora, Dominik Welte","doi":"10.1186/s13638-024-02401-4","DOIUrl":"https://doi.org/10.1186/s13638-024-02401-4","url":null,"abstract":"<p>Unmanned Aerial Vehicle (UAV) swarms have emerged as a promising technology for various applications, such as delivery, surveillance, and infrastructure inspection. An additional feature of deploying large UAV swarms is their use in mobile offloading networking. At the same time, this implies a key challenge in the efficient management of the computational and networking requirements for these offloading processes. This paper aims to fill this gap through a systematic literature review (SLR) analysing the research on distributed task offloading in UAV swarms. We conducted a systematic search of major scientific databases to identify relevant literature published between 2019 and 2023. A total of 63 papers were selected through a multistage screening process and their key contributions. This SLR aims to provide the current state of research on UAV swarm task offloading, including considerations for computation offloading, the role of UAV swarms, different aspects of UAV swarms, the number of UAVs in swarms impacting performance, and open issues. Our review also highlights UAV swarm offloading in various domains and discusses the challenges and limitations that must be addressed to ensure the widespread adoption of this technology. We outline the future research directions and potential applications of UAV swarm offloading, including its integration with other technologies.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold-driven K-means sector clustering algorithm for wireless sensor networks 用于无线传感器网络的阈值驱动 K-means 扇形聚类算法
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-04 DOI: 10.1186/s13638-024-02403-2
Bo Zeng, Shanshan Li, Xiaofeng Gao

The clustering algorithm is an effective method for developing energy efficiency routing protocol for wireless sensor networks (WSNs). In clustered WSNs, cluster heads must handle high traffic, thus consuming more energy. Therefore, forming balanced clusters and selecting optimal cluster heads are significant challenges. The paper proposes a sector clustering algorithm based on K-means called KMSC. KMSC improves efficiency and balances the cluster size by employing symmetric dividing sectors in conjunction with K-means. For the selection of cluster heads (CHs), KMSC uses the residual energy and distance to calculate the weight of the node, then selects the node with the highest weight as CH. A hybrid single-hop and multi-hop communication is utilized to reduce long-distance transmissions. Furthermore, the impact of the number of sectors, the threshold for clustering, and the network size on the performance of KMSC has been explored. The simulation results show that KMSC outperforms EECPK-means, K-means, TSC, LSC, and SEECP in terms of FND, HND, and LND.

聚类算法是为无线传感器网络(WSN)开发节能路由协议的有效方法。在聚类 WSN 中,簇头必须处理高流量,从而消耗更多能量。因此,形成平衡的簇和选择最佳簇头是一项重大挑战。本文提出了一种基于 K-means 的扇区聚类算法,称为 KMSC。KMSC 通过将对称划分扇区与 K-means 结合使用,提高了效率并平衡了簇的大小。在簇头(CH)的选择上,KMSC 使用剩余能量和距离来计算节点的权重,然后选择权重最高的节点作为 CH。为了减少长距离传输,KMSC 采用了单跳和多跳混合通信方式。此外,还探讨了扇区数量、聚类阈值和网络规模对 KMSC 性能的影响。仿真结果表明,KMSC 在 FND、HND 和 LND 方面优于 EECPK-means、K-means、TSC、LSC 和 SEECP。
{"title":"Threshold-driven K-means sector clustering algorithm for wireless sensor networks","authors":"Bo Zeng, Shanshan Li, Xiaofeng Gao","doi":"10.1186/s13638-024-02403-2","DOIUrl":"https://doi.org/10.1186/s13638-024-02403-2","url":null,"abstract":"<p>The clustering algorithm is an effective method for developing energy efficiency routing protocol for wireless sensor networks (WSNs). In clustered WSNs, cluster heads must handle high traffic, thus consuming more energy. Therefore, forming balanced clusters and selecting optimal cluster heads are significant challenges. The paper proposes a sector clustering algorithm based on K-means called KMSC. KMSC improves efficiency and balances the cluster size by employing symmetric dividing sectors in conjunction with K-means. For the selection of cluster heads (CHs), KMSC uses the residual energy and distance to calculate the weight of the node, then selects the node with the highest weight as CH. A hybrid single-hop and multi-hop communication is utilized to reduce long-distance transmissions. Furthermore, the impact of the number of sectors, the threshold for clustering, and the network size on the performance of KMSC has been explored. The simulation results show that KMSC outperforms EECPK-means, K-means, TSC, LSC, and SEECP in terms of FND, HND, and LND.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"39 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes 使用有限块长代码的移动边缘计算网络的安全意识节能设计
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-03 DOI: 10.1186/s13638-024-02395-z
Chenhao Shi, Yulin Hu, Yao Zhu, Anke Schmeink

Energy efficiency and physical-layer security are crucial considerations in the advancement of mobile edge computing systems. This paper addresses the trade-off between secure-reliability and energy consumption in finite blocklength (FBL) communications. Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. We propose an optimization framework aimed at minimizing energy consumption while ensuring secure-reliability by decomposing the problem into manageable subproblems. By demonstrating the convexity of the objective function concerning the variables, we establish the existence of an optimal parameter selection for the problem. This implies that practical optimization of parameters can significantly enhance system performance. Our numerical results demonstrate that the application of FBL regime and retransmission mechanism can effectively reduce the energy consumption of the system while ensuring secure-reliability. For the quantitative analyses, the retransmission mechanism is 33.1% better than no retransmission, and the FBL regime is 13.1% better than infinite blocklength (IBL) coding.

在移动边缘计算系统的发展过程中,能效和物理层安全性是至关重要的考虑因素。本文探讨了有限块长(FBL)通信中安全可靠性与能耗之间的权衡问题。具体来说,我们研究了一个涉及用户、合法边缘计算服务器和窃听者的三节点场景,其中用户将敏感数据卸载到边缘服务器,同时面临潜在的窃听威胁。我们提出了一个优化框架,旨在通过将问题分解为可管理的子问题,最大限度地降低能耗,同时确保安全可靠性。通过证明变量目标函数的凸性,我们确定了问题的最优参数选择。这意味着参数的实际优化可以显著提高系统性能。我们的数值结果表明,应用 FBL 机制和重传机制可以有效降低系统能耗,同时确保系统的安全可靠。在定量分析中,重传机制比不重传好 33.1%,FBL 机制比无限块长(IBL)编码好 13.1%。
{"title":"Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes","authors":"Chenhao Shi, Yulin Hu, Yao Zhu, Anke Schmeink","doi":"10.1186/s13638-024-02395-z","DOIUrl":"https://doi.org/10.1186/s13638-024-02395-z","url":null,"abstract":"<p>Energy efficiency and physical-layer security are crucial considerations in the advancement of mobile edge computing systems. This paper addresses the trade-off between secure-reliability and energy consumption in finite blocklength (FBL) communications. Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. We propose an optimization framework aimed at minimizing energy consumption while ensuring secure-reliability by decomposing the problem into manageable subproblems. By demonstrating the convexity of the objective function concerning the variables, we establish the existence of an optimal parameter selection for the problem. This implies that practical optimization of parameters can significantly enhance system performance. Our numerical results demonstrate that the application of FBL regime and retransmission mechanism can effectively reduce the energy consumption of the system while ensuring secure-reliability. For the quantitative analyses, the retransmission mechanism is 33.1% better than no retransmission, and the FBL regime is 13.1% better than infinite blocklength (IBL) coding.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2013 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives 无线链路层动态对称密钥生成:信息论视角
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-27 DOI: 10.1186/s13638-024-02396-y
David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim

The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges the possibility of breaches when adequate computational resources are available, that is why information-theoretic security is being explored, which suggests the existence of unbreakable cryptographic systems even in the presence of limitless processing power. Secret key exchange has traditionally relied on RSA or DH protocols, but researchers are now exploring innovative approaches for sharing secret keys among wireless network devices, leveraging physical or link layer characteristics. This research seeks to revolutionize secure multi-party key acquisition in wireless networks, capitalizing on information-theoretic security and collaborative data extraction. The proposed secret key generation framework comprehensively organizes and explains the information-theoretic aspects of secret key generation within the lower layers of wireless networks, especially the link layer, proposes a novel information-theoretic SKG framework for the dynamic acquisition of symmetric secret keys, and responds to contemporary information security challenges by relying on information-theory principles rather than vulnerable mathematical relationships in the post-quantum period. A new cryptographic key can be generated using a straightforward method, and when it is combined (XORed) with the previous key, it creates a continuously changing secret for encryption and decryption. This approach enhances security because, as attackers attempt to break the encryption, the system generates fresh, dynamic keys, making it progressively more challenging for them to succeed. The research work in question integrates key renewal, or how often keys are updated (dynamic keys), with a security off-period. It introduces a framework for determining the best key refresh rate based on the anticipated rate at which keys might be compromised. Furthermore, the proposed framework is scalable, allowing new nodes to quickly join the existing network. The system was tested with multiple nodes equipped with IEEE 802.11 interfaces, which were set in monitor mode to capture frames at the link layer. Nodes map their on-time frames onto their Bloom filters. Nodes exchange these Bloom filters in a feedback mechanism. Nodes extract those frames from their .pcap files, which are present in all Bloom filters; these are common frames among all nodes. These frames are used to form a shared secret that is passed to HMAC Key Derivation Function by each node to acquire the final encryption key of the required length. The validation of this encryption key is performed using a simple challenge-response protocol; upon successful validation, encrypted communication begins. Otherwise, the key generation process is restarted.

无线通信的扩展带来了安全漏洞,强调了安全系统的基本需求,即优先考虑数据保护的保密性、完整性和其他关键方面。由于计算安全承认在有足够计算资源的情况下存在漏洞的可能性,这也是人们探索信息论安全的原因,信息论安全表明,即使在处理能力无限的情况下,也存在牢不可破的加密系统。密钥交换传统上依赖于 RSA 或 DH 协议,但研究人员现在正在探索利用物理层或链路层特性在无线网络设备之间共享密钥的创新方法。这项研究旨在利用信息论安全和协作数据提取技术,彻底改变无线网络中的多方密钥安全获取方式。所提出的秘钥生成框架全面组织和解释了无线网络底层(尤其是链路层)秘钥生成的信息论问题,提出了用于动态获取对称秘钥的新型信息论 SKG 框架,并在后量子时代依靠信息论原理而不是脆弱的数学关系来应对当代信息安全挑战。新的加密密钥可以用一种简单的方法生成,当它与之前的密钥结合(XOR)时,就会产生一个不断变化的用于加密和解密的秘密。这种方法增强了安全性,因为当攻击者试图破解加密时,系统会生成新的、动态的密钥,使攻击者的成功难度逐渐增加。相关研究工作将密钥更新或密钥更新频率(动态密钥)与安全关闭期结合起来。它引入了一个框架,根据密钥可能被泄露的预期速度来确定最佳密钥更新率。此外,建议的框架还具有可扩展性,允许新节点快速加入现有网络。该系统使用配备 IEEE 802.11 接口的多个节点进行了测试,这些节点被设置为监控模式,以便在链路层捕获帧。节点将其准时帧映射到其 Bloom 过滤器上。节点通过反馈机制交换这些 Bloom 过滤器。节点从自己的 .pcap 文件中提取存在于所有 Bloom 过滤器中的帧,这些帧是所有节点的共同帧。这些帧用于形成共享密文,每个节点将其传递给 HMAC 密钥推导函数,以获取所需长度的最终加密密钥。加密密钥的验证使用简单的挑战-响应协议进行;验证成功后,加密通信开始。否则,密钥生成过程将重新开始。
{"title":"A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives","authors":"David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim","doi":"10.1186/s13638-024-02396-y","DOIUrl":"https://doi.org/10.1186/s13638-024-02396-y","url":null,"abstract":"<p>The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges the possibility of breaches when adequate computational resources are available, that is why information-theoretic security is being explored, which suggests the existence of unbreakable cryptographic systems even in the presence of limitless processing power. Secret key exchange has traditionally relied on RSA or DH protocols, but researchers are now exploring innovative approaches for sharing secret keys among wireless network devices, leveraging physical or link layer characteristics. This research seeks to revolutionize secure multi-party key acquisition in wireless networks, capitalizing on information-theoretic security and collaborative data extraction. The proposed secret key generation framework comprehensively organizes and explains the information-theoretic aspects of secret key generation within the lower layers of wireless networks, especially the link layer, proposes a novel information-theoretic SKG framework for the dynamic acquisition of symmetric secret keys, and responds to contemporary information security challenges by relying on information-theory principles rather than vulnerable mathematical relationships in the post-quantum period. A new cryptographic key can be generated using a straightforward method, and when it is combined (XORed) with the previous key, it creates a continuously changing secret for encryption and decryption. This approach enhances security because, as attackers attempt to break the encryption, the system generates fresh, dynamic keys, making it progressively more challenging for them to succeed. The research work in question integrates key renewal, or how often keys are updated (dynamic keys), with a security off-period. It introduces a framework for determining the best key refresh rate based on the anticipated rate at which keys might be compromised. Furthermore, the proposed framework is scalable, allowing new nodes to quickly join the existing network. The system was tested with multiple nodes equipped with IEEE 802.11 interfaces, which were set in monitor mode to capture frames at the link layer. Nodes map their on-time frames onto their Bloom filters. Nodes exchange these Bloom filters in a feedback mechanism. Nodes extract those frames from their .pcap files, which are present in all Bloom filters; these are common frames among all nodes. These frames are used to form a shared secret that is passed to HMAC Key Derivation Function by each node to acquire the final encryption key of the required length. The validation of this encryption key is performed using a simple challenge-response protocol; upon successful validation, encrypted communication begins. Otherwise, the key generation process is restarted.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"24 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-complexity cooperative active and passive beamforming multi-RIS-assisted communication networks 低复杂度合作式主动和被动波束成形多 RIS 辅助通信网络
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-27 DOI: 10.1186/s13638-024-02375-3
Mostafa M. Elsherbini, Osama A. Omer, Mostafa Salah

Reconfigurable intelligent surface (RIS) is a groundbreaking technology that has a significant potential for sixth generation (6G) networks. Its unique capability to control wireless environments makes it an attractive option. However, the spatial diversity increased by assisting users with all deployed RISs, this investigation has two drawbacks the high complexity design, and the received signals by the far RISs are severely attenuated. Therefore, we propose a RIS selection strategy to select the proper RISs as a pre-stage before the joint beamforming between the base station (BS) and RISs to reduce the high complexity of joint beamforming optimization. Furthermore, the joint active and passive beamforming problem based on the selection is formulated. Hence, achieving spatial diversity by examining cooperation between passive beamforming of multi-hop RIS, leads to a challenging problem. To tackle this issue, we design an algorithm for the RIS selection scheme. Also, to relax the non-convexity of the proposed problem, we decouple the problem into solvable subproblems by utilizing the fractional programming (FP) and quadratic transform (QT) optimization methods. Simulation results have demonstrated through different user locations the effectiveness of the selection strategy in performance enhancement by 30% in the sum rate, besides an obvious reduction in the complexity cost than other techniques.

可重构智能表面(RIS)是一项突破性技术,在第六代(6G)网络中具有巨大潜力。它控制无线环境的独特能力使其成为一种极具吸引力的选择。然而,通过协助用户使用所有部署的 RIS 来增加空间多样性,这项研究有两个缺点,一是设计复杂度高,二是远距离 RIS 接收到的信号衰减严重。因此,我们提出了一种 RIS 选择策略,在基站(BS)和 RIS 之间进行联合波束成形之前,先选择合适的 RIS,以降低联合波束成形优化的高复杂度。此外,还提出了基于选择的主动和被动联合波束成形问题。因此,通过研究多跳 RIS 的无源波束成形之间的合作来实现空间分集是一个具有挑战性的问题。为了解决这个问题,我们设计了一种 RIS 选择方案的算法。此外,为了放宽所提问题的非凸性,我们利用分数编程(FP)和二次变换(QT)优化方法,将问题解耦为可求解的子问题。仿真结果表明,与其他技术相比,该选择策略不仅明显降低了复杂度成本,还通过不同的用户位置有效地提高了 30% 的总和率。
{"title":"Low-complexity cooperative active and passive beamforming multi-RIS-assisted communication networks","authors":"Mostafa M. Elsherbini, Osama A. Omer, Mostafa Salah","doi":"10.1186/s13638-024-02375-3","DOIUrl":"https://doi.org/10.1186/s13638-024-02375-3","url":null,"abstract":"<p>Reconfigurable intelligent surface (RIS) is a groundbreaking technology that has a significant potential for sixth generation (6G) networks. Its unique capability to control wireless environments makes it an attractive option. However, the spatial diversity increased by assisting users with all deployed RISs, this investigation has two drawbacks the high complexity design, and the received signals by the far RISs are severely attenuated. Therefore, we propose a RIS selection strategy to select the proper RISs as a pre-stage before the joint beamforming between the base station (BS) and RISs to reduce the high complexity of joint beamforming optimization. Furthermore, the joint active and passive beamforming problem based on the selection is formulated. Hence, achieving spatial diversity by examining cooperation between passive beamforming of multi-hop RIS, leads to a challenging problem. To tackle this issue, we design an algorithm for the RIS selection scheme. Also, to relax the non-convexity of the proposed problem, we decouple the problem into solvable subproblems by utilizing the fractional programming (FP) and quadratic transform (QT) optimization methods. Simulation results have demonstrated through different user locations the effectiveness of the selection strategy in performance enhancement by 30% in the sum rate, besides an obvious reduction in the complexity cost than other techniques.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"130 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-efficient full-duplex near user with power allocation and antenna selection in NOMA-based systems 基于 NOMA 的系统中功率分配和天线选择的高能效全双工近用户系统
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-23 DOI: 10.1186/s13638-024-02391-3
Mahsa Shirzadian Gilan, Behrouz Maham

This paper proposes a power scaling (PS) technique aimed at mitigating the outage floor problem commonly encountered in multi-user full-duplex (FD) non-orthogonal multiple access (NOMA) systems. Two antenna modes denominated as adaptive antenna mode (AAM) and fixed antenna mode (FAM) are utilized in this work for L FD near users in close proximity. In addition, a combined method of selecting both antenna mode and near user integrated with PS is employed to improve the overall network performance. Moreover, a power allocation between the chosen near user and far user is considered. In the low-to-moderate power regions, by AAM and FAM, we achieve twice of full diversity gain and full diversity gain, respectively. The research presents mathematical expressions for deriving the average capacity and outage probability and supports the theoretical findings with simulation-based evidence. The results of this work show that PS method not only contributes to a greater spatial diversity but also leads to superior performance compared to traditional FD NOMA systems. Moreover, our proposed method overcomes the outage floor and capacity ceiling. Furthermore, the work can be developed to 6G massive MIMO technology in multi-user FD cooperative NOMA systems.

本文提出了一种功率缩放(PS)技术,旨在缓解多用户全双工(FD)非正交多址(NOMA)系统中常见的中断底线问题。本研究采用了自适应天线模式(AAM)和固定天线模式(FAM)两种天线模式,用于近距离用户的 L FD。此外,为提高整体网络性能,还采用了天线模式和近用户选择与 PS 集成的组合方法。此外,还考虑了所选近距离用户和远距离用户之间的功率分配。在中低功率区域,通过 AAM 和 FAM,我们分别实现了全分集增益和全分集增益的两倍。研究提出了推导平均容量和中断概率的数学表达式,并通过基于仿真的证据来支持理论结论。研究结果表明,与传统的 FD NOMA 系统相比,PS 方法不仅有助于实现更大的空间分集,还能带来更优越的性能。此外,我们提出的方法还克服了中断下限和容量上限。此外,这项工作还可以发展到多用户 FD 协同 NOMA 系统中的 6G 大规模 MIMO 技术。
{"title":"Power-efficient full-duplex near user with power allocation and antenna selection in NOMA-based systems","authors":"Mahsa Shirzadian Gilan, Behrouz Maham","doi":"10.1186/s13638-024-02391-3","DOIUrl":"https://doi.org/10.1186/s13638-024-02391-3","url":null,"abstract":"<p>This paper proposes a power scaling (PS) technique aimed at mitigating the outage floor problem commonly encountered in multi-user full-duplex (FD) non-orthogonal multiple access (NOMA) systems. Two antenna modes denominated as adaptive antenna mode (AAM) and fixed antenna mode (FAM) are utilized in this work for <i>L</i> FD near users in close proximity. In addition, a combined method of selecting both antenna mode and near user integrated with PS is employed to improve the overall network performance. Moreover, a power allocation between the chosen near user and far user is considered. In the low-to-moderate power regions, by AAM and FAM, we achieve twice of full diversity gain and full diversity gain, respectively. The research presents mathematical expressions for deriving the average capacity and outage probability and supports the theoretical findings with simulation-based evidence. The results of this work show that PS method not only contributes to a greater spatial diversity but also leads to superior performance compared to traditional FD NOMA systems. Moreover, our proposed method overcomes the outage floor and capacity ceiling. Furthermore, the work can be developed to 6G massive MIMO technology in multi-user FD cooperative NOMA systems.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"87 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EURASIP Journal on Wireless Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1