首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks 针对物联网网络的统一特征选择的通用轻量级入侵检测模型
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1002/nem.2291
Renya Nath N, Hiran V. Nath

The applicability of the Internet of Things (IoT) cutting across different domains has resulted in newer “things” acquiring IP connectivity. These things, technically known as IoT devices, are vulnerable to diverse security threats. Consequently, there has been an exponential increase in IoT malware over the past 5 years, and securing IoT devices from such attacks is a pressing concern in the current era. However, the traditional peripheral security measures do not comply with the lightweight security requirements of the IoT ecosystem. Considering this, we propose a lightweight intrusion detection model for IoT networks (LIDM-IoT) that demonstrates similar efficiency in exposing malicious activities compared with the existing computationally expensive methods. The crux of the proposed model is that it provides efficient attack detection with lower computational requirements in IoT networks. LIDM-IoT achieves the feat through a novel unified feature selection strategy that unifies filter-based and embedded feature selection methods. The proposed feature selection strategy reduces the feature space by 94%. Also, we use only the records of a single attack type to build the model using the XGBoost algorithm. We have tested LIDM-IoT with unseen attack types to ensure its generalized behavior. The results indicate that the proposed model exhibits efficient attack detection, with a reduced feature set, in IoT networks compared with the state-of-the-art models.

物联网(IoT)在不同领域的广泛应用,使越来越多的 "物 "获得了 IP 连接。这些 "物 "在技术上被称为物联网设备,容易受到各种安全威胁。因此,在过去 5 年里,物联网恶意软件呈指数级增长,而确保物联网设备免受此类攻击是当今时代亟待解决的问题。然而,传统的外围安全措施并不符合物联网生态系统的轻量级安全要求。有鉴于此,我们提出了一种适用于物联网网络的轻量级入侵检测模型(LIDM-IoT),与现有的计算成本高昂的方法相比,该模型在揭露恶意活动方面具有类似的效率。所提模型的关键在于,它能在物联网网络中以较低的计算要求提供高效的攻击检测。LIDM-IoT 通过一种新颖的统一特征选择策略实现了这一壮举,该策略统一了基于过滤器的特征选择方法和嵌入式特征选择方法。所提出的特征选择策略将特征空间缩小了 94%。此外,我们仅使用单一攻击类型的记录来使用 XGBoost 算法建立模型。我们用未见过的攻击类型对 LIDM-IoT 进行了测试,以确保其通用性。结果表明,与最先进的模型相比,所提出的模型在物联网网络中以较少的特征集实现了高效的攻击检测。
{"title":"A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks","authors":"Renya Nath N,&nbsp;Hiran V. Nath","doi":"10.1002/nem.2291","DOIUrl":"10.1002/nem.2291","url":null,"abstract":"<div>\u0000 \u0000 <p>The applicability of the Internet of Things (IoT) cutting across different domains has resulted in newer “things” acquiring IP connectivity. These things, technically known as IoT devices, are vulnerable to diverse security threats. Consequently, there has been an exponential increase in IoT malware over the past 5 years, and securing IoT devices from such attacks is a pressing concern in the current era. However, the traditional peripheral security measures do not comply with the lightweight security requirements of the IoT ecosystem. Considering this, we propose a lightweight intrusion detection model for IoT networks (LIDM-IoT) that demonstrates similar efficiency in exposing malicious activities compared with the existing computationally expensive methods. The crux of the proposed model is that it provides efficient attack detection with lower computational requirements in IoT networks. LIDM-IoT achieves the feat through a novel unified feature selection strategy that unifies filter-based and embedded feature selection methods. The proposed feature selection strategy reduces the feature space by 94%. Also, we use only the records of a single attack type to build the model using the XGBoost algorithm. We have tested LIDM-IoT with unseen attack types to ensure its generalized behavior. The results indicate that the proposed model exhibits efficient attack detection, with a reduced feature set, in IoT networks compared with the state-of-the-art models.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain-Adaptive Power Profiling Analysis Strategy for the Metaverse 面向元宇宙的领域自适应功率剖析分析策略
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1002/nem.2288
Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang, Jing Zhou

In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high-end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side-channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross-device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.

在汹涌澎湃的数字时代,"元宇宙 "作为一个开创性的概念,已成为技术领域的焦点。它正在重塑人类的工作和生活模式,开辟一个虚拟与现实互动的新领域。然而,元宇宙的快速发展也带来了安全和隐私方面的新挑战。在这个多元而复杂的技术环境中,数据保护至关重要。由于采用了先进的集成电路技术,元宇宙中高端设备和功能的创新能力面临着来自侧信道分析(SCA)的独特威胁,有可能导致用户隐私泄露。针对不同硬件设备造成的领域差异影响分析模型的普适性和分析精度的问题,本文提出了可移植性功率剖析分析(PPPA)策略。它结合领域适应和深度学习技术,对剖析设备和目标设备之间的领域差异进行建模和校准,增强了模型在不同设备环境下的适应性。实验表明,我们的方法只需 389 个电量跟踪就能恢复正确的密钥,在不同设备间有效地恢复密钥。本文强调了跨设备 SCA 的有效性,重点关注分析模型在不同硬件环境中的适应性和鲁棒性,从而提高了元宇宙环境中用户数据隐私的安全性。
{"title":"Domain-Adaptive Power Profiling Analysis Strategy for the Metaverse","authors":"Xiang Li,&nbsp;Ning Yang,&nbsp;Weifeng Liu,&nbsp;Aidong Chen,&nbsp;Yanlong Zhang,&nbsp;Shuo Wang,&nbsp;Jing Zhou","doi":"10.1002/nem.2288","DOIUrl":"10.1002/nem.2288","url":null,"abstract":"<div>\u0000 \u0000 <p>In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high-end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side-channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross-device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141612824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovations in Blockchain for Crypto Assets and Exchanges 区块链在加密资产和交易所方面的创新
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-17 DOI: 10.1002/nem.2287
James Won-Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang

This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.

The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.

The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.

The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.

The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.

We believe that these four papers make significant cont

本特刊收录了 IEEE CryptoEx 2023 研讨会(https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023)的优秀论文扩展版,该研讨会与 2023 IEEE 区块链和加密货币国际会议同期举行。研讨会于 2023 年 5 月 5 日星期五在阿联酋迪拜举行。本特刊中的论文探讨了分数式非可流通代币(NFT)、稳定币和加密货币交易所的重要进展,反映了区块链技术的多样化创新应用:由 Wonseok Choi、Jongsoo Woo 和 James Won-Ki Hong 撰写的第一篇论文题为《分数型不可兑换代币(NFTs):概述、评估、市场和挑战》,探讨了分数型 NFTs 的创新概念。通过实现高价值数字资产访问的民主化,部分 NFT 将代币化、智能合约和所有权模式融合在一起,从而彻底改变数字经济。第二篇论文的题目是 "稳定币中的庞氏骗局式设计"(Leveraging Ponzi-like Designs in Stablecoins),作者是傅山歌、王琴、于江山和陈世平。该研究阐明了庞氏骗局的基本性质,并引入了评估算法稳定币可持续性的合理模型。第三篇论文题为《雅典娜:使用统一订单簿在集中式加密货币交易所进行智能订单路由》,作者包括罗伯特-亨克尔(Robert Henker)、丹尼尔-阿茨伯格(Daniel Atzberger)、扬-奥勒-沃尔默(Jan Ole Vollmer)、威利-谢贝尔(Willy Scheibel)、于尔根-多尔纳(Jürgen Döllner)和马库斯-比克(Markus Bick),介绍了雅典娜的开发和实施。该系统将多个集中式加密货币交易所的订单簿整合到一个统一的订单簿中,从而优化了交易策略。Athena 的智能订单路由算法大大降低了隐性交易成本,特别有利于流动性不足的加密货币市场中的机构投资者:Srisht Fateh Singh、Panagiotis Michalopoulos 和 Andreas Veneris 的论文介绍了 Deeper,这是一种去中心化交易所设计,旨在提高低交易量代币的流动性。通过让流动性提供者共享共同代币的储备,Deeper 解决了高滑点和三明治攻击等问题。我们认为,这四篇论文为加密资产和交易所的区块链领域做出了重大贡献。我们衷心感谢作者们的卓越贡献,感谢审稿人的深刻反馈,感谢编辑团队为策划本特刊所付出的辛勤努力。
{"title":"Innovations in Blockchain for Crypto Assets and Exchanges","authors":"James Won-Ki Hong,&nbsp;Andreas Veneris,&nbsp;Hongtaek Ju,&nbsp;Taeyeol Jeong,&nbsp;Changhoon Kang","doi":"10.1002/nem.2287","DOIUrl":"https://doi.org/10.1002/nem.2287","url":null,"abstract":"<p>This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.</p><p>The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.</p><p>The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.</p><p>The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.</p><p>The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.</p><p>We believe that these four papers make significant cont","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain 离散傅里叶变换域中的抗屏幕拍摄稳健文件水印技术
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-02 DOI: 10.1002/nem.2278
Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu

Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head-mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross-media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross-media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen-shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen-shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.

Metaverse 的增强现实(AR)功能可通过头戴式设备的摄像头将虚拟信息无缝叠加到真实场景中。然而,这引发了人们对跨媒体信息传输时隐私保护和版权认证的担忧。此外,由于在现实世界中进行屏幕直拍,还存在秘密信息泄露的风险。在未经授权的屏幕捕捉情况下,确保信息安全和版权认证至关重要。为防止屏幕和摄像机之间的跨媒体传输造成信息丢失和干扰,我们实施了数字水印版权保护。我们提出了一种可抵御屏幕拍摄的自动文件水印创新框架。我们的方法是在文件底层嵌入环形水印。在提取方面,水印提取过程分为三个关键步骤:自动定位、自动校正和自动提取。首先,在隐蔽摄影中定位文档图像。然后,根据文档的文本行特征进行透视校正。最后,结合环形水印特征提取水印信息。我们的方法能够从隐蔽摄影中自动提取水印,同时考虑到隐蔽性、鲁棒性和视觉质量等方面。水印嵌入文档底层,保证了良好的视觉质量,不影响正常阅读和编辑。我们还提出了各种嵌入强度方案,以适应不同的使用场景,抵御屏幕拍摄或截图攻击以及各种噪声攻击。通过大量实验,我们证明了所提出的自动化框架的可行性和水印算法的鲁棒性,以及我们的方法的优越性和广阔的应用前景。
{"title":"Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain","authors":"Yazhou Zhang,&nbsp;Chaoyue Huang,&nbsp;Shaoteng Liu,&nbsp;Leichao Huang,&nbsp;Tianshu Yang,&nbsp;Xinpeng Zhang,&nbsp;Hanzhou Wu","doi":"10.1002/nem.2278","DOIUrl":"10.1002/nem.2278","url":null,"abstract":"<p>Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head-mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross-media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross-media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen-shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen-shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141273737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and light-weight patient survival prediction in Internet of Medical Things framework 医疗物联网框架中的安全轻量级患者生存预测
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-30 DOI: 10.1002/nem.2286
Shubh Mittal, Tisha Chawla, Saifur Rahman, Shantanu Pal, Chandan Karmakar

Thoracic surgeries in major lung resections for primary lung cancer are fraught with potential risks, emphasising the need to understand factors contributing to postoperative mortality. This study investigates the interplay of objective and subjective data in predicting postoperative outcomes to reduce data transmission costs in the Internet of Medical Things (IoMT). Objective metrics, such as forced vital capacity (FVC), offer consistent, quantifiable insights essential for predictive modelling. Conversely, subjective data derived from patient self-reports suggest that the patient's personal experiences are crucial for assessing the quality of life postsurgery. Utilising a dataset from the University of California, Irvine's Machine Learning Repository (UCI), 17 distinct attributes were examined. Using ensemble learning classifiers, the extra trees classifier is superior when utilising all features, achieving an accuracy of 0.92. Combining select subjective features, specifically PRE6, PRE8 and AGE (demographic), with objective data, yielded a comparable accuracy of 0.91. Feature importance analysis further highlights the significance of features like PRE5, PRE4 and AGE. This suggests potential redundancies in the full feature set, emphasising the importance of feature selection. Importantly, when compared with existing literature, this study's findings offer insights into the future of predictive modelling in thoracic surgeries, with implications for the rapidly evolving field of the IoMT.

摘要原发性肺癌的肺部大部切除手术充满了潜在风险,因此需要了解导致术后死亡的因素。本研究调查了客观数据和主观数据在预测术后结果方面的相互作用,以降低医疗物联网(IoMT)的数据传输成本。强迫生命容量(FVC)等客观指标提供了对预测建模至关重要的一致、可量化的见解。相反,来自患者自我报告的主观数据表明,患者的个人经历对于评估术后生活质量至关重要。利用加州大学欧文分校机器学习资料库(UCI)的数据集,对 17 个不同的属性进行了研究。在使用集合学习分类器时,额外树分类器在利用所有特征时更胜一筹,准确率达到了 0.92。将选定的主观特征,特别是 PRE6、PRE8 和年龄(人口统计学)与客观数据相结合,准确率达到了 0.91。特征重要性分析进一步突出了 PRE5、PRE4 和 AGE 等特征的重要性。这表明整个特征集可能存在冗余,强调了特征选择的重要性。重要的是,与现有文献相比,本研究的发现为胸外科预测建模的未来提供了启示,对快速发展的 IoMT 领域具有重要意义。
{"title":"A secure and light-weight patient survival prediction in Internet of Medical Things framework","authors":"Shubh Mittal,&nbsp;Tisha Chawla,&nbsp;Saifur Rahman,&nbsp;Shantanu Pal,&nbsp;Chandan Karmakar","doi":"10.1002/nem.2286","DOIUrl":"10.1002/nem.2286","url":null,"abstract":"<p>Thoracic surgeries in major lung resections for primary lung cancer are fraught with potential risks, emphasising the need to understand factors contributing to postoperative mortality. This study investigates the interplay of objective and subjective data in predicting postoperative outcomes to reduce data transmission costs in the Internet of Medical Things (IoMT). Objective metrics, such as forced vital capacity (FVC), offer consistent, quantifiable insights essential for predictive modelling. Conversely, subjective data derived from patient self-reports suggest that the patient's personal experiences are crucial for assessing the quality of life postsurgery. Utilising a dataset from the University of California, Irvine's Machine Learning Repository (UCI), 17 distinct attributes were examined. Using ensemble learning classifiers, the extra trees classifier is superior when utilising all features, achieving an accuracy of 0.92. Combining select subjective features, specifically PRE6, PRE8 and AGE (demographic), with objective data, yielded a comparable accuracy of 0.91. Feature importance analysis further highlights the significance of features like PRE5, PRE4 and AGE. This suggests potential redundancies in the full feature set, emphasising the importance of feature selection. Importantly, when compared with existing literature, this study's findings offer insights into the future of predictive modelling in thoracic surgeries, with implications for the rapidly evolving field of the IoMT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2286","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things 基于区块链的医疗物联网中医疗数据共享的安全跨链交易
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-23 DOI: 10.1002/nem.2279
Bohao Jiang, Chaoyang Li, Yu Tang, Xiangjun Xin

Blockchain technology has greatly promoted the development of the Internet of Medical Things (IoMT) from a centralized form to a distributed form. However, with many independent blockchain-based IoMT (BIoMT) systems being established by different institutions, these heterogeneous blockchain systems have created a new “data islands” problem. This paper proposes a multi-chain fusion (MCF) multi-party governance model based on relay chain technology. The MCF model helps establish cross-chain interaction and communication among the multiple heterogeneous blockchain systems in different medical institutions through the cross-chain gateway. Meanwhile, by utilizing the inter-blockchain transfer protocol (IBTP), the MCF model takes responsibility for legitimacy verification and reliable routing of cross-chain transactions, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems. Then, an elliptic curve signature scheme is adopted to protect user privacy in cross-chain transactions, which helps establish transaction verification for the MCF model in BIoMT systems. Finally, several experiments are carried out to prove the feasibility of the cross-chain scheme and the security of the elliptic curve signature scheme, and the performance index of the cross-chain system is evaluated. The performance results show that the MCF model can provide secure and efficient cross-chain services for sharing medical data among heterogeneous BIoMT systems, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems.

区块链技术极大地推动了医疗物联网(IoMT)从集中式向分布式的发展。然而,由于不同机构建立了许多独立的基于区块链的物联网医疗系统(BIoMT),这些异构的区块链系统造成了新的 "数据孤岛 "问题。本文提出了一种基于中继链技术的多链融合(MCF)多方治理模型。MCF 模型通过跨链网关,帮助不同医疗机构的多个异构区块链系统之间建立跨链交互和通信。同时,MCF 模型利用区块链间传输协议(IBTP),负责跨链交易的合法性验证和可靠路由,从而解决了传统区块链医疗系统固有的 "数据孤岛问题"。然后,采用椭圆曲线签名方案保护跨链交易中的用户隐私,这有助于在 BIoMT 系统中建立 MCF 模型的交易验证。最后,通过多个实验证明了跨链方案的可行性和椭圆曲线签名方案的安全性,并对跨链系统的性能指标进行了评估。性能结果表明,MCF 模型可以为异构 BIoMT 系统之间共享医疗数据提供安全高效的跨链服务,从而解决传统基于区块链的医疗系统固有的 "数据孤岛问题"。
{"title":"Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things","authors":"Bohao Jiang,&nbsp;Chaoyang Li,&nbsp;Yu Tang,&nbsp;Xiangjun Xin","doi":"10.1002/nem.2279","DOIUrl":"10.1002/nem.2279","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain technology has greatly promoted the development of the Internet of Medical Things (IoMT) from a centralized form to a distributed form. However, with many independent blockchain-based IoMT (BIoMT) systems being established by different institutions, these heterogeneous blockchain systems have created a new “data islands” problem. This paper proposes a multi-chain fusion (MCF) multi-party governance model based on relay chain technology. The MCF model helps establish cross-chain interaction and communication among the multiple heterogeneous blockchain systems in different medical institutions through the cross-chain gateway. Meanwhile, by utilizing the inter-blockchain transfer protocol (IBTP), the MCF model takes responsibility for legitimacy verification and reliable routing of cross-chain transactions, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems. Then, an elliptic curve signature scheme is adopted to protect user privacy in cross-chain transactions, which helps establish transaction verification for the MCF model in BIoMT systems. Finally, several experiments are carried out to prove the feasibility of the cross-chain scheme and the security of the elliptic curve signature scheme, and the performance index of the cross-chain system is evaluated. The performance results show that the MCF model can provide secure and efficient cross-chain services for sharing medical data among heterogeneous BIoMT systems, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transaction fee mechanisms with farsighted miners 有远见的矿工的交易费用机制
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-21 DOI: 10.1002/nem.2275
Jens Leth Hougaard, Mohsen Pourpouneh, Haiting Han

We investigate the recent fee mechanism EIP1559 of the Ethereum network. Whereas previous studies have focused on myopic miners, we here focus on strategic miners in the sense of miners being able to reason about the future blocks. We derive expressions for optimal miner behavior (in terms of setting block sizes) in the case of two-block foresight and varying degrees of hashing power. Results indicate that a sufficiently large mining pool will have enough hashing power to gain by strategic foresight. We further use a simulation study to examine the impact of both two-block and three-block foresight. In particular, the simulation study indicates that for realistic levels of hashing power, mining pools do not gain from being able to reason more than two blocks ahead. Moreover, even though the presence of strategic miners increases the variation in block sizes and potentially empty blocks, overall system throughput tends to increase slightly compared with myopic mining. We further analyze the effect of varying the base fee updating rule.

我们研究了以太坊网络最近的收费机制 EIP1559。以往的研究主要针对近视型矿工,而我们在此主要针对策略型矿工,即能够推理未来区块的矿工。我们推导出了在两个区块预见和不同程度哈希能力的情况下矿工行为(在设置区块大小方面)的最优表达式。结果表明,一个足够大的矿池将拥有足够的哈希计算能力,从而通过战略预见获得收益。我们还通过模拟研究进一步考察了两区块和三区块预见的影响。模拟研究尤其表明,在哈希计算能力处于现实水平的情况下,矿池并不会从提前两个区块以上的推理中获益。此外,尽管策略矿工的存在增加了区块大小和潜在空区块的变化,但与近视挖矿相比,系统的总体吞吐量往往会略有增加。我们进一步分析了改变基本费用更新规则的效果。
{"title":"Transaction fee mechanisms with farsighted miners","authors":"Jens Leth Hougaard,&nbsp;Mohsen Pourpouneh,&nbsp;Haiting Han","doi":"10.1002/nem.2275","DOIUrl":"10.1002/nem.2275","url":null,"abstract":"<p>We investigate the recent fee mechanism EIP1559 of the Ethereum network. Whereas previous studies have focused on myopic miners, we here focus on strategic miners in the sense of miners being able to reason about the future blocks. We derive expressions for optimal miner behavior (in terms of setting block sizes) in the case of two-block foresight and varying degrees of hashing power. Results indicate that a sufficiently large mining pool will have enough hashing power to gain by strategic foresight. We further use a simulation study to examine the impact of both two-block and three-block foresight. In particular, the simulation study indicates that for realistic levels of hashing power, mining pools do not gain from being able to reason more than two blocks ahead. Moreover, even though the presence of strategic miners increases the variation in block sizes and potentially empty blocks, overall system throughput tends to increase slightly compared with myopic mining. We further analyze the effect of varying the base fee updating rule.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Ponzi-like designs in stablecoins 利用稳定币中类似庞氏骗局的设计
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-19 DOI: 10.1002/nem.2277
Shange Fu, Qin Wang, Jiangshan Yu, Shiping Chen

Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their prices easily deviate from the target or even fall into a catastrophic collapse and are as a result often dismissed as a Ponzi scheme. However, what is the essence of Ponzi? In this paper, we try to clarify such a deceptive concept and reveal how algorithmic stablecoin works from a higher level. We find that Ponzi is basically a financial protocol that pays existing investors with funds collected from new ones. Running a Ponzi, however, does not necessarily imply that any participant is in any sense losing out, as long as the game can be perpetually rolled over. Economists call such realization as a rational Ponzi game. We accordingly propose a rational model in the context of algorithmic stablecoin and draw its holding conditions. We apply the model and use historical data to examine if the major types of algorithmic stablecoins meet the criteria for being a rational Ponzi game.

稳定币是加密货币中的一个独特子集,旨在通过特定资产支持或采用算法根据市场需求调整供应来实现价格稳定。算法稳定币是一种没有任何资产支持的特殊类型,它将彻底改变主权法币的运行方式。在大多数情况下,算法稳定币的稳定性很差,其价格很容易偏离目标,甚至陷入灾难性的崩溃,因此常常被视为庞氏骗局。然而,庞氏骗局的本质是什么?在本文中,我们试图澄清这样一个具有欺骗性的概念,并从更高的层面揭示算法稳定币是如何运作的。我们发现,庞氏骗局基本上是一种金融协议,用从新投资者那里收集的资金来支付现有投资者。然而,庞氏骗局的运行并不一定意味着任何参与者在任何意义上都是亏损的,只要游戏可以永久翻转。经济学家称这种实现方式为理性庞氏游戏。因此,我们在算法稳定币的背景下提出了一个理性模型,并得出其持有条件。我们应用该模型并利用历史数据来研究主要类型的算法稳定币是否符合理性庞氏游戏的标准。
{"title":"Leveraging Ponzi-like designs in stablecoins","authors":"Shange Fu,&nbsp;Qin Wang,&nbsp;Jiangshan Yu,&nbsp;Shiping Chen","doi":"10.1002/nem.2277","DOIUrl":"10.1002/nem.2277","url":null,"abstract":"<p>Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their prices easily deviate from the target or even fall into a catastrophic collapse and are as a result often dismissed as a Ponzi scheme. However, what is the essence of Ponzi? In this paper, we try to clarify such a deceptive concept and reveal how algorithmic stablecoin works from a higher level. We find that Ponzi is basically a financial protocol that pays existing investors with funds collected from new ones. Running a Ponzi, however, does not necessarily imply that any participant is in any sense losing out, as long as the game can be perpetually rolled over. Economists call such realization as a <i>rational Ponzi game</i>. We accordingly propose a rational model in the context of algorithmic stablecoin and draw its holding conditions. We apply the model and use historical data to examine if the major types of algorithmic stablecoins meet the criteria for being a rational Ponzi game.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141123335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem 经济调度问题的分布式算法,步长与网络无关,采用事件触发机制
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-16 DOI: 10.1002/nem.2276
Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz, Changhai Sun

The economic dispatch problem (EDP) poses a significant challenge in energy management for modern power systems, particularly as these systems undergo expansion. This growth escalates the demand for communication resources and increases the risk of communication failures. To address this challenge, we propose a distributed algorithm with network-independent step sizes and an event-triggered mechanism, which reduces communication requirements and enhances adaptability. Unlike traditional methods, our algorithm uses network-independent step sizes derived from each agent's local cost functions, thus eliminating the need for detailed network topology knowledge. The theoretical derivation identifies a range of step size values that depend solely on the objective function's strong convexity and the gradient's Lipschitz continuity. Furthermore, the proposed algorithm is shown to achieve a linear convergence rate, assuming the event triggering threshold criteria are met for linear convergence. Numerical experiments further validate the effectiveness and advantages of our proposed distributed algorithm by demonstrating its ability to maintain good convergence characteristics while reducing communication frequency.

经济调度问题(EDP)对现代电力系统的能源管理提出了重大挑战,尤其是在这些系统不断扩展的情况下。这种增长加剧了对通信资源的需求,并增加了通信故障的风险。为了应对这一挑战,我们提出了一种具有与网络无关的步长和事件触发机制的分布式算法,该算法可降低通信要求并增强适应性。与传统方法不同,我们的算法采用与网络无关的步长,这些步长来自每个代理的本地成本函数,因此无需详细的网络拓扑知识。理论推导确定了一系列步长值,这些值完全取决于目标函数的强凸性和梯度的 Lipschitz 连续性。此外,假设符合线性收敛的事件触发阈值标准,所提出的算法可实现线性收敛率。数值实验进一步验证了我们提出的分布式算法的有效性和优势,证明该算法能够在降低通信频率的同时保持良好的收敛特性。
{"title":"A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem","authors":"Baitong Chen,&nbsp;Jianhua Yang,&nbsp;Wei Lu,&nbsp;Witold Pedrycz,&nbsp;Changhai Sun","doi":"10.1002/nem.2276","DOIUrl":"10.1002/nem.2276","url":null,"abstract":"<p>The economic dispatch problem (EDP) poses a significant challenge in energy management for modern power systems, particularly as these systems undergo expansion. This growth escalates the demand for communication resources and increases the risk of communication failures. To address this challenge, we propose a distributed algorithm with network-independent step sizes and an event-triggered mechanism, which reduces communication requirements and enhances adaptability. Unlike traditional methods, our algorithm uses network-independent step sizes derived from each agent's local cost functions, thus eliminating the need for detailed network topology knowledge. The theoretical derivation identifies a range of step size values that depend solely on the objective function's strong convexity and the gradient's Lipschitz continuity. Furthermore, the proposed algorithm is shown to achieve a linear convergence rate, assuming the event triggering threshold criteria are met for linear convergence. Numerical experiments further validate the effectiveness and advantages of our proposed distributed algorithm by demonstrating its ability to maintain good convergence characteristics while reducing communication frequency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving data aggregation achieving completeness of data queries in smart grid 保护隐私的数据聚合实现智能电网数据查询的完整性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-13 DOI: 10.1002/nem.2273
Xinyang Li, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang

In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While traditional data aggregation schemes can provide a certain level of privacy protection for users, they also impose limitations on the control center's access to fine-grained data. To address these challenges, we propose a privacy-preserving data aggregation scheme supporting data query (PAQ). We designed a multi-level data aggregation mechanism based on Paillier semi-homomorphic encryption to achieve efficient aggregation of user data in the control center. Additionally, a data query mechanism based on electricity consumption intervals is introduced, allowing the control center to query aggregated ciphertexts for different user categories from outsourced data on the cloud server. Security analysis demonstrates that PAQ design effectively solves security issues in data aggregation and query processes. Performance analysis indicates that the proposed scheme outperforms existing solutions in terms of efficiency.

在智能电网系统中,控制中心通过分析用电数据来制定策略和提供服务。然而,确保用户数据的隐私和安全是一个至关重要的问题。虽然传统的数据聚合方案可以为用户提供一定程度的隐私保护,但也对控制中心访问细粒度数据造成了限制。为了应对这些挑战,我们提出了一种支持数据查询(PAQ)的隐私保护数据聚合方案。我们设计了一种基于 Paillier 半同态加密的多级数据聚合机制,以实现控制中心对用户数据的有效聚合。此外,我们还引入了基于用电间隔的数据查询机制,使控制中心可以从云服务器上的外包数据中查询不同用户类别的聚合密文。安全分析表明,PAQ 设计有效地解决了数据聚合和查询过程中的安全问题。性能分析表明,所提出的方案在效率方面优于现有解决方案。
{"title":"Privacy-preserving data aggregation achieving completeness of data queries in smart grid","authors":"Xinyang Li,&nbsp;Meng Zhao,&nbsp;Yong Ding,&nbsp;Changsong Yang,&nbsp;Huiyong Wang,&nbsp;Hai Liang,&nbsp;Yujue Wang","doi":"10.1002/nem.2273","DOIUrl":"10.1002/nem.2273","url":null,"abstract":"<p>In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While traditional data aggregation schemes can provide a certain level of privacy protection for users, they also impose limitations on the control center's access to fine-grained data. To address these challenges, we propose a privacy-preserving data aggregation scheme supporting data query (PAQ). We designed a multi-level data aggregation mechanism based on Paillier semi-homomorphic encryption to achieve efficient aggregation of user data in the control center. Additionally, a data query mechanism based on electricity consumption intervals is introduced, allowing the control center to query aggregated ciphertexts for different user categories from outsourced data on the cloud server. Security analysis demonstrates that PAQ design effectively solves security issues in data aggregation and query processes. Performance analysis indicates that the proposed scheme outperforms existing solutions in terms of efficiency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1