首页 > 最新文献

Network最新文献

英文 中文
An Enhanced Mechanism for Fault Tolerance in Agricultural Wireless Sensor Networks 农业无线传感器网络容错增强机制
Pub Date : 2024-04-23 DOI: 10.3390/network4020008
Mounya Smara, Al-Sakib Khan Pathan
Fault tolerance is a critical aspect for any wireless sensor network (WSN), which can be defined in plain terms as the quality of being dependable or performing consistently well. In other words, it may be described as the effectiveness of fault tolerance in the event of crucial component failures in the network. As a WSN is composed of sensors with constrained energy resources, network disconnections and faults may occur because of a power failure or exhaustion of the battery. When such a network is used for precision agriculture, which needs periodic and timely readings from the agricultural field, necessary measures are needed to handle the effects of such faults in the network. As climate change is affecting many parts of the globe, WSN-based precision agriculture could provide timely and early warnings to the farmers about unpredictable weather events and they could take the necessary measures to save their crops or to lessen the potential damage. Considering this as a critical application area, in this paper, we propose a fault-tolerant scheme for WSNs deployed for precision agriculture. Along with the description of our mechanism, we provide a theoretical operational model, simulation, analysis, and a formal verification using the UPPAAL model checker.
容错性是任何无线传感器网络(WSN)的一个重要方面,它可以简单地定义为可靠或性能稳定的质量。换句话说,它可以被描述为在网络中出现关键部件故障时的容错效果。由于 WSN 是由能量资源有限的传感器组成的,因此可能会因断电或电池耗尽而出现网络断开和故障。当这种网络用于精准农业时,需要定期从农田中及时读取数据,因此需要采取必要的措施来处理网络故障的影响。由于气候变化正在影响全球许多地区,基于 WSN 的精准农业可以就不可预测的天气事件向农民提供及时的早期预警,农民可以采取必要措施挽救作物或减少潜在的损害。考虑到这是一个关键的应用领域,我们在本文中为部署在精准农业领域的 WSN 提出了一种容错方案。在介绍我们的机制的同时,我们还提供了一个理论运行模型、仿真、分析,并使用 UPPAAL 模型检查器进行了正式验证。
{"title":"An Enhanced Mechanism for Fault Tolerance in Agricultural Wireless Sensor Networks","authors":"Mounya Smara, Al-Sakib Khan Pathan","doi":"10.3390/network4020008","DOIUrl":"https://doi.org/10.3390/network4020008","url":null,"abstract":"Fault tolerance is a critical aspect for any wireless sensor network (WSN), which can be defined in plain terms as the quality of being dependable or performing consistently well. In other words, it may be described as the effectiveness of fault tolerance in the event of crucial component failures in the network. As a WSN is composed of sensors with constrained energy resources, network disconnections and faults may occur because of a power failure or exhaustion of the battery. When such a network is used for precision agriculture, which needs periodic and timely readings from the agricultural field, necessary measures are needed to handle the effects of such faults in the network. As climate change is affecting many parts of the globe, WSN-based precision agriculture could provide timely and early warnings to the farmers about unpredictable weather events and they could take the necessary measures to save their crops or to lessen the potential damage. Considering this as a critical application area, in this paper, we propose a fault-tolerant scheme for WSNs deployed for precision agriculture. Along with the description of our mechanism, we provide a theoretical operational model, simulation, analysis, and a formal verification using the UPPAAL model checker.","PeriodicalId":19145,"journal":{"name":"Network","volume":"9 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140668342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach 无线体域网络中的医疗数据:基于令牌通信方法的设备认证技术和威胁缓解策略
Pub Date : 2024-04-09 DOI: 10.3390/network4020007
Jan Herbst, Matthias Rüb, S. P. Sanon, Christoph Lipps, Hans D. Schotten
Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and correlation of physical and biological information. Along with the utilization and integration of these (sensitive) private and personal data, there are substantial requirements concerning security and privacy, as well as protection during processing and transmission. Contrary to the star topology frequently used in various standards, the overall concept of a novel low-data rate token-based WBAN framework is proposed. This work further comprises the evaluation of strategies for handling medical data with WBANs and emphasizes the importance and necessity of encryption and security strategies in the context of sensitive information. Furthermore, this work considers the recent advancements in Artificial Intelligence (AI), which are opening up opportunities for enhancing cyber resilience, but on the other hand, also new attack vectors. Moreover, the implications of targeted regulatory measures, such as the European AI Act, are considered. In contrast to, for instance, the proposed star network topologies of the IEEE 802.15.6 WBAN standard or the Technical Committee (TC) SmartBAN of the European Telecommunication Standards Institute (ETSI), the concept of a ring topology is proposed which concatenates information in the form of a ‘data train’ and thus results in faster and more efficient communication. Beyond that, the conductivity of human skin is included in the approach presented to incorporate a supplementary channel. This direct contact requirement not only fortifies the security of the system but also facilitates a reliable means of secure communication, pivotal in maintaining the integrity of sensitive health data. The work identifies different threat models associated with the WBAN system and evaluates potential data vulnerabilities and risks to maximize security. It highlights the crucial balance between security and efficiency in WBANs, using the token-based approach as a case study. Further, it sets a foundation for future healthcare technology advancements, aiming to ensure the secure and efficient integration of patient data.
无线体域网(WBAN)、低功耗和近距离无线通信在近体区域具有优势,特别是在医疗保健领域:(i) 可对病人进行持续监测,(ii) 可记录和关联物理和生物信息。在利用和整合这些(敏感的)私人和个人数据的同时,对安全和隐私以及处理和传输过程中的保护也提出了很高的要求。与各种标准中经常使用的星形拓扑结构相反,本文提出了一种基于令牌的低数据速率新型 WBAN 框架的总体概念。这项工作还包括对使用无线局域网处理医疗数据的策略进行评估,并强调加密和安全策略在敏感信息方面的重要性和必要性。此外,这项工作还考虑了人工智能(AI)的最新进展,这为增强网络复原力带来了机遇,但另一方面也带来了新的攻击载体。此外,还考虑了《欧洲人工智能法案》等有针对性的监管措施的影响。与 IEEE 802.15.6 WBAN 标准或欧洲电信标准协会(ETSI)智能局域网技术委员会(TC)提出的星形网络拓扑结构相比,本文提出了环形拓扑结构的概念,它以 "数据列车 "的形式串联信息,从而实现更快、更高效的通信。此外,所提出的方法还包括利用人体皮肤的导电性来加入辅助通道。这种直接接触的要求不仅加强了系统的安全性,还促进了可靠的安全通信手段,对维护敏感健康数据的完整性至关重要。这项工作确定了与无线局域网系统相关的不同威胁模型,并评估了潜在的数据漏洞和风险,以最大限度地提高安全性。它以基于令牌的方法作为案例研究,强调了 WBAN 在安全性和效率之间的重要平衡。此外,它还为未来的医疗保健技术进步奠定了基础,旨在确保安全高效地整合患者数据。
{"title":"Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach","authors":"Jan Herbst, Matthias Rüb, S. P. Sanon, Christoph Lipps, Hans D. Schotten","doi":"10.3390/network4020007","DOIUrl":"https://doi.org/10.3390/network4020007","url":null,"abstract":"Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and correlation of physical and biological information. Along with the utilization and integration of these (sensitive) private and personal data, there are substantial requirements concerning security and privacy, as well as protection during processing and transmission. Contrary to the star topology frequently used in various standards, the overall concept of a novel low-data rate token-based WBAN framework is proposed. This work further comprises the evaluation of strategies for handling medical data with WBANs and emphasizes the importance and necessity of encryption and security strategies in the context of sensitive information. Furthermore, this work considers the recent advancements in Artificial Intelligence (AI), which are opening up opportunities for enhancing cyber resilience, but on the other hand, also new attack vectors. Moreover, the implications of targeted regulatory measures, such as the European AI Act, are considered. In contrast to, for instance, the proposed star network topologies of the IEEE 802.15.6 WBAN standard or the Technical Committee (TC) SmartBAN of the European Telecommunication Standards Institute (ETSI), the concept of a ring topology is proposed which concatenates information in the form of a ‘data train’ and thus results in faster and more efficient communication. Beyond that, the conductivity of human skin is included in the approach presented to incorporate a supplementary channel. This direct contact requirement not only fortifies the security of the system but also facilitates a reliable means of secure communication, pivotal in maintaining the integrity of sensitive health data. The work identifies different threat models associated with the WBAN system and evaluates potential data vulnerabilities and risks to maximize security. It highlights the crucial balance between security and efficiency in WBANs, using the token-based approach as a case study. Further, it sets a foundation for future healthcare technology advancements, aiming to ensure the secure and efficient integration of patient data.","PeriodicalId":19145,"journal":{"name":"Network","volume":"26 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140727513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Capacity of Optical Backbone Networks 关于光骨干网络的容量
Pub Date : 2024-03-11 DOI: 10.3390/network4010006
João J. O. Pires
Optical backbone networks, characterized by using optical fibers as a transmission medium, constitute the fundamental infrastructure employed today by network operators to deliver services to users. As network capacity is one of the key factors influencing optical network performance, it is important to comprehend its limitations and have the capability to estimate its value. In this context, we revisit the concept of capacity from various perspectives, including channel capacity, link capacity, and network capacity, thus providing an integrated view of the problem within the framework of the backbone tier. Hence, we review the fundamental concepts behind optical networks, along with the basic physical phenomena present in optical fiber transmission, and provide methodologies for estimating the different types of capacities, mainly using simple formulations. In particular, we propose a method to evaluate the network capacity that relies on the optical reach to account for physical layer aspects, in conjunction with capacitated routing techniques for traffic routing. We apply this method to three reference networks and obtain capacities ranging from tens to hundreds of terabits/s. Whenever possible, we also compare our results with published experimental data to understand how they relate.
光骨干网的特点是使用光纤作为传输介质,是当今网络运营商向用户提供服务的基本基础设施。网络容量是影响光网络性能的关键因素之一,因此了解其局限性并具备估算其价值的能力非常重要。在此背景下,我们将从信道容量、链路容量和网络容量等不同角度重新审视容量的概念,从而在骨干层的框架内提供一个综合的问题视角。因此,我们回顾了光网络背后的基本概念,以及光纤传输中存在的基本物理现象,并提供了估算不同类型容量的方法,主要使用简单的公式。特别是,我们提出了一种评估网络容量的方法,该方法依赖于考虑物理层方面的光到达,并结合容量路由技术进行流量路由。我们将这种方法应用于三个参考网络,获得了从几十到几百兆位/秒不等的容量。在可能的情况下,我们还将我们的结果与已公布的实验数据进行比较,以了解它们之间的关系。
{"title":"On the Capacity of Optical Backbone Networks","authors":"João J. O. Pires","doi":"10.3390/network4010006","DOIUrl":"https://doi.org/10.3390/network4010006","url":null,"abstract":"Optical backbone networks, characterized by using optical fibers as a transmission medium, constitute the fundamental infrastructure employed today by network operators to deliver services to users. As network capacity is one of the key factors influencing optical network performance, it is important to comprehend its limitations and have the capability to estimate its value. In this context, we revisit the concept of capacity from various perspectives, including channel capacity, link capacity, and network capacity, thus providing an integrated view of the problem within the framework of the backbone tier. Hence, we review the fundamental concepts behind optical networks, along with the basic physical phenomena present in optical fiber transmission, and provide methodologies for estimating the different types of capacities, mainly using simple formulations. In particular, we propose a method to evaluate the network capacity that relies on the optical reach to account for physical layer aspects, in conjunction with capacitated routing techniques for traffic routing. We apply this method to three reference networks and obtain capacities ranging from tens to hundreds of terabits/s. Whenever possible, we also compare our results with published experimental data to understand how they relate.","PeriodicalId":19145,"journal":{"name":"Network","volume":"37 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140253554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges 基于机器学习的自动决策系统中的数据保护问题:研究挑战
Pub Date : 2024-03-01 DOI: 10.3390/network4010005
Paraskevi Christodoulou, Konstantinos Limniotis
Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how important it is to simultaneously ensure the accuracy of the algorithms as well as privacy and personal data protection for the individuals whose data are used for training the corresponding models. In this respect, we also discuss how specific well-known data protection attacks that can be mounted in processes based on such algorithms are associated with a lack of specific legal safeguards; to this end, the General Data Protection Regulation (GDPR) is used as the basis for our evaluation. In relation to these attacks, some important privacy-enhancing techniques in this field are also surveyed. Moreover, focusing explicitly on deep learning algorithms as a type of machine learning algorithm, we further elaborate on one such privacy-enhancing technique, namely, the application of differential privacy to the training dataset. In this respect, we present, through an extensive set of experiments, the main difficulties that occur if one needs to demonstrate that such a privacy-enhancing technique is, indeed, sufficient to mitigate all the risks for the fundamental rights of individuals. More precisely, although we manage—by the proper configuration of several algorithms’ parameters—to achieve accuracy at about 90% for specific privacy thresholds, it becomes evident that even these values for accuracy and privacy may be unacceptable if a deep learning algorithm is to be used for making decisions concerning individuals. The paper concludes with a discussion of the current challenges and future steps, both from a legal as well as from a technical perspective.
本文讨论了在自动决策系统中使用机器学习算法所产生的数据保护问题。更确切地说,本文介绍了这一领域的主要挑战,并强调了同时确保算法的准确性以及保护个人隐私和个人数据的重要性,因为个人数据被用于训练相应的模型。在这方面,我们还讨论了在基于此类算法的流程中可能出现的众所周知的特定数据保护攻击是如何与缺乏特定法律保障相关联的;为此,我们将《通用数据保护条例》(GDPR)作为评估的基础。针对这些攻击,我们还调查了该领域一些重要的隐私增强技术。此外,我们明确将深度学习算法作为机器学习算法的一种类型,进一步阐述了其中一种隐私增强技术,即对训练数据集应用差异隐私。在这方面,如果需要证明这种隐私增强技术确实足以降低个人基本权利所面临的所有风险,我们将通过一系列广泛的实验来展示所遇到的主要困难。更确切地说,虽然我们通过对几种算法参数的适当配置,在特定隐私阈值下实现了约 90% 的准确率,但如果深度学习算法要用于做出与个人相关的决策,那么即使这些准确率和隐私值也可能是不可接受的。本文最后从法律和技术角度讨论了当前的挑战和未来的步骤。
{"title":"Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges","authors":"Paraskevi Christodoulou, Konstantinos Limniotis","doi":"10.3390/network4010005","DOIUrl":"https://doi.org/10.3390/network4010005","url":null,"abstract":"Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how important it is to simultaneously ensure the accuracy of the algorithms as well as privacy and personal data protection for the individuals whose data are used for training the corresponding models. In this respect, we also discuss how specific well-known data protection attacks that can be mounted in processes based on such algorithms are associated with a lack of specific legal safeguards; to this end, the General Data Protection Regulation (GDPR) is used as the basis for our evaluation. In relation to these attacks, some important privacy-enhancing techniques in this field are also surveyed. Moreover, focusing explicitly on deep learning algorithms as a type of machine learning algorithm, we further elaborate on one such privacy-enhancing technique, namely, the application of differential privacy to the training dataset. In this respect, we present, through an extensive set of experiments, the main difficulties that occur if one needs to demonstrate that such a privacy-enhancing technique is, indeed, sufficient to mitigate all the risks for the fundamental rights of individuals. More precisely, although we manage—by the proper configuration of several algorithms’ parameters—to achieve accuracy at about 90% for specific privacy thresholds, it becomes evident that even these values for accuracy and privacy may be unacceptable if a deep learning algorithm is to be used for making decisions concerning individuals. The paper concludes with a discussion of the current challenges and future steps, both from a legal as well as from a technical perspective.","PeriodicalId":19145,"journal":{"name":"Network","volume":"113 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140089607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDSMatch: A Novel Deployment Method for IDS Chains in SDNs IDSMatch:SDN 中 IDS 链的新型部署方法
Pub Date : 2024-02-07 DOI: 10.3390/network4010003
Nadia Niknami, Jie Wu
With the surge in cyber attacks, there is a pressing need for more robust network intrusion detection systems (IDSs). These IDSs perform at their best when they can monitor all the traffic coursing through the network, especially within a software-defined network (SDN). In an SDN configuration, the control plane and data plane operate independently, facilitating dynamic control over network flows. Typically, an IDS application resides in the control plane, or a centrally located network IDS transmits security reports to the controller. However, the controller, equipped with various control applications, may encounter challenges when analyzing substantial data, especially in the face of high traffic volumes. To enhance the processing power, detection rates, and alleviate the controller’s burden, deploying multiple instances of IDS across the data plane is recommended. While deploying IDS on individual switches within the data plane undoubtedly enhances detection rates, the associated costs of installing one at each switch raise concerns. To address this challenge, this paper proposes the deployment of IDS chains across the data plane to boost detection rates while preventing controller overload. The controller directs incoming traffic through alternative paths, incorporating IDS chains; however, potential delays from retransmitting traffic through an IDS chain could extend the journey to the destination. To address these delays and optimize flow distribution, our study proposes a method to balance flow assignments to specific IDS chains with minimal delay. Our approach is validated through comprehensive testing and evaluation using a test bed and trace-based simulation, demonstrating its effectiveness in reducing delays and hop counts across various traffic scenarios.
随着网络攻击的激增,人们迫切需要更强大的网络入侵检测系统(IDS)。当这些 IDS 能够监控流经网络的所有流量时,尤其是在软件定义网络(SDN)中,它们就能发挥最佳性能。在 SDN 配置中,控制平面和数据平面独立运行,便于对网络流进行动态控制。通常情况下,IDS 应用程序驻留在控制平面,或者由位于中央的网络 IDS 向控制器发送安全报告。然而,配备了各种控制应用程序的控制器在分析大量数据时可能会遇到挑战,尤其是面对高流量时。为了提高处理能力和检测率,减轻控制器的负担,建议在数据平面上部署多个 IDS 实例。在数据平面内的单个交换机上部署 IDS 无疑可以提高检测率,但在每个交换机上安装一个 IDS 的相关成本却令人担忧。为了应对这一挑战,本文建议在数据平面上部署 IDS 链,以提高检测率,同时防止控制器过载。控制器通过替代路径引导入站流量,其中包括 IDS 链;但是,通过 IDS 链重新传输流量可能会导致延迟,从而延长到达目的地的时间。为了解决这些延迟问题并优化流量分配,我们的研究提出了一种方法,以最小的延迟平衡特定 IDS 链的流量分配。通过使用测试平台和基于轨迹的仿真进行全面测试和评估,我们的方法得到了验证,证明了它在各种流量场景中减少延迟和跳数的有效性。
{"title":"IDSMatch: A Novel Deployment Method for IDS Chains in SDNs","authors":"Nadia Niknami, Jie Wu","doi":"10.3390/network4010003","DOIUrl":"https://doi.org/10.3390/network4010003","url":null,"abstract":"With the surge in cyber attacks, there is a pressing need for more robust network intrusion detection systems (IDSs). These IDSs perform at their best when they can monitor all the traffic coursing through the network, especially within a software-defined network (SDN). In an SDN configuration, the control plane and data plane operate independently, facilitating dynamic control over network flows. Typically, an IDS application resides in the control plane, or a centrally located network IDS transmits security reports to the controller. However, the controller, equipped with various control applications, may encounter challenges when analyzing substantial data, especially in the face of high traffic volumes. To enhance the processing power, detection rates, and alleviate the controller’s burden, deploying multiple instances of IDS across the data plane is recommended. While deploying IDS on individual switches within the data plane undoubtedly enhances detection rates, the associated costs of installing one at each switch raise concerns. To address this challenge, this paper proposes the deployment of IDS chains across the data plane to boost detection rates while preventing controller overload. The controller directs incoming traffic through alternative paths, incorporating IDS chains; however, potential delays from retransmitting traffic through an IDS chain could extend the journey to the destination. To address these delays and optimize flow distribution, our study proposes a method to balance flow assignments to specific IDS chains with minimal delay. Our approach is validated through comprehensive testing and evaluation using a test bed and trace-based simulation, demonstrating its effectiveness in reducing delays and hop counts across various traffic scenarios.","PeriodicalId":19145,"journal":{"name":"Network","volume":"60 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139797884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDSMatch: A Novel Deployment Method for IDS Chains in SDNs IDSMatch:SDN 中 IDS 链的新型部署方法
Pub Date : 2024-02-07 DOI: 10.3390/network4010003
Nadia Niknami, Jie Wu
With the surge in cyber attacks, there is a pressing need for more robust network intrusion detection systems (IDSs). These IDSs perform at their best when they can monitor all the traffic coursing through the network, especially within a software-defined network (SDN). In an SDN configuration, the control plane and data plane operate independently, facilitating dynamic control over network flows. Typically, an IDS application resides in the control plane, or a centrally located network IDS transmits security reports to the controller. However, the controller, equipped with various control applications, may encounter challenges when analyzing substantial data, especially in the face of high traffic volumes. To enhance the processing power, detection rates, and alleviate the controller’s burden, deploying multiple instances of IDS across the data plane is recommended. While deploying IDS on individual switches within the data plane undoubtedly enhances detection rates, the associated costs of installing one at each switch raise concerns. To address this challenge, this paper proposes the deployment of IDS chains across the data plane to boost detection rates while preventing controller overload. The controller directs incoming traffic through alternative paths, incorporating IDS chains; however, potential delays from retransmitting traffic through an IDS chain could extend the journey to the destination. To address these delays and optimize flow distribution, our study proposes a method to balance flow assignments to specific IDS chains with minimal delay. Our approach is validated through comprehensive testing and evaluation using a test bed and trace-based simulation, demonstrating its effectiveness in reducing delays and hop counts across various traffic scenarios.
随着网络攻击的激增,人们迫切需要更强大的网络入侵检测系统(IDS)。当这些 IDS 能够监控流经网络的所有流量时,尤其是在软件定义网络(SDN)中,它们就能发挥最佳性能。在 SDN 配置中,控制平面和数据平面独立运行,便于对网络流进行动态控制。通常情况下,IDS 应用程序驻留在控制平面,或者由位于中央的网络 IDS 向控制器发送安全报告。然而,配备了各种控制应用程序的控制器在分析大量数据时可能会遇到挑战,尤其是面对高流量时。为了提高处理能力和检测率,减轻控制器的负担,建议在数据平面上部署多个 IDS 实例。在数据平面内的单个交换机上部署 IDS 无疑可以提高检测率,但在每个交换机上安装一个 IDS 的相关成本却令人担忧。为了应对这一挑战,本文建议在数据平面上部署 IDS 链,以提高检测率,同时防止控制器过载。控制器通过替代路径引导入站流量,其中包括 IDS 链;但是,通过 IDS 链重新传输流量可能会导致延迟,从而延长到达目的地的时间。为了解决这些延迟问题并优化流量分配,我们的研究提出了一种方法,以最小的延迟平衡特定 IDS 链的流量分配。通过使用测试平台和基于轨迹的仿真进行全面测试和评估,我们的方法得到了验证,证明了它在各种流量场景中减少延迟和跳数的有效性。
{"title":"IDSMatch: A Novel Deployment Method for IDS Chains in SDNs","authors":"Nadia Niknami, Jie Wu","doi":"10.3390/network4010003","DOIUrl":"https://doi.org/10.3390/network4010003","url":null,"abstract":"With the surge in cyber attacks, there is a pressing need for more robust network intrusion detection systems (IDSs). These IDSs perform at their best when they can monitor all the traffic coursing through the network, especially within a software-defined network (SDN). In an SDN configuration, the control plane and data plane operate independently, facilitating dynamic control over network flows. Typically, an IDS application resides in the control plane, or a centrally located network IDS transmits security reports to the controller. However, the controller, equipped with various control applications, may encounter challenges when analyzing substantial data, especially in the face of high traffic volumes. To enhance the processing power, detection rates, and alleviate the controller’s burden, deploying multiple instances of IDS across the data plane is recommended. While deploying IDS on individual switches within the data plane undoubtedly enhances detection rates, the associated costs of installing one at each switch raise concerns. To address this challenge, this paper proposes the deployment of IDS chains across the data plane to boost detection rates while preventing controller overload. The controller directs incoming traffic through alternative paths, incorporating IDS chains; however, potential delays from retransmitting traffic through an IDS chain could extend the journey to the destination. To address these delays and optimize flow distribution, our study proposes a method to balance flow assignments to specific IDS chains with minimal delay. Our approach is validated through comprehensive testing and evaluation using a test bed and trace-based simulation, demonstrating its effectiveness in reducing delays and hop counts across various traffic scenarios.","PeriodicalId":19145,"journal":{"name":"Network","volume":"205 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139857845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities 以太坊从 "工作证明 "向 "股权证明 "过渡对防范智能合约犯罪活动的研究
Pub Date : 2024-01-26 DOI: 10.3390/network4010002
Oliver J. Hall, Stavros Shiaeles, Fudong Li
With the ever-increasing advancement in blockchain technology, security is a significant concern when substantial investments are involved. This paper explores known smart contract exploits used in previous and current years. The purpose of this research is to provide a point of reference for users interacting with blockchain technology or smart contract developers. The primary research gathered in this paper analyses unique smart contracts deployed on a blockchain by investigating the Solidity code involved and the transactions on the ledger linked to these contracts. A disparity was found in the techniques used in 2021 compared to 2023 after Ethereum moved from a Proof-of-Work blockchain to a Proof-of-Stake one, demonstrating that with the advancement in blockchain technology, there is also a corresponding advancement in the level of effort bad actors exert to steal funds from users. The research concludes that as users become more wary of malicious smart contracts, bad actors continue to develop more sophisticated techniques to defraud users. It is recommended that even though this paper outlines many of the currently used techniques by bad actors, users who continue to interact with smart contracts should consistently stay up to date with emerging exploitations.
随着区块链技术的不断进步,当涉及大量投资时,安全性是一个重要问题。本文探讨了前几年和最近几年使用的已知智能合约漏洞。本研究的目的是为与区块链技术或智能合约开发者互动的用户提供一个参考点。本文收集的主要研究通过调查所涉及的 Solidity 代码以及与这些合约相关联的分类账上的交易,分析了在区块链上部署的独特智能合约。在以太坊从 "工作证明"(Proof-of-Work)区块链转变为 "摄取证明"(Proof-of-Stake)区块链后,发现 2021 年与 2023 年所使用的技术存在差异,这表明随着区块链技术的进步,不良行为者窃取用户资金的努力程度也相应提高。研究得出结论,随着用户对恶意智能合约的警惕性越来越高,不良行为者会继续开发更复杂的技术来欺诈用户。我们建议,尽管本文概述了不良行为者目前使用的许多技术,但继续与智能合约互动的用户应不断了解新出现的漏洞。
{"title":"A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities","authors":"Oliver J. Hall, Stavros Shiaeles, Fudong Li","doi":"10.3390/network4010002","DOIUrl":"https://doi.org/10.3390/network4010002","url":null,"abstract":"With the ever-increasing advancement in blockchain technology, security is a significant concern when substantial investments are involved. This paper explores known smart contract exploits used in previous and current years. The purpose of this research is to provide a point of reference for users interacting with blockchain technology or smart contract developers. The primary research gathered in this paper analyses unique smart contracts deployed on a blockchain by investigating the Solidity code involved and the transactions on the ledger linked to these contracts. A disparity was found in the techniques used in 2021 compared to 2023 after Ethereum moved from a Proof-of-Work blockchain to a Proof-of-Stake one, demonstrating that with the advancement in blockchain technology, there is also a corresponding advancement in the level of effort bad actors exert to steal funds from users. The research concludes that as users become more wary of malicious smart contracts, bad actors continue to develop more sophisticated techniques to defraud users. It is recommended that even though this paper outlines many of the currently used techniques by bad actors, users who continue to interact with smart contracts should consistently stay up to date with emerging exploitations.","PeriodicalId":19145,"journal":{"name":"Network","volume":"49 4","pages":"33-47"},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140493685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach 低功耗和有损网络的路由解决方案概览:迈向可靠的寻路方法
Pub Date : 2024-01-15 DOI: 10.3390/network4010001
Hanin Almutairi, Ning Zhang
Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, healthcare, and smart cities. Owing to the characteristics of LLNs, such as Lossy channels and limited power, generic routing solutions designed for non-LLNs may not be adequate in terms of delivery reliability and routing efficiency. Consequently, a routing protocol for LLNs (RPL) was designed. Several RPL objective functions have been proposed to enhance the routing reliability in LLNs. This paper analyses these solutions against performance and security requirements to identify their limitations. Firstly, it discusses the characteristics and security issues of LLN and their impact on packet delivery reliability and routing efficiency. Secondly, it provides a comprehensive analysis of routing solutions and identifies existing limitations. Thirdly, based on these limitations, this paper highlights the need for a reliable and efficient path-finding solution for LLNs.
近年来,由于物联网 (IoT) 和机器对机器 (M2M) 应用在智能家居、工业自动化、医疗保健和智慧城市等各行各业的应用日益普及,低功耗和有损网络 (LLN) 发展迅速。由于 LLN 的特点(如有损信道和功率有限),为非 LLN 设计的通用路由解决方案可能无法满足传输可靠性和路由效率的要求。因此,我们设计了一种 LLN 路由协议(RPL)。为了提高 LLN 的路由可靠性,人们提出了几种 RPL 目标函数。本文根据性能和安全要求对这些解决方案进行了分析,以找出它们的局限性。首先,本文讨论了 LLN 的特点和安全问题及其对数据包传送可靠性和路由效率的影响。其次,它对路由解决方案进行了全面分析,并确定了现有的局限性。第三,基于这些局限性,本文强调了为 LLN 寻找可靠高效路径解决方案的必要性。
{"title":"A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach","authors":"Hanin Almutairi, Ning Zhang","doi":"10.3390/network4010001","DOIUrl":"https://doi.org/10.3390/network4010001","url":null,"abstract":"Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, healthcare, and smart cities. Owing to the characteristics of LLNs, such as Lossy channels and limited power, generic routing solutions designed for non-LLNs may not be adequate in terms of delivery reliability and routing efficiency. Consequently, a routing protocol for LLNs (RPL) was designed. Several RPL objective functions have been proposed to enhance the routing reliability in LLNs. This paper analyses these solutions against performance and security requirements to identify their limitations. Firstly, it discusses the characteristics and security issues of LLN and their impact on packet delivery reliability and routing efficiency. Secondly, it provides a comprehensive analysis of routing solutions and identifies existing limitations. Thirdly, based on these limitations, this paper highlights the need for a reliable and efficient path-finding solution for LLNs.","PeriodicalId":19145,"journal":{"name":"Network","volume":"12 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139528935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TSN Network Scheduling—Challenges and Approaches TSN 网络调度--挑战与方法
Pub Date : 2023-12-16 DOI: 10.3390/network3040026
Hamza Chahed, Andreas Kassler
Time-Sensitive Networking (TSN) is a set of Ethernet standards aimed to improve determinism in packet delivery for converged networks. The main goal is to provide mechanisms that enable low and predictable transmission latency and high availability for demanding applications such as real-time audio/video streaming, automotive, and industrial control. To provide the required guarantees, TSN integrates different traffic shaping mechanisms including 802.1Qbv, 802.1Qch, and 802.1Qcr, allowing for the coexistence of different traffic classes with different priorities on the same network. Achieving the required quality of service (QoS) level needs proper selection and configuration of shaping mechanisms, which is difficult due to the diversity in the requirements of the coexisting streams under the presence of potential end-system-induced jitter. This paper discusses the suitability of the TSN traffic shaping mechanisms for the different traffic types, analyzes the TSN network configuration problem, i.e., finds the optimal path and shaper configurations for all TSN elements in the network to provide the required QoS, discusses the goals, constraints, and challenges of time-aware scheduling, and elaborates on the evaluation criteria of both the network-wide schedules and the scheduling algorithms that derive the configurations to present a common ground for comparison between the different approaches. Finally, we analyze the evolution of the scheduling task, identify shortcomings, and suggest future research directions.
时间敏感网络(TSN)是一套以太网标准,旨在提高融合网络数据包传输的确定性。其主要目标是为要求苛刻的应用(如实时音频/视频流、汽车和工业控制)提供可预测的低传输延迟和高可用性机制。为了提供所需的保证,TSN 集成了不同的流量整形机制,包括 802.1Qbv、802.1Qch 和 802.1Qcr,允许同一网络中具有不同优先级的不同流量类别共存。要达到所需的服务质量(QoS)水平,需要对整形机制进行适当的选择和配置,但这很困难,因为在潜在的终端系统引起的抖动情况下,共存流的要求各不相同。本文讨论了 TSN 流量整形机制对不同流量类型的适用性,分析了 TSN 网络配置问题(即为网络中的所有 TSN 网元找到最佳路径和整形器配置,以提供所需的 QoS),讨论了时间感知调度的目标、限制和挑战,并详细阐述了全网调度和调度算法的评估标准,从而为不同方法之间的比较提供了共同基础。最后,我们分析了调度任务的演变,找出了不足之处,并提出了未来的研究方向。
{"title":"TSN Network Scheduling—Challenges and Approaches","authors":"Hamza Chahed, Andreas Kassler","doi":"10.3390/network3040026","DOIUrl":"https://doi.org/10.3390/network3040026","url":null,"abstract":"Time-Sensitive Networking (TSN) is a set of Ethernet standards aimed to improve determinism in packet delivery for converged networks. The main goal is to provide mechanisms that enable low and predictable transmission latency and high availability for demanding applications such as real-time audio/video streaming, automotive, and industrial control. To provide the required guarantees, TSN integrates different traffic shaping mechanisms including 802.1Qbv, 802.1Qch, and 802.1Qcr, allowing for the coexistence of different traffic classes with different priorities on the same network. Achieving the required quality of service (QoS) level needs proper selection and configuration of shaping mechanisms, which is difficult due to the diversity in the requirements of the coexisting streams under the presence of potential end-system-induced jitter. This paper discusses the suitability of the TSN traffic shaping mechanisms for the different traffic types, analyzes the TSN network configuration problem, i.e., finds the optimal path and shaper configurations for all TSN elements in the network to provide the required QoS, discusses the goals, constraints, and challenges of time-aware scheduling, and elaborates on the evaluation criteria of both the network-wide schedules and the scheduling algorithms that derive the configurations to present a common ground for comparison between the different approaches. Finally, we analyze the evolution of the scheduling task, identify shortcomings, and suggest future research directions.","PeriodicalId":19145,"journal":{"name":"Network","volume":"37 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138967290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment 优化 MLP-CNN 模型,增强 SDN 环境中 DDoS 攻击的检测能力
Pub Date : 2023-12-01 DOI: 10.3390/network3040024
Mohamed Ali Setitra, Mingyu Fan, B. L. Y. Agbley, ZineEl Abidine Bensalem
In the contemporary landscape, Distributed Denial of Service (DDoS) attacks have emerged as an exceedingly pernicious threat, particularly in the context of network management centered around technologies like Software-Defined Networking (SDN). With the increasing intricacy and sophistication of DDoS attacks, the need for effective countermeasures has led to the adoption of Machine Learning (ML) techniques. Nevertheless, despite substantial advancements in this field, challenges persist, adversely affecting the accuracy of ML-based DDoS-detection systems. This article introduces a model designed to detect DDoS attacks. This model leverages a combination of Multilayer Perceptron (MLP) and Convolutional Neural Network (CNN) to enhance the performance of ML-based DDoS-detection systems within SDN environments. We propose utilizing the SHapley Additive exPlanations (SHAP) feature-selection technique and employing a Bayesian optimizer for hyperparameter tuning to optimize our model. To further solidify the relevance of our approach within SDN environments, we evaluate our model by using an open-source SDN dataset known as InSDN. Furthermore, we apply our model to the CICDDoS-2019 dataset. Our experimental results highlight a remarkable overall accuracy of 99.95% with CICDDoS-2019 and an impressive 99.98% accuracy with the InSDN dataset. These outcomes underscore the effectiveness of our proposed DDoS-detection model within SDN environments compared to existing techniques.
在当今的环境中,分布式拒绝服务(DDoS)攻击已经成为一种极其有害的威胁,特别是在以软件定义网络(SDN)等技术为中心的网络管理环境中。随着DDoS攻击的复杂性和复杂性的增加,对有效对策的需求导致了机器学习(ML)技术的采用。然而,尽管该领域取得了实质性进展,但挑战依然存在,这对基于ml的ddos检测系统的准确性产生了不利影响。本文介绍了一个用于检测DDoS攻击的模型。该模型利用多层感知器(MLP)和卷积神经网络(CNN)的组合来增强SDN环境中基于ml的ddos检测系统的性能。我们建议利用SHapley加性解释(SHAP)特征选择技术和使用贝叶斯优化器进行超参数调整来优化我们的模型。为了进一步巩固我们的方法在SDN环境中的相关性,我们通过使用称为InSDN的开源SDN数据集来评估我们的模型。此外,我们将我们的模型应用于CICDDoS-2019数据集。我们的实验结果显示,CICDDoS-2019的总体准确率达到了99.95%,InSDN数据集的准确率达到了99.98%。与现有技术相比,这些结果强调了我们提出的ddos检测模型在SDN环境中的有效性。
{"title":"Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment","authors":"Mohamed Ali Setitra, Mingyu Fan, B. L. Y. Agbley, ZineEl Abidine Bensalem","doi":"10.3390/network3040024","DOIUrl":"https://doi.org/10.3390/network3040024","url":null,"abstract":"In the contemporary landscape, Distributed Denial of Service (DDoS) attacks have emerged as an exceedingly pernicious threat, particularly in the context of network management centered around technologies like Software-Defined Networking (SDN). With the increasing intricacy and sophistication of DDoS attacks, the need for effective countermeasures has led to the adoption of Machine Learning (ML) techniques. Nevertheless, despite substantial advancements in this field, challenges persist, adversely affecting the accuracy of ML-based DDoS-detection systems. This article introduces a model designed to detect DDoS attacks. This model leverages a combination of Multilayer Perceptron (MLP) and Convolutional Neural Network (CNN) to enhance the performance of ML-based DDoS-detection systems within SDN environments. We propose utilizing the SHapley Additive exPlanations (SHAP) feature-selection technique and employing a Bayesian optimizer for hyperparameter tuning to optimize our model. To further solidify the relevance of our approach within SDN environments, we evaluate our model by using an open-source SDN dataset known as InSDN. Furthermore, we apply our model to the CICDDoS-2019 dataset. Our experimental results highlight a remarkable overall accuracy of 99.95% with CICDDoS-2019 and an impressive 99.98% accuracy with the InSDN dataset. These outcomes underscore the effectiveness of our proposed DDoS-detection model within SDN environments compared to existing techniques.","PeriodicalId":19145,"journal":{"name":"Network","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138625171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1