首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Blockchain With Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image 区块链与分层自动关联多项式卷积神经网络相结合的图像加密技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70013
V. Deepa Priya, M. Sundaram

Nowadays, the image security is one of the most challenging issues to address the technological age. Security is the primary issue in data management and transmission because of the original data form that is read, abused and destroyed. The cloud companies struggle to secure the file. The cloud security is the major concern in cloud computing context. Numerous researches have been presented so far to protect the cloud environment. But, none of them provides the sufficient security. Therefore, this paper proposes a Blockchain-based technique for Image Security that combines Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography (BC-SIE-HAPCNN-FODCE). The Flickr30k dataset is used to collect the input images. At that point, cryptographic pixel values of picture are kept on blockchain to defend security of picture information. It uses Delegated Proof of Stake Consensus (DT-DPoS) approach appointed confirmation of stake agreement approach. The performance parameters, like processing time, reaction time, runtime, correlation coefficient analysis, entropy analysis, mean square error, and availability are used to determine the efficacy of the proposed BC-SIE-HAPCNN-FODCE approach. The performance of the proposed technique attains 18.81%, 32.05%, and 22.28% higher correlation coefficient and 25.38%, 20.81%, and 26.04% higher entropy compared with existing methods, such as Multiple Rossler lightweight Logistic sine mapping dependent Federated convolutional method with cyber blockchain in medical image encryption (BC-SIE-FCAL-MRLLSM), color image encryption under Hénon-zigzag map with chaotic restricted Boltzmann machine over Blockchain (BC-SIE-CRBM-HZM) and blockchain-assisted safe picture transmission along detection method on Internet of Medical Things Environment (BC-SIE-ECC-DBN), respectively.

如今,图像安全性是技术时代最具挑战性的问题之一。安全是数据管理和传输中的首要问题,因为原始数据形式会被读取、滥用和破坏。云计算公司努力确保文件安全。云安全是云计算背景下的主要问题。迄今为止,已经有许多研究提出要保护云环境。但是,它们都没有提供足够的安全性。因此,本文提出了一种基于区块链的图像安全技术,该技术结合了分层自动关联多项式卷积神经网络加密技术(BC-SIE-HAPCNN-FODCE)。Flickr30k 数据集用于收集输入图像。此时,图片的加密像素值被保存在区块链上,以保护图片信息的安全。区块链使用委托权益共识证明(DT-DPoS)方法指定权益协议确认方法。处理时间、反应时间、运行时间、相关系数分析、熵分析、均方误差和可用性等性能参数用于确定所提议的 BC-SIE-HAPCNN-FODCE 方法的有效性。与现有方法相比,所提技术的相关系数分别提高了 18.81%、32.05% 和 22.28%,熵分别提高了 25.38%、20.81% 和 26.04%。与现有方法相比,如医学图像加密中的多Rossler轻量级Logistic正弦映射依赖联邦卷积法与网络区块链(BC-SIE-FCAL-MRLLSM)、区块链上的混沌受限玻尔兹曼机Hénon-zigzag映射下的彩色图像加密(BC-SIE-CRBM-HZM)和医疗物联网环境下的区块链辅助安全图片传输沿检测方法(BC-SIE-ECC-DBN),熵值分别提高了18.81%、32.05%和22.28%。
{"title":"Blockchain With Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image","authors":"V. Deepa Priya,&nbsp;M. Sundaram","doi":"10.1002/ett.70013","DOIUrl":"https://doi.org/10.1002/ett.70013","url":null,"abstract":"<div>\u0000 \u0000 <p>Nowadays, the image security is one of the most challenging issues to address the technological age. Security is the primary issue in data management and transmission because of the original data form that is read, abused and destroyed. The cloud companies struggle to secure the file. The cloud security is the major concern in cloud computing context. Numerous researches have been presented so far to protect the cloud environment. But, none of them provides the sufficient security. Therefore, this paper proposes a Blockchain-based technique for Image Security that combines Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography (BC-SIE-HAPCNN-FODCE). The Flickr30k dataset is used to collect the input images. At that point, cryptographic pixel values of picture are kept on blockchain to defend security of picture information. It uses Delegated Proof of Stake Consensus (DT-DPoS) approach appointed confirmation of stake agreement approach. The performance parameters, like processing time, reaction time, runtime, correlation coefficient analysis, entropy analysis, mean square error, and availability are used to determine the efficacy of the proposed BC-SIE-HAPCNN-FODCE approach. The performance of the proposed technique attains 18.81%, 32.05%, and 22.28% higher correlation coefficient and 25.38%, 20.81%, and 26.04% higher entropy compared with existing methods, such as Multiple Rossler lightweight Logistic sine mapping dependent Federated convolutional method with cyber blockchain in medical image encryption (BC-SIE-FCAL-MRLLSM), color image encryption under Hénon-zigzag map with chaotic restricted Boltzmann machine over Blockchain (BC-SIE-CRBM-HZM) and blockchain-assisted safe picture transmission along detection method on Internet of Medical Things Environment (BC-SIE-ECC-DBN), respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm 无人机群安全保障成群运动的数字孪生深度强化学习
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70011
Zhilin Li, Lei Lei, Gaoqing Shen, Xiaochang Liu, Xiaojiao Liu

Multi-agent deep reinforcement learning (MADRL) has become a typical paradigm for the flocking motion of UAV swarm in dynamic, stochastic environments. However, sim-to-real problems, such as reality gap, training efficiency, and safety issues, restrict the application of MADRL in flocking motion scenarios. To address these problems, we first propose a digital twin (DT)-enabled training framework. With the assistance of high-fidelity digital twin simulation, effective policies can be efficiently trained. Based on the multi-agent proximal policy optimization (MAPPO) algorithm, we then design the learning approach for flocking motion with matching observation space, action space, and reward function. Afterward, we employ a distributed flocking center estimation algorithm based on position consensus. The estimated center is used as a policy input to improve the aggregation behavior. Moreover, we introduce a repulsion scheme, which applies an additional repulsion force to the action to prevent UAVs from colliding with neighbors and obstacles. Simulation results show that our method performs well in maintaining flocking formation and avoiding collisions, and has better decision-making ability in near-realistic environments.

多代理深度强化学习(MADRL)已成为无人机群在动态、随机环境中成群运动的典型范例。然而,模拟到现实的问题,如现实差距、训练效率和安全问题,限制了 MADRL 在成群运动场景中的应用。为了解决这些问题,我们首先提出了一个支持数字孪生(DT)的训练框架。在高保真数字孪生模拟的帮助下,可以高效地训练出有效的策略。在多代理近端策略优化(MAPPO)算法的基础上,我们设计了与观测空间、行动空间和奖励函数相匹配的植群运动学习方法。之后,我们采用了一种基于位置共识的分布式植群中心估计算法。估计出的中心作为策略输入,用于改善聚合行为。此外,我们还引入了一种斥力方案,为行动施加额外的斥力,以防止无人机与邻居和障碍物发生碰撞。仿真结果表明,我们的方法在保持蜂群队形和避免碰撞方面表现良好,在接近真实的环境中具有更好的决策能力。
{"title":"Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm","authors":"Zhilin Li,&nbsp;Lei Lei,&nbsp;Gaoqing Shen,&nbsp;Xiaochang Liu,&nbsp;Xiaojiao Liu","doi":"10.1002/ett.70011","DOIUrl":"https://doi.org/10.1002/ett.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Multi-agent deep reinforcement learning (MADRL) has become a typical paradigm for the flocking motion of UAV swarm in dynamic, stochastic environments. However, sim-to-real problems, such as reality gap, training efficiency, and safety issues, restrict the application of MADRL in flocking motion scenarios. To address these problems, we first propose a digital twin (DT)-enabled training framework. With the assistance of high-fidelity digital twin simulation, effective policies can be efficiently trained. Based on the multi-agent proximal policy optimization (MAPPO) algorithm, we then design the learning approach for flocking motion with matching observation space, action space, and reward function. Afterward, we employ a distributed flocking center estimation algorithm based on position consensus. The estimated center is used as a policy input to improve the aggregation behavior. Moreover, we introduce a repulsion scheme, which applies an additional repulsion force to the action to prevent UAVs from colliding with neighbors and obstacles. Simulation results show that our method performs well in maintaining flocking formation and avoiding collisions, and has better decision-making ability in near-realistic environments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology 利用深度学习和可信路由辅助区块链技术在 VANET 中预防流量和增强安全性
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70004
Cloudin Swamynathan, Revathy Shanmugam, Kanagasabapathy Pradeep Mohan Kumar, Balasubramani Subbiyan

Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary concept with enormous potential for developing safe and efficient transportation systems. Because VANETs are open networks that require regular information sharing, it might be difficult to ensure the security of data delivered through VANETs as well as driver privacy. This paper proposes a blockchain technology that supports trusted routing and deep learning for traffic prevention and security enhancement in VANETs. Initially, the proposed Feature Attention-based Extended Convolutional Capsule Network (FA_ECCN) model predicts the driver's behaviors such as normal, drowsy, distracted, fatigued, aggressive, and impaired. Next, the Binary Fire Hawks-based Optimized Link State Routing Protocol (BFH_OLSRP) is used to route traffic after trust values have been assessed. Furthermore, Binary Fire Hawks Optimization (BFHO) determines the best routing path based on criteria such as link stability and node stability degree. Finally, blockchain storage is supported by the Interplanetary File System (IPFS) technology to improve the security of VANET data. Additionally, the validation process is established by using Delegated Practical Byzantine Fault Tolerance (DPBFT). As a result, the proposed study employs the blockchain system to securely send data to neighboring vehicles via trust-based routing, thereby accurately predicting the driver's behavior. The proposed method achieves a better outcome in terms of latency, packet delivery ratio (PDR), overhead packets, throughputs, end-to-end delay, transmission overhead, and computational cost. According to simulation results and efficiency evaluation, the proposed approach outperforms existing approaches and enhances vehicle communication security in an effective manner.

便携式宽带网络中的车载特设网络(VANET)是一个革命性的概念,在开发安全高效的交通系统方面具有巨大的潜力。由于 VANET 是开放式网络,需要定期共享信息,因此可能难以确保通过 VANET 传输数据的安全性以及驾驶员的隐私。本文提出了一种支持可信路由和深度学习的区块链技术,用于 VANET 中的流量预防和安全增强。首先,本文提出的基于特征注意力的扩展卷积胶囊网络(FA_ECCN)模型可预测驾驶员的行为,如正常、瞌睡、分心、疲劳、攻击性和受损。然后,在评估信任值后,使用基于二进制火鹰的优化链路状态路由协议(BFH_OLSRP)对交通进行路由。此外,二进制火鹰优化(BFHO)根据链路稳定性和节点稳定程度等标准确定最佳路由路径。最后,区块链存储由星际文件系统(IPFS)技术提供支持,以提高 VANET 数据的安全性。此外,验证过程是通过委托实用拜占庭容错(DPBFT)建立的。因此,拟议的研究采用了区块链系统,通过基于信任的路由将数据安全地发送到邻近车辆,从而准确预测驾驶员的行为。所提出的方法在延迟、数据包交付率(PDR)、数据包开销、吞吐量、端到端延迟、传输开销和计算成本方面都取得了较好的结果。根据仿真结果和效率评估,所提出的方法优于现有方法,并能有效增强车辆通信的安全性。
{"title":"Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology","authors":"Cloudin Swamynathan,&nbsp;Revathy Shanmugam,&nbsp;Kanagasabapathy Pradeep Mohan Kumar,&nbsp;Balasubramani Subbiyan","doi":"10.1002/ett.70004","DOIUrl":"https://doi.org/10.1002/ett.70004","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary concept with enormous potential for developing safe and efficient transportation systems. Because VANETs are open networks that require regular information sharing, it might be difficult to ensure the security of data delivered through VANETs as well as driver privacy. This paper proposes a blockchain technology that supports trusted routing and deep learning for traffic prevention and security enhancement in VANETs. Initially, the proposed Feature Attention-based Extended Convolutional Capsule Network (FA_ECCN) model predicts the driver's behaviors such as normal, drowsy, distracted, fatigued, aggressive, and impaired. Next, the Binary Fire Hawks-based Optimized Link State Routing Protocol (BFH_OLSRP) is used to route traffic after trust values have been assessed. Furthermore, Binary Fire Hawks Optimization (BFHO) determines the best routing path based on criteria such as link stability and node stability degree. Finally, blockchain storage is supported by the Interplanetary File System (IPFS) technology to improve the security of VANET data. Additionally, the validation process is established by using Delegated Practical Byzantine Fault Tolerance (DPBFT). As a result, the proposed study employs the blockchain system to securely send data to neighboring vehicles via trust-based routing, thereby accurately predicting the driver's behavior. The proposed method achieves a better outcome in terms of latency, packet delivery ratio (PDR), overhead packets, throughputs, end-to-end delay, transmission overhead, and computational cost. According to simulation results and efficiency evaluation, the proposed approach outperforms existing approaches and enhances vehicle communication security in an effective manner.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security DSDOS 云:利用混合加密、基于区块链智能合约的访问控制和哈希验证码实现云安全的去中心化安全数据外包系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70016
K. L. Neela

With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an access key distributed by a third party. If this third party is untrustworthy, it poses a significant security threat to the system. To address this challenge, we propose a Decentralized Secure Data Outsourcing System (DSDOS) that uses blockchain technology to ensure data security and privacy. The DSDOS system comprises three modules: data security and privacy, access control and authorization, and data integrity and availability. The data security and privacy module uses a hybrid encryption scheme that combines Advanced Encryption Standard (AES), partially homomorphic encryption (PHE), and Diffie–Hellman (DH) to ensure secure data storage and access. The access control and authorization module uses a blockchain-based smart contract system to manage access to the encrypted data. The data integrity and availability module uses hash-based message authentication code (HMAC) to ensure that the data are not tampered with and is always available. We conducted a security and performance analysis of the DSDOS system and found that it outperforms previous schemes in terms of security and performance. The DSDOS system is a secure and privacy-preserving data outsourcing system that can be used to mitigate the security risks associated with traditional cloud storage systems.

随着将数据外包给云服务的趋势日益明显,确保数据安全和隐私变得至关重要。通常情况下,数据以加密形式存储在云服务器上,以降低风险。但是,访问加密数据需要第三方分发的访问密钥。如果第三方不可信,就会对系统构成重大安全威胁。为了应对这一挑战,我们提出了去中心化安全数据外包系统(DSDOS),该系统利用区块链技术确保数据的安全性和隐私性。DSDOS 系统由三个模块组成:数据安全与隐私、访问控制与授权、数据完整性与可用性。数据安全和隐私模块采用混合加密方案,结合了高级加密标准(AES)、部分同态加密(PHE)和 Diffie-Hellman (DH),以确保数据存储和访问的安全性。访问控制和授权模块使用基于区块链的智能合约系统来管理加密数据的访问。数据完整性和可用性模块使用基于哈希的消息验证码(HMAC)来确保数据不被篡改并始终可用。我们对 DSDOS 系统进行了安全性和性能分析,发现它在安全性和性能方面都优于以前的方案。DSDOS 系统是一种安全且保护隐私的数据外包系统,可用于降低传统云存储系统的相关安全风险。
{"title":"DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security","authors":"K. L. Neela","doi":"10.1002/ett.70016","DOIUrl":"https://doi.org/10.1002/ett.70016","url":null,"abstract":"<div>\u0000 \u0000 <p>With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an access key distributed by a third party. If this third party is untrustworthy, it poses a significant security threat to the system. To address this challenge, we propose a Decentralized Secure Data Outsourcing System (DSDOS) that uses blockchain technology to ensure data security and privacy. The DSDOS system comprises three modules: data security and privacy, access control and authorization, and data integrity and availability. The data security and privacy module uses a hybrid encryption scheme that combines Advanced Encryption Standard (AES), partially homomorphic encryption (PHE), and Diffie–Hellman (DH) to ensure secure data storage and access. The access control and authorization module uses a blockchain-based smart contract system to manage access to the encrypted data. The data integrity and availability module uses hash-based message authentication code (HMAC) to ensure that the data are not tampered with and is always available. We conducted a security and performance analysis of the DSDOS system and found that it outperforms previous schemes in terms of security and performance. The DSDOS system is a secure and privacy-preserving data outsourcing system that can be used to mitigate the security risks associated with traditional cloud storage systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints 基于深度强化学习的物理层安全增强设计,适用于具有实际约束条件的 RIS 辅助毫米波通信
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-05 DOI: 10.1002/ett.70007
Qingqing Tu, Zheng Dong, Chenfei Xie, Xianbing Zou, Ning Wei, Ya Li, Fei Xu

Reconfigurable intelligent surfaces (RIS) offer new opportunities for enhancing security in millimeter-wave (mmWave) communications. However, some significant practical challenges still need to be addressed before their extensive implementation in future wireless networks. This article considers the practical constraints in a secure mmWave system aided by distributed RISs, including imperfect channel state information (CSI) in dynamic channel conditions and high complexity of non-convex optimization in complex environments. To address these challenges, we propose a robust and efficient physical layer security (PLS) enhancement algorithm based on the deep reinforcement learning (DRL) framework to effectively tackle the issues of limited dynamic adaptation and high computational complexity encountered with conventional optimization methods. This algorithm, utilizing an actor-critic architecture, can dynamically track channel variations and optimize strategies for improved system secrecy rate. Numerical simulations demonstrate that the proposed DRL-based PLS enhancement algorithm outperforms non-convex optimization benchmarks in robustness and efficiency for secure mmWave communication systems aided by distributed RISs and affected by imperfect CSI.

可重构智能表面(RIS)为增强毫米波(mmWave)通信的安全性提供了新的机遇。然而,在未来的无线网络中广泛应用之前,仍需解决一些重大的实际挑战。本文探讨了分布式 RIS 辅助毫米波安全系统中的实际限制因素,包括动态信道条件下不完善的信道状态信息(CSI)和复杂环境下非凸优化的高复杂性。为了应对这些挑战,我们提出了一种基于深度强化学习(DRL)框架的稳健高效的物理层安全性(PLS)增强算法,以有效解决传统优化方法所遇到的动态适应性有限和计算复杂度高等问题。该算法采用行为批判架构,可动态跟踪信道变化并优化策略,从而提高系统保密率。数值模拟证明,对于由分布式 RIS 辅助并受不完美 CSI 影响的毫米波安全通信系统,所提出的基于 DRL 的 PLS 增强算法在鲁棒性和效率方面优于非凸优化基准。
{"title":"A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints","authors":"Qingqing Tu,&nbsp;Zheng Dong,&nbsp;Chenfei Xie,&nbsp;Xianbing Zou,&nbsp;Ning Wei,&nbsp;Ya Li,&nbsp;Fei Xu","doi":"10.1002/ett.70007","DOIUrl":"https://doi.org/10.1002/ett.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Reconfigurable intelligent surfaces (RIS) offer new opportunities for enhancing security in millimeter-wave (mmWave) communications. However, some significant practical challenges still need to be addressed before their extensive implementation in future wireless networks. This article considers the practical constraints in a secure mmWave system aided by distributed RISs, including imperfect channel state information (CSI) in dynamic channel conditions and high complexity of non-convex optimization in complex environments. To address these challenges, we propose a robust and efficient physical layer security (PLS) enhancement algorithm based on the deep reinforcement learning (DRL) framework to effectively tackle the issues of limited dynamic adaptation and high computational complexity encountered with conventional optimization methods. This algorithm, utilizing an actor-critic architecture, can dynamically track channel variations and optimize strategies for improved system secrecy rate. Numerical simulations demonstrate that the proposed DRL-based PLS enhancement algorithm outperforms non-convex optimization benchmarks in robustness and efficiency for secure mmWave communication systems aided by distributed RISs and affected by imperfect CSI.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication 针对 IRS 辅助无线电力传输的最佳电容设计,实现可持续的物联网通信
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-30 DOI: 10.1002/ett.70010
Bhupendra Sharma, Anirudh Agarwal, Deepak Mishra, Soumitra Debnath, Santosh Shah

Intelligent reflecting surface (IRS) is a cutting-edge technique that can significantly improve wireless propagation. It can efficiently utilize wireless power transfer to enable sustainable Internet-of-Things (IoT) transmission by reconfiguring the incident signal from the active transmitter. However, the flexibility of capacitance tuning in the IRS system, which controls underlying reflections, is often overlooked. The effective capacitance design in the IRS system can provide a new degree of freedom in the IoT communication system, which can enable additional performance gain in the received power. To achieve this, a novel IRS circuital optimization model is proposed in this work. It incorporates various electrical parameters of the meta-surface unit cell for improved IoT-enabled communication. The proposed optimization model provides an optimal capacitance as a function of phase shift (PS), which is controlled by IRS, incident frequency, and other IRS electrical parameters. This optimal capacitance is then used to define the received power. The convexity of the optimization problem is proved, and the global optimal capacitance is obtained for received power maximization. Our simulations show that the proposed optimization model outperforms the existing constructive interference-based optimal PS method, for which the capacitance is first calculated. Finally, the analytical results are numerically validated with several optimal design insights.

智能反射面(IRS)是一种能显著改善无线传播的尖端技术。通过重新配置有源发射器的入射信号,它可以有效利用无线功率传输,实现可持续的物联网(IoT)传输。然而,IRS 系统中控制底层反射的电容调谐的灵活性往往被忽视。IRS 系统中有效的电容设计可为物联网通信系统提供新的自由度,从而实现额外的接收功率性能增益。为此,本文提出了一种新型 IRS 电路优化模型。它结合了元表面单元格的各种电气参数,以改进物联网通信。所提出的优化模型提供了作为相移(PS)函数的最佳电容,而相移是由 IRS、入射频率和其他 IRS 电气参数控制的。然后,利用该最佳电容定义接收功率。我们证明了优化问题的凸性,并获得了接收功率最大化的全局最优电容。我们的模拟结果表明,所提出的优化模型优于现有的基于建设性干扰的最优 PS 方法,后者首先计算电容。最后,分析结果与若干优化设计见解进行了数值验证。
{"title":"Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication","authors":"Bhupendra Sharma,&nbsp;Anirudh Agarwal,&nbsp;Deepak Mishra,&nbsp;Soumitra Debnath,&nbsp;Santosh Shah","doi":"10.1002/ett.70010","DOIUrl":"https://doi.org/10.1002/ett.70010","url":null,"abstract":"<div>\u0000 \u0000 <p>Intelligent reflecting surface (IRS) is a cutting-edge technique that can significantly improve wireless propagation. It can efficiently utilize wireless power transfer to enable sustainable Internet-of-Things (IoT) transmission by reconfiguring the incident signal from the active transmitter. However, the flexibility of capacitance tuning in the IRS system, which controls underlying reflections, is often overlooked. The effective capacitance design in the IRS system can provide a new degree of freedom in the IoT communication system, which can enable additional performance gain in the received power. To achieve this, a novel IRS circuital optimization model is proposed in this work. It incorporates various electrical parameters of the meta-surface unit cell for improved IoT-enabled communication. The proposed optimization model provides an optimal capacitance as a function of phase shift (PS), which is controlled by IRS, incident frequency, and other IRS electrical parameters. This optimal capacitance is then used to define the received power. The convexity of the optimization problem is proved, and the global optimal capacitance is obtained for received power maximization. Our simulations show that the proposed optimization model outperforms the existing constructive interference-based optimal PS method, for which the capacitance is first calculated. Finally, the analytical results are numerically validated with several optimal design insights.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET 城域网中的恶意节点检测和安全路由协议深度人工免疫系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-25 DOI: 10.1002/ett.70008
S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar

In the context of Mobile Ad Hoc Networks (MANETs), the dynamic and decentralized topology poses significant challenges like unreliable connectivity, limited bandwidth, node mobility, and vulnerability to security threats from malicious nodes. Ensuring secure and energy-efficient data transmission in such environments is crucial for mission-critical applications. This research addresses these pressing challenges by introducing a robust routing protocol capable of detecting and mitigating malicious nodes, thereby enhancing MANET's Quality of Service (QoS). The proposed approach, the Dendritic Cell with Adaptive Trust Q-learning Protocol (dDC-ATQP), integrates several innovative techniques to tackle these issues. Firstly, the trust evaluation mechanism assesses the behavior of nodes to identify potential malicious actors, mitigating the effect of malicious nodes on system execution. Secondly, the adaptive routing strategy optimizes data transmission paths based on real-time network conditions, reducing latency and packet loss. To evaluate the effectiveness of this approach, extensive simulations are conducted using a range of performance metrics. The results demonstrate significant improvements over existing methods, including a throughput increase of (79.2% in 50 s), lower end-to-end-delay (0.075 s for 20 nodes), energy consumption of (38.55/J), higher packet delivery ratio (98% for 20 nodes), reduced packet loss ratio (5% for 100 nodes), enhanced security (80% for 70 nodes).

在移动 Ad Hoc 网络(MANET)中,动态和分散的拓扑结构带来了巨大的挑战,如不可靠的连接、有限的带宽、节点移动性以及易受恶意节点安全威胁的脆弱性。在这种环境中确保安全、节能的数据传输对关键任务应用至关重要。这项研究通过引入一种能够检测和减少恶意节点的稳健路由协议来应对这些紧迫的挑战,从而提高城域网的服务质量(QoS)。所提出的方法--树突状细胞与自适应信任Q-learning协议(dDC-ATQP)--整合了多项创新技术来解决这些问题。首先,信任评估机制通过评估节点的行为来识别潜在的恶意行为者,从而减轻恶意节点对系统执行的影响。其次,自适应路由策略根据实时网络条件优化数据传输路径,减少延迟和数据包丢失。为了评估这种方法的有效性,我们使用一系列性能指标进行了大量模拟。结果表明,与现有方法相比,该方法有明显改善,包括吞吐量提高(50 秒内提高 79.2%)、端到端延迟降低(20 个节点为 0.075 秒)、能耗降低(38.55/J)、数据包传送率提高(20 个节点为 98%)、数据包丢失率降低(100 个节点为 5%)、安全性增强(70 个节点为 80%)。
{"title":"Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET","authors":"S. Syed Jamaesha,&nbsp;M. S. Gowtham,&nbsp;M. Ramkumar","doi":"10.1002/ett.70008","DOIUrl":"https://doi.org/10.1002/ett.70008","url":null,"abstract":"<div>\u0000 \u0000 <p>In the context of Mobile Ad Hoc Networks (MANETs), the dynamic and decentralized topology poses significant challenges like unreliable connectivity, limited bandwidth, node mobility, and vulnerability to security threats from malicious nodes. Ensuring secure and energy-efficient data transmission in such environments is crucial for mission-critical applications. This research addresses these pressing challenges by introducing a robust routing protocol capable of detecting and mitigating malicious nodes, thereby enhancing MANET's Quality of Service (QoS). The proposed approach, the Dendritic Cell with Adaptive Trust Q-learning Protocol (dDC-ATQP), integrates several innovative techniques to tackle these issues. Firstly, the trust evaluation mechanism assesses the behavior of nodes to identify potential malicious actors, mitigating the effect of malicious nodes on system execution. Secondly, the adaptive routing strategy optimizes data transmission paths based on real-time network conditions, reducing latency and packet loss. To evaluate the effectiveness of this approach, extensive simulations are conducted using a range of performance metrics. The results demonstrate significant improvements over existing methods, including a throughput increase of (79.2% in 50 s), lower end-to-end-delay (0.075 s for 20 nodes), energy consumption of (38.55/J), higher packet delivery ratio (98% for 20 nodes), reduced packet loss ratio (5% for 100 nodes), enhanced security (80% for 70 nodes).</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits 一种用于边缘计算资源分配的新颖有预算限制的成交拍卖机制
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-25 DOI: 10.1002/ett.70005
Jixian Zhang, Hao Sun, Zhemin Wang, Qian Su, Weidong Li

An auction mechanism is an effective resource allocation method that can increase the revenue of resource providers in the field of edge computing. Existing auction mechanism designs mostly aim to maximize social welfare when allocating resources, but these schemes lead to low revenue. In contrast, clinching auctions have achieved good results in spectrum allocation and advertising due to their high revenue. Therefore, a clinching auction mechanism is a promising tool for allocating edge computing resources. However, clinching auctions have the drawback that they can only allocate homogeneous finitely divisible goods, meaning that they cannot be directly applied for resource allocation in edge computing. This article presents two new auction mechanisms that improve on the clinching auction. Specifically, based on the principle of increasing global prices and local competition, two mechanisms are designed, one from the perspective of resource providers (MDCAM-ECS) and the other from the perspective of users (MDCAM-User), to solve the problem of edge computing resource allocation and pricing with deployment constraints and user budget constraints. The mechanisms proposed in this article have the properties of individual rationality, truthfulness, and computational efficiency. In the experiments, in terms of social welfare and revenue, our algorithms can achieve a 20% improvement over existing algorithms, such as fixed-price, Vickery–Clarke–Groves (VCG), and monotonic critical-price mechanisms. Additionally, in most experiments, our algorithm can ensure resource utilization greater than 80%.

在边缘计算领域,拍卖机制是一种有效的资源分配方法,可以增加资源提供者的收入。现有的拍卖机制设计在分配资源时大多以社会福利最大化为目标,但这些方案导致收益较低。相比之下,成交拍卖由于收益高,在频谱分配和广告领域取得了良好的效果。因此,成交拍卖机制是一种很有前景的边缘计算资源分配工具。然而,成交拍卖的缺点是只能分配同质的有限可分物品,这意味着它不能直接应用于边缘计算的资源分配。本文提出了两种改进成交拍卖的新拍卖机制。具体来说,根据全局价格递增和局部竞争的原则,从资源提供者的角度(MDCAM-ECS)和用户的角度(MDCAM-User)设计了两种机制,以解决具有部署约束和用户预算约束的边缘计算资源分配和定价问题。本文提出的机制具有个体理性、真实性和计算效率等特性。在实验中,就社会福利和收入而言,我们的算法能比现有算法(如固定价格机制、Vickery-Clarke-Groves(VCG)机制和单调临界价格机制)提高 20%。此外,在大多数实验中,我们的算法都能确保资源利用率超过 80%。
{"title":"A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits","authors":"Jixian Zhang,&nbsp;Hao Sun,&nbsp;Zhemin Wang,&nbsp;Qian Su,&nbsp;Weidong Li","doi":"10.1002/ett.70005","DOIUrl":"https://doi.org/10.1002/ett.70005","url":null,"abstract":"<div>\u0000 \u0000 <p>An auction mechanism is an effective resource allocation method that can increase the revenue of resource providers in the field of edge computing. Existing auction mechanism designs mostly aim to maximize social welfare when allocating resources, but these schemes lead to low revenue. In contrast, clinching auctions have achieved good results in spectrum allocation and advertising due to their high revenue. Therefore, a clinching auction mechanism is a promising tool for allocating edge computing resources. However, clinching auctions have the drawback that they can only allocate homogeneous finitely divisible goods, meaning that they cannot be directly applied for resource allocation in edge computing. This article presents two new auction mechanisms that improve on the clinching auction. Specifically, based on the principle of increasing global prices and local competition, two mechanisms are designed, one from the perspective of resource providers (MDCAM-ECS) and the other from the perspective of users (MDCAM-User), to solve the problem of edge computing resource allocation and pricing with deployment constraints and user budget constraints. The mechanisms proposed in this article have the properties of individual rationality, truthfulness, and computational efficiency. In the experiments, in terms of social welfare and revenue, our algorithms can achieve a 20% improvement over existing algorithms, such as fixed-price, Vickery–Clarke–Groves (VCG), and monotonic critical-price mechanisms. Additionally, in most experiments, our algorithm can ensure resource utilization greater than 80%.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning 深度强化学习驱动卫星通信中对延迟敏感的服务功能链智能迁移
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-24 DOI: 10.1002/ett.70006
Peiying Zhang, Yilin Li, Lizhuang Tan, Kai Liu, Miao Wen, Hao Hao

Satellite communication technology solves the problem that the traditional wired network infrastructure is difficult to achieve global communication coverage. However, factors such as satellite orbits introduce frequent changes to the network topology, and challenges like satellite failures and communication link interruptions are prevalent. In the face of these issues, service function chain (SFC) migration becomes a crucial method for swiftly adjusting SFCs during faults, maintaining service continuity and availability. This article proposes a latency-sensitive SFC migration algorithm tailored to satellite networks. The algorithm first models the satellite network as a multi-domain virtual network, capturing the constraints faced during SFC migration. Subsequently, a deep reinforcement learning algorithm integrated attention mechanism is designed to more accurately capture and understand the complex network environment and dynamic satellite network topology and derive optimal SFC migration strategies for superior performance. Finally, through experimentation and evaluation of the deep reinforcement learning-driven latency-sensitive service function chain intelligent migration algorithm (LS-SFCM) in satellite communication, this study validates the effectiveness and superior performance of the algorithm in latency-sensitive scenarios. It provides a new avenue for enhancing the service quality and efficiency of satellite communication networks.

卫星通信技术解决了传统有线网络基础设施难以实现全球通信覆盖的问题。然而,卫星轨道等因素导致网络拓扑结构频繁变化,卫星故障和通信链路中断等挑战普遍存在。面对这些问题,服务功能链(SFC)迁移成为在故障期间迅速调整 SFC、保持服务连续性和可用性的重要方法。本文针对卫星网络提出了一种对延迟敏感的 SFC 迁移算法。该算法首先将卫星网络建模为多域虚拟网络,捕捉 SFC 迁移过程中面临的约束。随后,设计了一种集成注意力机制的深度强化学习算法,以更准确地捕捉和理解复杂的网络环境和动态的卫星网络拓扑结构,并推导出最优的 SFC 迁移策略,从而获得卓越的性能。最后,本研究通过对深度强化学习驱动的时延敏感服务功能链智能迁移算法(LS-SFCM)在卫星通信中的实验和评估,验证了该算法在时延敏感场景下的有效性和优越性能。它为提高卫星通信网络的服务质量和效率提供了一条新途径。
{"title":"Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning","authors":"Peiying Zhang,&nbsp;Yilin Li,&nbsp;Lizhuang Tan,&nbsp;Kai Liu,&nbsp;Miao Wen,&nbsp;Hao Hao","doi":"10.1002/ett.70006","DOIUrl":"https://doi.org/10.1002/ett.70006","url":null,"abstract":"<div>\u0000 \u0000 <p>Satellite communication technology solves the problem that the traditional wired network infrastructure is difficult to achieve global communication coverage. However, factors such as satellite orbits introduce frequent changes to the network topology, and challenges like satellite failures and communication link interruptions are prevalent. In the face of these issues, service function chain (SFC) migration becomes a crucial method for swiftly adjusting SFCs during faults, maintaining service continuity and availability. This article proposes a latency-sensitive SFC migration algorithm tailored to satellite networks. The algorithm first models the satellite network as a multi-domain virtual network, capturing the constraints faced during SFC migration. Subsequently, a deep reinforcement learning algorithm integrated attention mechanism is designed to more accurately capture and understand the complex network environment and dynamic satellite network topology and derive optimal SFC migration strategies for superior performance. Finally, through experimentation and evaluation of the deep reinforcement learning-driven latency-sensitive service function chain intelligent migration algorithm (LS-SFCM) in satellite communication, this study validates the effectiveness and superior performance of the algorithm in latency-sensitive scenarios. It provides a new avenue for enhancing the service quality and efficiency of satellite communication networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability 关于区块链技术的大量多语种文献综述:演变、挑战、平台、安全性和互操作性
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-23 DOI: 10.1002/ett.5037
Monika, Rajesh Bhatia, Manish Kumar

Blockchain technology has gained enormous interest from industry and academia recently. Technology enthusiasts are exploring its use case beyond cryptocurrencies and claim that blockchain technology can overcome the inefficiencies of centralized systems. In this study, we continue the work of previous authors, aiming to provide a more comprehensive understanding of the technical aspects of blockchain. This study is the first of its kind to review and analyze the current status of different technical aspects of blockchain technology influencing its adoption. We performed an extensive multivocal review to (i) demonstrate the progress of blockchain, (ii) discuss the challenges related to the wide-scale adoption of the technology, (iii) present a detailed analysis of blockchain platforms, (iv) highlight security and interoperability issues followed by the solutions proposed in the literature. We have considered 259 peer-reviewed research papers and the gray literature related to 40 blockchain platforms to provide an in-depth analysis of blockchain technology. In conclusion, this comprehensive survey provides a holistic view of blockchain technology's progress. It identifies challenges, trends, and future research directions, serving as a valuable resource for researchers and practitioners seeking to navigate the dynamic blockchain landscape.

最近,区块链技术受到了业界和学术界的极大关注。技术爱好者们正在探索其在加密货币之外的应用案例,并声称区块链技术可以克服中心化系统的低效率问题。在本研究中,我们延续了前几位作者的工作,旨在提供对区块链技术方面更全面的理解。本研究首次对影响区块链技术应用的不同技术方面的现状进行了回顾和分析。我们进行了广泛的多声部审查,以(i)展示区块链的进展,(ii)讨论与广泛采用该技术有关的挑战,(iii)对区块链平台进行详细分析,(iv)强调安全性和互操作性问题,以及文献中提出的解决方案。我们考虑了与 40 个区块链平台相关的 259 篇同行评审研究论文和灰色文献,对区块链技术进行了深入分析。总之,这份综合调查报告提供了对区块链技术进展的整体看法。它指出了挑战、趋势和未来的研究方向,是研究人员和从业人员探索动态区块链领域的宝贵资源。
{"title":"An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability","authors":"Monika,&nbsp;Rajesh Bhatia,&nbsp;Manish Kumar","doi":"10.1002/ett.5037","DOIUrl":"https://doi.org/10.1002/ett.5037","url":null,"abstract":"<p>Blockchain technology has gained enormous interest from industry and academia recently. Technology enthusiasts are exploring its use case beyond cryptocurrencies and claim that blockchain technology can overcome the inefficiencies of centralized systems. In this study, we continue the work of previous authors, aiming to provide a more comprehensive understanding of the technical aspects of blockchain. This study is the first of its kind to review and analyze the current status of different technical aspects of blockchain technology influencing its adoption. We performed an extensive multivocal review to (i) demonstrate the progress of blockchain, (ii) discuss the challenges related to the wide-scale adoption of the technology, (iii) present a detailed analysis of blockchain platforms, (iv) highlight security and interoperability issues followed by the solutions proposed in the literature. We have considered 259 peer-reviewed research papers and the gray literature related to 40 blockchain platforms to provide an in-depth analysis of blockchain technology. In conclusion, this comprehensive survey provides a holistic view of blockchain technology's progress. It identifies challenges, trends, and future research directions, serving as a valuable resource for researchers and practitioners seeking to navigate the dynamic blockchain landscape.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1