首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things 工业物联网中基于消息队列遥测传输(MQTT)协议的混合入侵检测方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-20 DOI: 10.1002/ett.5030
Georg Thamer Francis, Alireza Souri, Nihat İnanç

The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.

在过去几年中,针对工业物联网(IIoT)设备的攻击数量不断增加,尤其是针对消息队列遥测传输(MQTT)等广泛使用的通信协议的攻击。IIoT 应用的快速增长给网络安全带来了严峻挑战和技术差距。另一方面,传统的网络攻击检测方法无法解决和支持物联网环境的运行时责任。本研究提出了一种混合遗传算法和随机森林(GA_RF)方法,用于检测 IIoT 环境中使用 MQTT 协议的工业控制机(ICS)中的网络攻击。该架构将 ICS 与边缘设备和云服务器集成在一起,使用 GA_RF 算法检测传感器收集的数据中的异常情况。正常数据在本地进行处理,然后发送到云端进行存储和返回,从而确保持续监控和安全性。此外,MQTT-IOT-IDS2020 数据集作为一个真实的测试案例,用于预测所提出的 GA_RF 方法,并与其他一些强大的机器和深度学习模型进行比较。实验结果表明,所提出的 GA_RF 方法在检测网络攻击方面具有 99.87%-100% 的最佳准确率。该混合算法的平均绝对误差(MAE)也达到了 0-0.0015,精确度、召回率和 F 分数均为 100%。根据这一结果,提出了在 IIoT 环境中运行 GA_RF 的同时将 ICS 连接到服务器的架构。总之,本研究表明了 GA_RF 的有效性,旨在通过在 IIoT 中使用 MQTT 协议来提高安全性。
{"title":"A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things","authors":"Georg Thamer Francis,&nbsp;Alireza Souri,&nbsp;Nihat İnanç","doi":"10.1002/ett.5030","DOIUrl":"https://doi.org/10.1002/ett.5030","url":null,"abstract":"<p>The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of switch information security protection system based on software-defined networking 构建基于软件定义网络的交换机信息安全保护系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-20 DOI: 10.1002/ett.5033
Xueda Huang, Kuanlei Zheng, Sisi Chen, Zhaoren He

The communications industry has a new, forward-thinking architecture: software-defined networks (SDN). The inflexible structure of conventional networks severely hinders their ability to service modern organizations. The increased adaptability and transparency of SDN-powered networks makes them more vulnerable to security hazards like Distributed denial of service (DDoS) assaults. The switch information system introduces protection at the cost of some degree of adaptability. The information and software layers are potential entry points for DDoS assaults. The flow-based policies frequently collide at the application layer, giving rise to safety issues. The central nervous system of the network's components is the SDN controller located at the control layer. The centrally located controller interacts with networking hardware via switches. Attacks on control devices, switches, and communication channels can cause vulnerabilities in SDN networks. The study proposes Blockchain-SDN-based switch information security (BC-SDN-SIS) to address the information security problems. SDN applications operate at the highest level of SDN controllers, facilitating the easy rollout of new network services. The suggested design uses a distributed BC approach to guarantee confidentiality, anonymity, privacy, and scalability. The proposed BC-SDN-SIS model increases the accuracy ratio of 97.45%, precision ratio of 98.43, recall ratio of 97.34, effectiveness ratio of 97.6%, bandwidth of 2.5 Mbps, latency rate of .04 ms and F1-score ratio of 98.28% compared to other existing models.

通信行业拥有一种全新的前瞻性架构:软件定义网络(SDN)。传统网络僵化的结构严重阻碍了它们为现代组织提供服务的能力。由 SDN 驱动的网络具有更强的适应性和透明度,因此更容易受到分布式拒绝服务 (DDoS) 攻击等安全隐患的影响。交换机信息系统以一定程度的适应性为代价引入保护。信息层和软件层是 DDoS 攻击的潜在切入点。基于流量的策略经常在应用层发生冲突,从而引发安全问题。网络组件的中枢神经系统是位于控制层的 SDN 控制器。位于中心位置的控制器通过交换机与网络硬件交互。对控制设备、交换机和通信通道的攻击会导致 SDN 网络出现漏洞。本研究提出了基于区块链-SDN的交换机信息安全(BC-SDN-SIS)来解决信息安全问题。SDN 应用程序在 SDN 控制器的最高层运行,便于轻松推出新的网络服务。建议的设计采用分布式 BC 方法,以保证保密性、匿名性、隐私性和可扩展性。与其他现有模型相比,建议的 BC-SDN-SIS 模型的准确率提高了 97.45%,精确率提高了 98.43%,召回率提高了 97.34%,有效率提高了 97.6%,带宽提高了 2.5 Mbps,延迟率提高了 0.04 ms,F1 分数提高了 98.28%。
{"title":"Construction of switch information security protection system based on software-defined networking","authors":"Xueda Huang,&nbsp;Kuanlei Zheng,&nbsp;Sisi Chen,&nbsp;Zhaoren He","doi":"10.1002/ett.5033","DOIUrl":"https://doi.org/10.1002/ett.5033","url":null,"abstract":"<p>The communications industry has a new, forward-thinking architecture: software-defined networks (SDN). The inflexible structure of conventional networks severely hinders their ability to service modern organizations. The increased adaptability and transparency of SDN-powered networks makes them more vulnerable to security hazards like Distributed denial of service (DDoS) assaults. The switch information system introduces protection at the cost of some degree of adaptability. The information and software layers are potential entry points for DDoS assaults. The flow-based policies frequently collide at the application layer, giving rise to safety issues. The central nervous system of the network's components is the SDN controller located at the control layer. The centrally located controller interacts with networking hardware via switches. Attacks on control devices, switches, and communication channels can cause vulnerabilities in SDN networks. The study proposes Blockchain-SDN-based switch information security (BC-SDN-SIS) to address the information security problems. SDN applications operate at the highest level of SDN controllers, facilitating the easy rollout of new network services. The suggested design uses a distributed BC approach to guarantee confidentiality, anonymity, privacy, and scalability. The proposed BC-SDN-SIS model increases the accuracy ratio of 97.45%, precision ratio of 98.43, recall ratio of 97.34, effectiveness ratio of 97.6%, bandwidth of 2.5 Mbps, latency rate of .04 ms and F1-score ratio of 98.28% compared to other existing models.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges 回顾基于网络物理系统的网络入侵检测系统:特点、工业协议、攻击、数据集和挑战
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-19 DOI: 10.1002/ett.5029
Ram Ji, Devanand Padha, Yashwant Singh, Surbhi Sharma

Cyber-Physical Systems (CPSs) provide critical infrastructure for the betterment of human lives thereby integrating cyber and physical components but the fusion of physical and digital components leads to an increase in the attack surface, which in turn provides opportunities for the attackers to intrude on these systems, which can affect the critical services like health care, water treatment facility, the electrical grid, hydropower plant, and so forth. The existing intrusion detection systems (IDSs) in CPSs are facing issues like poor detection accuracy, high false alarm rate and more computation time. Also, existing intrusion detection systems cannot identify new attacks that is, zero-day assaults. Prerequisite exists for the design of the framework for detecting intrusions using artificial intelligence inspired approaches grounded on the principle of ensemble techniques. Intrusion detection framework assimilating ensemble-based technique for CPS has been proposed. Since the proposed framework incorporates privileges of multiple techniques for intrusion detection and classification, hence the proposed framework may overcome the limitations of existing IDSs for CPS. Overview of cutting-edge incursion identification methods for CPSs is presented. Several characteristics of CPS, industrial protocols, and anomaly detection techniques for intrusion detection are analyzed. Taxonomy of IDS for CPS has been proposed, taxonomy of attacks and threats on CPS has been intended. Research challenges for IDS in CPS are also uncovered from this review.

网络物理系统(CPS)提供了改善人类生活的关键基础设施,从而将网络和物理组件整合在一起,但物理和数字组件的融合导致攻击面的增加,这反过来又为攻击者入侵这些系统提供了机会,从而可能影响医疗保健、水处理设施、电网、水电站等关键服务。现有的 CPS 入侵检测系统(IDS)面临着检测精度低、误报率高和计算时间长等问题。此外,现有的入侵检测系统无法识别新的攻击,即零日攻击。利用基于集合技术原理的人工智能方法来设计入侵检测框架是有前提条件的。针对 CPS 提出的入侵检测框架吸收了基于集合的技术。由于所提议的框架融合了多种入侵检测和分类技术,因此可以克服现有 CPS IDS 的局限性。概述了 CPS 的前沿入侵识别方法。分析了 CPS 的几个特征、工业协议和用于入侵检测的异常检测技术。提出了 CPS IDS 的分类法,并打算对 CPS 的攻击和威胁进行分类。本综述还揭示了 CPS 中 IDS 的研究挑战。
{"title":"Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges","authors":"Ram Ji,&nbsp;Devanand Padha,&nbsp;Yashwant Singh,&nbsp;Surbhi Sharma","doi":"10.1002/ett.5029","DOIUrl":"https://doi.org/10.1002/ett.5029","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) provide critical infrastructure for the betterment of human lives thereby integrating cyber and physical components but the fusion of physical and digital components leads to an increase in the attack surface, which in turn provides opportunities for the attackers to intrude on these systems, which can affect the critical services like health care, water treatment facility, the electrical grid, hydropower plant, and so forth. The existing intrusion detection systems (IDSs) in CPSs are facing issues like poor detection accuracy, high false alarm rate and more computation time. Also, existing intrusion detection systems cannot identify new attacks that is, zero-day assaults. Prerequisite exists for the design of the framework for detecting intrusions using artificial intelligence inspired approaches grounded on the principle of ensemble techniques. Intrusion detection framework assimilating ensemble-based technique for CPS has been proposed. Since the proposed framework incorporates privileges of multiple techniques for intrusion detection and classification, hence the proposed framework may overcome the limitations of existing IDSs for CPS. Overview of cutting-edge incursion identification methods for CPSs is presented. Several characteristics of CPS, industrial protocols, and anomaly detection techniques for intrusion detection are analyzed. Taxonomy of IDS for CPS has been proposed, taxonomy of attacks and threats on CPS has been intended. Research challenges for IDS in CPS are also uncovered from this review.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “Dynamic service function chain placement in mobile computing: An asynchronous advantage actor-critic based approach” 移动计算中的动态服务功能链布局:基于异步优势行动者批判的方法"
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-12 DOI: 10.1002/ett.5027

Jiang H, Xia H, Zare M. Dynamic service function chain placement in mobile computing: an asynchronous advantage actor-critic based approach. Trans Emerging Tel Tech. 2024;35(8):e5022. doi: 10.1002/ett.5022

Due to unforeseen circumstances, there have been changes in the affiliations of the authors associated with this paper. The correct affiliations for each author are as follows:

Heling Jiang

School of Information Management, Central China Normal University, Wuhan, Hubei 430079, China

Information Department, GuiZhou University of Finance & Economic, Guiyang 550025, China

Hai Xia

Gui'an New Area Science and Innovation Industry Development Co., Ltd, Guiyang, Guizhou 550025, China

Mansoureh Zare

Department of Computer Engineering, Bushehr Branch, Islamic Azad University, Bushehr 75168, Iran

This error was on the part of the corresponding author, and we apologize for any inconvenience this may have caused.

Jiang H, Xia H, Zare M. 移动计算中的动态服务功能链布局:基于异步优势行为批评的方法。Trans Emerging Tel Tech.Doi:10.1002/ett.5022由于不可预见的情况,与本文相关的作者单位发生了变化。每位作者的正确单位如下:蒋海玲华中师范大学信息管理学院,湖北武汉 430079 贵州财经学院信息系,贵州贵阳 550025 海峡贵安新区科创产业发展有限公司,贵州贵阳 550025 海峡贵安新区科创产业发展有限公司,贵州贵阳 550025 海峡贵安新区科创产业发展有限公司,贵州贵阳 550025该错误系通讯作者所为,我们对由此造成的不便深表歉意。
{"title":"Correction to “Dynamic service function chain placement in mobile computing: An asynchronous advantage actor-critic based approach”","authors":"","doi":"10.1002/ett.5027","DOIUrl":"https://doi.org/10.1002/ett.5027","url":null,"abstract":"<p>Jiang H, Xia H, Zare M. Dynamic service function chain placement in mobile computing: an asynchronous advantage actor-critic based approach. <i>Trans Emerging Tel Tech</i>. 2024;35(8):e5022. doi: 10.1002/ett.5022</p><p>Due to unforeseen circumstances, there have been changes in the affiliations of the authors associated with this paper. The correct affiliations for each author are as follows:</p><p>Heling Jiang</p><p>School of Information Management, Central China Normal University, Wuhan, Hubei 430079, China</p><p>Information Department, GuiZhou University of Finance &amp; Economic, Guiyang 550025, China</p><p>Hai Xia</p><p>Gui'an New Area Science and Innovation Industry Development Co., Ltd, Guiyang, Guizhou 550025, China</p><p>Mansoureh Zare</p><p>Department of Computer Engineering, Bushehr Branch, Islamic Azad University, Bushehr 75168, Iran</p><p>This error was on the part of the corresponding author, and we apologize for any inconvenience this may have caused.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141973663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X” 更正为 "PAM:使用贪婪启发式和 5G NR-V2X 的基于预测分析和模块的计算卸载框架"
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-08 DOI: 10.1002/ett.5026

Khattak MI, Yuan H, Ahmad A, Ahmed M, Khan A, Inamullah. PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X. Trans Emerging Tel Tech. 2024;35(7):e5003. https://doi.org/10.1002/ett.5003

The second affiliation of the third author was not included in the final published version. The affiliation is below.

“Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Pakistan.”

We apologize for this error.

Khattak MI, Yuan H, Ahmad A, Ahmed M, Khan A, Inamullah.PAM:使用贪婪启发式和 5G NR-V2X 的基于预测分析和模块的计算卸载框架。Trans Emerging Tel Tech.2024;35(7):e5003。https://doi.org/10.1002/ett.5003The 第三作者的第二单位未包含在最终发表的版本中。作者单位如下:"Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Pakistan. "我们对此错误深表歉意。
{"title":"Correction to “PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X”","authors":"","doi":"10.1002/ett.5026","DOIUrl":"10.1002/ett.5026","url":null,"abstract":"<p>Khattak MI, Yuan H, Ahmad A, Ahmed M, Khan A, Inamullah. PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X. Trans Emerging Tel Tech. 2024;35(7):e5003. https://doi.org/10.1002/ett.5003</p><p>The second affiliation of the third author was not included in the final published version. The affiliation is below.</p><p>“Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Pakistan.”</p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141929825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing hybrid beamforming in millimeter-wave massive multiple-input multiple-output systems: A gradient projection approach 优化毫米波大规模多输入多输出系统中的混合波束成形:梯度投影法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-05 DOI: 10.1002/ett.5025
Mehrdad Momen-Tayefeh, Ali Olfat

Millimeter waves (mmWave) present an enticing opportunity for wireless communication due to their substantial bandwidth. However, mitigating signal losses within this spectrum necessitates employing numerous antennas for transmission and reception. In practical scenarios, dedicating individual RF chains to each antenna is often unfeasible. In response to this limitation, our research investigates a hybrid beamforming approach, seeking to optimize spectral efficiency through an alternating optimization (AO) technique. Our goal is to develop an algorithm that can be easily integrated into diverse hybrid beamforming configurations. On the other hand the pursuit of optimizing spectral efficiency while adhering to the constraints imposed by phase shifters results in a non-convex problem. To confront this challenge, we employ a gradient descent framework combined with projection methods. We introduce the gradient prediction method (GPM), which leads to a closed-form solution for projection. Simulations underscore that this hybrid beamforming structure can achieve the performance of a fully digital beamforming method when the number of RF chains is twice the total number of data streams, regardless of the number of antennas involved. Furthermore, we will conduct a comparative performance analysis of our proposed algorithm against other established benchmark algorithms to ascertain its superiority.

毫米波(mmWave)具有巨大的带宽,为无线通信带来了诱人的机遇。然而,要减少该频谱内的信号损耗,就必须使用大量天线进行发射和接收。在实际应用中,为每个天线配备单独的射频链往往是不可行的。针对这一限制,我们的研究调查了一种混合波束成形方法,寻求通过交替优化(AO)技术优化频谱效率。我们的目标是开发一种可以轻松集成到各种混合波束成形配置中的算法。另一方面,在追求优化频谱效率的同时,还要遵守移相器施加的约束,这就产生了一个非凸问题。为了应对这一挑战,我们采用了梯度下降框架与投影方法相结合的方法。我们引入了梯度预测法 (GPM),该方法可得出投影的闭式解。模拟结果表明,当射频链的数量是数据流总数的两倍时,无论涉及多少天线,这种混合波束成形结构都能达到全数字波束成形方法的性能。此外,我们还将对我们提出的算法与其他既定基准算法进行性能比较分析,以确定其优越性。
{"title":"Optimizing hybrid beamforming in millimeter-wave massive multiple-input multiple-output systems: A gradient projection approach","authors":"Mehrdad Momen-Tayefeh,&nbsp;Ali Olfat","doi":"10.1002/ett.5025","DOIUrl":"10.1002/ett.5025","url":null,"abstract":"<p>Millimeter waves (mmWave) present an enticing opportunity for wireless communication due to their substantial bandwidth. However, mitigating signal losses within this spectrum necessitates employing numerous antennas for transmission and reception. In practical scenarios, dedicating individual RF chains to each antenna is often unfeasible. In response to this limitation, our research investigates a hybrid beamforming approach, seeking to optimize spectral efficiency through an alternating optimization (AO) technique. Our goal is to develop an algorithm that can be easily integrated into diverse hybrid beamforming configurations. On the other hand the pursuit of optimizing spectral efficiency while adhering to the constraints imposed by phase shifters results in a non-convex problem. To confront this challenge, we employ a gradient descent framework combined with projection methods. We introduce the gradient prediction method (GPM), which leads to a closed-form solution for projection. Simulations underscore that this hybrid beamforming structure can achieve the performance of a fully digital beamforming method when the number of RF chains is twice the total number of data streams, regardless of the number of antennas involved. Furthermore, we will conduct a comparative performance analysis of our proposed algorithm against other established benchmark algorithms to ascertain its superiority.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141929724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient device-to-device communication in IoT: The DMBSOA-enhanced MQTT protocol 物联网中安全高效的设备对设备通信:DMBSOA 增强型 MQTT 协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-30 DOI: 10.1002/ett.5024
Bharathi Shantha Loganathan, Sathya Priya Jaganathan

The Internet of Things (IoT) plays a crucial role in enhancing technology by facilitating data transfer, storage, control, and management across networks. Secure communication within IoT environments remains a significant challenge. This research aims to enhance IoT security by integrating Message Queuing Telemetry Transport (MQTT) and MQTT-Sensor Network (MQTT-SN) protocols with the Dual Mutation-Based Seagull Optimization Algorithm (DMBSOA). MQTT, known for its lightweight and dependable messaging, is widely used in the IoT community but is vulnerable to cyber-attacks, particularly concerning privacy and authentication. DMBSOA, inspired by seagulls' foraging behavior, optimizes MQTT settings to enhance security, reliability, and performance. The proposed model dynamically adjusts key parameters such as transmission frequency, Quality of service (QoS) levels, and message size to improve energy consumption, throughput, end-to-end delay, and packet delivery ratio. A comprehensive system model is presented, comprising publisher, subscriber, and broker nodes, with security mechanisms integrated into the broker to ensure data integrity, authentication, and encryption. MQTT operates over Transmission Control Protocol/Internet Protocol (TCP/IP), while MQTT-SN uses User Datagram Protocol (UDP), catering to resource-constrained devices and low-power modes. The proposed technique attained throughput (68 kB), energy consumption (120 mJ), security level (96%), energy efficiency (98.80%), path loss (22 dB), end-to-end delay (35 ms), processing time (230 s) and packet delivery ratio (0.98). The DMBSOA-optimized MQTT protocol demonstrates superior performance compared to these models, highlighting its potential to meet the evolving demands of IoT security. This research underscores the effectiveness of DMBSOA in enhancing MQTT protocol security and efficiency, providing a promising solution for secure IoT communication.

物联网(IoT)通过促进跨网络的数据传输、存储、控制和管理,在提升技术水平方面发挥着至关重要的作用。物联网环境中的安全通信仍然是一项重大挑战。本研究旨在通过将消息队列遥测传输(MQTT)和 MQTT 传感器网络(MQTT-SN)协议与基于突变的双海鸥优化算法(DMBSOA)相集成,提高物联网的安全性。MQTT 以其轻量级和可靠的消息传递而闻名,在物联网领域得到广泛应用,但容易受到网络攻击,尤其是在隐私和身份验证方面。DMBSOA 受海鸥觅食行为的启发,优化了 MQTT 设置,以提高安全性、可靠性和性能。所提出的模型可动态调整关键参数,如传输频率、服务质量(QoS)等级和消息大小,以改善能耗、吞吐量、端到端延迟和数据包交付率。本文提出了一个全面的系统模型,包括发布者、订阅者和代理节点,并在代理中集成了安全机制,以确保数据完整性、身份验证和加密。MQTT 通过传输控制协议/互联网协议(TCP/IP)运行,而 MQTT-SN 则使用用户数据报协议(UDP),以适应资源受限的设备和低功耗模式。所提出的技术实现了吞吐量(68 kB)、能耗(120 mJ)、安全等级(96%)、能效(98.80%)、路径损耗(22 dB)、端到端延迟(35 ms)、处理时间(230 s)和数据包交付率(0.98)。与这些模型相比,经过 DMBSOA 优化的 MQTT 协议表现出更优越的性能,凸显了其满足不断发展的物联网安全需求的潜力。这项研究强调了 DMBSOA 在增强 MQTT 协议安全性和效率方面的有效性,为物联网安全通信提供了一种前景广阔的解决方案。
{"title":"Secure and efficient device-to-device communication in IoT: The DMBSOA-enhanced MQTT protocol","authors":"Bharathi Shantha Loganathan,&nbsp;Sathya Priya Jaganathan","doi":"10.1002/ett.5024","DOIUrl":"10.1002/ett.5024","url":null,"abstract":"<p>The Internet of Things (IoT) plays a crucial role in enhancing technology by facilitating data transfer, storage, control, and management across networks. Secure communication within IoT environments remains a significant challenge. This research aims to enhance IoT security by integrating Message Queuing Telemetry Transport (MQTT) and MQTT-Sensor Network (MQTT-SN) protocols with the Dual Mutation-Based Seagull Optimization Algorithm (DMBSOA). MQTT, known for its lightweight and dependable messaging, is widely used in the IoT community but is vulnerable to cyber-attacks, particularly concerning privacy and authentication. DMBSOA, inspired by seagulls' foraging behavior, optimizes MQTT settings to enhance security, reliability, and performance. The proposed model dynamically adjusts key parameters such as transmission frequency, Quality of service (QoS) levels, and message size to improve energy consumption, throughput, end-to-end delay, and packet delivery ratio. A comprehensive system model is presented, comprising publisher, subscriber, and broker nodes, with security mechanisms integrated into the broker to ensure data integrity, authentication, and encryption. MQTT operates over Transmission Control Protocol/Internet Protocol (TCP/IP), while MQTT-SN uses User Datagram Protocol (UDP), catering to resource-constrained devices and low-power modes. The proposed technique attained throughput (68 kB), energy consumption (120 mJ), security level (96%), energy efficiency (98.80%), path loss (22 dB), end-to-end delay (35 ms), processing time (230 s) and packet delivery ratio (0.98). The DMBSOA-optimized MQTT protocol demonstrates superior performance compared to these models, highlighting its potential to meet the evolving demands of IoT security. This research underscores the effectiveness of DMBSOA in enhancing MQTT protocol security and efficiency, providing a promising solution for secure IoT communication.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141867166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential detection with feedback information for two-way cooperative spectrum sensing in cognitive internet of things 认知物联网中带有反馈信息的双向合作频谱感知序列检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1002/ett.5023
Jun Wu, Mingkun Su, Jianrong Bao, Lei Qiao, Xiaorong Xu, Hao Wang, Gefei Zhu, Weiwei Cao

With the rapid growth of internet of thing (IoT) devices, cooperative spectrum sensing (CSS) has emerged as a promising solution to leverage the spatial diversity of multiple secondary IoT sensing nodes (SNs) for spectrum availability. However, the cooperative paradigm also incurs increased cooperative costs between each SN and the fusion center (FC), leading to decreased cooperative efficiency and achievable throughput, especially in large-scale cognitive IoT (CIoT). To address these challenges, we present a sequential detection with feedback information (SD-FI) approach in this paper. To achieve this objective, we propose a two-way CSS model that formulates an optimization problem of Bayes cost in a quickest detection framework with feedback. To solve this optimization problem, we derive the structure of the optimal local decision rule from the local decision function and determine the optimal detection threshold in conjunction with the cost function. Following the optimal threshold pair, we implement the optimal SD-FI and theoretically demonstrate the uniqueness of the optimal threshold and optimal sensing time. Simulation results demonstrate superiority of SD-FI in terms of cooperative performance (i.e., detection performance and Bayes cost) and sample size. Notably, even with limited sensing time, our proposed SD-FI exhibits high throughput, highlighting its effectiveness in enhancing spectrum availability and utilization in CIoT.

随着物联网(IoT)设备的快速增长,合作频谱传感(CSS)已成为一种前景广阔的解决方案,可利用多个辅助物联网传感节点(SN)的空间多样性来提高频谱可用性。然而,合作模式也增加了每个 SN 与融合中心(FC)之间的合作成本,导致合作效率和可实现吞吐量下降,尤其是在大规模认知物联网(CIoT)中。为了应对这些挑战,我们在本文中提出了一种带反馈信息的顺序检测(SD-FI)方法。为实现这一目标,我们提出了一个双向 CSS 模型,该模型在带反馈的最快检测框架中提出了一个贝叶斯成本优化问题。为了解决这个优化问题,我们从局部决策函数中推导出最优局部决策规则的结构,并结合成本函数确定最优检测阈值。根据最优阈值对,我们实现了最优 SD-FI,并从理论上证明了最优阈值和最优感应时间的唯一性。仿真结果表明,SD-FI 在合作性能(即检测性能和贝叶斯成本)和样本大小方面都更胜一筹。值得注意的是,即使感知时间有限,我们提出的 SD-FI 也能表现出很高的吞吐量,这突出表明了它在提高 CIoT 中频谱可用性和利用率方面的有效性。
{"title":"Sequential detection with feedback information for two-way cooperative spectrum sensing in cognitive internet of things","authors":"Jun Wu,&nbsp;Mingkun Su,&nbsp;Jianrong Bao,&nbsp;Lei Qiao,&nbsp;Xiaorong Xu,&nbsp;Hao Wang,&nbsp;Gefei Zhu,&nbsp;Weiwei Cao","doi":"10.1002/ett.5023","DOIUrl":"10.1002/ett.5023","url":null,"abstract":"<p>With the rapid growth of internet of thing (IoT) devices, cooperative spectrum sensing (CSS) has emerged as a promising solution to leverage the spatial diversity of multiple secondary IoT sensing nodes (SNs) for spectrum availability. However, the cooperative paradigm also incurs increased cooperative costs between each SN and the fusion center (FC), leading to decreased cooperative efficiency and achievable throughput, especially in large-scale cognitive IoT (CIoT). To address these challenges, we present a sequential detection with feedback information (SD-FI) approach in this paper. To achieve this objective, we propose a two-way CSS model that formulates an optimization problem of Bayes cost in a quickest detection framework with feedback. To solve this optimization problem, we derive the structure of the optimal local decision rule from the local decision function and determine the optimal detection threshold in conjunction with the cost function. Following the optimal threshold pair, we implement the optimal SD-FI and theoretically demonstrate the uniqueness of the optimal threshold and optimal sensing time. Simulation results demonstrate superiority of SD-FI in terms of cooperative performance (i.e., detection performance and Bayes cost) and sample size. Notably, even with limited sensing time, our proposed SD-FI exhibits high throughput, highlighting its effectiveness in enhancing spectrum availability and utilization in CIoT.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference management of cognitive IoT based on interference steering and alignment 基于干扰引导和调整的认知物联网干扰管理
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-18 DOI: 10.1002/ett.5013
Zhen-xing Sun, Jin-bin Qian, Miao Liu, Chun-ping Nan, Guo-hui Sha

In the cognitive IoT spectrum sharing process, the complex interference environment leads to a low spectral efficiency of the licensed spectrum. To solve this problem, this article allows more cognitive users (CU) to access the licensed spectrum while ensuring reliable transmission of primary users (PU) by introducing the advanced interference steering (IS) technique. Traditional IS methods are only suitable for single-user and single-data-stream scenarios. Meanwhile, these methods have many drawbacks in multi-user and multi-data-stream scenarios. To overcome these drawbacks, two IS algorithms based on time division (TD) multiple access are proposed in this article, which are TD based equivalent interference sub-channel interference steering (TD-EI-SCIS) and TD-based sub-channel interference steering (TD-SCIS), respectively. Furthermore, considering the fact that PU has the highest communication quality priority in cognitive IoT, a joint interference management (JIM) scheme based on TD-EI-SCIS, TD-SCIS, and partial interference alignment (PIA) is proposed to protect the PU. Simulation results show that the spectral efficiency (SE) of the PU in the proposed JIM scheme is not significantly improved compared with the proposed TD-EI-SCIS in the low SNR region. However, from the perspective of the total SE in the whole cognitive IoT system, TD-EI-SCIS is superior to the JIM about 3 to 4 bit/s/Hz on average. In the high SNR region, the JIM scheme significantly outperforms TD-EI-SCIS not only in terms of the SE of PU about 10 bit/s/Hz but also in the aspect of the SE in the total network about 7 bit/s/Hz on average.

在认知物联网频谱共享过程中,复杂的干扰环境导致许可频谱的频谱效率较低。为解决这一问题,本文通过引入先进的干扰引导(IS)技术,在确保主用户(PU)可靠传输的同时,允许更多认知用户(CU)访问许可频谱。传统的 IS 方法只适用于单用户和单数据流场景。同时,这些方法在多用户和多数据流场景中存在许多缺点。为了克服这些缺点,本文提出了两种基于时分(TD)多址的 IS 算法,分别是基于 TD 的等效干扰子信道干扰转向(TD-EI-SCIS)和基于 TD 的子信道干扰转向(TD-SCIS)。此外,考虑到 PU 在认知物联网中具有最高的通信质量优先权,提出了一种基于 TD-EI-SCIS、TD-SCIS 和部分干扰对齐(PIA)的联合干扰管理(JIM)方案来保护 PU。仿真结果表明,在低 SNR 区域,与 TD-EI-SCIS 相比,拟议 JIM 方案中 PU 的频谱效率(SE)没有明显改善。但是,从整个认知物联网系统的总频谱效率来看,TD-EI-SCIS 比 JIM 平均高出约 3 至 4 比特/秒/赫兹。在高信噪比区域,JIM 方案不仅在 PU SE(约 10 bit/s/Hz)方面明显优于 TD-EI-SCIS,而且在整个网络的 SE(平均约 7 bit/s/Hz)方面也明显优于 TD-EI-SCIS。
{"title":"Interference management of cognitive IoT based on interference steering and alignment","authors":"Zhen-xing Sun,&nbsp;Jin-bin Qian,&nbsp;Miao Liu,&nbsp;Chun-ping Nan,&nbsp;Guo-hui Sha","doi":"10.1002/ett.5013","DOIUrl":"https://doi.org/10.1002/ett.5013","url":null,"abstract":"<p>In the cognitive IoT spectrum sharing process, the complex interference environment leads to a low spectral efficiency of the licensed spectrum. To solve this problem, this article allows more cognitive users (CU) to access the licensed spectrum while ensuring reliable transmission of primary users (PU) by introducing the advanced interference steering (IS) technique. Traditional IS methods are only suitable for single-user and single-data-stream scenarios. Meanwhile, these methods have many drawbacks in multi-user and multi-data-stream scenarios. To overcome these drawbacks, two IS algorithms based on time division (TD) multiple access are proposed in this article, which are TD based equivalent interference sub-channel interference steering (TD-EI-SCIS) and TD-based sub-channel interference steering (TD-SCIS), respectively. Furthermore, considering the fact that PU has the highest communication quality priority in cognitive IoT, a joint interference management (JIM) scheme based on TD-EI-SCIS, TD-SCIS, and partial interference alignment (PIA) is proposed to protect the PU. Simulation results show that the spectral efficiency (SE) of the PU in the proposed JIM scheme is not significantly improved compared with the proposed TD-EI-SCIS in the low SNR region. However, from the perspective of the total SE in the whole cognitive IoT system, TD-EI-SCIS is superior to the JIM about 3 to 4 bit/s/Hz on average. In the high SNR region, the JIM scheme significantly outperforms TD-EI-SCIS not only in terms of the SE of PU about 10 bit/s/Hz but also in the aspect of the SE in the total network about 7 bit/s/Hz on average.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141730322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic service function chain placement in mobile computing: An asynchronous advantage actor-critic based approach 移动计算中的动态服务功能链布局:基于异步优势行动者批判的方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1002/ett.5022
Heling Jiang, Hai Xia, Mansoureh Zare

Internet of Things (IoT) devices are constantly sending data to the cloud. The resource-rich cloud computing paradigm provides users with significant potential to reduce costs and improve quality of service (QoS). However, the centralized architecture of cloud data centers and thousands of miles away from clients has reduced the efficiency of this paradigm in delay-sensitive and real-time applications. In order to get over these restrictions, fog computing was integrated into cloud computing as a new paradigm. Without using the cloud, fog computing can supply the resources needed for IoT devices at the network's edge. Delay is thereby decreased because processing, analysis, and storage are located closer to the clients and the areas where the data is created. In Mobile Edge Computing (MEC) networks, this study sets up an architecture based on Deep Reinforcement Learning (DRL) to deliver online services to end users. We introduce a DRL-based method named DPPR for Dynamic service function chain (SFC) Placement that uses Parallelized virtual network functions (VNFs) and seeks to optimize the long-term expected cumulative Reward. Online service provider DPPR can accomplish processing acceleration through parallel VNF sharing. In addition, by extracting the distribution of initialized VNFs, DPPR improves the capacity to handle subsequent requests. The conducted simulations demonstrate the efficacy of the proposed method, so that the average number of accepted requests is improved by about 11.7%.

物联网(IoT)设备不断向云端发送数据。资源丰富的云计算模式为用户降低成本和提高服务质量(QoS)提供了巨大潜力。然而,云数据中心的集中式架构以及与客户之间的千里之遥降低了这种模式在对延迟敏感的实时应用中的效率。为了克服这些限制,雾计算作为一种新模式被整合到云计算中。在不使用云计算的情况下,雾计算可以为网络边缘的物联网设备提供所需的资源。由于处理、分析和存储位置更靠近客户端和数据创建区域,因此可以减少延迟。在移动边缘计算(MEC)网络中,本研究建立了一个基于深度强化学习(DRL)的架构,为终端用户提供在线服务。我们介绍了一种基于 DRL 的方法,名为 DPPR,用于动态服务功能链(SFC)安置,该方法使用并行化虚拟网络功能(VNF),力求优化长期预期累积奖励。在线服务提供商 DPPR 可通过并行 VNF 共享实现处理加速。此外,通过提取初始化 VNF 的分布情况,DPPR 提高了处理后续请求的能力。所进行的仿真证明了所提方法的有效性,使接受请求的平均数量提高了约 11.7%。
{"title":"Dynamic service function chain placement in mobile computing: An asynchronous advantage actor-critic based approach","authors":"Heling Jiang,&nbsp;Hai Xia,&nbsp;Mansoureh Zare","doi":"10.1002/ett.5022","DOIUrl":"https://doi.org/10.1002/ett.5022","url":null,"abstract":"<p>Internet of Things (IoT) devices are constantly sending data to the cloud. The resource-rich cloud computing paradigm provides users with significant potential to reduce costs and improve quality of service (QoS). However, the centralized architecture of cloud data centers and thousands of miles away from clients has reduced the efficiency of this paradigm in delay-sensitive and real-time applications. In order to get over these restrictions, fog computing was integrated into cloud computing as a new paradigm. Without using the cloud, fog computing can supply the resources needed for IoT devices at the network's edge. Delay is thereby decreased because processing, analysis, and storage are located closer to the clients and the areas where the data is created. In Mobile Edge Computing (MEC) networks, this study sets up an architecture based on Deep Reinforcement Learning (DRL) to deliver online services to end users. We introduce a DRL-based method named DPPR for <span>D</span>ynamic service function chain (SFC) <span>P</span>lacement that uses <span>P</span>arallelized virtual network functions (VNFs) and seeks to optimize the long-term expected cumulative <span>R</span>eward. Online service provider DPPR can accomplish processing acceleration through parallel VNF sharing. In addition, by extracting the distribution of initialized VNFs, DPPR improves the capacity to handle subsequent requests. The conducted simulations demonstrate the efficacy of the proposed method, so that the average number of accepted requests is improved by about 11.7%.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1