首页 > 最新文献

Wireless Networks最新文献

英文 中文
Generative channel estimation for intelligent reflecting surface-aided wireless communication 智能反射面辅助无线通信的生成信道估计
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-07 DOI: 10.1007/s11276-024-03688-3

Abstract

Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as the IRS does not have radio frequency chains to transmit/receive signals and the capability to process the signals is also limited. The cascaded channel linking the base station (BS) and a user through the IRS does not necessarily adhere to a specific channel distribution. Conventional and deep learning-based techniques for channel estimation face challenges: the pilot overhead and compromised estimation accuracy due to assumptions of prior channel distribution and noisy signal. To overcome these issues a novel generative cascaded channel estimation (GCCE) model based on a generative adversarial network (GAN) is proposed to estimate the cascaded channel. The GGCE model reduces the reliance on pilot signals, effectively minimizing pilot overhead, by deriving CSI from received signal data. To enhance the estimation accuracy, the channel correlation information is provided as a conditioning factor for the GCCE model. Additionally, a denoising network is integrated into the GCCE framework to effectively remove noise from the received signal. These integrations collectively enhance the estimation accuracy of the GCCE model compared to the initial GAN setup. Experimental results illustrate the superiority of the proposed GCCE model over conventional and deep learning techniques when provided with the same pilot count.

摘要 智能反射面(IRS)已成为一种可行的技术,可通过智能控制无线信号传播来提高无线通信系统的频谱效率。在由 IRS 控制的无线通信中,获取信道状态信息(CSI)对于设计最佳波束成形至关重要。然而,由于 IRS 没有发射/接收信号的无线电频率链,而且处理信号的能力也有限,因此获取 CSI 十分困难。通过 IRS 连接基站(BS)和用户的级联信道并不一定遵循特定的信道分布。传统的信道估计技术和基于深度学习的信道估计技术都面临着挑战:先导开销和由于假定先验信道分布和噪声信号而降低的估计精度。为了克服这些问题,我们提出了一种基于生成对抗网络(GAN)的新型生成级联信道估计(GCCE)模型来估计级联信道。GGCE 模型从接收到的信号数据中推导出 CSI,从而减少了对先导信号的依赖,有效地降低了先导开销。为了提高估计精度,信道相关信息被作为 GCCE 模型的一个条件因子。此外,GCCE 框架还集成了去噪网络,以有效去除接收信号中的噪声。与最初的 GAN 设置相比,这些集成共同提高了 GCCE 模型的估计精度。实验结果表明,在相同先导计数的情况下,拟议的 GCCE 模型优于传统技术和深度学习技术。
{"title":"Generative channel estimation for intelligent reflecting surface-aided wireless communication","authors":"","doi":"10.1007/s11276-024-03688-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03688-3","url":null,"abstract":"<h3>Abstract</h3> <p>Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as the IRS does not have radio frequency chains to transmit/receive signals and the capability to process the signals is also limited. The cascaded channel linking the base station (BS) and a user through the IRS does not necessarily adhere to a specific channel distribution. Conventional and deep learning-based techniques for channel estimation face challenges: the pilot overhead and compromised estimation accuracy due to assumptions of prior channel distribution and noisy signal. To overcome these issues a novel generative cascaded channel estimation (GCCE) model based on a generative adversarial network (GAN) is proposed to estimate the cascaded channel. The GGCE model reduces the reliance on pilot signals, effectively minimizing pilot overhead, by deriving CSI from received signal data. To enhance the estimation accuracy, the channel correlation information is provided as a conditioning factor for the GCCE model. Additionally, a denoising network is integrated into the GCCE framework to effectively remove noise from the received signal. These integrations collectively enhance the estimation accuracy of the GCCE model compared to the initial GAN setup. Experimental results illustrate the superiority of the proposed GCCE model over conventional and deep learning techniques when provided with the same pilot count.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"62 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140057510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data 使用生理数据的 WMSN 匿名相互认证和密钥协议方案
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-06 DOI: 10.1007/s11276-024-03690-9
Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher

Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.

无线医疗传感器网络(WMSN)是物联网(IoT)的一种应用,在当今时代的医疗保健行业扮演着非常重要的角色,尤其是在 COVID-19 大流行之后。要维护用户或患者实时健康信息的安全和隐私,最重要的是要有适当的相互验证和密钥协议(AKA)。在此背景下,沙迪-纳什万(Shadi Nashwan)为医疗物联网系统(即 WMSN)提出了一种端到端身份验证方案,并声称他们的方案可以抵御许多现有的可能威胁,而且还能保持较低的计算成本。遗憾的是,在这项研究中,人们发现他们的方案可能会受到窃听和干扰/不同步攻击的威胁,而且在计算上也存在很多缺陷。此外,他们还假设网关节点(GWN)始终是可信的,但在现实中,这并不总是可行的,因为网关节点可能充当本地服务器。因此,本文利用用户的生理信息(如心电图数据)提出了一种新的 AKA 方案,以使 WMSN 更加安全可靠。此外,所提出的方案还能抵御许多众所周知的威胁,如 GWN 欺骗攻击、密钥托管问题,并能防范 GWN 数据库被盗问题。为了证明所提方案的优越性,我们分别使用互联网安全协议和应用自动验证(即 AVISPA)和 Burrows-Abadi-Needham (BAN) 逻辑进行了非正式和正式的安全分析。根据与现有方案在安全特性、计算和通信成本以及存储要求方面的比较研究,拟议方案的性能优于现有方案,非常适合实际应用。
{"title":"An anonymous mutual authentication and key agreement scheme in WMSN using physiological data","authors":"Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher","doi":"10.1007/s11276-024-03690-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03690-9","url":null,"abstract":"<p>Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"31 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of malicious URLs using machine learning 利用机器学习检测恶意 URL
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-06 DOI: 10.1007/s11276-024-03700-w

The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant, because they usually have access to the Internet, although in many cases they are vulnerable to these phishing attacks. This paper offers an overview of the most relevant techniques for the accurate detection of fraudulent URLs, from the most widely used machine learning and deep learning algorithms, to the application, as a proof of concept, of classification models based on quantum machine learning. Starting from an essential data preparation phase, special attention is paid to the initial comparison of several traditional machine learning models, evaluating them with different datasets and obtaining interesting results that achieve true positive rates greater than 90%. After that first approach, the study moves on to the application of quantum machine learning, analysing the specificities of this recent field and assessing the possibilities it offers for the detection of malicious URLs. Given the limited available literature specifically on the detection of malicious URLs and other cybersecurity issues through quantum machine learning, the research presented here represents a relevant novelty on the combination of both concepts in the form of quantum machine learning algorithms for cybersecurity. Indeed, after the analysis of several algorithms, encouraging results have been obtained that open the door to further research on the application of quantum computing in the field of cybersecurity.

检测使用与合法网站相似的地址指向恶意网站的欺诈性 URL 是防御网络钓鱼攻击的一种关键形式。目前,物联网设备尤其如此,因为它们通常可以访问互联网,尽管在许多情况下它们很容易受到这些网络钓鱼攻击。本文概述了准确检测欺诈性 URL 的最相关技术,从最广泛使用的机器学习和深度学习算法,到基于量子机器学习的分类模型的应用(作为概念验证)。从基本的数据准备阶段开始,研究特别关注了几个传统机器学习模型的初步比较,用不同的数据集对它们进行了评估,并获得了有趣的结果,真阳性率超过了 90%。采用第一种方法后,研究转向量子机器学习的应用,分析这一最新领域的特殊性,并评估其为检测恶意 URL 提供的可能性。鉴于专门通过量子机器学习检测恶意 URL 和其他网络安全问题的现有文献有限,本文介绍的研究是将这两个概念以量子机器学习网络安全算法的形式结合起来的相关创新。事实上,在对几种算法进行分析后,已经获得了令人鼓舞的结果,为进一步研究量子计算在网络安全领域的应用打开了大门。
{"title":"Detection of malicious URLs using machine learning","authors":"","doi":"10.1007/s11276-024-03700-w","DOIUrl":"https://doi.org/10.1007/s11276-024-03700-w","url":null,"abstract":"<p>The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant, because they usually have access to the Internet, although in many cases they are vulnerable to these phishing attacks. This paper offers an overview of the most relevant techniques for the accurate detection of fraudulent URLs, from the most widely used machine learning and deep learning algorithms, to the application, as a proof of concept, of classification models based on quantum machine learning. Starting from an essential data preparation phase, special attention is paid to the initial comparison of several traditional machine learning models, evaluating them with different datasets and obtaining interesting results that achieve true positive rates greater than 90%. After that first approach, the study moves on to the application of quantum machine learning, analysing the specificities of this recent field and assessing the possibilities it offers for the detection of malicious URLs. Given the limited available literature specifically on the detection of malicious URLs and other cybersecurity issues through quantum machine learning, the research presented here represents a relevant novelty on the combination of both concepts in the form of quantum machine learning algorithms for cybersecurity. Indeed, after the analysis of several algorithms, encouraging results have been obtained that open the door to further research on the application of quantum computing in the field of cybersecurity.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks 基于混合优化算法的无线传感器网络多目标优化多路径和多跳路由选择
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-05 DOI: 10.1007/s11276-024-03686-5
Madhav Singh, Laxmi Shrivastava

Multi-path and multi-hop routing are multi-objective optimization problems involving multiple constraints that need to be addressed in the current scenario in wireless sensor networks. The routing process is challenging due to the constrained energy resources and transmission bandwidth. The conventional strategies possess shortcomings, like, as high computing complexity, extensive problem-solving time, complexity in achieving optimal values, and ease of falling into local solutions. Hence, the aim is to propose a hybrid metaheuristic algorithm, known as a multi-objective optimized multi-path and multi-hop routing algorithm (MMMRA). It incorporates the chimp optimization algorithm (COA) for determining the optimal multi-path route based on multi-objective function and ant colony optimization for determining the optimal multi-hop routing. The proposed MMMRA is implemented using NS-2 and to evaluate the performance, nine various scenarios are considered. The MMMRA is validated using different performance measures and compared with other benchmark algorithms. The simulation results indicate that the MMMRA exhibits percentage improvement in terms of residual energy by 1.63%, 4.96%, 6.89%, 7.51%, and 9.67% over IPSMT, BIM2RT, SCP, PSOBS, and RDICMR algorithms respectively. Moreover, the HND and FND of the MMMRA algorithm perform better in all three scenarios (center, corner, and outside positions of sink node), especially when the sink node is placed at the center position, the HND of MMRA shows a percentage improvement by 24% and 12.73% over IPSO–GWO, and COA–HGS algorithms respectively. Similarly, the FND of MMRA shows percentage improvement by 21.05% and 9.5% over IPSO–GWO, and COA–HGS algorithms respectively.

多路径和多跳路由是多目标优化问题,涉及多个约束条件,需要在当前的无线传感器网络中加以解决。由于能源资源和传输带宽的限制,路由过程具有挑战性。传统策略存在计算复杂度高、解决问题时间长、获得最优值复杂、容易陷入局部求解等缺点。因此,我们提出了一种混合元启发式算法,即多目标优化多路径多跳路由算法(MMMRA)。它结合了黑猩猩优化算法(COA)和蚁群优化算法,前者用于根据多目标函数确定最优多路径路由,后者用于确定最优多跳路由。提议的 MMMRA 使用 NS-2 实现,为了评估其性能,考虑了九种不同的情况。使用不同的性能指标对 MMMRA 进行了验证,并与其他基准算法进行了比较。仿真结果表明,MMMRA 在剩余能量方面比 IPSMT、BIM2RT、SCP、PSOBS 和 RDICMR 算法分别提高了 1.63%、4.96%、6.89%、7.51% 和 9.67%。此外,MMMRA 算法的 HND 和 FND 在三种情况下(汇节点的中心、角落和外部位置)都表现较好,特别是当汇节点位于中心位置时,MMRA 的 HND 比 IPSO-GWO 和 COA-HGS 算法分别提高了 24% 和 12.73%。同样,与 IPSO-GWO 和 COA-HGS 算法相比,MMRA 的 FND 分别提高了 21.05% 和 9.5%。
{"title":"Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks","authors":"Madhav Singh, Laxmi Shrivastava","doi":"10.1007/s11276-024-03686-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03686-5","url":null,"abstract":"<p>Multi-path and multi-hop routing are multi-objective optimization problems involving multiple constraints that need to be addressed in the current scenario in wireless sensor networks. The routing process is challenging due to the constrained energy resources and transmission bandwidth. The conventional strategies possess shortcomings, like, as high computing complexity, extensive problem-solving time, complexity in achieving optimal values, and ease of falling into local solutions. Hence, the aim is to propose a hybrid metaheuristic algorithm, known as a multi-objective optimized multi-path and multi-hop routing algorithm (MMMRA). It incorporates the chimp optimization algorithm (COA) for determining the optimal multi-path route based on multi-objective function and ant colony optimization for determining the optimal multi-hop routing. The proposed MMMRA is implemented using NS-2 and to evaluate the performance, nine various scenarios are considered. The MMMRA is validated using different performance measures and compared with other benchmark algorithms. The simulation results indicate that the MMMRA exhibits percentage improvement in terms of residual energy by 1.63%, 4.96%, 6.89%, 7.51%, and 9.67% over IPSMT, BIM2RT, SCP, PSOBS, and RDICMR algorithms respectively. Moreover, the HND and FND of the MMMRA algorithm perform better in all three scenarios (center, corner, and outside positions of sink node), especially when the sink node is placed at the center position, the HND of MMRA shows a percentage improvement by 24% and 12.73% over IPSO–GWO, and COA–HGS algorithms respectively. Similarly, the FND of MMRA shows percentage improvement by 21.05% and 9.5% over IPSO–GWO, and COA–HGS algorithms respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"30 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140035535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection 高效的代理辅助田口萨尔普群算法及其在入侵检测中的应用
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1007/s11276-024-03677-6
Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan

The meta-heuristic algorithms require a lot of fitness calculations to get good enough solutions, which constitutes an obstacle to solving computationally complex practical problems. Recently, it has been found that surrogate-assisted meta-heuristic algorithms show potential in solving expensive complex optimization problems. This paper proposes an efficient surrogate-assisted Taguchi salp swarm algorithm (SATSSA) to solve expensive complex optimization problems. The SATSSA uses a combination of the local surrogate-assisted model (LSAM), global surrogate-assisted model (GSAM), and k-means clustering surrogate-assisted model (KCSAM) to fit the fitness function. To enhance the prediction ability of the model, an improved salp swarm algorithm with the Taguchi method (TSSA) is proposed to update and predict the model. GSAM is mainly used to capture the entire landscape of the search space. KCSAM is designed to capture part of the search space to improve the exploration capability of the algorithm. LSAM is used to capture the contours around the optimal individual. The proposed SATSSA is compared with other four excellent algorithms on 30D, 50D, and 100D benchmark functions. In addition, SATSSA is also applied to intrusion detection. Simulation results show that SATSSA is effective in improving detection rate and reducing false alarm rate.

元启发式算法需要大量的适应度计算才能得到足够好的解,这对解决计算复杂的实际问题构成了障碍。最近,人们发现代理辅助元启发式算法在解决昂贵的复杂优化问题方面显示出潜力。本文提出了一种高效的代理辅助田口萨尔普群算法(SATSSA)来解决昂贵的复杂优化问题。SATSSA 采用局部代理辅助模型(LSAM)、全局代理辅助模型(GSAM)和 k-means 聚类代理辅助模型(KCSAM)的组合来拟合适配函数。为了提高模型的预测能力,提出了一种改进的田口方法萨尔普群算法(TSSA)来更新和预测模型。GSAM 主要用于捕捉搜索空间的全貌。KCSAM 用于捕捉搜索空间的一部分,以提高算法的探索能力。LSAM 用于捕捉最优个体周围的轮廓。建议的 SATSSA 在 30D、50D 和 100D 基准函数上与其他四种优秀算法进行了比较。此外,SATSSA 还被应用于入侵检测。仿真结果表明,SATSSA 能有效提高检测率并降低误报率。
{"title":"An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection","authors":"Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan","doi":"10.1007/s11276-024-03677-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03677-6","url":null,"abstract":"<p>The meta-heuristic algorithms require a lot of fitness calculations to get good enough solutions, which constitutes an obstacle to solving computationally complex practical problems. Recently, it has been found that surrogate-assisted meta-heuristic algorithms show potential in solving expensive complex optimization problems. This paper proposes an efficient surrogate-assisted Taguchi salp swarm algorithm (SATSSA) to solve expensive complex optimization problems. The SATSSA uses a combination of the local surrogate-assisted model (LSAM), global surrogate-assisted model (GSAM), and k-means clustering surrogate-assisted model (KCSAM) to fit the fitness function. To enhance the prediction ability of the model, an improved salp swarm algorithm with the Taguchi method (TSSA) is proposed to update and predict the model. GSAM is mainly used to capture the entire landscape of the search space. KCSAM is designed to capture part of the search space to improve the exploration capability of the algorithm. LSAM is used to capture the contours around the optimal individual. The proposed SATSSA is compared with other four excellent algorithms on 30D, 50D, and 100D benchmark functions. In addition, SATSSA is also applied to intrusion detection. Simulation results show that SATSSA is effective in improving detection rate and reducing false alarm rate.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140020087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation 通过事件驱动和状态等级激活实现分布式高能效无线传感和信息融合
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1007/s11276-024-03691-8
Juteng Fu, Xiang Ma, Hang Yu, Keren Dai

The dynamic management of sensor nodes and advanced information fusion are necessary technologies to enhance the comprehensive performance of sensor networks. This paper presents a cascaded sensor dynamic activation and information fusion algorithm to simultaneously optimize the energy and sensing performance of wireless sensing networks. The proposed algorithm dynamically activates nodes that are most suitable for the current sensing task through a joint event-driven and state ranking activation algorithm that achieves a better sensing performance with lower energy costs. In addition, it further utilizes the sensing information of all the activated nodes with maximum efficiency, through an improved distributed Kalman information fusion, which achieves an extra improvement in sensing accuracy as measured by the minimum variance. Finally, the superiority of the proposed cascaded algorithm is verified by a simulation comparison, achieving almost zero dead nodes in terms of energy, and a 62.1% decrease in average error in terms of sensing.

传感器节点的动态管理和先进的信息融合是提高传感器网络综合性能的必要技术。本文提出了一种级联传感器动态激活和信息融合算法,可同时优化无线传感网络的能量和传感性能。所提出的算法通过事件驱动和状态排序联合激活算法,动态激活最适合当前传感任务的节点,从而以较低的能量成本实现更好的传感性能。此外,它还通过改进的分布式卡尔曼信息融合,以最高效率进一步利用所有激活节点的传感信息,从而额外提高了以最小方差衡量的传感精度。最后,通过模拟比较验证了所提出的级联算法的优越性,在能量方面几乎实现了零死节,在传感方面平均误差降低了 62.1%。
{"title":"Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation","authors":"Juteng Fu, Xiang Ma, Hang Yu, Keren Dai","doi":"10.1007/s11276-024-03691-8","DOIUrl":"https://doi.org/10.1007/s11276-024-03691-8","url":null,"abstract":"<p>The dynamic management of sensor nodes and advanced information fusion are necessary technologies to enhance the comprehensive performance of sensor networks. This paper presents a cascaded sensor dynamic activation and information fusion algorithm to simultaneously optimize the energy and sensing performance of wireless sensing networks. The proposed algorithm dynamically activates nodes that are most suitable for the current sensing task through a joint event-driven and state ranking activation algorithm that achieves a better sensing performance with lower energy costs. In addition, it further utilizes the sensing information of all the activated nodes with maximum efficiency, through an improved distributed Kalman information fusion, which achieves an extra improvement in sensing accuracy as measured by the minimum variance. Finally, the superiority of the proposed cascaded algorithm is verified by a simulation comparison, achieving almost zero dead nodes in terms of energy, and a 62.1% decrease in average error in terms of sensing.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system MH-SIA:利用蜂群智能算法实现未来无线通信系统的多目标切换
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03661-0

Abstract

Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover procedures to improve quality, coverage, and service in the existing network. The LTE-A future wireless communication networks consist of various femtocells, microcells, and macrocells. Therefore, designing the appropriate mechanism to perform handovers among different cells is a challenging research problem. We propose a novel handover mechanism called multi-objective handover using swarm intelligence algorithm (MH-SIA) for the future wireless communication system. MH-SIA is made of two novel features multi-objective handover and SIA for handover process optimization. The multi-objective trust parameters of each User's Equipment are computed to perform the handover decision-making and target cell selection using the SIA. The computed trust parameters are utilized as the modified fitness function in Differential Evolution (DE) optimization technique. Due to the fast convergence of DE, it performs computationally efficient handover operations. The multi-objective trust parameters are utilized in handover decision-making and target cell selection to improve network performances with minimum handover latency. The experimental result of MH-SIA reveals the efficient performance compared to underlying methods.

摘要 随着无线网络需求的增加,需要异构网络来满足用户需求。网络移动性管理至关重要。移动性管理面临的挑战与减少此类网络中呼叫/数据包丢失的切换解决方案有关。在高级长期演进(LTE-A)系统中,切换是移动性管理中最关键的部分之一,它依赖于切换程序来提高现有网络的质量、覆盖范围和服务。LTE-A 未来的无线通信网络由各种毫微微蜂窝、微微蜂窝和宏蜂窝组成。因此,设计适当的机制来执行不同小区之间的切换是一个具有挑战性的研究问题。我们为未来的无线通信系统提出了一种名为 "多目标切换群智能算法(MH-SIA)"的新型切换机制。MH-SIA 由多目标切换和用于切换过程优化的 SIA 两项新功能组成。通过计算每个用户设备的多目标信任参数,利用 SIA 进行切换决策和目标小区选择。计算出的信任参数被用作差分进化(DE)优化技术中的修正适应度函数。由于差分进化的快速收敛性,它能执行计算效率高的切换操作。多目标信任参数被用于切换决策和目标小区选择,从而以最小的切换延迟提高网络性能。MH-SIA 的实验结果表明,与基础方法相比,它具有高效的性能。
{"title":"MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system","authors":"","doi":"10.1007/s11276-024-03661-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03661-0","url":null,"abstract":"<h3>Abstract</h3> <p>Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover procedures to improve quality, coverage, and service in the existing network. The LTE-A future wireless communication networks consist of various femtocells, microcells, and macrocells. Therefore, designing the appropriate mechanism to perform handovers among different cells is a challenging research problem. We propose a novel handover mechanism called multi-objective handover using swarm intelligence algorithm (MH-SIA) for the future wireless communication system. MH-SIA is made of two novel features multi-objective handover and SIA for handover process optimization. The multi-objective trust parameters of each User's Equipment are computed to perform the handover decision-making and target cell selection using the SIA. The computed trust parameters are utilized as the modified fitness function in Differential Evolution (DE) optimization technique. Due to the fast convergence of DE, it performs computationally efficient handover operations. The multi-objective trust parameters are utilized in handover decision-making and target cell selection to improve network performances with minimum handover latency. The experimental result of MH-SIA reveals the efficient performance compared to underlying methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"25 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure shortest distance queries over encrypted graph in cloud computing 云计算中加密图的安全最短距离查询
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03692-7

Abstract

Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately, most of them only provide an approximate result by pre-computing and storing a distance oracle. To provide the exact shortest path, our solution employs a distributed two-trapdoor public-key crypto-system to perform addition and comparison operations over ciphertexts. The detailed security analysis indicates that our scheme achieves semantically secure under DDH assumption and the experiments are performed on various real-world database and random database. The experimental result shows the feasibility of our scheme.

摘要 由于许多应用都是作为图问题来处理的,因此图数据库受到越来越多的关注。最短距离查询是基本操作之一,近年来一直受到研究。为了确保数据和查询的私密性,研究人员提出了一些安全图加密方案,这些方案支持大规模图数据库中的最短距离查询。遗憾的是,大多数方案只能通过预先计算和存储距离甲骨文来提供近似结果。为了提供精确的最短路径,我们的解决方案采用了分布式双陷阱门公钥加密系统,对密文执行加法和比较操作。详细的安全性分析表明,我们的方案在 DDH 假设下实现了语义安全,并在各种真实数据库和随机数据库上进行了实验。实验结果表明我们的方案是可行的。
{"title":"Secure shortest distance queries over encrypted graph in cloud computing","authors":"","doi":"10.1007/s11276-024-03692-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03692-7","url":null,"abstract":"<h3>Abstract</h3> <p>Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately, most of them only provide an approximate result by pre-computing and storing a distance oracle. To provide the exact shortest path, our solution employs a distributed two-trapdoor public-key crypto-system to perform addition and comparison operations over ciphertexts. The detailed security analysis indicates that our scheme achieves semantically secure under DDH assumption and the experiments are performed on various real-world database and random database. The experimental result shows the feasibility of our scheme.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review 探索克服基于物联网的无线传感器网络路由挑战的机器学习解决方案:综述
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03697-2

Abstract

An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their shortcomings comprise the first portion of the paper. The integration of ML approaches, such as reinforcement learning and supervised and unsupervised learning, is then explored in order to improve WSN routing efficiency. The article examines the difficulties and factors related to ML-based routing, including data quality, energy efficiency, scalability, and security. Applications and case studies show how ML is really used in WSN routing, offering insights into effective tactics and lessons discovered. Evaluation metrics and performance assessments are included in a separate section that uses simulation and experimental data to compare ML-based and conventional techniques. Looking forward, the study describes new breakthroughs in ML for WSNs and points out unresolved issues, providing a guide for future research paths. The important results and their consequences are outlined in the conclusion, which also highlights how ML has the potential to revolutionize WSN routing in the future.

摘要 基于物联网(IoT)的无线传感器网络(WSN)的发展引发了整个行业的范式变革,这使得可靠而有效的路由选择方法变得十分必要。本文将深入分析如何利用机器学习(ML)技术解决 WSN 路由问题。本文的第一部分总结了标准路由算法并分析了其缺点。然后探讨了如何整合强化学习、监督和非监督学习等 ML 方法,以提高 WSN 路由效率。文章探讨了与基于 ML 的路由相关的困难和因素,包括数据质量、能效、可扩展性和安全性。应用和案例研究展示了如何在 WSN 路由中真正使用 ML,深入探讨了有效的策略和发现的经验教训。评估指标和性能评估包含在一个单独的章节中,该章节使用模拟和实验数据来比较基于 ML 的技术和传统技术。展望未来,本研究描述了 WSN 在 ML 方面的新突破,并指出了尚未解决的问题,为未来的研究路径提供了指导。结论部分概述了重要成果及其后果,还强调了 ML 有可能在未来彻底改变 WSN 路由。
{"title":"Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review","authors":"","doi":"10.1007/s11276-024-03697-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03697-2","url":null,"abstract":"<h3>Abstract</h3> <p>An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their shortcomings comprise the first portion of the paper. The integration of ML approaches, such as reinforcement learning and supervised and unsupervised learning, is then explored in order to improve WSN routing efficiency. The article examines the difficulties and factors related to ML-based routing, including data quality, energy efficiency, scalability, and security. Applications and case studies show how ML is really used in WSN routing, offering insights into effective tactics and lessons discovered. Evaluation metrics and performance assessments are included in a separate section that uses simulation and experimental data to compare ML-based and conventional techniques. Looking forward, the study describes new breakthroughs in ML for WSNs and points out unresolved issues, providing a guide for future research paths. The important results and their consequences are outlined in the conclusion, which also highlights how ML has the potential to revolutionize WSN routing in the future.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"232 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive trust system for misbehavior detection in wireless sensor networks 用于无线传感器网络不当行为检测的自适应信任系统
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-28 DOI: 10.1007/s11276-024-03687-4

Abstract

Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks. They employ fixed trust metrics derived from expert opinion rather than the objective method based on the network’s current security level. Furthermore, they are complex trust systems designed for a specific application with a high attack probability. Thus, even with a low attack rate, they consume a lot of energy. This paper proposes an adaptive trust system that considers both the network’s risk level and the trust values of sensor nodes at the same time. To match the situation in the network, the proposed system employs various trust policies. In risky situations where the WSN environment remains untrustworthy, the proposed system adjusts its trust metrics based on the network attack intensity. When the attacks are eliminated and the misbehavior rate is low, the system switches to an energy efficient policy and adjusts its trust metrics to conserve sensor node energy. Simulation results show that a zero-tolerance policy achieves 95% of the detection rate and conserves 50% of nodes’ energy under the presence of 35% of malicious nodes in the network. Energy efficient policy achieves 90% of detection rate and conserves 95% of nodes’ energy under the existence of 10% of malicious nodes in the network. Normal policy achieves up to 90% of detection rate between 15 and 25% of malicious nodes while conserving 70% and 80% of energy under these percentages.

摘要 信任管理已被证明是保护网络免受恶意节点攻击和确保无线传感器网络(WSN)安全的有效技术。目前已提出了许多信任系统,但其中大多数都不能适应当前的网络安全状况和所受攻击的强度,尤其是在协同攻击的情况下。它们采用的是根据专家意见得出的固定信任指标,而不是基于网络当前安全级别的客观方法。此外,它们是为特定应用设计的复杂信任系统,具有很高的攻击概率。因此,即使攻击率很低,它们也会消耗大量能源。本文提出的自适应信任系统同时考虑了网络的风险等级和传感器节点的信任值。为了与网络中的情况相匹配,该系统采用了多种信任策略。在 WSN 环境仍然不可信的风险情况下,提议的系统会根据网络攻击强度调整其信任指标。当攻击消除且不当行为发生率较低时,系统会切换到节能策略,并调整其信任指标,以节约传感器节点的能量。仿真结果表明,在网络中存在 35% 的恶意节点的情况下,零容忍策略可实现 95% 的检测率,并节省 50% 的节点能量。高能效策略在网络中存在 10% 的恶意节点的情况下,检测率达到 90%,节约了 95% 的节点能量。正常策略在恶意节点比例为 15% 到 25% 之间时,检测率可达到 90%,而在此比例下可节省 70% 到 80% 的能量。
{"title":"An adaptive trust system for misbehavior detection in wireless sensor networks","authors":"","doi":"10.1007/s11276-024-03687-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03687-4","url":null,"abstract":"<h3>Abstract</h3> <p>Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks. They employ fixed trust metrics derived from expert opinion rather than the objective method based on the network’s current security level. Furthermore, they are complex trust systems designed for a specific application with a high attack probability. Thus, even with a low attack rate, they consume a lot of energy. This paper proposes an adaptive trust system that considers both the network’s risk level and the trust values of sensor nodes at the same time. To match the situation in the network, the proposed system employs various trust policies. In risky situations where the WSN environment remains untrustworthy, the proposed system adjusts its trust metrics based on the network attack intensity. When the attacks are eliminated and the misbehavior rate is low, the system switches to an energy efficient policy and adjusts its trust metrics to conserve sensor node energy. Simulation results show that a zero-tolerance policy achieves 95% of the detection rate and conserves 50% of nodes’ energy under the presence of 35% of malicious nodes in the network. Energy efficient policy achieves 90% of detection rate and conserves 95% of nodes’ energy under the existence of 10% of malicious nodes in the network. Normal policy achieves up to 90% of detection rate between 15 and 25% of malicious nodes while conserving 70% and 80% of energy under these percentages.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"8 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1