首页 > 最新文献

Wireless Networks最新文献

英文 中文
Soca: secure offloading considering computational acceleration for multi-access edge computing Soca:考虑到多访问边缘计算的计算加速的安全卸载
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1007/s11276-024-03813-2
Meng Yi, Peng Yang, Jinhu Xie, Cheng Fang, Bing Li

Due to the complexity and security requirements of edge computing environments and the limited resources of terminals, secure offloading in multi-access edge computing (MEC) networks has emerged as a critical and urgent research area. However, many studies on task offloading often ignore the necessary balance between security requirements and efficiency. To address this issue, we propose a Secure Offloading Strategy Considering Computational Acceleration, named SOCA, designed to bolster security while preserving offloading efficiency. Specifically, the secure offloading problem is modeled as a multi-objective optimization problem by achieving a composite function of latency mitigation and security metrics as the optimization objective, which is solved by the ChaCha20-based offloading decision algorithm (ChaCha20-ODA). The algorithm employs the ChaCha20 encryption protocol as its security mechanism. By executing a quarter-round function to generate a keystream, it provides robust protection for data tasks, ensuring that the data remains impervious to malevolent interception by adversaries throughout the transmission process. Furthermore, to improve the computational efficiency of task offloading, the algorithm simultaneously leverages both edge and local computing resources, achieving computational acceleration by optimizing the appropriate offload ratio. The experimental results illustrate that as compared with baselines, our approach achieves remarkable improvement in the balance between latency and safety benchmarks, which demonstrates the superiority of our method.

由于边缘计算环境的复杂性和安全性要求以及终端资源的有限性,多接入边缘计算(MEC)网络中的安全卸载已成为一个关键而紧迫的研究领域。然而,许多关于任务卸载的研究往往忽视了安全要求与效率之间的必要平衡。为了解决这个问题,我们提出了一种考虑计算加速的安全卸载策略(名为 SOCA),旨在加强安全性的同时保持卸载效率。具体来说,安全卸载问题被建模为一个多目标优化问题,以实现延迟缓解和安全指标的复合函数作为优化目标,由基于ChaCha20的卸载决策算法(ChaCha20-ODA)来解决。该算法采用 ChaCha20 加密协议作为安全机制。该算法通过执行四分之一轮函数生成密钥流,为数据任务提供稳健的保护,确保数据在整个传输过程中不会被对手恶意截获。此外,为了提高任务卸载的计算效率,该算法同时利用边缘和本地计算资源,通过优化适当的卸载比例实现计算加速。实验结果表明,与基线相比,我们的方法在延迟和安全基准之间的平衡方面取得了显著改善,这证明了我们方法的优越性。
{"title":"Soca: secure offloading considering computational acceleration for multi-access edge computing","authors":"Meng Yi, Peng Yang, Jinhu Xie, Cheng Fang, Bing Li","doi":"10.1007/s11276-024-03813-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03813-2","url":null,"abstract":"<p>Due to the complexity and security requirements of edge computing environments and the limited resources of terminals, secure offloading in multi-access edge computing (MEC) networks has emerged as a critical and urgent research area. However, many studies on task offloading often ignore the necessary balance between security requirements and efficiency. To address this issue, we propose a Secure Offloading Strategy Considering Computational Acceleration, named SOCA, designed to bolster security while preserving offloading efficiency. Specifically, the secure offloading problem is modeled as a multi-objective optimization problem by achieving a composite function of latency mitigation and security metrics as the optimization objective, which is solved by the ChaCha20-based offloading decision algorithm (ChaCha20-ODA). The algorithm employs the ChaCha20 encryption protocol as its security mechanism. By executing a quarter-round function to generate a keystream, it provides robust protection for data tasks, ensuring that the data remains impervious to malevolent interception by adversaries throughout the transmission process. Furthermore, to improve the computational efficiency of task offloading, the algorithm simultaneously leverages both edge and local computing resources, achieving computational acceleration by optimizing the appropriate offload ratio. The experimental results illustrate that as compared with baselines, our approach achieves remarkable improvement in the balance between latency and safety benchmarks, which demonstrates the superiority of our method.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"15 1 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism 基于容器迁移机制的新型多目标优化 DAG 任务调度策略
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1007/s11276-024-03811-4
Wenjia Deng, Lin Zhu, Yang Shen, Chuan Zhou, Jian Guo, Yong Cheng

In order to solve the complex task scheduling problem of fog computing processing big data in the industrial Internet of Things, a task scheduling strategy based on ant colony algorithm called TSSAC (task scheduling strategy with ant colony)is proposed. Tasks with dependencies are modeled as a directed acyclic graph. The performance indices including makespan, load balancing and energy consumption of fog server are optimized simultaneously, and the ant colony algorithm is used to solve the multi-objective optimization problem. The pheromone heuristic factor and pheromone evaporation coefficient of the ant colony algorithm are updated in a linear increasing way, so that the ants are less affected by pheromones in the early stage and obtain a larger search range. During the later stage, it is greatly affected by pheromone and quickly converges to the optimal solution. Furthermore, during the task execution container migration mechanism is introduced to solve the overload problem caused by high server utilization and energy loss caused by low server utilization simultaneously. The simulation results show that the proposed task scheduling strategy TSSAC reduces energy consumption by 23.5% compared with the traditional algorithm, meanwhile, achieves a compromise between task makespan and load balancing index compared with the traditional algorithm.

为了解决工业物联网中雾计算处理大数据的复杂任务调度问题,提出了一种基于蚁群算法的任务调度策略,称为 TSSAC(蚁群任务调度策略)。具有依赖关系的任务被建模为有向无环图。同时对性能指标进行优化,包括雾服务器的时间跨度、负载平衡和能耗,并使用蚁群算法解决多目标优化问题。蚁群算法的信息素启发式因子和信息素蒸发系数以线性递增的方式更新,使蚂蚁在前期受信息素的影响较小,获得较大的搜索范围。在后期阶段,蚂蚁受信息素的影响较大,会迅速收敛到最优解。此外,在任务执行过程中还引入了容器迁移机制,以同时解决服务器利用率高导致的过载问题和服务器利用率低导致的能量损失问题。仿真结果表明,所提出的任务调度策略 TSSAC 与传统算法相比,能耗降低了 23.5%,同时,与传统算法相比,在任务跨度和负载平衡指标之间实现了折中。
{"title":"A novel multi-objective optimized DAG task scheduling strategy for fog computing based on container migration mechanism","authors":"Wenjia Deng, Lin Zhu, Yang Shen, Chuan Zhou, Jian Guo, Yong Cheng","doi":"10.1007/s11276-024-03811-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03811-4","url":null,"abstract":"<p>In order to solve the complex task scheduling problem of fog computing processing big data in the industrial Internet of Things, a task scheduling strategy based on ant colony algorithm called TSSAC (task scheduling strategy with ant colony)is proposed. Tasks with dependencies are modeled as a directed acyclic graph. The performance indices including makespan, load balancing and energy consumption of fog server are optimized simultaneously, and the ant colony algorithm is used to solve the multi-objective optimization problem. The pheromone heuristic factor and pheromone evaporation coefficient of the ant colony algorithm are updated in a linear increasing way, so that the ants are less affected by pheromones in the early stage and obtain a larger search range. During the later stage, it is greatly affected by pheromone and quickly converges to the optimal solution. Furthermore, during the task execution container migration mechanism is introduced to solve the overload problem caused by high server utilization and energy loss caused by low server utilization simultaneously. The simulation results show that the proposed task scheduling strategy TSSAC reduces energy consumption by 23.5% compared with the traditional algorithm, meanwhile, achieves a compromise between task makespan and load balancing index compared with the traditional algorithm.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"10 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based solution for enhancing the efficiency and security of healthcare knowledge management systems in the era of industry 4.0 基于区块链的解决方案,在工业 4.0 时代提高医疗保健知识管理系统的效率和安全性
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1007/s11276-024-03770-w
Yang Yuman, S. B. Goyal, Anand Singh Rajawat, Manoj Kumar, Achyut Shankar, Fatimah Alhayan, Shakila Basheer

This study proposes a blockchain-based solution to enhance the efficiency and security of Healthcare Knowledge Management Systems for Industry 4.0. With the widespread adoption of network internet platforms, managing knowledge data safely and effectively has become a critical challenge. Traditional Healthcare Knowledge Management Systems rely on centralized storage methods, which can lead to knowledge monopolies, resulting in a crisis of trust between knowledge management and sharing subjects. This paper proposes the Dumbo algorithm, which enhances the adaptability of asynchronous environments and improves the security of shared blockchains in knowledge-sharing environments. The Dumbo algorithm ensures traditional knowledge management platforms’ trust, security, and efficiency by eliminating data tampering through a unique workload-proof and consensus mechanism in blockchain technology. Additionally, distributed accounting solves the problems of low efficiency and poor security of central systems while dispersing the risk of damage to the central database and guaranteeing data security. This study aims to realize knowledge sharing based on blockchain and solve the challenges associated with conventional Healthcare Knowledge Management Systems. The proposed solution has the potential to significantly improve the management, sharing, and security of knowledge in Industry 4.0. We expect to see major improvements in the way that healthcare data is shared, saved, and used thanks to this blockchain-based strategy, which will open the door to better patient care and more operational efficiency in the healthcare sector.

本研究提出了一种基于区块链的解决方案,以提高工业 4.0 医疗保健知识管理系统的效率和安全性。随着网络互联网平台的广泛应用,安全有效地管理知识数据已成为一项严峻挑战。传统的医疗保健知识管理系统依赖于集中存储方式,容易导致知识垄断,造成知识管理和共享主体之间的信任危机。本文提出的 Dumbo 算法,增强了异步环境的适应性,提高了知识共享环境中共享区块链的安全性。Dumbo算法通过区块链技术独特的工作量防篡改和共识机制,杜绝了数据篡改,确保了传统知识管理平台的信任、安全和效率。此外,分布式记账解决了中心系统效率低、安全性差的问题,同时分散了中心数据库受损的风险,保证了数据的安全性。本研究旨在实现基于区块链的知识共享,解决传统医疗保健知识管理系统所面临的挑战。所提出的解决方案有望显著改善工业 4.0 中的知识管理、共享和安全性。我们预计,得益于这一基于区块链的战略,医疗保健数据的共享、保存和使用方式将得到重大改进,这将为医疗保健行业提供更好的患者护理和更高的运营效率打开大门。
{"title":"A blockchain-based solution for enhancing the efficiency and security of healthcare knowledge management systems in the era of industry 4.0","authors":"Yang Yuman, S. B. Goyal, Anand Singh Rajawat, Manoj Kumar, Achyut Shankar, Fatimah Alhayan, Shakila Basheer","doi":"10.1007/s11276-024-03770-w","DOIUrl":"https://doi.org/10.1007/s11276-024-03770-w","url":null,"abstract":"<p>This study proposes a blockchain-based solution to enhance the efficiency and security of Healthcare Knowledge Management Systems for Industry 4.0. With the widespread adoption of network internet platforms, managing knowledge data safely and effectively has become a critical challenge. Traditional Healthcare Knowledge Management Systems rely on centralized storage methods, which can lead to knowledge monopolies, resulting in a crisis of trust between knowledge management and sharing subjects. This paper proposes the Dumbo algorithm, which enhances the adaptability of asynchronous environments and improves the security of shared blockchains in knowledge-sharing environments. The Dumbo algorithm ensures traditional knowledge management platforms’ trust, security, and efficiency by eliminating data tampering through a unique workload-proof and consensus mechanism in blockchain technology. Additionally, distributed accounting solves the problems of low efficiency and poor security of central systems while dispersing the risk of damage to the central database and guaranteeing data security. This study aims to realize knowledge sharing based on blockchain and solve the challenges associated with conventional Healthcare Knowledge Management Systems. The proposed solution has the potential to significantly improve the management, sharing, and security of knowledge in Industry 4.0. We expect to see major improvements in the way that healthcare data is shared, saved, and used thanks to this blockchain-based strategy, which will open the door to better patient care and more operational efficiency in the healthcare sector.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"67 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workload prioritization and optimal task scheduling in cloud: introduction to hybrid optimization algorithm 云计算中的工作负载优先级和最佳任务调度:混合优化算法介绍
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1007/s11276-024-03793-3
Yellamma Pachipala, Durga Bhavani Dasari, Veeranki Venkata Rama Maheswara Rao, Prakash Bethapudi, Tumma Srinivasarao

Cloud computing represents an evolved form of cluster, client server, and grid computing, enabling users to seamlessly access resources over the internet. The quality and reliability of the cloud computing services are depends on the specific tasks undertaken by the users. Task Scheduling emerges as a pivotal factor in enhancing the efficiency and reliability of a cloud environment, aiming to optimize resource utilization. Furthermore, efficient task scheduling holds a prime importance in achieving superior performance, minimizing response time, reducing energy consumption and maximizing throughput. Assigning work to essential resources is a challenging process to achieve better performance. However, this paper plans to propose a novel workload prioritization and optimal task scheduling in the cloud with two steps. At first, the ranks are allotted to the tasks with Analytical Hierarchy Process based ranking process that uses a k-means clustering strategy to group the workloads. Then, the tasks are scheduled under the consideration of constraints like makespan, utilization cost, and migration cost and risk probability; based on priority. Accordingly, the task scheduling is done optimally by the proposed hybrid optimization Blue Updated Jellyfish Search Optimization that combines algorithms like Blue Monkey Optimization and Jelly fish Search Optimization algorithms. The performance of the proposed scheduling process is validated and proved over the conventional methods.

云计算是集群、客户服务器和网格计算的进化形式,使用户能够通过互联网无缝访问资源。云计算服务的质量和可靠性取决于用户执行的具体任务。任务调度是提高云环境效率和可靠性的关键因素,旨在优化资源利用率。此外,高效的任务调度在实现卓越性能、最小化响应时间、降低能耗和最大化吞吐量方面具有重要意义。要实现更好的性能,将工作分配给基本资源是一个具有挑战性的过程。然而,本文计划提出一种新颖的云计算工作负载优先级和最优任务调度方法,分为两个步骤。首先,使用基于层次分析法(Analytical Hierarchy Process)的排序程序为任务分配等级,该排序程序使用 k-means 聚类策略对工作负载进行分组。然后,根据优先级,在考虑到工期、利用率成本、迁移成本和风险概率等约束条件的情况下对任务进行调度。因此,任务调度是通过所提出的混合优化蓝更新水母搜索优化来优化完成的,该优化结合了蓝猴优化和水母搜索优化等算法。与传统方法相比,提议的调度流程的性能得到了验证和证明。
{"title":"Workload prioritization and optimal task scheduling in cloud: introduction to hybrid optimization algorithm","authors":"Yellamma Pachipala, Durga Bhavani Dasari, Veeranki Venkata Rama Maheswara Rao, Prakash Bethapudi, Tumma Srinivasarao","doi":"10.1007/s11276-024-03793-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03793-3","url":null,"abstract":"<p>Cloud computing represents an evolved form of cluster, client server, and grid computing, enabling users to seamlessly access resources over the internet. The quality and reliability of the cloud computing services are depends on the specific tasks undertaken by the users. Task Scheduling emerges as a pivotal factor in enhancing the efficiency and reliability of a cloud environment, aiming to optimize resource utilization. Furthermore, efficient task scheduling holds a prime importance in achieving superior performance, minimizing response time, reducing energy consumption and maximizing throughput. Assigning work to essential resources is a challenging process to achieve better performance. However, this paper plans to propose a novel workload prioritization and optimal task scheduling in the cloud with two steps. At first, the ranks are allotted to the tasks with Analytical Hierarchy Process based ranking process that uses a k-means clustering strategy to group the workloads. Then, the tasks are scheduled under the consideration of constraints like makespan, utilization cost, and migration cost and risk probability; based on priority. Accordingly, the task scheduling is done optimally by the proposed hybrid optimization Blue Updated Jellyfish Search Optimization that combines algorithms like Blue Monkey Optimization and Jelly fish Search Optimization algorithms. The performance of the proposed scheduling process is validated and proved over the conventional methods. </p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"24 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework 通过数字孪生驱动的任务卸载框架增强无人机辅助飞行器边缘计算网络
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1007/s11276-024-03804-3
Zhiyang Zhang, Fengli Zhang, Minsheng Cao, Chaosheng Feng, Dajiang Chen

Enhancing the task offload performance of UAV-assisted Vehicular Edge Computing Networks (VECNs) is complex, especially in vehicle-to-everything (V2X) applications. These networks rely on UAVs and roadside units (RSUs) to offload heavy computational tasks and reduce the load on the on-board systems. However, UAV-assisted VECNs face severe challenges from heterogeneous offload node resources and dynamic edge network environments in providing low-latency and high-response task offloading, especially during traffic congestion or infrastructure failures. In this paper, we propose a digital twin (DT)-driven task offloading framework for UAV-assisted VECNs. The aim of the proposed framework is to improve the global performance of VECN task offloading under limited computational and communication resource constraints. Firstly, we construct a decentralized offloading decision-centralized evaluation task offloading framework for UAV-assisted VECNs based on the asynchronous advantage actor-critic (A3C) algorithm. Secondly, we integrate the graph attention networks (GAT) into the framework to incorporate the dynamically changing DT network topology information into the state evaluation of VECNs. By simulating a DT-driven multi-UAV cooperative system and comprehensive evaluation of real-world task request datasets. The framework has a better task throughput rate and stability when performing task offloading in local resource overload and dynamic edge environment scenarios.

提高无人机辅助车载边缘计算网络(VECN)的任务卸载性能非常复杂,尤其是在车对物(V2X)应用中。这些网络依靠无人机和路边装置(RSU)来卸载繁重的计算任务,减轻车载系统的负荷。然而,无人机辅助 VECN 在提供低延迟和高响应任务卸载方面面临着来自异构卸载节点资源和动态边缘网络环境的严峻挑战,尤其是在交通拥堵或基础设施故障期间。在本文中,我们为无人机辅助 VECN 提出了一个数字孪生(DT)驱动的任务卸载框架。提出该框架的目的是在有限的计算和通信资源约束下提高 VECN 任务卸载的全局性能。首先,我们基于异步优势行动者批判(A3C)算法,构建了无人机辅助 VECN 的分散卸载决策-集中评估任务卸载框架。其次,我们将图注意网络(GAT)集成到框架中,将动态变化的 DT 网络拓扑信息纳入 VECN 的状态评估。通过模拟 DT 驱动的多无人机协同系统,并对真实世界的任务请求数据集进行综合评估。该框架在本地资源过载和动态边缘环境场景下进行任务卸载时,具有更好的任务吞吐率和稳定性。
{"title":"Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework","authors":"Zhiyang Zhang, Fengli Zhang, Minsheng Cao, Chaosheng Feng, Dajiang Chen","doi":"10.1007/s11276-024-03804-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03804-3","url":null,"abstract":"<p>Enhancing the task offload performance of UAV-assisted Vehicular Edge Computing Networks (VECNs) is complex, especially in vehicle-to-everything (V2X) applications. These networks rely on UAVs and roadside units (RSUs) to offload heavy computational tasks and reduce the load on the on-board systems. However, UAV-assisted VECNs face severe challenges from heterogeneous offload node resources and dynamic edge network environments in providing low-latency and high-response task offloading, especially during traffic congestion or infrastructure failures. In this paper, we propose a digital twin (DT)-driven task offloading framework for UAV-assisted VECNs. The aim of the proposed framework is to improve the global performance of VECN task offloading under limited computational and communication resource constraints. Firstly, we construct a decentralized offloading decision-centralized evaluation task offloading framework for UAV-assisted VECNs based on the asynchronous advantage actor-critic (A3C) algorithm. Secondly, we integrate the graph attention networks (GAT) into the framework to incorporate the dynamically changing DT network topology information into the state evaluation of VECNs. By simulating a DT-driven multi-UAV cooperative system and comprehensive evaluation of real-world task request datasets. The framework has a better task throughput rate and stability when performing task offloading in local resource overload and dynamic edge environment scenarios.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"20 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating cooperative strategies for security-reliability trade-off in full-duplex relay wireless networks 研究全双工中继无线网络中安全-可靠性权衡的合作策略
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1007/s11276-024-03758-6
Sajad Poursajadi, Mohammad Hossein Madani

In this paper, we present a comprehensive investigation on security-reliability trade-off (SRT) in cooperative wireless networks in which full-duplex intermediate nodes act as jammer and/or relay. Various cooperative schemes named as opportunistic relay selection (ORS), opportunistic jammer selection (OJS), hybrid relay-jammer selection (HRJS), and joint relay-jammer selection (JRJS) are considered. In these schemes, relay and jammer sets are distinguished by comparing the instantaneous and average fading properties of the main and wiretap links, respectively. So that, one or two helpers from these sets are opportunistically employed for cooperation regarding the applied scheme. We analyze the outage and intercept probabilities and derive closed-form expressions for the SRT of the considered schemes. The results show that the cooperative schemes deliver different behaviors by varying parameters such as number of helpers, link quality and data rate. In details, ORS outperforms the other schemes for high main to eavesdropper ratio (MER), whereas JRJS delivers better performance for lower MERs. By improving the relay-to-destination link compared to source-to-destination, both HRJS and JRJS outperform the ORS while HRJS delivers better SRT than JRJS. Moreover, HRJS outperforms JRJS at higher data rates. The results also indicate that SRT of all schemes is improved by increasing the number of helpers.

在本文中,我们对全双工中间节点充当干扰者和/或中继的合作无线网络中的安全性-可靠性权衡(SRT)进行了全面研究。本文考虑了各种合作方案,包括机会主义中继选择(ORS)、机会主义干扰者选择(OJS)、混合中继-干扰者选择(HRJS)和联合中继-干扰者选择(JRJS)。在这些方案中,分别通过比较主链路和窃听链路的瞬时和平均衰减特性来区分中继和干扰器组。这样,在所应用的方案中,这些集中的一个或两个助手就会被伺机用于合作。我们分析了中断和截获概率,并推导出所考虑方案的 SRT 闭式表达式。结果表明,通过改变帮助者数量、链路质量和数据速率等参数,合作方案会产生不同的行为。具体而言,在主线与窃听者比率(MER)较高的情况下,ORS 的性能优于其他方案,而在 MER 较低的情况下,JRJS 的性能更好。与源到目标相比,通过改进中继到目标链路,HRJS 和 JRJS 的性能都优于 ORS,而 HRJS 的 SRT 比 JRJS 更好。此外,在更高的数据速率下,HRJS 的性能优于 JRJS。结果还表明,所有方案的 SRT 都能通过增加帮助者的数量得到改善。
{"title":"Investigating cooperative strategies for security-reliability trade-off in full-duplex relay wireless networks","authors":"Sajad Poursajadi, Mohammad Hossein Madani","doi":"10.1007/s11276-024-03758-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03758-6","url":null,"abstract":"<p>In this paper, we present a comprehensive investigation on security-reliability trade-off (SRT) in cooperative wireless networks in which full-duplex intermediate nodes act as jammer and/or relay. Various cooperative schemes named as opportunistic relay selection (ORS), opportunistic jammer selection (OJS), hybrid relay-jammer selection (HRJS), and joint relay-jammer selection (JRJS) are considered. In these schemes, relay and jammer sets are distinguished by comparing the instantaneous and average fading properties of the main and wiretap links, respectively. So that, one or two helpers from these sets are opportunistically employed for cooperation regarding the applied scheme. We analyze the outage and intercept probabilities and derive closed-form expressions for the SRT of the considered schemes. The results show that the cooperative schemes deliver different behaviors by varying parameters such as number of helpers, link quality and data rate. In details, ORS outperforms the other schemes for high main to eavesdropper ratio (MER), whereas JRJS delivers better performance for lower MERs. By improving the relay-to-destination link compared to source-to-destination, both HRJS and JRJS outperform the ORS while HRJS delivers better SRT than JRJS. Moreover, HRJS outperforms JRJS at higher data rates. The results also indicate that SRT of all schemes is improved by increasing the number of helpers.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"16 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on anti-interference performance of 5G multi band communication antenna supported by NFC technology NFC 技术支持的 5G 多频段通信天线抗干扰性能研究
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-29 DOI: 10.1007/s11276-024-03803-4
Zhixiang Lu

In order to improve the stability and fidelity of 5G multi-band communication, an anti-jamming design method based on NFC and RFID technology is proposed to develop the anti-jamming ability of 5G multi-band communication antenna. Combine NFC technology with mobile phone technology and RFID identification technology, then construct a 5G multi-band communication channel model based on NFC technology. A unique signal attenuation technique is used to suppress intercode interference between 5G multiband communication channels. At the same time, extract the symbolic feature components of 5G multi-band communication antenna, and the compatible design of NFC and existing contactless smart card technology is used to guide the Bluetooth matching process. In order to realize the channel equalization design of 5G multi-band communication antenna, adopt the adaptive sampling decision equalization adjustment technique. According to the beamforming and delay scheduling methods, establish the transmission delay control of the multi-band communication antenna. According to the spatial beamforming principle, realize the anti-interference design of the 5G multi-band communication antenna. This method has a better channel balance and a lower bit error rate in the anti-jamming design of 5G multi-band communication antenna supported by NFC technology. Therefore, this technology has good potential and value for promoting NFC technology in mobile communication equipment. The lowest bit error rate is 0.006, and the shortest delay is 0.251.

为了提高 5G 多频段通信的稳定性和保真度,提出了一种基于 NFC 和 RFID 技术的抗干扰设计方法,以开发 5G 多频段通信天线的抗干扰能力。将 NFC 技术与手机技术和 RFID 识别技术相结合,构建基于 NFC 技术的 5G 多频段通信信道模型。采用独特的信号衰减技术抑制 5G 多频段通信信道之间的码间干扰。同时,提取 5G 多频段通信天线的符号特征成分,并利用 NFC 与现有非接触式智能卡技术的兼容设计来指导蓝牙匹配过程。为实现5G多频段通信天线的信道均衡设计,采用自适应采样决策均衡调整技术。根据波束成形和延迟调度方法,建立多频段通信天线的传输延迟控制。根据空间波束成形原理,实现 5G 多频段通信天线的抗干扰设计。该方法在 NFC 技术支撑的 5G 多频段通信天线抗干扰设计中具有较好的信道平衡性和较低的误码率。因此,该技术对于在移动通信设备中推广 NFC 技术具有良好的潜力和价值。最低误码率为 0.006,最短延迟为 0.251。
{"title":"Research on anti-interference performance of 5G multi band communication antenna supported by NFC technology","authors":"Zhixiang Lu","doi":"10.1007/s11276-024-03803-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03803-4","url":null,"abstract":"<p>In order to improve the stability and fidelity of 5G multi-band communication, an anti-jamming design method based on NFC and RFID technology is proposed to develop the anti-jamming ability of 5G multi-band communication antenna. Combine NFC technology with mobile phone technology and RFID identification technology, then construct a 5G multi-band communication channel model based on NFC technology. A unique signal attenuation technique is used to suppress intercode interference between 5G multiband communication channels. At the same time, extract the symbolic feature components of 5G multi-band communication antenna, and the compatible design of NFC and existing contactless smart card technology is used to guide the Bluetooth matching process. In order to realize the channel equalization design of 5G multi-band communication antenna, adopt the adaptive sampling decision equalization adjustment technique. According to the beamforming and delay scheduling methods, establish the transmission delay control of the multi-band communication antenna. According to the spatial beamforming principle, realize the anti-interference design of the 5G multi-band communication antenna. This method has a better channel balance and a lower bit error rate in the anti-jamming design of 5G multi-band communication antenna supported by NFC technology. Therefore, this technology has good potential and value for promoting NFC technology in mobile communication equipment. The lowest bit error rate is 0.006, and the shortest delay is 0.251.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"19 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
D2D communication assisted edge computing based resource pricing and scheduling research in blockchain 区块链中基于 D2D 通信辅助边缘计算的资源定价和调度研究
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1007/s11276-024-03792-4
Ludan Zhang, Xueyong Yu, Jianing Song, Hongbo Zhu

Affected by limited computing resources and energy, intelligent terminal devices in edge computing systems cannot perform computationally intensive mining tasks in blockchains based on the PoW (proof-of-work) protocol. Therefore, rational terminal devices, as miners, choose to offload mining tasks to other devices or edge computing servers. Aiming at the problem that lightweight devices cannot complete the blockchain mining tasks, this paper firstly proposes a blockchain mining task offloading strategy based on D2D-EC (Device to Device Communication Assisted Edge Computing). Miners offload mining tasks to CMN (Collaborative Mining Network) integrated by mining devices or edge computing server. Secondly, the mobility of devices increases the risk of failure in the blockchain consensus process. Therefore, we develop a prediction method based on Lagrange interpolation to predict the track of devices. The mobility prediction of devices enable miners to make rational offloading strategy, that is, offload fewer tasks to devices with strong mobility to reduce consensus failure costs. In this paper, the interaction between miners and resource suppliers is modeled as a two-stage multi-leader multi-follower Stackelberg game to obtain the best resource requests of miners and best pricing of resource suppliers. To find the NE (Nash Equilibrium) of the Stackelberg game, this paper develops a gradient search-based best response distributed algorithm (BRD). Simulation results show that the algorithm can optimize miners’ utilities and suppliers’ profits quickly, and the proposed prediction method can effectively enable miners to optimize allocation of mining tasks.

受计算资源和能源有限的影响,边缘计算系统中的智能终端设备无法在基于 PoW(工作量证明)协议的区块链中执行计算密集型挖矿任务。因此,合理的终端设备作为矿工,会选择将挖矿任务卸载给其他设备或边缘计算服务器。针对轻量级设备无法完成区块链挖矿任务的问题,本文首先提出了一种基于D2D-EC(设备到设备通信辅助边缘计算)的区块链挖矿任务卸载策略。矿工将挖矿任务卸载到由挖矿设备或边缘计算服务器集成的 CMN(协同挖矿网络)上。其次,设备的移动性增加了区块链共识过程中的失败风险。因此,我们开发了一种基于拉格朗日插值法的预测方法来预测设备的移动轨迹。通过对设备移动性的预测,矿工可以制定合理的卸载策略,即向移动性强的设备卸载较少的任务,以降低共识失败的成本。本文将矿工与资源供应商之间的互动建模为两阶段多领导者多追随者的斯塔克尔伯格博弈,以获得矿工的最佳资源请求和资源供应商的最佳定价。为了找到斯塔克尔伯格博弈的纳什均衡(NE),本文开发了一种基于梯度搜索的最佳响应分布式算法(BRD)。仿真结果表明,该算法能快速优化矿工的效用和供应商的利润,所提出的预测方法能有效帮助矿工优化采矿任务分配。
{"title":"D2D communication assisted edge computing based resource pricing and scheduling research in blockchain","authors":"Ludan Zhang, Xueyong Yu, Jianing Song, Hongbo Zhu","doi":"10.1007/s11276-024-03792-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03792-4","url":null,"abstract":"<p>Affected by limited computing resources and energy, intelligent terminal devices in edge computing systems cannot perform computationally intensive mining tasks in blockchains based on the PoW (proof-of-work) protocol. Therefore, rational terminal devices, as miners, choose to offload mining tasks to other devices or edge computing servers. Aiming at the problem that lightweight devices cannot complete the blockchain mining tasks, this paper firstly proposes a blockchain mining task offloading strategy based on D2D-EC (Device to Device Communication Assisted Edge Computing). Miners offload mining tasks to CMN (Collaborative Mining Network) integrated by mining devices or edge computing server. Secondly, the mobility of devices increases the risk of failure in the blockchain consensus process. Therefore, we develop a prediction method based on Lagrange interpolation to predict the track of devices. The mobility prediction of devices enable miners to make rational offloading strategy, that is, offload fewer tasks to devices with strong mobility to reduce consensus failure costs. In this paper, the interaction between miners and resource suppliers is modeled as a two-stage multi-leader multi-follower Stackelberg game to obtain the best resource requests of miners and best pricing of resource suppliers. To find the NE (Nash Equilibrium) of the Stackelberg game, this paper develops a gradient search-based best response distributed algorithm (BRD). Simulation results show that the algorithm can optimize miners’ utilities and suppliers’ profits quickly, and the proposed prediction method can effectively enable miners to optimize allocation of mining tasks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industry 面向智能医疗行业的自适应安全物联网和基于云的疾病分类策略
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1007/s11276-024-03783-5
Ankit Verma, Gaurav Agarwal, Amit Kumar Gupta, Vipin Kumar, Shweta Singh

Hospital facilities were limited in rural areas and there is no awareness about disease infection and so on. Hence, the Internet of Things (IoT) technology was designed in the health care industry to treat and save illiterate people from the harmful diseases. Recently, the health care system based on IoT technology became a huge demand in the online and medical industry. However, offering the protection frame for gathered data in cloud becomes a challenging task, because the cloud contains a lot of different patient data. To overcome this issue, the current research has designed a novel Elapid Encryption in cloud frame to secure the gathered data. Moreover, the security function is executed by encrypting the collected information in the cloud storage. Also, a novel generalized fuzzy intelligence and ant lion optimization model was developed for disease prediction and severity calculation. Hence, the developed design is implemented using MATLAB and its efficiency is compared with the existing approaches such as H-DT, DNN, and DTNNN. From the comparison, proposed model has finest and highest performance like high accuracy, precision, recall and confidential rate then lower error rate and processing time. Consequently, AUC value by the developed model is 89.8%, sensitivity rate as 99% and specificity rate as 97.8%, less error rate as 0.08, accuracy rate as 99.92% and 99.9% of precision, high recall measure as 99.92%, time consumption of the proposed model is 10 s.

农村地区的医院设施有限,人们对疾病感染等缺乏认识。因此,物联网(IoT)技术被设计用于医疗保健行业,以治疗和拯救文盲,使其免受疾病的危害。最近,基于物联网技术的医疗保健系统成为网络和医疗行业的巨大需求。然而,由于云中包含大量不同的病人数据,为云中收集的数据提供保护框架成为一项具有挑战性的任务。为了解决这个问题,目前的研究设计了一种新颖的 Elapid 加密云框架,以保护收集到的数据。此外,安全功能是通过对云存储中收集的信息进行加密来实现的。此外,还开发了一种新颖的广义模糊智能和蚁狮优化模型,用于疾病预测和严重程度计算。因此,使用 MATLAB 实现了所开发的设计,并将其效率与 H-DT、DNN 和 DTNN 等现有方法进行了比较。从比较结果来看,所提出的模型具有最佳和最高的性能,如较高的准确度、精确度、召回率和保密率,以及较低的错误率和处理时间。因此,所开发模型的 AUC 值为 89.8%,灵敏度为 99%,特异度为 97.8%,错误率为 0.08,准确率为 99.92%,精确率为 99.9%,召回率为 99.92%,耗时为 10 秒。
{"title":"An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industry","authors":"Ankit Verma, Gaurav Agarwal, Amit Kumar Gupta, Vipin Kumar, Shweta Singh","doi":"10.1007/s11276-024-03783-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03783-5","url":null,"abstract":"<p>Hospital facilities were limited in rural areas and there is no awareness about disease infection and so on. Hence, the Internet of Things (IoT) technology was designed in the health care industry to treat and save illiterate people from the harmful diseases. Recently, the health care system based on IoT technology became a huge demand in the online and medical industry. However, offering the protection frame for gathered data in cloud becomes a challenging task, because the cloud contains a lot of different patient data. To overcome this issue, the current research has designed a novel Elapid Encryption in cloud frame to secure the gathered data. Moreover, the security function is executed by encrypting the collected information in the cloud storage. Also, a novel generalized fuzzy intelligence and ant lion optimization model was developed for disease prediction and severity calculation. Hence, the developed design is implemented using MATLAB and its efficiency is compared with the existing approaches such as H-DT, DNN, and DTNNN. From the comparison, proposed model has finest and highest performance like high accuracy, precision, recall and confidential rate then lower error rate and processing time. Consequently, AUC value by the developed model is 89.8%, sensitivity rate as 99% and specificity rate as 97.8%, less error rate as 0.08, accuracy rate as 99.92% and 99.9% of precision, high recall measure as 99.92%, time consumption of the proposed model is 10 s.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"2016 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling sustainable green communication in three-tier 5G ultra dense HetNet with sleep cycle modulated energy harvesting 利用睡眠周期调制能量采集,在三层 5G 超密集 HetNet 中实现可持续绿色通信
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-24 DOI: 10.1007/s11276-024-03765-7
Arijeet Ghosh, Iti Saha Misra

The recent upsurge of data-demanding applications has necessitated a paradigm shift in deployment scenario in the direction of Multi-tier Ultra-Dense Heterogeneous networks (UDHN), which involve the dense deployment of more than one tier of small cells under-laying traditional macro cellular networks. However, higher data rates and the dense deployment of Small cell eNodeBs (SeNBs) elicit a possible escalation of network energy consumption which stirs up the mobile operators' operating expenditure. To deal with this, primarily, in this work, we present the Strategic Sleeping Policy of the SeNBs based on M/M/1 queuing theory and investigate its impact in reducing the power consumption of the proposed three-tier UDHN which consists of one tier of Macro eNodeB and two tiers of SeNBs based on performance metrics like Energy Efficiency and Area Energy Consumption Ratio. Further, we also introduce a novel Sleep Cycle Modulated Energy Harvesting Technique for SeNBs to ensure proper utilization of energy resources. An analytical model based on Continuous Time Markov Chain is also developed to evaluate the Energy Utilization of the proposed SCMEH method. The comprehensive performance analysis reveals that the implementation of integrated SCMEH enabled SeNBs under HetNet can not only guarantee QoS requirements under concurrent time-varying urban tele-traffic conditions but also ensure Sustainable Green Communication by radically controlling the estimated power consumption per hour basis throughout a day.

近来,数据需求量激增的应用要求多层超密集异构网络(UDHN)的部署模式发生转变,这涉及在传统的宏蜂窝网络下密集部署一层以上的小蜂窝。然而,更高的数据传输速率和密集部署的小蜂窝 eNodeB(SeNB)可能会导致网络能耗上升,从而增加移动运营商的运营支出。为了解决这个问题,我们在这项工作中主要提出了基于 M/M/1 队列理论的 SeNB 策略性休眠策略,并根据能效和区域能耗比等性能指标,研究了该策略对降低拟议的三层 UDHN(由一层宏 eNodeB 和两层 SeNB 组成)能耗的影响。此外,我们还为 SeNB 引入了一种新型睡眠周期调制能量收集技术,以确保能源资源的合理利用。我们还开发了一个基于连续时间马尔可夫链的分析模型,以评估所提出的 SCMEH 方法的能量利用率。全面的性能分析表明,在 HetNet 下实施支持 SCMEH 的集成 SeNB 不仅能在并发的时变城市电信交通条件下保证 QoS 要求,还能通过从根本上控制全天每小时的估计功耗来确保可持续绿色通信。
{"title":"Enabling sustainable green communication in three-tier 5G ultra dense HetNet with sleep cycle modulated energy harvesting","authors":"Arijeet Ghosh, Iti Saha Misra","doi":"10.1007/s11276-024-03765-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03765-7","url":null,"abstract":"<p>The recent upsurge of data-demanding applications has necessitated a paradigm shift in deployment scenario in the direction of Multi-tier Ultra-Dense Heterogeneous networks (UDHN), which involve the dense deployment of more than one tier of small cells under-laying traditional macro cellular networks. However, higher data rates and the dense deployment of Small cell eNodeBs (SeNBs) elicit a possible escalation of network energy consumption which stirs up the mobile operators' operating expenditure. To deal with this, primarily, in this work, we present the Strategic Sleeping Policy of the SeNBs based on M/M/1 queuing theory and investigate its impact in reducing the power consumption of the proposed three-tier UDHN which consists of one tier of Macro eNodeB and two tiers of SeNBs based on performance metrics like Energy Efficiency and Area Energy Consumption Ratio. Further, we also introduce a novel Sleep Cycle Modulated Energy Harvesting Technique for SeNBs to ensure proper utilization of energy resources. An analytical model based on Continuous Time Markov Chain is also developed to evaluate the Energy Utilization of the proposed SCMEH method. The comprehensive performance analysis reveals that the implementation of integrated SCMEH enabled SeNBs under HetNet can not only guarantee QoS requirements under concurrent time-varying urban tele-traffic conditions but also ensure Sustainable Green Communication by radically controlling the estimated power consumption per hour basis throughout a day.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"47 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1