首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems FLAShadow:用于低端嵌入式系统的基于闪存的影子堆栈
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1145/3670413
Michele Grisafi, M. Ammar, Marco Roveri, Bruno Crispo
Run-time attacks are a rising threat to both low- and high-end systems, with the spread of techniques like Return Oriented Programming (ROP) that aim at hijacking the control flow of vulnerable applications. Although several control flow integrity schemes have been proposed by both academia and the industry, the vast majority of them are not compatible with low-end embedded devices, especially the ones that lack hardware security features. In this paper, we propose FLAShadow , a secure shadow stack design and implementation for low-end embedded systems, relying on zero hardware security features. The key idea is to leverage a software-based memory isolation mechanism to establish an integrity-protected memory area on the Flash of the target device, where FLAShadow can be securely maintained. FLAShadow exclusively reserves a register for maintaining the integrity of the stack pointer and also depends on a minimal trusted run-time component to avoid trusting the compiler toolchain. We evaluate an open-source implementation of FLAShadow for the MSP430 architecture, showing an average performance and memory overhead of 168.58% and 25.91% respectively. While the average performance overhead is considered high, we show that it is application-dependent and incurs less than 5% for some applications.
随着旨在劫持易受攻击应用程序控制流的面向返回编程(ROP)等技术的普及,运行时攻击对低端和高端系统都构成了日益严重的威胁。虽然学术界和工业界都提出了一些控制流完整性方案,但绝大多数方案都与低端嵌入式设备不兼容,尤其是那些缺乏硬件安全功能的设备。 在本文中,我们提出了 FLAShadow,这是一种适用于低端嵌入式系统的安全影子堆栈设计和实现方案,依赖于零硬件安全特性。其主要思想是利用基于软件的内存隔离机制,在目标设备的闪存上建立一个完整性受保护的内存区域,并在该区域内安全地维护 FLAShadow。FLAShadow 专门为维护堆栈指针的完整性保留了一个寄存器,同时还依赖于最小可信运行时组件,以避免对编译器工具链的信任。我们对 MSP430 架构的 FLAShadow 开源实现进行了评估,结果显示平均性能开销和内存开销分别为 168.58% 和 25.91%。虽然平均性能开销被认为很高,但我们发现它与应用有关,在某些应用中开销不到 5%。
{"title":"FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems","authors":"Michele Grisafi, M. Ammar, Marco Roveri, Bruno Crispo","doi":"10.1145/3670413","DOIUrl":"https://doi.org/10.1145/3670413","url":null,"abstract":"Run-time attacks are a rising threat to both low- and high-end systems, with the spread of techniques like Return Oriented Programming (ROP) that aim at hijacking the control flow of vulnerable applications. Although several control flow integrity schemes have been proposed by both academia and the industry, the vast majority of them are not compatible with low-end embedded devices, especially the ones that lack hardware security features.\u0000 \u0000 In this paper, we propose\u0000 FLAShadow\u0000 , a secure shadow stack design and implementation for low-end embedded systems, relying on zero hardware security features. The key idea is to leverage a software-based memory isolation mechanism to establish an integrity-protected memory area on the Flash of the target device, where\u0000 FLAShadow\u0000 can be securely maintained.\u0000 FLAShadow\u0000 exclusively reserves a register for maintaining the integrity of the stack pointer and also depends on a minimal trusted run-time component to avoid trusting the compiler toolchain. We evaluate an open-source implementation of\u0000 FLAShadow\u0000 for the MSP430 architecture, showing an average performance and memory overhead of 168.58% and 25.91% respectively. While the average performance overhead is considered high, we show that it is application-dependent and incurs less than 5% for some applications.\u0000","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141660247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoSense: Deep Learning Augmented Sensing for Coexistence with Networking in Millimeter-Wave Picocells CoSense:深度学习增强传感,实现毫米波微微蜂窝与网络共存
IF 2.7 Pub Date : 2024-06-05 DOI: 10.1145/3670415
Hem Regmi, Sanjib Sur
We present CoSense, a system that enables coexistence of networking and sensing on next-generation millimeter-wave (mmWave) picocells for traffic monitoring and pedestrian safety at intersections in all weather conditions. Although existing wireless signal-based object detection systems are available, they suffer from limited resolution, and their outputs may not provide sufficient discriminatory information in complex scenes, such as traffic intersections. CoSense proposes using 5G picocells, which operate at mmWave frequency bands and provide higher data rates and higher sensing resolution than traditional wireless technology. However, it is difficult to run sensing applications and data transfer simultaneously on mmWave devices due to potential interference, and using special-purpose sensing hardware can prohibit deployment of sensing applications to a large number of existing and future inexpensive mmWave devices. Additionally, mmWave devices are vulnerable to weak reflectivity and specularity challenges which may result in loss of information about objects and pedestrians. To overcome these challenges, CoSense design customized deep learning models that not only can recover missing information about the target scene but also enable coexistence of networking and sensing. We evaluate CoSense on diverse data samples captured at traffic intersections and demonstrate that it can detect and locate pedestrians and vehicles, both qualitatively and quantitatively, without significantly affecting the networking throughput.
我们介绍的 CoSense 是一种在下一代毫米波(mmWave)微微蜂窝上实现联网和传感共存的系统,用于全天候路口交通监控和行人安全。虽然现有的基于无线信号的物体检测系统已经面世,但它们的分辨率有限,其输出可能无法在复杂场景(如交通路口)中提供足够的判别信息。CoSense 建议使用 5G 微微蜂窝,这种微微蜂窝在毫米波频段工作,与传统无线技术相比,数据传输速率更高,传感分辨率也更高。然而,由于潜在的干扰,很难在毫米波设备上同时运行传感应用和数据传输,而且使用特殊用途的传感硬件会阻碍在大量现有和未来的廉价毫米波设备上部署传感应用。此外,毫米波设备容易受到弱反射和镜面反射的影响,可能导致物体和行人信息的丢失。为了克服这些挑战,CoSense 设计了定制的深度学习模型,不仅能恢复丢失的目标场景信息,还能实现联网和传感的共存。我们在交通路口捕获的各种数据样本上对 CoSense 进行了评估,结果表明它可以定性和定量地检测和定位行人和车辆,而且不会对联网吞吐量造成重大影响。
{"title":"CoSense: Deep Learning Augmented Sensing for Coexistence with Networking in Millimeter-Wave Picocells","authors":"Hem Regmi, Sanjib Sur","doi":"10.1145/3670415","DOIUrl":"https://doi.org/10.1145/3670415","url":null,"abstract":"We present CoSense, a system that enables coexistence of networking and sensing on next-generation millimeter-wave (mmWave) picocells for traffic monitoring and pedestrian safety at intersections in all weather conditions. Although existing wireless signal-based object detection systems are available, they suffer from limited resolution, and their outputs may not provide sufficient discriminatory information in complex scenes, such as traffic intersections. CoSense proposes using 5G picocells, which operate at mmWave frequency bands and provide higher data rates and higher sensing resolution than traditional wireless technology. However, it is difficult to run sensing applications and data transfer simultaneously on mmWave devices due to potential interference, and using special-purpose sensing hardware can prohibit deployment of sensing applications to a large number of existing and future inexpensive mmWave devices. Additionally, mmWave devices are vulnerable to weak reflectivity and specularity challenges which may result in loss of information about objects and pedestrians. To overcome these challenges, CoSense design customized deep learning models that not only can recover missing information about the target scene but also enable coexistence of networking and sensing. We evaluate CoSense on diverse data samples captured at traffic intersections and demonstrate that it can detect and locate pedestrians and vehicles, both qualitatively and quantitatively, without significantly affecting the networking throughput.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141385000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms CASPER:面向工业机械臂的情境感知物联网异常检测系统
IF 2.7 Pub Date : 2024-06-01 DOI: 10.1145/3670414
Hakan Kayan, Ryan Heartfield, Omer F. Rana, Pete Burnap, Charith Perera
Industrial cyber-physical systems (ICPS) are widely employed in supervising and controlling critical infrastructures (CIs), with manufacturing systems that incorporate industrial robotic arms being a prominent example. The increasing adoption of ubiquitous computing technologies in these systems has led to benefits such as real-time monitoring, reduced maintenance costs, and high interconnectivity. This adoption has also brought cybersecurity vulnerabilities exploited by adversaries disrupting manufacturing processes via manipulating actuator behaviors. Previous incidents in the industrial cyber domain prove that adversaries launch sophisticated attacks rendering network-based anomaly detection mechanisms insufficient as the ”physics” involved in the process is overlooked. To address this issue, we propose an IoT-based cyber-physical anomaly detection system that can detect motion-based behavioral changes in an industrial robotic arm. We apply both statistical and state-of-the-art machine learning (ML) methods to real-time Inertial Measurement Unit (IMU) data collected from an edge development board attached to an arm doing a pick-and-place operation. To generate anomalies, we modify the joint velocity of the arm. Our goal is to create an air-gapped secondary protection layer to detect ”physical” anomalies without depending on the integrity of network data, thus augmenting overall anomaly detection capability. Our empirical results show that the proposed system, which utilizes 1D-CNNs, can successfully detect motion-based anomalies on a real-world industrial robotic arm. The significance of our work lies in its contribution to developing a comprehensive solution for ICPS security, which goes beyond conventional network-based methods.
工业网络物理系统(ICPS)被广泛应用于关键基础设施(CIs)的监督和控制,其中包含工业机械臂的制造系统就是一个突出的例子。这些系统越来越多地采用泛在计算技术,带来了实时监控、降低维护成本和高度互联性等好处。这种采用也带来了网络安全漏洞,被对手利用,通过操纵执行器行为破坏制造流程。之前在工业网络领域发生的事件证明,对手发起的复杂攻击使基于网络的异常检测机制变得不足,因为过程中涉及的 "物理 "因素被忽视了。为了解决这个问题,我们提出了一种基于物联网的网络物理异常检测系统,它可以检测工业机械臂中基于运动的行为变化。我们将统计方法和最先进的机器学习(ML)方法应用于从连接到进行拾放操作的机械臂的边缘开发板上收集的实时惯性测量单元(IMU)数据。为了产生异常,我们修改了手臂的关节速度。我们的目标是在不依赖网络数据完整性的情况下,创建一个空气屏蔽二级保护层来检测 "物理 "异常,从而增强整体异常检测能力。我们的实证结果表明,利用 1D-CNN 的拟议系统可以成功检测到真实世界中工业机械臂上基于运动的异常。我们工作的意义在于,它为开发 ICPS 安全的全面解决方案做出了贡献,超越了传统的基于网络的方法。
{"title":"CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms","authors":"Hakan Kayan, Ryan Heartfield, Omer F. Rana, Pete Burnap, Charith Perera","doi":"10.1145/3670414","DOIUrl":"https://doi.org/10.1145/3670414","url":null,"abstract":"Industrial cyber-physical systems (ICPS) are widely employed in supervising and controlling critical infrastructures (CIs), with manufacturing systems that incorporate industrial robotic arms being a prominent example. The increasing adoption of ubiquitous computing technologies in these systems has led to benefits such as real-time monitoring, reduced maintenance costs, and high interconnectivity. This adoption has also brought cybersecurity vulnerabilities exploited by adversaries disrupting manufacturing processes via manipulating actuator behaviors. Previous incidents in the industrial cyber domain prove that adversaries launch sophisticated attacks rendering network-based anomaly detection mechanisms insufficient as the ”physics” involved in the process is overlooked. To address this issue, we propose an IoT-based cyber-physical anomaly detection system that can detect motion-based behavioral changes in an industrial robotic arm. We apply both statistical and state-of-the-art machine learning (ML) methods to real-time Inertial Measurement Unit (IMU) data collected from an edge development board attached to an arm doing a pick-and-place operation. To generate anomalies, we modify the joint velocity of the arm. Our goal is to create an air-gapped secondary protection layer to detect ”physical” anomalies without depending on the integrity of network data, thus augmenting overall anomaly detection capability. Our empirical results show that the proposed system, which utilizes 1D-CNNs, can successfully detect motion-based anomalies on a real-world industrial robotic arm. The significance of our work lies in its contribution to developing a comprehensive solution for ICPS security, which goes beyond conventional network-based methods.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Video Caching in the Edge Network using Deep Reinforcement Learning 利用深度强化学习实现边缘网络中的协作视频缓存
IF 2.7 Pub Date : 2024-05-11 DOI: 10.1145/3664613
Anirban Lekharu, Pranav Gupta, Arijit Sur, Moumita Patra
With the enormous growth in mobile data traffic over the 5G environment, Adaptive BitRate (ABR) video streaming has become a challenging problem. Recent advances in Mobile Edge Computing (MEC) technology make it feasible to use Base Stations (BSs) intelligently by network caching, popularity-based video streaming, etc. Additional computing resources on the edge node offer an opportunity to reduce network traffic on the backhaul links during peak traffic hours. More recently, it has been found in the literature that collaborative caching strategies between neighbouring BSs (i.e., MEC servers) make it more efficient to reduce backhaul traffic and network congestion and thus improve the viewer experience substantially. In this work, we propose a Reinforcement Learning (RL) based collaborative caching mechanism where the edge servers cooperate to serve the requested content from the end-users. Specifically, this research aims to improve the overall cache hit rate at the MEC, where the edge servers are clustered based on their geographic locations. The said task is modelled as a multi-objective optimization problem and solved using an RL framework. In addition, a novel cache admission and eviction policy is defined by calculating the priority score of video segments in the clustered MEC mesh network.
随着 5G 环境下移动数据流量的巨大增长,自适应比特率(ABR)视频流已成为一个具有挑战性的问题。移动边缘计算(MEC)技术的最新进展使得通过网络缓存、基于流行度的视频流等方式智能地使用基站(BS)成为可能。边缘节点上的额外计算资源为减少高峰时段回程链路上的网络流量提供了机会。最近,有文献发现,相邻 BS(即 MEC 服务器)之间的协作缓存策略能更有效地减少回程流量和网络拥塞,从而大大改善观众的观看体验。在这项工作中,我们提出了一种基于强化学习(RL)的协作缓存机制,在这种机制下,边缘服务器会合作为终端用户请求的内容提供服务。具体来说,这项研究旨在提高 MEC 的整体缓存命中率,其中边缘服务器根据其地理位置进行集群。上述任务被模拟为一个多目标优化问题,并使用 RL 框架加以解决。此外,还通过计算集群 MEC 网状网络中视频片段的优先级得分,定义了一种新颖的缓存接纳和驱逐策略。
{"title":"Collaborative Video Caching in the Edge Network using Deep Reinforcement Learning","authors":"Anirban Lekharu, Pranav Gupta, Arijit Sur, Moumita Patra","doi":"10.1145/3664613","DOIUrl":"https://doi.org/10.1145/3664613","url":null,"abstract":"With the enormous growth in mobile data traffic over the 5G environment, Adaptive BitRate (ABR) video streaming has become a challenging problem. Recent advances in Mobile Edge Computing (MEC) technology make it feasible to use Base Stations (BSs) intelligently by network caching, popularity-based video streaming, etc. Additional computing resources on the edge node offer an opportunity to reduce network traffic on the backhaul links during peak traffic hours. More recently, it has been found in the literature that collaborative caching strategies between neighbouring BSs (i.e., MEC servers) make it more efficient to reduce backhaul traffic and network congestion and thus improve the viewer experience substantially. In this work, we propose a Reinforcement Learning (RL) based collaborative caching mechanism where the edge servers cooperate to serve the requested content from the end-users. Specifically, this research aims to improve the overall cache hit rate at the MEC, where the edge servers are clustered based on their geographic locations. The said task is modelled as a multi-objective optimization problem and solved using an RL framework. In addition, a novel cache admission and eviction policy is defined by calculating the priority score of video segments in the clustered MEC mesh network.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140989895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks ARIoTEDef:基于自我进化、对抗多步骤攻击的逆向鲁棒物联网早期防御系统
IF 2.7 Pub Date : 2024-04-20 DOI: 10.1145/3660646
Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino
IoT cyber threats, exemplified by jackware and crypto mining, underscore the vulnerability of IoT devices. Due to the multi-step nature of many attacks, early detection is vital for a swift response and preventing malware propagation. However, accurately detecting early-stage attacks is challenging, as attackers employ stealthy, zero-day, or adversarial machine learning to evade detection. To enhance security, we propose ARIoTEDef, an A dversarially R obust IoT E arly Def ense system, which identifies early-stage infections and evolves autonomously. It models multi-stage attacks based on a cyber kill chain and maintains stage-specific detectors. When anomalies in the later action stage emerge, the system retroactively analyzes event logs using an attention-based Seq2Seq model to identify early infections. Then, the infection detector is updated with information about the identified infections. We have evaluated ARIoTEDef against multi-stage attacks, such as the Mirai botnet. Results show that the infection detector’s average F1 score increases from 0.31 to 0.87 after one evolution round. We have also conducted an extensive analysis of ARIoTEDef against adversarial evasion attacks. Our results show that ARIoTEDef is robust and benefits from multiple rounds of evolution.
以 Jackware 和加密货币挖掘为代表的物联网网络威胁凸显了物联网设备的脆弱性。由于许多攻击具有多步骤性,因此早期检测对于快速响应和防止恶意软件传播至关重要。然而,准确检测早期攻击具有挑战性,因为攻击者会利用隐蔽、零时差或对抗性机器学习来逃避检测。为了提高安全性,我们提出了一个可识别早期感染并自主进化的ARIoTEDef--一种可逆的、可靠的物联网早期防御系统。它基于网络杀伤链建立多阶段攻击模型,并维护特定阶段的探测器。当后期行动阶段出现异常时,系统会使用基于注意力的 Seq2Seq 模型追溯分析事件日志,以识别早期感染。然后,用已识别感染的信息更新感染检测器。我们针对多阶段攻击(如 Mirai 僵尸网络)对 ARIoTEDef 进行了评估。结果显示,经过一轮进化后,感染检测器的平均 F1 分数从 0.31 提高到了 0.87。我们还对 ARIoTEDef 针对对抗性规避攻击进行了广泛分析。结果表明,ARIoTEDef 具有很强的鲁棒性,可以从多轮进化中获益。
{"title":"ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks","authors":"Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino","doi":"10.1145/3660646","DOIUrl":"https://doi.org/10.1145/3660646","url":null,"abstract":"\u0000 IoT cyber threats, exemplified by jackware and crypto mining, underscore the vulnerability of IoT devices. Due to the multi-step nature of many attacks, early detection is vital for a swift response and preventing malware propagation. However, accurately detecting early-stage attacks is challenging, as attackers employ stealthy, zero-day, or adversarial machine learning to evade detection. To enhance security, we propose ARIoTEDef, an\u0000 A\u0000 dversarially\u0000 R\u0000 obust\u0000 IoT\u0000 E\u0000 arly\u0000 Def\u0000 ense system, which identifies early-stage infections and evolves autonomously. It models multi-stage attacks based on a cyber kill chain and maintains stage-specific detectors. When anomalies in the later action stage emerge, the system retroactively analyzes event logs using an attention-based Seq2Seq model to identify early infections. Then, the infection detector is updated with information about the identified infections. We have evaluated ARIoTEDef against multi-stage attacks, such as the Mirai botnet. Results show that the infection detector’s average F1 score increases from 0.31 to 0.87 after one evolution round. We have also conducted an extensive analysis of ARIoTEDef against adversarial evasion attacks. Our results show that ARIoTEDef is robust and benefits from multiple rounds of evolution.\u0000","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140679634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Getting it just right: towards balanced utility, privacy, and equity in shared space sensing 恰到好处:在共享空间感知中兼顾实用性、私密性和公平性
IF 2.7 Pub Date : 2024-02-29 DOI: 10.1145/3648479
Andrew Xu, Jacob Biehl, Adam Lee
Low-cost sensors have enabled a wide array of data-driven applications and insights. As a result, encountering spaces with pervasive sensing has become all but unavoidable. This creates a fundamental tension: the success of smart environments will become increasingly dependent on equity of access to data-driven insights and consideration of the privacy expectations of sensed individuals. These concerns highlight the need to bring equity to all stakeholders of smart environments, which in turn would preserve public trust in these smart spaces. In this work, we explored several approaches to identity-obscuring visual representations through a progressive series of experiments. We designed and validated a series of visual representations through stakeholder interactions and tested the ability of these visual representations to limit identification via a crowdsourced study. An evaluation across three months of data gathered within our organization also showed that the identity-obscured data could still be leveraged to accurately count group size. Our contributions lay the groundwork for sensing frameworks that bring utility to all stakeholders of shared spaces while being cognizant of their diverse privacy expectations.
低成本传感器带来了大量数据驱动型应用和洞察力。因此,在空间中使用无处不在的传感器已变得几乎不可避免。这就产生了一个根本性的矛盾:智能环境的成功将越来越取决于能否公平地获取数据驱动的洞察力,以及是否考虑到被感知者的隐私期望。这些问题凸显了为智能环境的所有利益相关者带来公平的必要性,这反过来又会维护公众对这些智能空间的信任。在这项工作中,我们通过一系列循序渐进的实验,探索了几种模糊身份视觉呈现的方法。我们通过利益相关者的互动设计并验证了一系列视觉表征,并通过众包研究测试了这些视觉表征限制身份识别的能力。对我们组织内部收集的三个月数据进行的评估也表明,身份遮蔽数据仍可用于准确计算群体规模。我们的贡献为传感框架奠定了基础,该框架既能为共享空间的所有利益相关者带来实用性,又能考虑到他们对隐私的不同期望。
{"title":"Getting it just right: towards balanced utility, privacy, and equity in shared space sensing","authors":"Andrew Xu, Jacob Biehl, Adam Lee","doi":"10.1145/3648479","DOIUrl":"https://doi.org/10.1145/3648479","url":null,"abstract":"Low-cost sensors have enabled a wide array of data-driven applications and insights. As a result, encountering spaces with pervasive sensing has become all but unavoidable. This creates a fundamental tension: the success of smart environments will become increasingly dependent on equity of access to data-driven insights and consideration of the privacy expectations of sensed individuals. These concerns highlight the need to bring equity to all stakeholders of smart environments, which in turn would preserve public trust in these smart spaces. In this work, we explored several approaches to identity-obscuring visual representations through a progressive series of experiments. We designed and validated a series of visual representations through stakeholder interactions and tested the ability of these visual representations to limit identification via a crowdsourced study. An evaluation across three months of data gathered within our organization also showed that the identity-obscured data could still be leveraged to accurately count group size. Our contributions lay the groundwork for sensing frameworks that bring utility to all stakeholders of shared spaces while being cognizant of their diverse privacy expectations.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140409482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning Based Approaches to Adaptive Context Caching in Distributed Context Management Systems 基于强化学习的分布式情境管理系统自适应情境缓存方法
IF 2.7 Pub Date : 2024-02-16 DOI: 10.1145/3648571
Shakthi Weerasinghe, A. Zaslavsky, S. W. Loke, A. Medvedev, A. Abken, Alireza Hassani, Guang-Li Huang
Real-time applications increasingly rely on context information to provide relevant and dependable features. Context queries require large-scale retrieval, inferencing, aggregation, and delivery of context using only limited computing resources, especially in a distributed environment. If this is slow, inconsistent, and too expensive to access context information, the dependability and relevancy of real-time applications may fail to exist. This paper argues, transiency of context (i.e., the limited validity period), variations in the features of context query loads (e.g., the request rate, different Quality of Service (QoS), and Quality of Context (QoC) requirements), and lack of prior knowledge about context to make near real-time adaptations as fundamental challenges that need to be addressed to overcome these shortcomings. Hence, we propose a performance metric driven reinforcement learning based adaptive context caching approach aiming to maximize both cost- and performance-efficiency for middleware-based Context Management Systems (CMSs). Although context-aware caching has been thoroughly investigated in the literature, our approach is novel because existing techniques are not fully applicable to caching context due to (i) the underlying fundamental challenges and (ii) not addressing the limitations hindering dependability and consistency of context. Unlike previously tested modes of CMS operations and traditional data caching techniques, our approach can provide real-time pervasive applications with lower cost, faster, and fresher high quality context information. Compared to existing context-aware data caching algorithms, our technique is bespoken for caching context information, which is different from traditional data. We also show that our full-cycle context lifecycle-based approach can maximize both cost- and performance-efficiency while maintaining adequate QoC solely based on real-time performance metrics and our heuristic techniques without depending on any previous knowledge about the context, variations in query features, or quality demands, unlike any previous work. We demonstrate using a real world inspired scenario and a prototype middleware based CMS integrated with our adaptive context caching approach that we have implemented, how realtime applications that are 85% faster can be more relevant and dependable to users, while costing 60.22% less than using existing techniques to access context information. Our model is also at least twice as fast and more flexible to adapt compared to existing benchmarks even under uncertainty and lack of prior knowledge about context, transiency, and variable context query loads.
实时应用越来越依赖上下文信息来提供相关和可靠的功能。上下文查询需要利用有限的计算资源进行大规模的检索、推理、聚合和上下文交付,尤其是在分布式环境中。如果获取上下文信息的过程缓慢、不一致且成本过高,那么实时应用的可靠性和相关性就可能不复存在。本文认为,上下文的瞬时性(即有限的有效期)、上下文查询负载特征的变化(如请求率、不同的服务质量(QoS)和上下文质量(QoC)要求),以及缺乏对上下文的事先了解以进行近乎实时的调整,是克服这些缺点需要应对的基本挑战。因此,我们提出了一种基于性能指标驱动的强化学习自适应上下文缓存方法,旨在最大限度地提高基于中间件的上下文管理系统(CMS)的成本和性能效率。虽然文献中已经对上下文感知缓存进行了深入研究,但我们的方法是新颖的,因为现有技术并不完全适用于缓存上下文,原因在于:(i) 基本挑战;(ii) 没有解决阻碍上下文可靠性和一致性的限制因素。与之前测试过的 CMS 操作模式和传统数据缓存技术不同,我们的方法可以为实时普适应用提供更低成本、更快速度和更新鲜的高质量上下文信息。与现有的上下文感知数据缓存算法相比,我们的技术更适合缓存不同于传统数据的上下文信息。我们还表明,我们基于全周期上下文生命周期的方法可以最大限度地提高成本和性能效率,同时仅根据实时性能指标和我们的启发式技术就能保持足够的质量保证,而无需依赖任何有关上下文、查询特征变化或质量要求的先前知识,这与之前的任何工作都不同。我们使用一个真实世界的灵感场景和一个基于中间件的 CMS 原型,并集成了我们实施的自适应上下文缓存方法,展示了如何使实时应用的速度提高 85%,从而提高用户的相关性和可靠性,同时比使用现有技术获取上下文信息的成本低 60.22%。与现有基准相比,即使在不确定和缺乏有关上下文、瞬时性和可变上下文查询负载的先验知识的情况下,我们的模型也至少快两倍,而且适应性更灵活。
{"title":"Reinforcement Learning Based Approaches to Adaptive Context Caching in Distributed Context Management Systems","authors":"Shakthi Weerasinghe, A. Zaslavsky, S. W. Loke, A. Medvedev, A. Abken, Alireza Hassani, Guang-Li Huang","doi":"10.1145/3648571","DOIUrl":"https://doi.org/10.1145/3648571","url":null,"abstract":"Real-time applications increasingly rely on context information to provide relevant and dependable features. Context queries require large-scale retrieval, inferencing, aggregation, and delivery of context using only limited computing resources, especially in a distributed environment. If this is slow, inconsistent, and too expensive to access context information, the dependability and relevancy of real-time applications may fail to exist. This paper argues, transiency of context (i.e., the limited validity period), variations in the features of context query loads (e.g., the request rate, different Quality of Service (QoS), and Quality of Context (QoC) requirements), and lack of prior knowledge about context to make near real-time adaptations as fundamental challenges that need to be addressed to overcome these shortcomings. Hence, we propose a performance metric driven reinforcement learning based adaptive context caching approach aiming to maximize both cost- and performance-efficiency for middleware-based Context Management Systems (CMSs). Although context-aware caching has been thoroughly investigated in the literature, our approach is novel because existing techniques are not fully applicable to caching context due to (i) the underlying fundamental challenges and (ii) not addressing the limitations hindering dependability and consistency of context. Unlike previously tested modes of CMS operations and traditional data caching techniques, our approach can provide real-time pervasive applications with lower cost, faster, and fresher high quality context information. Compared to existing context-aware data caching algorithms, our technique is bespoken for caching context information, which is different from traditional data. We also show that our full-cycle context lifecycle-based approach can maximize both cost- and performance-efficiency while maintaining adequate QoC solely based on real-time performance metrics and our heuristic techniques without depending on any previous knowledge about the context, variations in query features, or quality demands, unlike any previous work. We demonstrate using a real world inspired scenario and a prototype middleware based CMS integrated with our adaptive context caching approach that we have implemented, how realtime applications that are 85% faster can be more relevant and dependable to users, while costing 60.22% less than using existing techniques to access context information. Our model is also at least twice as fast and more flexible to adapt compared to existing benchmarks even under uncertainty and lack of prior knowledge about context, transiency, and variable context query loads.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140454663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Privacy-Aware IoT Applications for Unregulated Domains 为不受监管的领域设计注重隐私的物联网应用
IF 2.7 Pub Date : 2024-02-15 DOI: 10.1145/3648480
Nada Alhirabi, Stephanie Beaumont, Omer F. Rana, Charith Perera
Internet of Things (IoT) applications (apps) are challenging to design because of the heterogeneous systems on which they are deployed. IoT devices and apps may collect and analyse sensitive personal data, which is often protected by data privacy laws, some within highly regulated domains such as healthcare. Privacy-by-design (PbD) schemes can be used by developers to consider data privacy at the design stage. However, software developers are not widely adopting these approaches due to difficulties in understanding and interpreting them. There are currently a limited number of tools available for developers to use in this context. We believe that a successful privacy-by-design tool should be able to (i) assist developers in addressing privacy requirements in less regulated domains, as well as (ii) help them learn about privacy as they use the tool. The findings of two controlled lab studies are presented, involving 42 developers. We discuss how such a PbD tool can help novice IoT developers comply with privacy laws (such as GDPR) and follow privacy guidelines (such as privacy patterns). Based on our findings, such tools can help raise awareness of data privacy requirements at design. This increases the likelihood that subsequent designs will be more aware of data privacy requirements.
物联网(IoT)应用程序(Apps)的设计具有挑战性,因为它们部署在异构系统上。物联网设备和应用程序可能会收集和分析敏感的个人数据,这些数据通常受到数据隐私法的保护,有些数据还受到医疗保健等高度监管领域的保护。开发人员可采用 "隐私设计"(PbD)方案,在设计阶段就考虑数据隐私问题。然而,由于难以理解和解释这些方法,软件开发人员并未广泛采用这些方法。目前,可供开发人员在这种情况下使用的工具数量有限。我们认为,一个成功的隐私设计工具应该能够(i)帮助开发人员解决监管较少领域的隐私要求,以及(ii)帮助他们在使用工具的过程中学习隐私知识。本文介绍了两项实验室对照研究的结果,涉及 42 名开发人员。我们讨论了此类 PbD 工具如何帮助物联网新手开发人员遵守隐私法律(如 GDPR)并遵循隐私准则(如隐私模式)。根据我们的研究结果,此类工具有助于在设计时提高对数据隐私要求的认识。这就增加了后续设计更加了解数据隐私要求的可能性。
{"title":"Designing Privacy-Aware IoT Applications for Unregulated Domains","authors":"Nada Alhirabi, Stephanie Beaumont, Omer F. Rana, Charith Perera","doi":"10.1145/3648480","DOIUrl":"https://doi.org/10.1145/3648480","url":null,"abstract":"Internet of Things (IoT) applications (apps) are challenging to design because of the heterogeneous systems on which they are deployed. IoT devices and apps may collect and analyse sensitive personal data, which is often protected by data privacy laws, some within highly regulated domains such as healthcare. Privacy-by-design (PbD) schemes can be used by developers to consider data privacy at the design stage. However, software developers are not widely adopting these approaches due to difficulties in understanding and interpreting them. There are currently a limited number of tools available for developers to use in this context. We believe that a successful privacy-by-design tool should be able to (i) assist developers in addressing privacy requirements in less regulated domains, as well as (ii) help them learn about privacy as they use the tool. The findings of two controlled lab studies are presented, involving 42 developers. We discuss how such a PbD tool can help novice IoT developers comply with privacy laws (such as GDPR) and follow privacy guidelines (such as privacy patterns). Based on our findings, such tools can help raise awareness of data privacy requirements at design. This increases the likelihood that subsequent designs will be more aware of data privacy requirements.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139834365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Privacy-Aware IoT Applications for Unregulated Domains 为不受监管的领域设计注重隐私的物联网应用
IF 2.7 Pub Date : 2024-02-15 DOI: 10.1145/3648480
Nada Alhirabi, Stephanie Beaumont, Omer F. Rana, Charith Perera
Internet of Things (IoT) applications (apps) are challenging to design because of the heterogeneous systems on which they are deployed. IoT devices and apps may collect and analyse sensitive personal data, which is often protected by data privacy laws, some within highly regulated domains such as healthcare. Privacy-by-design (PbD) schemes can be used by developers to consider data privacy at the design stage. However, software developers are not widely adopting these approaches due to difficulties in understanding and interpreting them. There are currently a limited number of tools available for developers to use in this context. We believe that a successful privacy-by-design tool should be able to (i) assist developers in addressing privacy requirements in less regulated domains, as well as (ii) help them learn about privacy as they use the tool. The findings of two controlled lab studies are presented, involving 42 developers. We discuss how such a PbD tool can help novice IoT developers comply with privacy laws (such as GDPR) and follow privacy guidelines (such as privacy patterns). Based on our findings, such tools can help raise awareness of data privacy requirements at design. This increases the likelihood that subsequent designs will be more aware of data privacy requirements.
物联网(IoT)应用程序(Apps)的设计具有挑战性,因为它们部署在异构系统上。物联网设备和应用程序可能会收集和分析敏感的个人数据,这些数据通常受到数据隐私法的保护,有些数据还受到医疗保健等高度监管领域的保护。开发人员可采用 "隐私设计"(PbD)方案,在设计阶段就考虑数据隐私问题。然而,由于难以理解和解释这些方法,软件开发人员并未广泛采用这些方法。目前,可供开发人员在这种情况下使用的工具数量有限。我们认为,一个成功的隐私设计工具应该能够(i)帮助开发人员解决监管较少领域的隐私要求,以及(ii)帮助他们在使用工具的过程中学习隐私知识。本文介绍了两项实验室对照研究的结果,涉及 42 名开发人员。我们讨论了此类 PbD 工具如何帮助物联网新手开发人员遵守隐私法律(如 GDPR)并遵循隐私准则(如隐私模式)。根据我们的研究结果,此类工具有助于在设计时提高对数据隐私要求的认识。这就增加了后续设计更加了解数据隐私要求的可能性。
{"title":"Designing Privacy-Aware IoT Applications for Unregulated Domains","authors":"Nada Alhirabi, Stephanie Beaumont, Omer F. Rana, Charith Perera","doi":"10.1145/3648480","DOIUrl":"https://doi.org/10.1145/3648480","url":null,"abstract":"Internet of Things (IoT) applications (apps) are challenging to design because of the heterogeneous systems on which they are deployed. IoT devices and apps may collect and analyse sensitive personal data, which is often protected by data privacy laws, some within highly regulated domains such as healthcare. Privacy-by-design (PbD) schemes can be used by developers to consider data privacy at the design stage. However, software developers are not widely adopting these approaches due to difficulties in understanding and interpreting them. There are currently a limited number of tools available for developers to use in this context. We believe that a successful privacy-by-design tool should be able to (i) assist developers in addressing privacy requirements in less regulated domains, as well as (ii) help them learn about privacy as they use the tool. The findings of two controlled lab studies are presented, involving 42 developers. We discuss how such a PbD tool can help novice IoT developers comply with privacy laws (such as GDPR) and follow privacy guidelines (such as privacy patterns). Based on our findings, such tools can help raise awareness of data privacy requirements at design. This increases the likelihood that subsequent designs will be more aware of data privacy requirements.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139774664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TONARI: Reactive Detection of Close Physical Contact using Unlicensed LPWAN Signals TONARI:利用未授权的 LPWAN 信号对近距离物理接触进行反应式检测
IF 2.7 Pub Date : 2024-02-15 DOI: 10.1145/3648572
Chenglong Shao, Osamu Muta
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-of-Things services such as vehicle proximity alert and radiation exposure reduction. This is achieved traditionally through tailor-made proximity sensors that proactively transmit wireless signals and analyze the reflection from an object. Despite its feasibility, the past few years have witnessed the prosperity of reactive CPC detection techniques that do not need spontaneous signal transmission and merely exploit received wireless signals from a target. Unlike existing approaches entailing additional effort of multiple antennas, dedicated signal emitters, human intervention, or a back-end server, this paper presents TONARI, an effortless CPC detection framework that performs in a reactive manner. TONARI is developed for the first time with LoRa, the representative of unlicensed low-power wide area network (LPWAN) technologies, as the wireless signal for CPC detection. At the heart of TONARI lies a novel feature arbitrator that decides whether two devices are in CPC or not by distinguishing different types of LoRa chirp-based additive sample magnitude sequences. Software-defined radio-based experiments are conducted to show that the achievable CPC detection accuracy via TONARI can reach 100% in most practical cases.
识别两个物体是否有密切的物理接触(CPC)是各种物联网服务的基础,如车辆接近警报和减少辐射照射。传统上,这是通过量身定制的接近传感器来实现的,这些传感器会主动发射无线信号并分析来自物体的反射。尽管这种方法可行,但在过去几年中,无需自发信号传输、只需利用从目标接收到的无线信号的被动式 CPC 检测技术得到了蓬勃发展。与需要额外使用多天线、专用信号发射器、人工干预或后端服务器的现有方法不同,本文介绍的 TONARI 是一种以被动方式执行的轻松 CPC 检测框架。TONARI 首次使用 LoRa(未授权低功耗广域网 (LPWAN) 技术的代表)作为 CPC 检测的无线信号进行开发。TONARI 的核心是一个新颖的特征仲裁器,它通过区分不同类型的基于 LoRa 的啁啾加法采样幅度序列来决定两个设备是否处于 CPC 中。基于软件定义无线电的实验表明,在大多数实际情况下,通过 TONARI 实现的 CPC 检测准确率可达 100%。
{"title":"TONARI: Reactive Detection of Close Physical Contact using Unlicensed LPWAN Signals","authors":"Chenglong Shao, Osamu Muta","doi":"10.1145/3648572","DOIUrl":"https://doi.org/10.1145/3648572","url":null,"abstract":"Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-of-Things services such as vehicle proximity alert and radiation exposure reduction. This is achieved traditionally through tailor-made proximity sensors that proactively transmit wireless signals and analyze the reflection from an object. Despite its feasibility, the past few years have witnessed the prosperity of reactive CPC detection techniques that do not need spontaneous signal transmission and merely exploit received wireless signals from a target. Unlike existing approaches entailing additional effort of multiple antennas, dedicated signal emitters, human intervention, or a back-end server, this paper presents TONARI, an effortless CPC detection framework that performs in a reactive manner. TONARI is developed for the first time with LoRa, the representative of unlicensed low-power wide area network (LPWAN) technologies, as the wireless signal for CPC detection. At the heart of TONARI lies a novel feature arbitrator that decides whether two devices are in CPC or not by distinguishing different types of LoRa chirp-based additive sample magnitude sequences. Software-defined radio-based experiments are conducted to show that the achievable CPC detection accuracy via TONARI can reach 100% in most practical cases.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139776404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1