首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services SCVS:关于人工智能和边缘云支持隐私保护的智慧城市视频监控服务
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-06 DOI: 10.1145/3542953
Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, N. Vadnere, Dijiang Huang
Video surveillance systems are increasingly becoming common in many private and public campuses, city buildings, and facilities. They provide many useful smart campus/city monitoring and management services based on data captured from video sensors. However, the video surveillance services may also breach personally identifiable information, especially human face images being monitored; therefore, it may potentially violate the privacy of human subjects involved. To address this privacy issue, we introduced a large-scale distributed video surveillance service model, called Smart-city Video Surveillance (SCVS). SCVS is a video surveillance data collection and processing platform to identify important events, monitor, protect, and make decisions for smart campus/city applications. In this article, the specific research focus is on how to identify and anonymize human faces in a distributed edge cloud computing infrastructure. To preserve the privacy of data during video anonymization, SCVS utilizes a two-step approach: (i) parameter server-based distributed machine learning solution, which ensures that edge nodes can exchange parameters for machine learning-based training. Since the dataset is not located on a centralized location, the data privacy and ownership are protected and preserved. (ii) To improve the machine learning model’s accuracy, we presented an asynchronous training approach to protect data and model privacy for both data owners and data users, respectively. SCVS adopts an in-memory encryption approach, where edge computing nodes collect and process data in the memory of edge nodes in encrypted form. This approach can effectively prevent honest but curious attacks. The performance evaluation shows the presented privacy protection platform is efficient and effective compared to traditional centralized computing models as presented in Section 5.
视频监控系统在许多私立和公立校园、城市建筑和设施中越来越普遍。它们基于从视频传感器捕获的数据提供许多有用的智能校园/城市监控和管理服务。然而,视频监控服务也可能会泄露个人身份信息,特别是被监控的人脸图像;因此,它可能会潜在地侵犯所涉及的人类受试者的隐私。为了解决这一隐私问题,我们引入了一种大规模分布式视频监控服务模型,称为智能城市视频监控(SCVS)。SCVS是一个视频监控数据收集和处理平台,用于识别重要事件,监控,保护和制定智能校园/城市应用决策。在本文中,具体的研究重点是如何在分布式边缘云计算基础设施中识别和匿名化人脸。为了在视频匿名化过程中保护数据的隐私,SCVS采用两步方法:(i)基于参数服务器的分布式机器学习解决方案,确保边缘节点可以交换参数进行基于机器学习的训练。由于数据集不位于集中位置,因此数据隐私和所有权得到了保护和保留。(ii)为了提高机器学习模型的准确性,我们提出了一种异步训练方法,分别为数据所有者和数据用户保护数据和模型隐私。SCVS采用内存加密方式,边缘计算节点以加密形式收集和处理边缘节点内存中的数据。这种方法可以有效地防止诚实但好奇的攻击。性能评估表明,与第5节中介绍的传统集中式计算模型相比,所提出的隐私保护平台是高效有效的。
{"title":"SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services","authors":"Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, N. Vadnere, Dijiang Huang","doi":"10.1145/3542953","DOIUrl":"https://doi.org/10.1145/3542953","url":null,"abstract":"Video surveillance systems are increasingly becoming common in many private and public campuses, city buildings, and facilities. They provide many useful smart campus/city monitoring and management services based on data captured from video sensors. However, the video surveillance services may also breach personally identifiable information, especially human face images being monitored; therefore, it may potentially violate the privacy of human subjects involved. To address this privacy issue, we introduced a large-scale distributed video surveillance service model, called Smart-city Video Surveillance (SCVS). SCVS is a video surveillance data collection and processing platform to identify important events, monitor, protect, and make decisions for smart campus/city applications. In this article, the specific research focus is on how to identify and anonymize human faces in a distributed edge cloud computing infrastructure. To preserve the privacy of data during video anonymization, SCVS utilizes a two-step approach: (i) parameter server-based distributed machine learning solution, which ensures that edge nodes can exchange parameters for machine learning-based training. Since the dataset is not located on a centralized location, the data privacy and ownership are protected and preserved. (ii) To improve the machine learning model’s accuracy, we presented an asynchronous training approach to protect data and model privacy for both data owners and data users, respectively. SCVS adopts an in-memory encryption approach, where edge computing nodes collect and process data in the memory of edge nodes in encrypted form. This approach can effectively prevent honest but curious attacks. The performance evaluation shows the presented privacy protection platform is efficient and effective compared to traditional centralized computing models as presented in Section 5.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"28 1","pages":"1 - 26"},"PeriodicalIF":2.7,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80197136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Green Planning of IoT Home Automation Workflows in Smart Buildings 智能建筑中物联网家庭自动化工作流的绿色规划
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-26 DOI: 10.1145/3549549
Soteris Constantinou, Andreas Konstantinidis, Panos K. Chrysanthis, D. Zeinalipour-Yazti
The advancement of renewable energy infrastructure in smart buildings (e.g., photovoltaic) has highlighted the importance of energy self-consumption by energy-demanding IoT-enabled devices (e.g., heating/cooling, electromobility, and appliances), which refers to the process of intelligently consuming energy at the time it is available. This stabilizes the energy grid, minimizes energy dissipation on power lines but more importantly is good for the environment as energy from fossil sources with a high CO2 footprint is minimized. On the other hand, user comfort levels expressed in the form of Rule Automation Workflows (RAW), are usually not aligned with renewable production patterns. In this work, we propose an innovative framework, coined IoT Meta-Control Firewall (IMCF+), which aims to bridge this gap and balance the trade-off between comfort, energy consumption, and CO2 emissions. The IMCF+ framework incorporates an innovative Green Planner (GP) algorithm, which is an AI-inspired algorithm that schedules energy consumption with a variety of amortization strategies. We have implemented IMCF+ and GP as part of a complete IoT ecosystem in openHAB and our extensive evaluation shows that we achieve a CO2 reduction of 45–59% to satisfy the comfort of a variety of user groups with only a moderate ≈ 3% in reducing their comfort levels.
智能建筑中可再生能源基础设施(例如光伏)的进步突出了能源需求高的物联网设备(例如加热/冷却,电动汽车和电器)的能源自我消耗的重要性,这是指在可用时智能消耗能源的过程。这稳定了能源网,最大限度地减少了电力线上的能量耗散,但更重要的是对环境有益,因为来自二氧化碳排放量高的化石能源的能源被最小化了。另一方面,以规则自动化工作流(RAW)形式表示的用户舒适度通常与可再生生产模式不一致。在这项工作中,我们提出了一个创新的框架,即物联网元控制防火墙(IMCF+),旨在弥合这一差距,平衡舒适度、能耗和二氧化碳排放之间的权衡。IMCF+框架采用了一种创新的绿色规划师(GP)算法,这是一种受人工智能启发的算法,可以通过各种摊销策略来安排能源消耗。我们已经在openHAB中实现了IMCF+和GP作为完整物联网生态系统的一部分,我们的广泛评估表明,我们实现了45-59%的二氧化碳减排,以满足各种用户群体的舒适度,仅降低了约3%的舒适度。
{"title":"Green Planning of IoT Home Automation Workflows in Smart Buildings","authors":"Soteris Constantinou, Andreas Konstantinidis, Panos K. Chrysanthis, D. Zeinalipour-Yazti","doi":"10.1145/3549549","DOIUrl":"https://doi.org/10.1145/3549549","url":null,"abstract":"The advancement of renewable energy infrastructure in smart buildings (e.g., photovoltaic) has highlighted the importance of energy self-consumption by energy-demanding IoT-enabled devices (e.g., heating/cooling, electromobility, and appliances), which refers to the process of intelligently consuming energy at the time it is available. This stabilizes the energy grid, minimizes energy dissipation on power lines but more importantly is good for the environment as energy from fossil sources with a high CO2 footprint is minimized. On the other hand, user comfort levels expressed in the form of Rule Automation Workflows (RAW), are usually not aligned with renewable production patterns. In this work, we propose an innovative framework, coined IoT Meta-Control Firewall (IMCF+), which aims to bridge this gap and balance the trade-off between comfort, energy consumption, and CO2 emissions. The IMCF+ framework incorporates an innovative Green Planner (GP) algorithm, which is an AI-inspired algorithm that schedules energy consumption with a variety of amortization strategies. We have implemented IMCF+ and GP as part of a complete IoT ecosystem in openHAB and our extensive evaluation shows that we achieve a CO2 reduction of 45–59% to satisfy the comfort of a variety of user groups with only a moderate ≈ 3% in reducing their comfort levels.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"21 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87158970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Novel Approach for Classification in Resource-Constrained Environments 资源约束环境下一种新的分类方法
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-19 DOI: 10.1145/3549552
Arun C. S. Kumar, Zhijie Wang, Abhishek Srivastava
Internet of Things’ (IoT) deployments are increasingly dependent upon learning algorithms to analyse collected data, draw conclusions, and take decisions. The norm is to deploy such learning algorithms on the cloud and have IoT nodes interact with the cloud. While this is effective, it is rather wasteful in terms of energy expended and temporal latency. In this article, the endeavour is to develop a technique that facilitates classification, an important learning algorithm, within the extremely resource constrained environments of IoT nodes. The approach comprises selecting a small number of representative data points, called prototypes, from a large dataset and deploying these prototypes over IoT nodes. The prototypes are selected in a manner that they appropriately represent the complete dataset and are able to correctly classify new, incoming data. The novelty lies in the manner of prototype selection for a cluster that not only considers the location of datapoints of its own cluster but also that of datapoints in neighboring clusters. The efficacy of the approach is validated using standard datasets and compared with state-of-the-art classification techniques used in constrained environments. A real world deployment of the technique is done over an Arduino Uno-based IoT node and shown to be effective.
物联网(IoT)的部署越来越依赖于学习算法来分析收集的数据、得出结论和做出决策。规范是在云中部署这样的学习算法,并让物联网节点与云交互。虽然这是有效的,但就能量消耗和时间延迟而言,它相当浪费。在本文中,努力开发一种技术,促进分类,一个重要的学习算法,在物联网节点的极度资源受限的环境。该方法包括从大型数据集中选择少量具有代表性的数据点(称为原型),并将这些原型部署在物联网节点上。选择原型的方式是,它们适当地表示完整的数据集,并能够正确地分类新的传入数据。该方法的新颖之处在于,在选取原型时,既考虑了本簇数据点的位置,又考虑了邻近簇中数据点的位置。使用标准数据集验证了该方法的有效性,并将其与约束环境中使用的最新分类技术进行了比较。该技术的实际部署是在基于Arduino的IoT节点上完成的,并证明是有效的。
{"title":"A Novel Approach for Classification in Resource-Constrained Environments","authors":"Arun C. S. Kumar, Zhijie Wang, Abhishek Srivastava","doi":"10.1145/3549552","DOIUrl":"https://doi.org/10.1145/3549552","url":null,"abstract":"Internet of Things’ (IoT) deployments are increasingly dependent upon learning algorithms to analyse collected data, draw conclusions, and take decisions. The norm is to deploy such learning algorithms on the cloud and have IoT nodes interact with the cloud. While this is effective, it is rather wasteful in terms of energy expended and temporal latency. In this article, the endeavour is to develop a technique that facilitates classification, an important learning algorithm, within the extremely resource constrained environments of IoT nodes. The approach comprises selecting a small number of representative data points, called prototypes, from a large dataset and deploying these prototypes over IoT nodes. The prototypes are selected in a manner that they appropriately represent the complete dataset and are able to correctly classify new, incoming data. The novelty lies in the manner of prototype selection for a cluster that not only considers the location of datapoints of its own cluster but also that of datapoints in neighboring clusters. The efficacy of the approach is validated using standard datasets and compared with state-of-the-art classification techniques used in constrained environments. A real world deployment of the technique is done over an Arduino Uno-based IoT node and shown to be effective.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"39 1","pages":"1 - 21"},"PeriodicalIF":2.7,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90958949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-driven Self-adaptive Deployment of Internet of Things Applications with Automated Modification Proposals 具有自动修改建议的物联网应用的模型驱动自适应部署
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-19 DOI: 10.1145/3549553
J. C. Kirchhof, A. Kleiss, Bernhard Rumpe, David Schmalzing, Philipp Schneider, A. Wortmann
Today’s Internet of Things (IoT) applications are mostly developed as a bundle of hardware and associated software. Future cross-manufacturer app stores for IoT applications will require that the strong coupling of hardware and software is loosened. In the resulting IoT applications, a quintessential challenge is the effective and efficient deployment of IoT software components across variable networks of heterogeneous devices. Current research focuses on computing whether deployment requirements fit the intended target devices instead of assisting users in successfully deploying IoT applications by suggesting deployment requirement relaxations or hardware alternatives. This can make successfully deploying large-scale IoT applications a costly trial-and-error endeavor. To mitigate this, we have devised a method for providing such deployment suggestions based on search and backtracking. This can make deploying IoT applications more effective and more efficient, which, ultimately, eases reducing the complexity of deploying the software surrounding us.
今天的物联网(IoT)应用程序主要是作为硬件和相关软件的捆绑开发的。未来物联网应用的跨厂商应用商店将要求硬件和软件的强耦合得到放松。在由此产生的物联网应用中,一个典型的挑战是跨异构设备的可变网络有效和高效地部署物联网软件组件。目前的研究重点是计算部署要求是否适合预期的目标设备,而不是通过建议部署要求放松或硬件替代来帮助用户成功部署物联网应用。这使得成功部署大规模物联网应用程序成为一项代价高昂的试错努力。为了缓解这种情况,我们设计了一种基于搜索和回溯提供部署建议的方法。这可以使部署物联网应用程序更加有效和高效,从而最终降低部署我们周围软件的复杂性。
{"title":"Model-driven Self-adaptive Deployment of Internet of Things Applications with Automated Modification Proposals","authors":"J. C. Kirchhof, A. Kleiss, Bernhard Rumpe, David Schmalzing, Philipp Schneider, A. Wortmann","doi":"10.1145/3549553","DOIUrl":"https://doi.org/10.1145/3549553","url":null,"abstract":"Today’s Internet of Things (IoT) applications are mostly developed as a bundle of hardware and associated software. Future cross-manufacturer app stores for IoT applications will require that the strong coupling of hardware and software is loosened. In the resulting IoT applications, a quintessential challenge is the effective and efficient deployment of IoT software components across variable networks of heterogeneous devices. Current research focuses on computing whether deployment requirements fit the intended target devices instead of assisting users in successfully deploying IoT applications by suggesting deployment requirement relaxations or hardware alternatives. This can make successfully deploying large-scale IoT applications a costly trial-and-error endeavor. To mitigate this, we have devised a method for providing such deployment suggestions based on search and backtracking. This can make deploying IoT applications more effective and more efficient, which, ultimately, eases reducing the complexity of deploying the software surrounding us.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"80 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87146822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrating IoT-Sensing and Crowdsensing with Privacy: Privacy-Preserving Hybrid Sensing for Smart Cities 将物联网传感和大众传感与隐私相结合:智能城市的隐私保护混合传感
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-29 DOI: 10.1145/3549550
Hanwei Zhu, S. Chau, G. Guarddin, W. Liang
Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreliability and the lack of incentives for users’ contributions. In this article, we explore an integrated paradigm called “hybrid sensing” that harnesses both IoT-sensing and crowdsensing in a complementary manner. In hybrid sensing, users are incentivized to provide sensing data not covered by IoT sensors and provide crowdsourced feedback to assist in calibrating IoT-sensing. Their contributions will be rewarded with credits that can be redeemed to retrieve synthesized information from the hybrid system. In this article, we develop a hybrid sensing system that supports explicit user privacy—IoT sensors are obscured physically to prevent capturing private user data, and users interact with a crowdsensing server via a privacy-preserving protocol to preserve their anonymity. A key application of our system is smart parking, by which users can inquire and find the available parking spaces in outdoor parking lots. We implemented our hybrid sensing system for smart parking and conducted extensive empirical evaluations. Finally, our hybrid sensing system can be potentially applied to other information-driven services in smart cities.
数据感知与采集是智慧城市各种信息驱动服务的重要组成部分。一方面,物联网(IoT)传感器可以部署在某些固定位置,以可靠地捕获数据,但传感覆盖范围有限。另一方面,也可以通过自愿用户贡献的众测动态收集数据,但存在不可靠和缺乏对用户贡献的激励的问题。在本文中,我们探索了一种称为“混合传感”的集成范式,它以互补的方式利用物联网传感和众传感。在混合传感中,用户被激励提供物联网传感器未覆盖的传感数据,并提供众包反馈,以协助校准物联网传感。他们的贡献将获得积分奖励,这些积分可以用来从混合系统中检索合成信息。在本文中,我们开发了一种支持明确用户隐私的混合传感系统-物联网传感器被物理遮蔽以防止捕获私人用户数据,用户通过隐私保护协议与众测服务器交互以保持其匿名性。该系统的一个关键应用是智能停车,用户可以通过智能停车查询和查找室外停车场的可用停车位。我们实施了智能停车的混合传感系统,并进行了广泛的实证评估。最后,我们的混合传感系统可以潜在地应用于智慧城市的其他信息驱动服务。
{"title":"Integrating IoT-Sensing and Crowdsensing with Privacy: Privacy-Preserving Hybrid Sensing for Smart Cities","authors":"Hanwei Zhu, S. Chau, G. Guarddin, W. Liang","doi":"10.1145/3549550","DOIUrl":"https://doi.org/10.1145/3549550","url":null,"abstract":"Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreliability and the lack of incentives for users’ contributions. In this article, we explore an integrated paradigm called “hybrid sensing” that harnesses both IoT-sensing and crowdsensing in a complementary manner. In hybrid sensing, users are incentivized to provide sensing data not covered by IoT sensors and provide crowdsourced feedback to assist in calibrating IoT-sensing. Their contributions will be rewarded with credits that can be redeemed to retrieve synthesized information from the hybrid system. In this article, we develop a hybrid sensing system that supports explicit user privacy—IoT sensors are obscured physically to prevent capturing private user data, and users interact with a crowdsensing server via a privacy-preserving protocol to preserve their anonymity. A key application of our system is smart parking, by which users can inquire and find the available parking spaces in outdoor parking lots. We implemented our hybrid sensing system for smart parking and conducted extensive empirical evaluations. Finally, our hybrid sensing system can be potentially applied to other information-driven services in smart cities.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"22 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75823677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment 谁在控制我的设备?面向共享智能家居环境的多用户多设备感知门禁系统
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-15 DOI: 10.1145/3543513
A. Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, P. Mcdaniel, E. Kirda, A. Uluagac
Multiple users have access to multiple devices in a smart home system – typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique, trusted user that controls access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a multi-user environment, users have conflicting, complex, and dynamically-changing demands on multiple devices that cannot be handled by traditional access control techniques. Moreover, smart devices from different platforms/vendors can share the same home environment, making existing access control obsolete for smart home systems. To address these challenges, in this paper, we introduce Kratos+, a novel multi-user and multi-device-aware access control mechanism that allows smart home users to flexibly specify their access control demands. Kratos+ has four main components: user interaction module, backend server, policy manager, and policy execution module. Users can easily specify their desired access control settings using the interaction module that are translated into access control policies in the back-end server. The policy manager analyzes these policies, initiates automated negotiation between users to resolve conflicting demands, and generates final policies to enforce in smart home systems. We implemented Kratos+ as a platform-independent solution and evaluated its performance on real smart home deployments featuring multi-user scenarios with a rich set of configurations (337 different policies including 231 demand conflicts and 69 restriction policies). These configurations also included five different threats associated with access control mechanisms. Our extensive evaluations show that Kratos+ is very effective in resolving conflicting access control demands with minimal overhead. We also performed an extensive user study with 72 smart home users to better understand the user’s needs before designing the system and a usability study to evaluate the efficacy of Kratos+ in a real-life smart home environment.
多个用户可以访问智能家居系统中的多个设备-通常通过安装在移动设备上的专用应用程序。传统的访问控制机制考虑一个唯一的、受信任的用户来控制对设备的访问。然而,多用户多设备智能家居设置对传统的单用户系统构成了根本不同的挑战。例如,在多用户环境中,用户对多个设备的需求是相互冲突的、复杂的、动态变化的,传统的访问控制技术无法处理这些需求。此外,来自不同平台/供应商的智能设备可以共享相同的家庭环境,使现有的访问控制对智能家居系统来说已经过时。为了应对这些挑战,本文介绍了一种新的多用户、多设备感知的访问控制机制Kratos+,它允许智能家居用户灵活地指定他们的访问控制需求。Kratos+有四个主要组件:用户交互模块、后端服务器、策略管理器和策略执行模块。用户可以使用交互模块轻松指定所需的访问控制设置,交互模块在后端服务器中转换为访问控制策略。策略管理器分析这些策略,启动用户之间的自动协商以解决冲突的需求,并生成最终的策略以在智能家居系统中执行。我们将Kratos+作为一个独立于平台的解决方案实现,并在具有丰富配置集(337种不同策略,包括231种需求冲突和69种限制策略)的多用户场景的真实智能家居部署中评估其性能。这些配置还包括与访问控制机制相关的五种不同威胁。我们的广泛评估表明,Kratos+在以最小的开销解决冲突的访问控制需求方面非常有效。我们还对72名智能家居用户进行了广泛的用户研究,以便在设计系统之前更好地了解用户的需求,并进行了可用性研究,以评估Kratos+在现实生活中的智能家居环境中的功效。
{"title":"Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment","authors":"A. Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, P. Mcdaniel, E. Kirda, A. Uluagac","doi":"10.1145/3543513","DOIUrl":"https://doi.org/10.1145/3543513","url":null,"abstract":"Multiple users have access to multiple devices in a smart home system – typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique, trusted user that controls access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a multi-user environment, users have conflicting, complex, and dynamically-changing demands on multiple devices that cannot be handled by traditional access control techniques. Moreover, smart devices from different platforms/vendors can share the same home environment, making existing access control obsolete for smart home systems. To address these challenges, in this paper, we introduce Kratos+, a novel multi-user and multi-device-aware access control mechanism that allows smart home users to flexibly specify their access control demands. Kratos+ has four main components: user interaction module, backend server, policy manager, and policy execution module. Users can easily specify their desired access control settings using the interaction module that are translated into access control policies in the back-end server. The policy manager analyzes these policies, initiates automated negotiation between users to resolve conflicting demands, and generates final policies to enforce in smart home systems. We implemented Kratos+ as a platform-independent solution and evaluated its performance on real smart home deployments featuring multi-user scenarios with a rich set of configurations (337 different policies including 231 demand conflicts and 69 restriction policies). These configurations also included five different threats associated with access control mechanisms. Our extensive evaluations show that Kratos+ is very effective in resolving conflicting access control demands with minimal overhead. We also performed an extensive user study with 72 smart home users to better understand the user’s needs before designing the system and a usability study to evaluate the efficacy of Kratos+ in a real-life smart home environment.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"31 1","pages":"1 - 39"},"PeriodicalIF":2.7,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81447716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey on IoT Profiling, Fingerprinting, and Identification 物联网分析、指纹和身份识别研究综述
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-31 DOI: 10.1145/3539736
Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.
连接到互联网的异构物联网(IoT)设备的激增产生了一些操作和安全挑战,例如监控、检测和识别数百万互联的物联网设备。网络和系统管理员必须正确识别哪些设备是正常的,哪些设备需要安全更新,哪些设备容易受到特定攻击。物联网分析是一种新兴技术,用于识别和验证连接设备的特定行为,并在网络中隔离可疑和易受攻击的设备,以进行进一步监控。本文全面回顾了各种物联网设备分析方法,并基于不同的安全角度为物联网分析技术提供了清晰的分类。我们首先研究了几种当前的物联网设备分析技术及其应用。接下来,我们分析了各种物联网设备漏洞,概述了多个特征,并提供了详细信息,以实现分析算法的风险评估/缓解阶段。通过回顾分析物联网设备的方法,我们确定了不同领域的组织可以实施的各种最先进的方法,以满足分析需求。此外,本文还讨论了用于物联网设备分析的几种机器学习和深度学习算法。最后,我们讨论了该领域的挑战和未来研究的可能性。
{"title":"A Survey on IoT Profiling, Fingerprinting, and Identification","authors":"Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani","doi":"10.1145/3539736","DOIUrl":"https://doi.org/10.1145/3539736","url":null,"abstract":"The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"46 1","pages":"1 - 39"},"PeriodicalIF":2.7,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90803755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review 6TiSCH -支持IPv6的开放堆栈物联网网络形成:综述
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-10 DOI: 10.1145/3536166
Alakesh Kalita, M. Khatua
The IPv6 over IEEE 802.15.4e TSCH mode (6TiSCH) network is intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT). The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) link layer protocol allows the nodes to change their physical channel after each transmission to eliminate interference and multi-path fading on the channels. However, due to this feature, new nodes (aka pledges) take more time to join the 6TiSCH network, resulting in significant energy consumption and inefficient data transmission, which makes the communication unreliable. Therefore, the formation of 6TiSCH network has gained immense interest among the researchers. To date, numerous solutions have been offered by various researchers in order to speed up the formation of 6TiSCH networks. This article briefly discusses about the 6TiSCH network and its formation process, followed by a detailed survey on the works that considered 6TiSCH network formation. We also perform theoretical analysis and real testbed experiments for a better understanding of the existing works related to 6TiSCH network formation. This article is concluded after summarizing the research challenges in 6TiSCH network formation and providing a few open issues in this domain of work.
IPv6 over IEEE 802.15.4e TSCH模式(6TiSCH)网络旨在为多跳和可扩展的工业物联网(IIoT)提供可靠和延迟有限的通信。IEEE 802.15.4e时隙信道跳频(TSCH)链路层协议允许节点在每次传输后改变其物理信道,以消除信道上的干扰和多径衰落。然而,由于这一特性,新节点(即承诺节点)加入6TiSCH网络需要更多的时间,从而导致大量的能量消耗和低效的数据传输,使得通信不可靠。因此,6TiSCH网络的形成引起了研究者的极大兴趣。迄今为止,为了加快6TiSCH网络的形成,各种研究人员已经提出了许多解决方案。本文简要讨论了6TiSCH网络及其形成过程,然后对考虑6TiSCH网络形成的工作进行了详细的综述。为了更好地理解现有的与6TiSCH网络形成相关的工作,我们还进行了理论分析和实际试验台实验。本文总结了6TiSCH网络形成的研究挑战,并提出了该工作领域的一些有待解决的问题。
{"title":"6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review","authors":"Alakesh Kalita, M. Khatua","doi":"10.1145/3536166","DOIUrl":"https://doi.org/10.1145/3536166","url":null,"abstract":"The IPv6 over IEEE 802.15.4e TSCH mode (6TiSCH) network is intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT). The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) link layer protocol allows the nodes to change their physical channel after each transmission to eliminate interference and multi-path fading on the channels. However, due to this feature, new nodes (aka pledges) take more time to join the 6TiSCH network, resulting in significant energy consumption and inefficient data transmission, which makes the communication unreliable. Therefore, the formation of 6TiSCH network has gained immense interest among the researchers. To date, numerous solutions have been offered by various researchers in order to speed up the formation of 6TiSCH networks. This article briefly discusses about the 6TiSCH network and its formation process, followed by a detailed survey on the works that considered 6TiSCH network formation. We also perform theoretical analysis and real testbed experiments for a better understanding of the existing works related to 6TiSCH network formation. This article is concluded after summarizing the research challenges in 6TiSCH network formation and providing a few open issues in this domain of work.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"12 1","pages":"1 - 36"},"PeriodicalIF":2.7,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83734341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments iorepair:灵活处理各种物联网部署中的故障
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-09 DOI: 10.1145/3532194
Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan
IoT devices can be used to complete a wide array of physical tasks, but due to factors such as low computational resources and distributed physical deployment, they are susceptible to a wide array of faulty behaviors. Many devices deployed in homes, vehicles, industrial sites, and hospitals carry a great risk of damage to property, harm to a person, or breach of security if they behave faultily. We propose a general fault handling system named IoTRepair, which shows promising results for effectiveness with limited latency and power overhead in an IoT environment. IoTRepair dynamically organizes and customizes fault-handling techniques to address the unique problems associated with heterogeneous IoT deployments. We evaluate IoTRepair by creating a physical implementation mirroring a typical home environment to motivate the effectiveness of this system. Our evaluation showed that each of our fault-handling functions could be completed within 100 milliseconds after fault identification, which is a fraction of the time that state-of-the-art fault-identification methods take (measured in minutes). The power overhead is equally small, with the computation and device action consuming less than 30 milliwatts. This evaluation shows that IoTRepair not only can be deployed in a physical system, but offers significant benefits at a low overhead.
物联网设备可用于完成各种物理任务,但由于低计算资源和分布式物理部署等因素,它们容易受到各种错误行为的影响。部署在家庭、车辆、工业场所和医院中的许多设备,如果出现故障,可能会造成财产损失、人身伤害或违反安全规定。我们提出了一种名为IoTRepair的通用故障处理系统,该系统在物联网环境中以有限的延迟和功耗开销显示出有希望的效果。IoTRepair动态组织和定制故障处理技术,以解决与异构物联网部署相关的独特问题。我们通过创建一个反映典型家庭环境的物理实现来评估IoTRepair,以激发该系统的有效性。我们的评估表明,我们的每个故障处理功能都可以在故障识别后的100毫秒内完成,这是最先进的故障识别方法所需时间(以分钟为单位)的一小部分。功率开销同样小,计算和设备动作消耗不到30毫瓦。该评估表明,IoTRepair不仅可以部署在物理系统中,而且可以在低开销的情况下提供显著的优势。
{"title":"IoTRepair: Flexible Fault Handling in Diverse IoT Deployments","authors":"Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan","doi":"10.1145/3532194","DOIUrl":"https://doi.org/10.1145/3532194","url":null,"abstract":"IoT devices can be used to complete a wide array of physical tasks, but due to factors such as low computational resources and distributed physical deployment, they are susceptible to a wide array of faulty behaviors. Many devices deployed in homes, vehicles, industrial sites, and hospitals carry a great risk of damage to property, harm to a person, or breach of security if they behave faultily. We propose a general fault handling system named IoTRepair, which shows promising results for effectiveness with limited latency and power overhead in an IoT environment. IoTRepair dynamically organizes and customizes fault-handling techniques to address the unique problems associated with heterogeneous IoT deployments. We evaluate IoTRepair by creating a physical implementation mirroring a typical home environment to motivate the effectiveness of this system. Our evaluation showed that each of our fault-handling functions could be completed within 100 milliseconds after fault identification, which is a fraction of the time that state-of-the-art fault-identification methods take (measured in minutes). The power overhead is equally small, with the computation and device action consuming less than 30 milliwatts. This evaluation shows that IoTRepair not only can be deployed in a physical system, but offers significant benefits at a low overhead.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"6 1","pages":"1 - 33"},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86952542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics 基于时间序列动态类可分性分析的物联网数据分类策略
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-09 DOI: 10.1145/3533049
J. B. Borges, Heitor S. Ramos, A. Loureiro
This article proposes TSCLAS, a time series classification strategy for the Internet of Things (IoT) data, based on the class separability analysis of their temporal dynamics. Given the large number and incompleteness of IoT data, the use of traditional classification algorithms is not possible. Thus, we claim that solutions for IoT scenarios should avoid using raw data directly, preferring their transformation to a new domain. In the ordinal patterns domain, it is possible to capture the temporal dynamics of raw data to distinguish them. However, to be applied to this challenging scenario, TSCLAS follows a strategy for selecting the best parameters for the ordinal patterns transformation based on maximizing the class separability of the time series dynamics. We show that our method is competitive compared to other classification algorithms from the literature. Furthermore, TSCLAS is scalable concerning the length of time series and robust to the presence of missing data gaps on them. By simulating missing data gaps as long as 50% of the data, our method could beat the accuracy of the compared classification algorithms. Besides, even when losing in accuracy, TSCLAS presents lower computation times for both training and testing phases.
基于物联网数据时间动态的类可分性分析,提出了物联网数据的时间序列分类策略TSCLAS。考虑到物联网数据的数量和不完整性,使用传统的分类算法是不可能的。因此,我们声称物联网场景的解决方案应避免直接使用原始数据,而更倾向于将其转换到新领域。在有序模式域中,可以捕获原始数据的时间动态以区分它们。然而,为了应用于这个具有挑战性的场景,TSCLAS遵循一种策略,基于最大化时间序列动态的类可分离性,为有序模式转换选择最佳参数。我们表明,与文献中的其他分类算法相比,我们的方法具有竞争力。此外,TSCLAS在时间序列长度方面具有可扩展性,并且对缺失数据间隙的存在具有鲁棒性。通过模拟高达50%的数据缺失,我们的方法可以击败比较的分类算法的准确性。此外,即使在准确性下降的情况下,TSCLAS在训练和测试阶段都具有较低的计算时间。
{"title":"A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics","authors":"J. B. Borges, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3533049","DOIUrl":"https://doi.org/10.1145/3533049","url":null,"abstract":"This article proposes TSCLAS, a time series classification strategy for the Internet of Things (IoT) data, based on the class separability analysis of their temporal dynamics. Given the large number and incompleteness of IoT data, the use of traditional classification algorithms is not possible. Thus, we claim that solutions for IoT scenarios should avoid using raw data directly, preferring their transformation to a new domain. In the ordinal patterns domain, it is possible to capture the temporal dynamics of raw data to distinguish them. However, to be applied to this challenging scenario, TSCLAS follows a strategy for selecting the best parameters for the ordinal patterns transformation based on maximizing the class separability of the time series dynamics. We show that our method is competitive compared to other classification algorithms from the literature. Furthermore, TSCLAS is scalable concerning the length of time series and robust to the presence of missing data gaps on them. By simulating missing data gaps as long as 50% of the data, our method could beat the accuracy of the compared classification algorithms. Besides, even when losing in accuracy, TSCLAS presents lower computation times for both training and testing phases.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"19 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84637334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1