首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
A Closed-loop Hybrid Supervision Framework of Cryptocurrency Transactions for Data Trading in IoT 面向物联网数据交易的加密货币交易闭环混合监管框架
IF 2.7 Pub Date : 2022-12-05 DOI: 10.1145/3568171
Liushun Zhao, Deke Guo, Junjie Xie, Lailong Luo, Yulong Shen
The Device-as-a-service (DaaS) Internet of Things (IoT) business model enables distributed IoT devices to sell collected data to other devices, paving the way for machine-to-machine (M2M) economy applications. Cryptocurrencies are widely used by various IoT devices to undertake the main settlement and payment task in the M2M economy. However, the cryptocurrency market, which lacks effective supervision, has fluctuated wildly in the past few years. These fluctuations are breeding grounds for arbitrage in IoT data trading. Therefore, a practical cryptocurrency market supervision framework is very imperative in the process of IoT data trading to ensure that the trading is completed safely and fairly. The difficulty stems from how to combine these unlabeled daily trading data with supervision strategies to punish abnormal users, who disrupt the data trading market in IoT. In this article, we propose a closed-loop hybrid supervision framework based on the unsupervised anomaly detection to solve this problem. The core is to design the multi-modal unsupervised anomaly detection methods on trading prices to identify malicious users. We then design a dedicated control strategy with three levels to defend against various abnormal behaviors, according to the detection results. Furthermore, to guarantee the reliability of this framework, we evaluate the detection rate, accuracy, precision, and time consumption of single-modal and multi-modal detection methods and the contrast algorithm Adaptive KDE [19]. Finally, an effective prototype framework for supervising is established. The extensive evaluations prove that our supervision framework greatly reduces IoT data trading risks and losses.
设备即服务(DaaS)物联网(IoT)商业模式使分布式物联网设备能够将收集到的数据出售给其他设备,为机器对机器(M2M)经济应用铺平了道路。加密货币被各种物联网设备广泛使用,承担M2M经济中的主要结算和支付任务。然而,由于缺乏有效监管,加密货币市场在过去几年里波动很大。这些波动是物联网数据交易套利的温床。因此,在物联网数据交易过程中,一个实用的加密货币市场监管框架是非常必要的,以确保交易安全公平地完成。难点在于如何将这些未标记的日常交易数据与监管策略相结合,以惩罚扰乱物联网数据交易市场的异常用户。本文提出了一种基于无监督异常检测的闭环混合监督框架来解决这一问题。核心是设计交易价格的多模态无监督异常检测方法来识别恶意用户。然后,根据检测结果,我们设计了一个专用的三个级别的控制策略来防御各种异常行为。此外,为了保证该框架的可靠性,我们评估了单模态和多模态检测方法以及对比度算法Adaptive KDE的检出率、准确率、精度和耗时[19]。最后,建立了一个有效的监督原型框架。广泛的评估证明,我们的监管框架大大降低了物联网数据交易的风险和损失。
{"title":"A Closed-loop Hybrid Supervision Framework of Cryptocurrency Transactions for Data Trading in IoT","authors":"Liushun Zhao, Deke Guo, Junjie Xie, Lailong Luo, Yulong Shen","doi":"10.1145/3568171","DOIUrl":"https://doi.org/10.1145/3568171","url":null,"abstract":"The Device-as-a-service (DaaS) Internet of Things (IoT) business model enables distributed IoT devices to sell collected data to other devices, paving the way for machine-to-machine (M2M) economy applications. Cryptocurrencies are widely used by various IoT devices to undertake the main settlement and payment task in the M2M economy. However, the cryptocurrency market, which lacks effective supervision, has fluctuated wildly in the past few years. These fluctuations are breeding grounds for arbitrage in IoT data trading. Therefore, a practical cryptocurrency market supervision framework is very imperative in the process of IoT data trading to ensure that the trading is completed safely and fairly. The difficulty stems from how to combine these unlabeled daily trading data with supervision strategies to punish abnormal users, who disrupt the data trading market in IoT. In this article, we propose a closed-loop hybrid supervision framework based on the unsupervised anomaly detection to solve this problem. The core is to design the multi-modal unsupervised anomaly detection methods on trading prices to identify malicious users. We then design a dedicated control strategy with three levels to defend against various abnormal behaviors, according to the detection results. Furthermore, to guarantee the reliability of this framework, we evaluate the detection rate, accuracy, precision, and time consumption of single-modal and multi-modal detection methods and the contrast algorithm Adaptive KDE [19]. Finally, an effective prototype framework for supervising is established. The extensive evaluations prove that our supervision framework greatly reduces IoT data trading risks and losses.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90445391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Could Tierless Languages Reduce IoT Development Grief? 无层次语言能减少物联网开发的痛苦吗?
IF 2.7 Pub Date : 2022-11-30 DOI: 10.1145/3572901
Mart Lubbers, P. Koopman, Adrian Ramsingh, Jeremy Singer, P. Trinder
Internet of Things (IoT) software is notoriously complex, conventionally comprising multiple tiers. Traditionally an IoT developer must use multiple programming languages and ensure that the components interoperate correctly. A novel alternative is to use a single tierless language with a compiler that generates the code for each component and ensures their correct interoperation. We report a systematic comparative evaluation of two tierless language technologies for IoT stacks: one for resource-rich sensor nodes (Clean with iTask) and one for resource-constrained sensor nodes (Clean with iTask and mTask). The evaluation is based on four implementations of a typical smart campus application: two tierless and two Python-based tiered. (1) We show that tierless languages have the potential to significantly reduce the development effort for IoT systems, requiring 70% less code than the tiered implementations. Careful analysis attributes this code reduction to reduced interoperation (e.g., two embedded domain-specific languages and one paradigm versus seven languages and two paradigms), automatically generated distributed communication, and powerful IoT programming abstractions. (2) We show that tierless languages have the potential to significantly improve the reliability of IoT systems, describing how Clean iTask/mTask maintains type safety, provides higher-order failure management, and simplifies maintainability. (3) We report the first comparison of a tierless IoT codebase for resource-rich sensor nodes with one for resource-constrained sensor nodes. The comparison shows that they have similar code size (within 7%), and functional structure. (4) We present the first comparison of two tierless IoT languages, one for resource-rich sensor nodes and the other for resource-constrained sensor nodes.
众所周知,物联网(IoT)软件非常复杂,通常由多层组成。传统上,物联网开发人员必须使用多种编程语言,并确保组件正确互操作。一种新颖的替代方案是使用单一的无层语言和编译器,该编译器为每个组件生成代码并确保它们的正确互操作。我们报告了物联网堆栈的两种无层语言技术的系统比较评估:一种用于资源丰富的传感器节点(Clean with iTask),另一种用于资源受限的传感器节点(Clean with iTask和mTask)。评估基于典型智能校园应用的四种实现:两种分层和两种基于python的分层。(1)我们表明,分层语言有可能显著减少物联网系统的开发工作量,比分层实现所需的代码少70%。仔细分析将这种代码减少归因于减少的互操作性(例如,两种嵌入式领域特定语言和一种范式,而不是七种语言和两种范式),自动生成的分布式通信以及强大的物联网编程抽象。(2)我们表明,分层语言具有显著提高物联网系统可靠性的潜力,描述了Clean iTask/mTask如何维护类型安全,提供高阶故障管理,并简化可维护性。(3)我们报告了针对资源丰富的传感器节点的无层物联网代码库与针对资源受限的传感器节点的代码库的首次比较。对比表明,它们的代码大小(在7%以内)和功能结构相似。(4)我们首次比较了两种无层次物联网语言,一种用于资源丰富的传感器节点,另一种用于资源受限的传感器节点。
{"title":"Could Tierless Languages Reduce IoT Development Grief?","authors":"Mart Lubbers, P. Koopman, Adrian Ramsingh, Jeremy Singer, P. Trinder","doi":"10.1145/3572901","DOIUrl":"https://doi.org/10.1145/3572901","url":null,"abstract":"Internet of Things (IoT) software is notoriously complex, conventionally comprising multiple tiers. Traditionally an IoT developer must use multiple programming languages and ensure that the components interoperate correctly. A novel alternative is to use a single tierless language with a compiler that generates the code for each component and ensures their correct interoperation. We report a systematic comparative evaluation of two tierless language technologies for IoT stacks: one for resource-rich sensor nodes (Clean with iTask) and one for resource-constrained sensor nodes (Clean with iTask and mTask). The evaluation is based on four implementations of a typical smart campus application: two tierless and two Python-based tiered. (1) We show that tierless languages have the potential to significantly reduce the development effort for IoT systems, requiring 70% less code than the tiered implementations. Careful analysis attributes this code reduction to reduced interoperation (e.g., two embedded domain-specific languages and one paradigm versus seven languages and two paradigms), automatically generated distributed communication, and powerful IoT programming abstractions. (2) We show that tierless languages have the potential to significantly improve the reliability of IoT systems, describing how Clean iTask/mTask maintains type safety, provides higher-order failure management, and simplifies maintainability. (3) We report the first comparison of a tierless IoT codebase for resource-rich sensor nodes with one for resource-constrained sensor nodes. The comparison shows that they have similar code size (within 7%), and functional structure. (4) We present the first comparison of two tierless IoT languages, one for resource-rich sensor nodes and the other for resource-constrained sensor nodes.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78402050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing IoT Project Success through Agile Best Practices 通过敏捷最佳实践增强物联网项目的成功
IF 2.7 Pub Date : 2022-10-27 DOI: 10.1145/3568170
Wouter Moedt, R. Bernsteiner, M. Hall, Ann L. Fruhling
Worldwide spending on Internet of Things (IoT) applications is forecasted to surpass $1 trillion by 2022. To stay competitive in this growing technological industry segment, lowering costs while increasing productivity and shortening time-to-market will become increasingly important. Adopting Agile Software Development practices for IoT projects may provide this competitive advantage, as it enables organizations to respond to change, while being dynamic and innovative. Applying a mixed-methods approach, agile IoT practitioners around the world and from diverse industries were surveyed and interviewed. Our study recommends that Agile Software Development team makeup, practices, and methods should be tailored to the specific industry, culture, people, and IT application of an organization. People play an important role in the success of agile projects; therefore, our research focuses on identifying the critical attributes of agile teams to maximize success. Our study identified the five critical agile practices: Collective Code Ownership, Continuous Integration, Single Team, Dedicated Customer, and Sprint Planning and found that both technical and soft skills are essential for successful IoT development.
到2022年,全球在物联网(IoT)应用上的支出预计将超过1万亿美元。为了在这个不断发展的技术行业领域保持竞争力,降低成本、提高生产率和缩短上市时间将变得越来越重要。在物联网项目中采用敏捷软件开发实践可以提供这种竞争优势,因为它使组织能够在动态和创新的同时响应变化。采用混合方法,对来自世界各地和不同行业的敏捷物联网从业者进行了调查和访谈。我们的研究建议,敏捷软件开发团队的组成、实践和方法应该针对组织的特定行业、文化、人员和IT应用进行定制。人在敏捷项目的成功中扮演着重要的角色;因此,我们的研究重点是确定敏捷团队的关键属性,以最大限度地提高成功。我们的研究确定了五个关键的敏捷实践:集体代码所有权、持续集成、单一团队、专注的客户和冲刺计划,并发现技术和软技能对于成功的物联网开发至关重要。
{"title":"Enhancing IoT Project Success through Agile Best Practices","authors":"Wouter Moedt, R. Bernsteiner, M. Hall, Ann L. Fruhling","doi":"10.1145/3568170","DOIUrl":"https://doi.org/10.1145/3568170","url":null,"abstract":"Worldwide spending on Internet of Things (IoT) applications is forecasted to surpass $1 trillion by 2022. To stay competitive in this growing technological industry segment, lowering costs while increasing productivity and shortening time-to-market will become increasingly important. Adopting Agile Software Development practices for IoT projects may provide this competitive advantage, as it enables organizations to respond to change, while being dynamic and innovative. Applying a mixed-methods approach, agile IoT practitioners around the world and from diverse industries were surveyed and interviewed. Our study recommends that Agile Software Development team makeup, practices, and methods should be tailored to the specific industry, culture, people, and IT application of an organization. People play an important role in the success of agile projects; therefore, our research focuses on identifying the critical attributes of agile teams to maximize success. Our study identified the five critical agile practices: Collective Code Ownership, Continuous Integration, Single Team, Dedicated Customer, and Sprint Planning and found that both technical and soft skills are essential for successful IoT development.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87172173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Robust MAC Protocol for LoRa LoRa的鲁棒MAC协议设计
IF 2.7 Pub Date : 2022-09-16 DOI: 10.1145/3557048
Absar-Ul-Haque Ahmar, Emekcan Aras, T. D. Nguyen, Sam Michiels, W. Joosen, D. Hughes
Low-power wide-area networks enable large-scale deployments of low-power wireless devices. LoRaWAN is a long-range wireless technology that has emerged as a low-power and low data rate solution to support Internet of Things applications. Although LoRaWAN provides a low-power and cost-efficient networking solution, recent literature shows that it performs poorly in terms of reliability and security in dense deployments due to the uncoordinated (ALOHA-based) nature of the MAC (medium access control) protocol. Furthermore, LoRaWAN is not robust against selective jamming attacks. This article proposes CRAM: a time-synchronized cryptographic frequency hopping MAC protocol designed for the LoRa physical layer. CRAM reduces the contention by fairly exploiting the available frequency space and maximizes the entropy of the channel hopping algorithm. We develop a large physical testbed and a simulator to thoroughly evaluate the proposed protocol. Our evaluations show that CRAM significantly improves reliability and scalability and increases channel utilization while making selective jamming difficult to perform compared to the standard LoRaWAN protocol.
低功耗广域网使低功耗无线设备的大规模部署成为可能。LoRaWAN是一种远程无线技术,已成为支持物联网应用的低功耗和低数据速率解决方案。尽管LoRaWAN提供了一种低功耗和低成本的网络解决方案,但最近的文献表明,由于MAC(介质访问控制)协议的不协调(基于aloha)性质,它在密集部署中的可靠性和安全性方面表现不佳。此外,LoRaWAN对选择性干扰攻击的鲁棒性不强。本文提出了一种针对LoRa物理层设计的时间同步加密跳频MAC协议CRAM。CRAM通过充分利用可用的频率空间来减少争用,并使信道跳频算法的熵最大化。我们开发了一个大型物理测试平台和模拟器来彻底评估所提出的协议。我们的评估表明,与标准的LoRaWAN协议相比,CRAM显著提高了可靠性和可扩展性,增加了信道利用率,同时使选择性干扰难以执行。
{"title":"Design of a Robust MAC Protocol for LoRa","authors":"Absar-Ul-Haque Ahmar, Emekcan Aras, T. D. Nguyen, Sam Michiels, W. Joosen, D. Hughes","doi":"10.1145/3557048","DOIUrl":"https://doi.org/10.1145/3557048","url":null,"abstract":"Low-power wide-area networks enable large-scale deployments of low-power wireless devices. LoRaWAN is a long-range wireless technology that has emerged as a low-power and low data rate solution to support Internet of Things applications. Although LoRaWAN provides a low-power and cost-efficient networking solution, recent literature shows that it performs poorly in terms of reliability and security in dense deployments due to the uncoordinated (ALOHA-based) nature of the MAC (medium access control) protocol. Furthermore, LoRaWAN is not robust against selective jamming attacks. This article proposes CRAM: a time-synchronized cryptographic frequency hopping MAC protocol designed for the LoRa physical layer. CRAM reduces the contention by fairly exploiting the available frequency space and maximizes the entropy of the channel hopping algorithm. We develop a large physical testbed and a simulator to thoroughly evaluate the proposed protocol. Our evaluations show that CRAM significantly improves reliability and scalability and increases channel utilization while making selective jamming difficult to perform compared to the standard LoRaWAN protocol.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78418872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services SCVS:关于人工智能和边缘云支持隐私保护的智慧城市视频监控服务
IF 2.7 Pub Date : 2022-09-06 DOI: 10.1145/3542953
Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, N. Vadnere, Dijiang Huang
Video surveillance systems are increasingly becoming common in many private and public campuses, city buildings, and facilities. They provide many useful smart campus/city monitoring and management services based on data captured from video sensors. However, the video surveillance services may also breach personally identifiable information, especially human face images being monitored; therefore, it may potentially violate the privacy of human subjects involved. To address this privacy issue, we introduced a large-scale distributed video surveillance service model, called Smart-city Video Surveillance (SCVS). SCVS is a video surveillance data collection and processing platform to identify important events, monitor, protect, and make decisions for smart campus/city applications. In this article, the specific research focus is on how to identify and anonymize human faces in a distributed edge cloud computing infrastructure. To preserve the privacy of data during video anonymization, SCVS utilizes a two-step approach: (i) parameter server-based distributed machine learning solution, which ensures that edge nodes can exchange parameters for machine learning-based training. Since the dataset is not located on a centralized location, the data privacy and ownership are protected and preserved. (ii) To improve the machine learning model’s accuracy, we presented an asynchronous training approach to protect data and model privacy for both data owners and data users, respectively. SCVS adopts an in-memory encryption approach, where edge computing nodes collect and process data in the memory of edge nodes in encrypted form. This approach can effectively prevent honest but curious attacks. The performance evaluation shows the presented privacy protection platform is efficient and effective compared to traditional centralized computing models as presented in Section 5.
视频监控系统在许多私立和公立校园、城市建筑和设施中越来越普遍。它们基于从视频传感器捕获的数据提供许多有用的智能校园/城市监控和管理服务。然而,视频监控服务也可能会泄露个人身份信息,特别是被监控的人脸图像;因此,它可能会潜在地侵犯所涉及的人类受试者的隐私。为了解决这一隐私问题,我们引入了一种大规模分布式视频监控服务模型,称为智能城市视频监控(SCVS)。SCVS是一个视频监控数据收集和处理平台,用于识别重要事件,监控,保护和制定智能校园/城市应用决策。在本文中,具体的研究重点是如何在分布式边缘云计算基础设施中识别和匿名化人脸。为了在视频匿名化过程中保护数据的隐私,SCVS采用两步方法:(i)基于参数服务器的分布式机器学习解决方案,确保边缘节点可以交换参数进行基于机器学习的训练。由于数据集不位于集中位置,因此数据隐私和所有权得到了保护和保留。(ii)为了提高机器学习模型的准确性,我们提出了一种异步训练方法,分别为数据所有者和数据用户保护数据和模型隐私。SCVS采用内存加密方式,边缘计算节点以加密形式收集和处理边缘节点内存中的数据。这种方法可以有效地防止诚实但好奇的攻击。性能评估表明,与第5节中介绍的传统集中式计算模型相比,所提出的隐私保护平台是高效有效的。
{"title":"SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services","authors":"Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, N. Vadnere, Dijiang Huang","doi":"10.1145/3542953","DOIUrl":"https://doi.org/10.1145/3542953","url":null,"abstract":"Video surveillance systems are increasingly becoming common in many private and public campuses, city buildings, and facilities. They provide many useful smart campus/city monitoring and management services based on data captured from video sensors. However, the video surveillance services may also breach personally identifiable information, especially human face images being monitored; therefore, it may potentially violate the privacy of human subjects involved. To address this privacy issue, we introduced a large-scale distributed video surveillance service model, called Smart-city Video Surveillance (SCVS). SCVS is a video surveillance data collection and processing platform to identify important events, monitor, protect, and make decisions for smart campus/city applications. In this article, the specific research focus is on how to identify and anonymize human faces in a distributed edge cloud computing infrastructure. To preserve the privacy of data during video anonymization, SCVS utilizes a two-step approach: (i) parameter server-based distributed machine learning solution, which ensures that edge nodes can exchange parameters for machine learning-based training. Since the dataset is not located on a centralized location, the data privacy and ownership are protected and preserved. (ii) To improve the machine learning model’s accuracy, we presented an asynchronous training approach to protect data and model privacy for both data owners and data users, respectively. SCVS adopts an in-memory encryption approach, where edge computing nodes collect and process data in the memory of edge nodes in encrypted form. This approach can effectively prevent honest but curious attacks. The performance evaluation shows the presented privacy protection platform is efficient and effective compared to traditional centralized computing models as presented in Section 5.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80197136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Green Planning of IoT Home Automation Workflows in Smart Buildings 智能建筑中物联网家庭自动化工作流的绿色规划
IF 2.7 Pub Date : 2022-07-26 DOI: 10.1145/3549549
Soteris Constantinou, Andreas Konstantinidis, Panos K. Chrysanthis, D. Zeinalipour-Yazti
The advancement of renewable energy infrastructure in smart buildings (e.g., photovoltaic) has highlighted the importance of energy self-consumption by energy-demanding IoT-enabled devices (e.g., heating/cooling, electromobility, and appliances), which refers to the process of intelligently consuming energy at the time it is available. This stabilizes the energy grid, minimizes energy dissipation on power lines but more importantly is good for the environment as energy from fossil sources with a high CO2 footprint is minimized. On the other hand, user comfort levels expressed in the form of Rule Automation Workflows (RAW), are usually not aligned with renewable production patterns. In this work, we propose an innovative framework, coined IoT Meta-Control Firewall (IMCF+), which aims to bridge this gap and balance the trade-off between comfort, energy consumption, and CO2 emissions. The IMCF+ framework incorporates an innovative Green Planner (GP) algorithm, which is an AI-inspired algorithm that schedules energy consumption with a variety of amortization strategies. We have implemented IMCF+ and GP as part of a complete IoT ecosystem in openHAB and our extensive evaluation shows that we achieve a CO2 reduction of 45–59% to satisfy the comfort of a variety of user groups with only a moderate ≈ 3% in reducing their comfort levels.
智能建筑中可再生能源基础设施(例如光伏)的进步突出了能源需求高的物联网设备(例如加热/冷却,电动汽车和电器)的能源自我消耗的重要性,这是指在可用时智能消耗能源的过程。这稳定了能源网,最大限度地减少了电力线上的能量耗散,但更重要的是对环境有益,因为来自二氧化碳排放量高的化石能源的能源被最小化了。另一方面,以规则自动化工作流(RAW)形式表示的用户舒适度通常与可再生生产模式不一致。在这项工作中,我们提出了一个创新的框架,即物联网元控制防火墙(IMCF+),旨在弥合这一差距,平衡舒适度、能耗和二氧化碳排放之间的权衡。IMCF+框架采用了一种创新的绿色规划师(GP)算法,这是一种受人工智能启发的算法,可以通过各种摊销策略来安排能源消耗。我们已经在openHAB中实现了IMCF+和GP作为完整物联网生态系统的一部分,我们的广泛评估表明,我们实现了45-59%的二氧化碳减排,以满足各种用户群体的舒适度,仅降低了约3%的舒适度。
{"title":"Green Planning of IoT Home Automation Workflows in Smart Buildings","authors":"Soteris Constantinou, Andreas Konstantinidis, Panos K. Chrysanthis, D. Zeinalipour-Yazti","doi":"10.1145/3549549","DOIUrl":"https://doi.org/10.1145/3549549","url":null,"abstract":"The advancement of renewable energy infrastructure in smart buildings (e.g., photovoltaic) has highlighted the importance of energy self-consumption by energy-demanding IoT-enabled devices (e.g., heating/cooling, electromobility, and appliances), which refers to the process of intelligently consuming energy at the time it is available. This stabilizes the energy grid, minimizes energy dissipation on power lines but more importantly is good for the environment as energy from fossil sources with a high CO2 footprint is minimized. On the other hand, user comfort levels expressed in the form of Rule Automation Workflows (RAW), are usually not aligned with renewable production patterns. In this work, we propose an innovative framework, coined IoT Meta-Control Firewall (IMCF+), which aims to bridge this gap and balance the trade-off between comfort, energy consumption, and CO2 emissions. The IMCF+ framework incorporates an innovative Green Planner (GP) algorithm, which is an AI-inspired algorithm that schedules energy consumption with a variety of amortization strategies. We have implemented IMCF+ and GP as part of a complete IoT ecosystem in openHAB and our extensive evaluation shows that we achieve a CO2 reduction of 45–59% to satisfy the comfort of a variety of user groups with only a moderate ≈ 3% in reducing their comfort levels.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87158970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Novel Approach for Classification in Resource-Constrained Environments 资源约束环境下一种新的分类方法
IF 2.7 Pub Date : 2022-07-19 DOI: 10.1145/3549552
Arun C. S. Kumar, Zhijie Wang, Abhishek Srivastava
Internet of Things’ (IoT) deployments are increasingly dependent upon learning algorithms to analyse collected data, draw conclusions, and take decisions. The norm is to deploy such learning algorithms on the cloud and have IoT nodes interact with the cloud. While this is effective, it is rather wasteful in terms of energy expended and temporal latency. In this article, the endeavour is to develop a technique that facilitates classification, an important learning algorithm, within the extremely resource constrained environments of IoT nodes. The approach comprises selecting a small number of representative data points, called prototypes, from a large dataset and deploying these prototypes over IoT nodes. The prototypes are selected in a manner that they appropriately represent the complete dataset and are able to correctly classify new, incoming data. The novelty lies in the manner of prototype selection for a cluster that not only considers the location of datapoints of its own cluster but also that of datapoints in neighboring clusters. The efficacy of the approach is validated using standard datasets and compared with state-of-the-art classification techniques used in constrained environments. A real world deployment of the technique is done over an Arduino Uno-based IoT node and shown to be effective.
物联网(IoT)的部署越来越依赖于学习算法来分析收集的数据、得出结论和做出决策。规范是在云中部署这样的学习算法,并让物联网节点与云交互。虽然这是有效的,但就能量消耗和时间延迟而言,它相当浪费。在本文中,努力开发一种技术,促进分类,一个重要的学习算法,在物联网节点的极度资源受限的环境。该方法包括从大型数据集中选择少量具有代表性的数据点(称为原型),并将这些原型部署在物联网节点上。选择原型的方式是,它们适当地表示完整的数据集,并能够正确地分类新的传入数据。该方法的新颖之处在于,在选取原型时,既考虑了本簇数据点的位置,又考虑了邻近簇中数据点的位置。使用标准数据集验证了该方法的有效性,并将其与约束环境中使用的最新分类技术进行了比较。该技术的实际部署是在基于Arduino的IoT节点上完成的,并证明是有效的。
{"title":"A Novel Approach for Classification in Resource-Constrained Environments","authors":"Arun C. S. Kumar, Zhijie Wang, Abhishek Srivastava","doi":"10.1145/3549552","DOIUrl":"https://doi.org/10.1145/3549552","url":null,"abstract":"Internet of Things’ (IoT) deployments are increasingly dependent upon learning algorithms to analyse collected data, draw conclusions, and take decisions. The norm is to deploy such learning algorithms on the cloud and have IoT nodes interact with the cloud. While this is effective, it is rather wasteful in terms of energy expended and temporal latency. In this article, the endeavour is to develop a technique that facilitates classification, an important learning algorithm, within the extremely resource constrained environments of IoT nodes. The approach comprises selecting a small number of representative data points, called prototypes, from a large dataset and deploying these prototypes over IoT nodes. The prototypes are selected in a manner that they appropriately represent the complete dataset and are able to correctly classify new, incoming data. The novelty lies in the manner of prototype selection for a cluster that not only considers the location of datapoints of its own cluster but also that of datapoints in neighboring clusters. The efficacy of the approach is validated using standard datasets and compared with state-of-the-art classification techniques used in constrained environments. A real world deployment of the technique is done over an Arduino Uno-based IoT node and shown to be effective.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90958949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-driven Self-adaptive Deployment of Internet of Things Applications with Automated Modification Proposals 具有自动修改建议的物联网应用的模型驱动自适应部署
IF 2.7 Pub Date : 2022-07-19 DOI: 10.1145/3549553
J. C. Kirchhof, A. Kleiss, Bernhard Rumpe, David Schmalzing, Philipp Schneider, A. Wortmann
Today’s Internet of Things (IoT) applications are mostly developed as a bundle of hardware and associated software. Future cross-manufacturer app stores for IoT applications will require that the strong coupling of hardware and software is loosened. In the resulting IoT applications, a quintessential challenge is the effective and efficient deployment of IoT software components across variable networks of heterogeneous devices. Current research focuses on computing whether deployment requirements fit the intended target devices instead of assisting users in successfully deploying IoT applications by suggesting deployment requirement relaxations or hardware alternatives. This can make successfully deploying large-scale IoT applications a costly trial-and-error endeavor. To mitigate this, we have devised a method for providing such deployment suggestions based on search and backtracking. This can make deploying IoT applications more effective and more efficient, which, ultimately, eases reducing the complexity of deploying the software surrounding us.
今天的物联网(IoT)应用程序主要是作为硬件和相关软件的捆绑开发的。未来物联网应用的跨厂商应用商店将要求硬件和软件的强耦合得到放松。在由此产生的物联网应用中,一个典型的挑战是跨异构设备的可变网络有效和高效地部署物联网软件组件。目前的研究重点是计算部署要求是否适合预期的目标设备,而不是通过建议部署要求放松或硬件替代来帮助用户成功部署物联网应用。这使得成功部署大规模物联网应用程序成为一项代价高昂的试错努力。为了缓解这种情况,我们设计了一种基于搜索和回溯提供部署建议的方法。这可以使部署物联网应用程序更加有效和高效,从而最终降低部署我们周围软件的复杂性。
{"title":"Model-driven Self-adaptive Deployment of Internet of Things Applications with Automated Modification Proposals","authors":"J. C. Kirchhof, A. Kleiss, Bernhard Rumpe, David Schmalzing, Philipp Schneider, A. Wortmann","doi":"10.1145/3549553","DOIUrl":"https://doi.org/10.1145/3549553","url":null,"abstract":"Today’s Internet of Things (IoT) applications are mostly developed as a bundle of hardware and associated software. Future cross-manufacturer app stores for IoT applications will require that the strong coupling of hardware and software is loosened. In the resulting IoT applications, a quintessential challenge is the effective and efficient deployment of IoT software components across variable networks of heterogeneous devices. Current research focuses on computing whether deployment requirements fit the intended target devices instead of assisting users in successfully deploying IoT applications by suggesting deployment requirement relaxations or hardware alternatives. This can make successfully deploying large-scale IoT applications a costly trial-and-error endeavor. To mitigate this, we have devised a method for providing such deployment suggestions based on search and backtracking. This can make deploying IoT applications more effective and more efficient, which, ultimately, eases reducing the complexity of deploying the software surrounding us.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87146822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrating IoT-Sensing and Crowdsensing with Privacy: Privacy-Preserving Hybrid Sensing for Smart Cities 将物联网传感和大众传感与隐私相结合:智能城市的隐私保护混合传感
IF 2.7 Pub Date : 2022-06-29 DOI: 10.1145/3549550
Hanwei Zhu, S. Chau, G. Guarddin, W. Liang
Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreliability and the lack of incentives for users’ contributions. In this article, we explore an integrated paradigm called “hybrid sensing” that harnesses both IoT-sensing and crowdsensing in a complementary manner. In hybrid sensing, users are incentivized to provide sensing data not covered by IoT sensors and provide crowdsourced feedback to assist in calibrating IoT-sensing. Their contributions will be rewarded with credits that can be redeemed to retrieve synthesized information from the hybrid system. In this article, we develop a hybrid sensing system that supports explicit user privacy—IoT sensors are obscured physically to prevent capturing private user data, and users interact with a crowdsensing server via a privacy-preserving protocol to preserve their anonymity. A key application of our system is smart parking, by which users can inquire and find the available parking spaces in outdoor parking lots. We implemented our hybrid sensing system for smart parking and conducted extensive empirical evaluations. Finally, our hybrid sensing system can be potentially applied to other information-driven services in smart cities.
数据感知与采集是智慧城市各种信息驱动服务的重要组成部分。一方面,物联网(IoT)传感器可以部署在某些固定位置,以可靠地捕获数据,但传感覆盖范围有限。另一方面,也可以通过自愿用户贡献的众测动态收集数据,但存在不可靠和缺乏对用户贡献的激励的问题。在本文中,我们探索了一种称为“混合传感”的集成范式,它以互补的方式利用物联网传感和众传感。在混合传感中,用户被激励提供物联网传感器未覆盖的传感数据,并提供众包反馈,以协助校准物联网传感。他们的贡献将获得积分奖励,这些积分可以用来从混合系统中检索合成信息。在本文中,我们开发了一种支持明确用户隐私的混合传感系统-物联网传感器被物理遮蔽以防止捕获私人用户数据,用户通过隐私保护协议与众测服务器交互以保持其匿名性。该系统的一个关键应用是智能停车,用户可以通过智能停车查询和查找室外停车场的可用停车位。我们实施了智能停车的混合传感系统,并进行了广泛的实证评估。最后,我们的混合传感系统可以潜在地应用于智慧城市的其他信息驱动服务。
{"title":"Integrating IoT-Sensing and Crowdsensing with Privacy: Privacy-Preserving Hybrid Sensing for Smart Cities","authors":"Hanwei Zhu, S. Chau, G. Guarddin, W. Liang","doi":"10.1145/3549550","DOIUrl":"https://doi.org/10.1145/3549550","url":null,"abstract":"Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreliability and the lack of incentives for users’ contributions. In this article, we explore an integrated paradigm called “hybrid sensing” that harnesses both IoT-sensing and crowdsensing in a complementary manner. In hybrid sensing, users are incentivized to provide sensing data not covered by IoT sensors and provide crowdsourced feedback to assist in calibrating IoT-sensing. Their contributions will be rewarded with credits that can be redeemed to retrieve synthesized information from the hybrid system. In this article, we develop a hybrid sensing system that supports explicit user privacy—IoT sensors are obscured physically to prevent capturing private user data, and users interact with a crowdsensing server via a privacy-preserving protocol to preserve their anonymity. A key application of our system is smart parking, by which users can inquire and find the available parking spaces in outdoor parking lots. We implemented our hybrid sensing system for smart parking and conducted extensive empirical evaluations. Finally, our hybrid sensing system can be potentially applied to other information-driven services in smart cities.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75823677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment 谁在控制我的设备?面向共享智能家居环境的多用户多设备感知门禁系统
IF 2.7 Pub Date : 2022-06-15 DOI: 10.1145/3543513
A. Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, P. Mcdaniel, E. Kirda, A. Uluagac
Multiple users have access to multiple devices in a smart home system – typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique, trusted user that controls access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a multi-user environment, users have conflicting, complex, and dynamically-changing demands on multiple devices that cannot be handled by traditional access control techniques. Moreover, smart devices from different platforms/vendors can share the same home environment, making existing access control obsolete for smart home systems. To address these challenges, in this paper, we introduce Kratos+, a novel multi-user and multi-device-aware access control mechanism that allows smart home users to flexibly specify their access control demands. Kratos+ has four main components: user interaction module, backend server, policy manager, and policy execution module. Users can easily specify their desired access control settings using the interaction module that are translated into access control policies in the back-end server. The policy manager analyzes these policies, initiates automated negotiation between users to resolve conflicting demands, and generates final policies to enforce in smart home systems. We implemented Kratos+ as a platform-independent solution and evaluated its performance on real smart home deployments featuring multi-user scenarios with a rich set of configurations (337 different policies including 231 demand conflicts and 69 restriction policies). These configurations also included five different threats associated with access control mechanisms. Our extensive evaluations show that Kratos+ is very effective in resolving conflicting access control demands with minimal overhead. We also performed an extensive user study with 72 smart home users to better understand the user’s needs before designing the system and a usability study to evaluate the efficacy of Kratos+ in a real-life smart home environment.
多个用户可以访问智能家居系统中的多个设备-通常通过安装在移动设备上的专用应用程序。传统的访问控制机制考虑一个唯一的、受信任的用户来控制对设备的访问。然而,多用户多设备智能家居设置对传统的单用户系统构成了根本不同的挑战。例如,在多用户环境中,用户对多个设备的需求是相互冲突的、复杂的、动态变化的,传统的访问控制技术无法处理这些需求。此外,来自不同平台/供应商的智能设备可以共享相同的家庭环境,使现有的访问控制对智能家居系统来说已经过时。为了应对这些挑战,本文介绍了一种新的多用户、多设备感知的访问控制机制Kratos+,它允许智能家居用户灵活地指定他们的访问控制需求。Kratos+有四个主要组件:用户交互模块、后端服务器、策略管理器和策略执行模块。用户可以使用交互模块轻松指定所需的访问控制设置,交互模块在后端服务器中转换为访问控制策略。策略管理器分析这些策略,启动用户之间的自动协商以解决冲突的需求,并生成最终的策略以在智能家居系统中执行。我们将Kratos+作为一个独立于平台的解决方案实现,并在具有丰富配置集(337种不同策略,包括231种需求冲突和69种限制策略)的多用户场景的真实智能家居部署中评估其性能。这些配置还包括与访问控制机制相关的五种不同威胁。我们的广泛评估表明,Kratos+在以最小的开销解决冲突的访问控制需求方面非常有效。我们还对72名智能家居用户进行了广泛的用户研究,以便在设计系统之前更好地了解用户的需求,并进行了可用性研究,以评估Kratos+在现实生活中的智能家居环境中的功效。
{"title":"Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment","authors":"A. Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, P. Mcdaniel, E. Kirda, A. Uluagac","doi":"10.1145/3543513","DOIUrl":"https://doi.org/10.1145/3543513","url":null,"abstract":"Multiple users have access to multiple devices in a smart home system – typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique, trusted user that controls access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a multi-user environment, users have conflicting, complex, and dynamically-changing demands on multiple devices that cannot be handled by traditional access control techniques. Moreover, smart devices from different platforms/vendors can share the same home environment, making existing access control obsolete for smart home systems. To address these challenges, in this paper, we introduce Kratos+, a novel multi-user and multi-device-aware access control mechanism that allows smart home users to flexibly specify their access control demands. Kratos+ has four main components: user interaction module, backend server, policy manager, and policy execution module. Users can easily specify their desired access control settings using the interaction module that are translated into access control policies in the back-end server. The policy manager analyzes these policies, initiates automated negotiation between users to resolve conflicting demands, and generates final policies to enforce in smart home systems. We implemented Kratos+ as a platform-independent solution and evaluated its performance on real smart home deployments featuring multi-user scenarios with a rich set of configurations (337 different policies including 231 demand conflicts and 69 restriction policies). These configurations also included five different threats associated with access control mechanisms. Our extensive evaluations show that Kratos+ is very effective in resolving conflicting access control demands with minimal overhead. We also performed an extensive user study with 72 smart home users to better understand the user’s needs before designing the system and a usability study to evaluate the efficacy of Kratos+ in a real-life smart home environment.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81447716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1