首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
Security and Privacy Requirements for the Internet of Things 物联网的安全与隐私需求
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-02-01 DOI: 10.1145/3437537
Nada Alhirabi, O. Rana, Charith Perera
The design and development process for internet of things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across many different types of nodes with different capabilities under different conditions. Second, IoT application development involves different types of software engineers such as desktop, web, embedded, and mobile to work together. Furthermore, non-software engineering personnel such as business analysts are also involved in the design process. In addition to the complexity of having multiple software engineering specialists cooperating to merge different hardware and software components together, the development process requires different software and hardware stacks to be integrated together (e.g., different stacks from different companies such as Microsoft Azure and IBM Bluemix). Due to the above complexities, non-functional requirements (such as security and privacy, which are highly important in the context of the IoT) tend to be ignored or treated as though they are less important in the IoT application development process. This article reviews techniques, methods, and tools to support security and privacy requirements in existing non-IoT application designs, enabling their use and integration into IoT applications. This article primarily focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy). Our goal is not only to analyse, compare, and consolidate the empirical research but also to appreciate their findings and discuss their applicability for the IoT.
物联网(IoT)应用程序的设计和开发过程比桌面、移动或web应用程序更复杂。首先,物联网应用需要软件和硬件在不同条件下跨具有不同功能的许多不同类型的节点协同工作。其次,物联网应用程序的开发涉及不同类型的软件工程师,如桌面、web、嵌入式和移动,以协同工作。此外,像业务分析师这样的非软件工程人员也参与到设计过程中。除了让多个软件工程专家合作将不同的硬件和软件组件合并在一起的复杂性之外,开发过程还需要将不同的软件和硬件堆栈集成在一起(例如,来自不同公司的不同堆栈,例如Microsoft Azure和IBM Bluemix)。由于上述复杂性,非功能需求(例如在物联网环境中非常重要的安全性和隐私性)往往被忽略或视为在物联网应用程序开发过程中不那么重要。本文回顾了支持现有非物联网应用设计中的安全和隐私需求的技术、方法和工具,使其能够使用并集成到物联网应用中。本文主要关注有助于捕获非功能需求(即安全性和隐私性)的设计符号、模型和语言。我们的目标不仅是分析、比较和巩固实证研究,而且还要欣赏他们的发现并讨论他们对物联网的适用性。
{"title":"Security and Privacy Requirements for the Internet of Things","authors":"Nada Alhirabi, O. Rana, Charith Perera","doi":"10.1145/3437537","DOIUrl":"https://doi.org/10.1145/3437537","url":null,"abstract":"The design and development process for internet of things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across many different types of nodes with different capabilities under different conditions. Second, IoT application development involves different types of software engineers such as desktop, web, embedded, and mobile to work together. Furthermore, non-software engineering personnel such as business analysts are also involved in the design process. In addition to the complexity of having multiple software engineering specialists cooperating to merge different hardware and software components together, the development process requires different software and hardware stacks to be integrated together (e.g., different stacks from different companies such as Microsoft Azure and IBM Bluemix). Due to the above complexities, non-functional requirements (such as security and privacy, which are highly important in the context of the IoT) tend to be ignored or treated as though they are less important in the IoT application development process. This article reviews techniques, methods, and tools to support security and privacy requirements in existing non-IoT application designs, enabling their use and integration into IoT applications. This article primarily focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy). Our goal is not only to analyse, compare, and consolidate the empirical research but also to appreciate their findings and discuss their applicability for the IoT.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"86 1","pages":"1 - 37"},"PeriodicalIF":2.7,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83751973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Location- and Person-Independent Activity Recognition with WiFi, Deep Neural Networks, and Reinforcement Learning WiFi,深度神经网络和强化学习的位置和人独立活动识别
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-21 DOI: 10.1145/3424739
Yongsen Ma, S. Arshad, Swetha Muniraju, E. Torkildson, Enrico Rantala, K. Doppler, Gang Zhou
In recent years, Channel State Information (CSI) measured by WiFi is widely used for human activity recognition. In this article, we propose a deep learning design for location- and person-independent activity recognition with WiFi. The proposed design consists of three Deep Neural Networks (DNNs): a 2D Convolutional Neural Network (CNN) as the recognition algorithm, a 1D CNN as the state machine, and a reinforcement learning agent for neural architecture search. The recognition algorithm learns location- and person-independent features from different perspectives of CSI data. The state machine learns temporal dependency information from history classification results. The reinforcement learning agent optimizes the neural architecture of the recognition algorithm using a Recurrent Neural Network (RNN) with Long Short-Term Memory (LSTM). The proposed design is evaluated in a lab environment with different WiFi device locations, antenna orientations, sitting/standing/walking locations/orientations, and multiple persons. The proposed design has 97% average accuracy when testing devices and persons are not seen during training. The proposed design is also evaluated by two public datasets with accuracy of 80% and 83%. The proposed design needs very little human efforts for ground truth labeling, feature engineering, signal processing, and tuning of learning parameters and hyperparameters.
近年来,WiFi测量的信道状态信息(Channel State Information, CSI)被广泛用于人体活动识别。在本文中,我们提出了一种基于WiFi的独立于位置和个人的活动识别的深度学习设计。提出的设计由三个深度神经网络(dnn)组成:二维卷积神经网络(CNN)作为识别算法,一维卷积神经网络作为状态机,以及用于神经结构搜索的强化学习代理。该识别算法从CSI数据的不同角度学习与位置和人无关的特征。状态机从历史分类结果中学习时间依赖信息。强化学习智能体使用具有长短期记忆(LSTM)的递归神经网络(RNN)优化识别算法的神经结构。在不同的WiFi设备位置、天线方向、坐/站/行走位置/方向和多人的实验室环境中对所提出的设计进行了评估。当训练期间没有看到测试设备和人员时,所提出的设计的平均准确率为97%。该设计还通过两个公共数据集进行了评估,准确率分别为80%和83%。所提出的设计需要很少的人力来进行地面真值标记、特征工程、信号处理以及学习参数和超参数的调整。
{"title":"Location- and Person-Independent Activity Recognition with WiFi, Deep Neural Networks, and Reinforcement Learning","authors":"Yongsen Ma, S. Arshad, Swetha Muniraju, E. Torkildson, Enrico Rantala, K. Doppler, Gang Zhou","doi":"10.1145/3424739","DOIUrl":"https://doi.org/10.1145/3424739","url":null,"abstract":"In recent years, Channel State Information (CSI) measured by WiFi is widely used for human activity recognition. In this article, we propose a deep learning design for location- and person-independent activity recognition with WiFi. The proposed design consists of three Deep Neural Networks (DNNs): a 2D Convolutional Neural Network (CNN) as the recognition algorithm, a 1D CNN as the state machine, and a reinforcement learning agent for neural architecture search. The recognition algorithm learns location- and person-independent features from different perspectives of CSI data. The state machine learns temporal dependency information from history classification results. The reinforcement learning agent optimizes the neural architecture of the recognition algorithm using a Recurrent Neural Network (RNN) with Long Short-Term Memory (LSTM). The proposed design is evaluated in a lab environment with different WiFi device locations, antenna orientations, sitting/standing/walking locations/orientations, and multiple persons. The proposed design has 97% average accuracy when testing devices and persons are not seen during training. The proposed design is also evaluated by two public datasets with accuracy of 80% and 83%. The proposed design needs very little human efforts for ground truth labeling, feature engineering, signal processing, and tuning of learning parameters and hyperparameters.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"34 1","pages":"1 - 25"},"PeriodicalIF":2.7,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78014146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network 6TiSCH网络快速形成控制包的机会传输
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-02 DOI: 10.1145/3430380
Alakesh Kalita, M. Khatua
Network bootstrapping is one of the initial tasks executed in any wireless network such as Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource conservation and efficient data collection. Our probabilistic analysis reveals that the performance of 6TiSCH based IIoT network formation degrades with time because of the following reasons: (i) IETF 6TiSCH Minimal Configuration (6TiSCH-MC) standard considered that beacon frame has the highest priority over all other control packets, (ii) 6TiSCH-MC provides minimal routing information during network formation, and (iii) sometimes, joined node can not transmit control packets due to high congestion in shared slots. To deal with these problems, this article proposes two schemes—opportunistic priority alternation and rate control (OPR) and opportunistic channel access (OCA). OPR dynamically adjusts the priority of control packets and provides sufficient routing information during network bootstrapping, whereas OCA allows the nodes having urgent packet to transmit it in less time. Along with the theoretical analysis of the proposed schemes, we also provide comparison-based simulation and real testbed experiment results to validate the proposed schemes together. The received results show significant performance improvements in terms of joining time and energy consumption.
网络引导是任何无线网络(如工业物联网(IIoT))中执行的初始任务之一。工业物联网网络的快速形成有助于资源节约和高效的数据收集。我们的概率分析表明,由于以下原因,基于6TiSCH的IIoT网络形成性能随着时间的推移而下降:(i) IETF 6TiSCH最小配置(6TiSCH- mc)标准认为信标帧具有高于所有其他控制数据包的最高优先级;(ii) 6TiSCH- mc在网络形成过程中提供的路由信息最少;(iii)有时,由于共享槽的高度拥塞,加入节点无法传输控制数据包。针对这些问题,本文提出了机会优先级交替和速率控制(OPR)和机会信道接入(OCA)两种方案。OPR可以动态调整控制报文的优先级,并在网络启动过程中提供足够的路由信息,而OCA则允许具有紧急报文的节点在更短的时间内传输。在对所提方案进行理论分析的同时,我们还提供了基于对比的仿真和真实试验台实验结果来验证所提方案。得到的结果表明,在连接时间和能耗方面有显著的性能改进。
{"title":"Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network","authors":"Alakesh Kalita, M. Khatua","doi":"10.1145/3430380","DOIUrl":"https://doi.org/10.1145/3430380","url":null,"abstract":"Network bootstrapping is one of the initial tasks executed in any wireless network such as Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource conservation and efficient data collection. Our probabilistic analysis reveals that the performance of 6TiSCH based IIoT network formation degrades with time because of the following reasons: (i) IETF 6TiSCH Minimal Configuration (6TiSCH-MC) standard considered that beacon frame has the highest priority over all other control packets, (ii) 6TiSCH-MC provides minimal routing information during network formation, and (iii) sometimes, joined node can not transmit control packets due to high congestion in shared slots. To deal with these problems, this article proposes two schemes—opportunistic priority alternation and rate control (OPR) and opportunistic channel access (OCA). OPR dynamically adjusts the priority of control packets and provides sufficient routing information during network bootstrapping, whereas OCA allows the nodes having urgent packet to transmit it in less time. Along with the theoretical analysis of the proposed schemes, we also provide comparison-based simulation and real testbed experiment results to validate the proposed schemes together. The received results show significant performance improvements in terms of joining time and energy consumption.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"9 1","pages":"1 - 29"},"PeriodicalIF":2.7,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86121200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections 基于独立随机投影的物联网轻量级隐私保护协同学习研究
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-11 DOI: 10.1145/3441303
Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin
The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.
物联网(IoT)将成为实现更好的系统智能的主要数据生成基础设施。本文考虑了一种实用的保护隐私的协作学习方案的设计和实现,其中好奇的学习协调器根据许多物联网对象提供的数据样本训练更好的机器学习模型,同时保护训练数据原始形式的机密性不受协调器的影响。现有的分布式机器学习和数据加密方法会产生大量的计算和通信开销,使得它们不适合资源受限的物联网对象。我们研究了一种方法,该方法在每个物联网对象上应用独立随机投影来混淆数据,并基于来自物联网对象的投影数据在协调器上训练深度神经网络。这种方法为物联网对象引入了少量的计算开销,并将大部分工作负载转移给具有足够计算资源的协调器。尽管物联网对象执行的独立预测解决了好奇的协调器和一些受损物联网对象之间的潜在勾结,但它们显着增加了预测数据的复杂性。在本文中,我们利用深度学习的优越学习能力来捕获复杂的模式,以保持良好的学习性能。广泛的比较评估表明,这种方法优于其他轻量级方法,这些方法在具有轻度到中度数据模式复杂性的应用程序中对差分隐私和/或支持向量机应用加性噪声进行学习。
{"title":"On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections","authors":"Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin","doi":"10.1145/3441303","DOIUrl":"https://doi.org/10.1145/3441303","url":null,"abstract":"The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"66 1","pages":"1 - 32"},"PeriodicalIF":2.7,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81054621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Federated Learning Approach to Anomaly Detection in Smart Buildings 智能建筑异常检测的联邦学习方法
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-20 DOI: 10.1145/3467981
Raed Abdel Sater, A. Hamza
Internet of Things (IoT) sensors in smart buildings are becoming increasingly ubiquitous, making buildings more livable, energy efficient, and sustainable. These devices sense the environment and generate multivariate temporal data of paramount importance for detecting anomalies and improving the prediction of energy usage in smart buildings. However, detecting these anomalies in centralized systems is often plagued by a huge delay in response time. To overcome this issue, we formulate the anomaly detection problem in a federated learning setting by leveraging the multi-task learning paradigm, which aims at solving multiple tasks simultaneously while taking advantage of the similarities and differences across tasks. We propose a novel privacy-by-design federated learning model using a stacked long short-time memory (LSTM) model, and we demonstrate that it is more than twice as fast during training convergence compared to the centralized LSTM. The effectiveness of our federated learning approach is demonstrated on three real-world datasets generated by the IoT production system at General Electric Current smart building, achieving state-of-the-art performance compared to baseline methods in both classification and regression tasks. Our experimental results demonstrate the effectiveness of the proposed framework in reducing the overall training cost without compromising the prediction performance.
智能建筑中的物联网(IoT)传感器变得越来越普遍,使建筑更加宜居、节能和可持续。这些设备感知环境并生成多元时间数据,这些数据对于检测异常和改进智能建筑中的能源使用预测至关重要。然而,在集中式系统中检测这些异常通常会受到响应时间的巨大延迟的困扰。为了克服这一问题,我们利用多任务学习范式在联邦学习环境中制定异常检测问题,该范式旨在同时解决多个任务,同时利用任务之间的相似性和差异性。我们提出了一种使用堆叠长短时记忆(LSTM)模型的新型隐私设计联邦学习模型,并且我们证明了与集中式LSTM相比,它在训练收敛期间的速度要快两倍以上。我们的联合学习方法的有效性在通用电气当前智能建筑的物联网生产系统生成的三个真实数据集上得到了证明,与分类和回归任务的基线方法相比,实现了最先进的性能。我们的实验结果证明了该框架在不影响预测性能的情况下降低整体训练成本的有效性。
{"title":"A Federated Learning Approach to Anomaly Detection in Smart Buildings","authors":"Raed Abdel Sater, A. Hamza","doi":"10.1145/3467981","DOIUrl":"https://doi.org/10.1145/3467981","url":null,"abstract":"Internet of Things (IoT) sensors in smart buildings are becoming increasingly ubiquitous, making buildings more livable, energy efficient, and sustainable. These devices sense the environment and generate multivariate temporal data of paramount importance for detecting anomalies and improving the prediction of energy usage in smart buildings. However, detecting these anomalies in centralized systems is often plagued by a huge delay in response time. To overcome this issue, we formulate the anomaly detection problem in a federated learning setting by leveraging the multi-task learning paradigm, which aims at solving multiple tasks simultaneously while taking advantage of the similarities and differences across tasks. We propose a novel privacy-by-design federated learning model using a stacked long short-time memory (LSTM) model, and we demonstrate that it is more than twice as fast during training convergence compared to the centralized LSTM. The effectiveness of our federated learning approach is demonstrated on three real-world datasets generated by the IoT production system at General Electric Current smart building, achieving state-of-the-art performance compared to baseline methods in both classification and regression tasks. Our experimental results demonstrate the effectiveness of the proposed framework in reducing the overall training cost without compromising the prediction performance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"164 1","pages":"1 - 23"},"PeriodicalIF":2.7,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80335269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Edge-Assisted Control for Healthcare Internet of Things 医疗物联网边缘辅助控制
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-19 DOI: 10.1145/3407091
A. Anzanpour, Delaram Amiri, I. Azimi, M. Levorato, N. Dutt, P. Liljeberg, A. Rahmani
Recent advances in pervasive Internet of Things technologies and edge computing have opened new avenues for development of ubiquitous health monitoring applications. Delivering an acceptable level of usability and accuracy for these healthcare Internet of Things applications requires optimization of both system-driven and data-driven aspects, which are typically done in a disjoint manner. Although decoupled optimization of these processes yields local optima at each level, synergistic coupling of the system and data levels can lead to a holistic solution opening new opportunities for optimization. In this article, we present an edge-assisted resource manager that dynamically controls the fidelity and duration of sensing w.r.t. changes in the patient’s activity and health state, thus fine-tuning the trade-off between energy efficiency and measurement accuracy. The cornerstone of our proposed solution is an intelligent low-latency real-time controller implemented at the edge layer that detects abnormalities in the patient’s condition and accordingly adjusts the sensing parameters of a reconfigurable wireless sensor node. We assess the efficiency of our proposed system via a case study of the photoplethysmography-based medical early warning score system. Our experiments on a real full hardware-software early warning score system reveal up to 49% power savings while maintaining the accuracy of the sensory data.
普及物联网技术和边缘计算的最新进展为开发无处不在的健康监测应用开辟了新的途径。为这些医疗保健物联网应用程序提供可接受的可用性和准确性水平,需要对系统驱动和数据驱动两个方面进行优化,而这两个方面通常以脱节的方式完成。虽然这些过程的解耦优化在每个级别上产生局部最优,但系统和数据级别的协同耦合可以产生一个整体的解决方案,为优化提供新的机会。在本文中,我们介绍了一种边缘辅助资源管理器,它可以动态控制感知患者活动和健康状态下w.r.t.变化的保真度和持续时间,从而微调能源效率和测量精度之间的权衡。我们提出的解决方案的基础是在边缘层实现一个智能低延迟实时控制器,该控制器可以检测患者病情的异常情况,并相应地调整可重构无线传感器节点的传感参数。我们通过一个基于光容积脉搏波的医疗预警评分系统的案例研究来评估我们提出的系统的效率。我们在一个真正的全硬件软件预警评分系统上的实验显示,在保持感官数据准确性的同时,节省高达49%的电力。
{"title":"Edge-Assisted Control for Healthcare Internet of Things","authors":"A. Anzanpour, Delaram Amiri, I. Azimi, M. Levorato, N. Dutt, P. Liljeberg, A. Rahmani","doi":"10.1145/3407091","DOIUrl":"https://doi.org/10.1145/3407091","url":null,"abstract":"Recent advances in pervasive Internet of Things technologies and edge computing have opened new avenues for development of ubiquitous health monitoring applications. Delivering an acceptable level of usability and accuracy for these healthcare Internet of Things applications requires optimization of both system-driven and data-driven aspects, which are typically done in a disjoint manner. Although decoupled optimization of these processes yields local optima at each level, synergistic coupling of the system and data levels can lead to a holistic solution opening new opportunities for optimization. In this article, we present an edge-assisted resource manager that dynamically controls the fidelity and duration of sensing w.r.t. changes in the patient’s activity and health state, thus fine-tuning the trade-off between energy efficiency and measurement accuracy. The cornerstone of our proposed solution is an intelligent low-latency real-time controller implemented at the edge layer that detects abnormalities in the patient’s condition and accordingly adjusts the sensing parameters of a reconfigurable wireless sensor node. We assess the efficiency of our proposed system via a case study of the photoplethysmography-based medical early warning score system. Our experiments on a real full hardware-software early warning score system reveal up to 49% power savings while maintaining the accuracy of the sensory data.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"661 1","pages":"1 - 21"},"PeriodicalIF":2.7,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76847146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An All-wireless SDN Framework for BLE Mesh 面向BLE Mesh的全无线SDN框架
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-08-04 DOI: 10.1145/3403581
Yuri Murillo, A. Chiumento, B. Reynders, S. Pollin
The Internet of Things (IoT) paradigm combines the interconnection of massive amounts of battery-constrained and low-computational-power devices with low-latency and high-reliability network requirements. Additionally, diverse end-to-end services and applications with different Quality of Service (QoS) requirements are expected to coexist in the same network infrastructure. Software-defined Networking (SDN) is a paradigm designed to solve these problems, but its implementation in wireless networks and especially in the resource-constrained IoT systems is extremely challenging and has seen very limited adoption, since it requires isolation of data and control plane information flows and a reliable and scalable control plane. In this work, Bluetooth Low Energy (BLE) mesh is introduced as an adequate technology for an all-wireless SDN-BLE implementation, which is a technology that has become the de-facto standard for IoT. The proposed SDN-BLE framework uses a routing network slice for the data plane information flow and a flooding network slice for the control plane information flow, ensuring their isolation while still being transmitted over the wireless medium. The design and implementation of all the classical SDN layers on a hybrid BLE mesh testbed is given, where the data plane is formed by the BLE nodes and the control plane can be centralized on a server or distributed over several WiFi gateways. Several controllers are described and implemented, allowing the framework to obtain end-to-end network knowledge to manage individual nodes over the air and configure their behavior to meet application requirements. An experimental characterization of the SDN-BLE framework is given, where the impact of the different parameters of the system on the network reliability, overhead, and energy consumption is studied. Additionally, the distributed versus centralized control plane operation modes are experimentally characterized, and it is shown that the distributed approach can provide the same performance as the centralized one when careful system design is performed. Finally, a proof of concept for the SDN-BLE framework is presented, where a network congestion is automatically detected and the nodes responsible of such congestion are identified and reconfigured over the air, bypassing the congested links, to resume regular network performance.
物联网(IoT)范式结合了大量电池限制和低计算功率设备与低延迟和高可靠性网络需求的互连。此外,具有不同服务质量(QoS)需求的各种端到端服务和应用程序有望在同一网络基础设施中共存。软件定义网络(SDN)是一种旨在解决这些问题的范例,但其在无线网络,特别是在资源受限的物联网系统中的实现极具挑战性,并且采用非常有限,因为它需要隔离数据和控制平面信息流以及可靠且可扩展的控制平面。在这项工作中,蓝牙低功耗(BLE)网格被引入作为全无线SDN-BLE实现的适当技术,该技术已成为物联网的事实上的标准。所提出的SDN-BLE框架在数据平面信息流中使用路由网络片,在控制平面信息流中使用泛洪网络片,保证了它们的隔离性,同时仍能在无线介质上传输。给出了在混合BLE网格测试台上所有经典SDN层的设计与实现,其中数据平面由BLE节点组成,控制平面可以集中在一台服务器上,也可以分布在多个WiFi网关上。描述和实现了几个控制器,允许框架获得端到端网络知识,以通过空中管理单个节点并配置其行为以满足应用程序需求。给出了SDN-BLE框架的实验表征,研究了系统不同参数对网络可靠性、开销和能耗的影响。此外,对分布式控制平面和集中式控制平面的工作方式进行了实验表征,结果表明,在精心设计系统时,分布式控制平面可以提供与集中式控制平面相同的性能。最后,提出了SDN-BLE框架的概念验证,其中自动检测网络拥塞,并通过空中识别和重新配置负责此类拥塞的节点,绕过拥塞链路,以恢复正常的网络性能。
{"title":"An All-wireless SDN Framework for BLE Mesh","authors":"Yuri Murillo, A. Chiumento, B. Reynders, S. Pollin","doi":"10.1145/3403581","DOIUrl":"https://doi.org/10.1145/3403581","url":null,"abstract":"The Internet of Things (IoT) paradigm combines the interconnection of massive amounts of battery-constrained and low-computational-power devices with low-latency and high-reliability network requirements. Additionally, diverse end-to-end services and applications with different Quality of Service (QoS) requirements are expected to coexist in the same network infrastructure. Software-defined Networking (SDN) is a paradigm designed to solve these problems, but its implementation in wireless networks and especially in the resource-constrained IoT systems is extremely challenging and has seen very limited adoption, since it requires isolation of data and control plane information flows and a reliable and scalable control plane. In this work, Bluetooth Low Energy (BLE) mesh is introduced as an adequate technology for an all-wireless SDN-BLE implementation, which is a technology that has become the de-facto standard for IoT. The proposed SDN-BLE framework uses a routing network slice for the data plane information flow and a flooding network slice for the control plane information flow, ensuring their isolation while still being transmitted over the wireless medium. The design and implementation of all the classical SDN layers on a hybrid BLE mesh testbed is given, where the data plane is formed by the BLE nodes and the control plane can be centralized on a server or distributed over several WiFi gateways. Several controllers are described and implemented, allowing the framework to obtain end-to-end network knowledge to manage individual nodes over the air and configure their behavior to meet application requirements. An experimental characterization of the SDN-BLE framework is given, where the impact of the different parameters of the system on the network reliability, overhead, and energy consumption is studied. Additionally, the distributed versus centralized control plane operation modes are experimentally characterized, and it is shown that the distributed approach can provide the same performance as the centralized one when careful system design is performed. Finally, a proof of concept for the SDN-BLE framework is presented, where a network congestion is automatically detected and the nodes responsible of such congestion are identified and reconfigured over the air, bypassing the congested links, to resume regular network performance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"5 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2020-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3403581","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72525156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authenticating Smart Home Devices via Home Limited Channels 通过家庭有限渠道认证智能家居设备
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-08-04 DOI: 10.1145/3399432
Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu
Nowadays, most Internet of Things devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks such as spoofing and eavesdropping attacks. Existing methods using encryption keys may be inapplicable on these resource-constrained devices that cannot afford the computationally expensive encryption operations. Thus, in this article, we design a key-free communication method for such devices in a smart home. In particular, we introduce the Home-limited Channel (HLC) that can be accessed only within a house yet inaccessible for outside-house attackers. Utilizing HLCs, we propose HlcAuth, a challenge-response mechanism to authenticate the communications between smart devices without keys. The advantages of HlcAuth are low cost, lightweight as well as key-free, and requiring no human intervention. According to the security analysis, HlcAuth can defeat replay attacks, message-forgery attacks, and man-in-the-middle (MiTM) attacks, among others. We further evaluate HlcAuth in four different physical scenarios, and results show that HlcAuth achieves 100% true positive rate (TPR) within 4.2m for in-house devices while 0% false positive rate (FPR) for outside attackers, i.e., guaranteeing a high-level usability and security for in-house communications. Finally, we implement HlcAuth in both single-room and multi-room scenarios.
如今,智能家居中的物联网设备大多依靠射频信道进行通信,容易受到欺骗、窃听攻击等各种攻击。使用加密密钥的现有方法可能不适用于这些资源受限的设备,因为它们无法承担计算成本高昂的加密操作。因此,在本文中,我们为智能家居中的这些设备设计了一种无钥匙通信方法。特别地,我们引入了家庭限制通道(HLC),它只能在房屋内访问,而外部攻击者无法访问。利用HLCs,我们提出HlcAuth,一种挑战-响应机制,用于验证智能设备之间的通信,无需密钥。hlcath的优点是成本低、重量轻、不需要钥匙,而且不需要人工干预。根据安全性分析,HlcAuth可以击败重放攻击、消息伪造攻击和中间人攻击等。我们进一步在四种不同的物理场景下对HlcAuth进行了评估,结果表明,HlcAuth对内部设备在4.2m内实现了100%的真阳性率(TPR),而对外部攻击者的假阳性率(FPR)为0%,即保证了内部通信的高可用性和安全性。最后,我们在单房间和多房间场景中实现hlcath。
{"title":"Authenticating Smart Home Devices via Home Limited Channels","authors":"Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu","doi":"10.1145/3399432","DOIUrl":"https://doi.org/10.1145/3399432","url":null,"abstract":"Nowadays, most Internet of Things devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks such as spoofing and eavesdropping attacks. Existing methods using encryption keys may be inapplicable on these resource-constrained devices that cannot afford the computationally expensive encryption operations. Thus, in this article, we design a key-free communication method for such devices in a smart home. In particular, we introduce the Home-limited Channel (HLC) that can be accessed only within a house yet inaccessible for outside-house attackers. Utilizing HLCs, we propose HlcAuth, a challenge-response mechanism to authenticate the communications between smart devices without keys. The advantages of HlcAuth are low cost, lightweight as well as key-free, and requiring no human intervention. According to the security analysis, HlcAuth can defeat replay attacks, message-forgery attacks, and man-in-the-middle (MiTM) attacks, among others. We further evaluate HlcAuth in four different physical scenarios, and results show that HlcAuth achieves 100% true positive rate (TPR) within 4.2m for in-house devices while 0% false positive rate (FPR) for outside attackers, i.e., guaranteeing a high-level usability and security for in-house communications. Finally, we implement HlcAuth in both single-room and multi-room scenarios.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"61 1","pages":"1 - 24"},"PeriodicalIF":2.7,"publicationDate":"2020-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88019349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Evaluation of the 6TiSCH Distributed Resource Management Mode 6TiSCH分布式资源管理模式评价
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-10 DOI: 10.1145/3395927
F. Righetti, C. Vallati, Sajal K. Das, G. Anastasi
The IETF is currently defining the 6TiSCH architecture for the Industrial Internet of Things to ensure reliable and timely communication. 6TiSCH relies on the IEEE TSCH MAC protocol and defines different scheduling approaches for managing TSCH cells, including a distributed (neighbor-to-neighbor) scheduling scheme, where cells are allocated by nodes in a cooperative way. Each node leverages a Scheduling Function (SF) to compute the required number of cells, and the 6top (6P) protocol to negotiate them with neighbors. Currently, the Minimal Scheduling Function (MSF) is under consideration for standardization. However, multiple SFs are expected to be used in real deployments, in order to accommodate the requirements of different use cases. In this article, we carry out a comprehensive analysis of 6TiSCH distributed scheduling to assess its performance under realistic conditions. Firstly, we derive an analytical model to assess the 6P protocol, and we show that 6P transactions take a long time to complete and may also fail. Then, we evaluate the performance of MSF and other distributed SFs through simulations and real experiments. The results show that their performance is affected by the failure of 6P transactions and the instability of the routing protocol, which may lead to congestion from which the network is unable to recover. Finally, we propose a new SF (E-OTF) and show, through simulations and real experiments, that it can effectively improve the overall performance, by allowing nodes to quickly recover from congestion.
IETF目前正在为工业物联网定义6TiSCH架构,以确保可靠和及时的通信。6TiSCH依赖于IEEE TSCH MAC协议,并定义了不同的调度方法来管理TSCH单元,包括分布式(邻居到邻居)调度方案,其中单元由节点以合作的方式分配。每个节点利用调度函数(Scheduling Function, SF)计算所需的单元数,并利用6top (6P)协议与邻居进行协商。目前,最小调度函数(MSF)正在考虑标准化。然而,为了适应不同用例的需求,期望在实际部署中使用多个sf。在本文中,我们对6TiSCH分布式调度进行了全面的分析,以评估其在现实条件下的性能。首先,我们推导了一个分析模型来评估6P协议,我们表明6P交易需要很长时间才能完成,也可能失败。然后,我们通过仿真和实际实验来评估MSF和其他分布式SFs的性能。结果表明,6P事务的失败和路由协议的不稳定性会影响它们的性能,从而导致网络无法恢复的拥塞。最后,我们提出了一种新的SF (E-OTF),并通过仿真和实际实验表明,它可以有效地提高整体性能,允许节点从拥塞中快速恢复。
{"title":"An Evaluation of the 6TiSCH Distributed Resource Management Mode","authors":"F. Righetti, C. Vallati, Sajal K. Das, G. Anastasi","doi":"10.1145/3395927","DOIUrl":"https://doi.org/10.1145/3395927","url":null,"abstract":"The IETF is currently defining the 6TiSCH architecture for the Industrial Internet of Things to ensure reliable and timely communication. 6TiSCH relies on the IEEE TSCH MAC protocol and defines different scheduling approaches for managing TSCH cells, including a distributed (neighbor-to-neighbor) scheduling scheme, where cells are allocated by nodes in a cooperative way. Each node leverages a Scheduling Function (SF) to compute the required number of cells, and the 6top (6P) protocol to negotiate them with neighbors. Currently, the Minimal Scheduling Function (MSF) is under consideration for standardization. However, multiple SFs are expected to be used in real deployments, in order to accommodate the requirements of different use cases. In this article, we carry out a comprehensive analysis of 6TiSCH distributed scheduling to assess its performance under realistic conditions. Firstly, we derive an analytical model to assess the 6P protocol, and we show that 6P transactions take a long time to complete and may also fail. Then, we evaluate the performance of MSF and other distributed SFs through simulations and real experiments. The results show that their performance is affected by the failure of 6P transactions and the instability of the routing protocol, which may lead to congestion from which the network is unable to recover. Finally, we propose a new SF (E-OTF) and show, through simulations and real experiments, that it can effectively improve the overall performance, by allowing nodes to quickly recover from congestion.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"1 1","pages":"1 - 31"},"PeriodicalIF":2.7,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77082630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a Low-cost RSSI-based Crop Monitoring 迈向低成本rssi作物监测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-06-19 DOI: 10.1145/3393667
Jan Bauer, N. Aschenbruck
The continuous monitoring of crop growth is crucial for site-specific and sustainable farm management in the context of precision agriculture. With the help of precise in situ information, agricultural practices, such as irrigation, fertilization, and plant protection, can be dynamically adapted to the changing needs of individual sites, thereby supporting yield increases and resource optimization. Nowadays, IoT technology with networked sensors deployed in greenhouses and farmlands already contributes to in situ information. In addition to existing soil sensors for moisture or nutrient monitoring, there are also (mainly optical) sensors to assess growth developments and vital conditions of crops. This article presents a novel and complementary approach for a low-cost crop sensing that is based on temporal variations of the signal strength of low-power IoT radio communication. To this end, the relationship between crop growth, represented by the leaf area index (LAI), and the attenuation of signal propagation of low-cost radio transceivers is investigated. Real-world experiments in wheat fields show a significant correlation between LAI and received signal strength indicator (RSSI) time series. Moreover, influencing meteorological factors are identified and their effects are analyzed. Including these factors, a multiple linear model is finally developed that enables an RSSI-based LAI estimation with great potential.
在精准农业的背景下,持续监测作物生长对特定地点和可持续的农场管理至关重要。在精确的现场信息的帮助下,农业实践,如灌溉、施肥和植物保护,可以动态地适应个别地点不断变化的需求,从而支持产量增加和资源优化。如今,部署在温室和农田中的联网传感器的物联网技术已经为现场信息做出了贡献。除了现有的用于水分或养分监测的土壤传感器外,还有(主要是光学)传感器用于评估作物的生长发育和生命条件。本文提出了一种基于低功耗物联网无线电通信信号强度时间变化的低成本作物传感的新颖互补方法。为此,研究了以叶面积指数(LAI)为代表的作物生长与低成本无线电收发器信号传播衰减的关系。小麦田间实测表明,LAI与接收信号强度指标(RSSI)时间序列之间存在显著的相关关系。并对影响气象因子进行了识别和分析。考虑到这些因素,最终建立了一个多元线性模型,使基于rssi的LAI估计具有很大的潜力。
{"title":"Towards a Low-cost RSSI-based Crop Monitoring","authors":"Jan Bauer, N. Aschenbruck","doi":"10.1145/3393667","DOIUrl":"https://doi.org/10.1145/3393667","url":null,"abstract":"The continuous monitoring of crop growth is crucial for site-specific and sustainable farm management in the context of precision agriculture. With the help of precise in situ information, agricultural practices, such as irrigation, fertilization, and plant protection, can be dynamically adapted to the changing needs of individual sites, thereby supporting yield increases and resource optimization. Nowadays, IoT technology with networked sensors deployed in greenhouses and farmlands already contributes to in situ information. In addition to existing soil sensors for moisture or nutrient monitoring, there are also (mainly optical) sensors to assess growth developments and vital conditions of crops. This article presents a novel and complementary approach for a low-cost crop sensing that is based on temporal variations of the signal strength of low-power IoT radio communication. To this end, the relationship between crop growth, represented by the leaf area index (LAI), and the attenuation of signal propagation of low-cost radio transceivers is investigated. Real-world experiments in wheat fields show a significant correlation between LAI and received signal strength indicator (RSSI) time series. Moreover, influencing meteorological factors are identified and their effects are analyzed. Including these factors, a multiple linear model is finally developed that enables an RSSI-based LAI estimation with great potential.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"43 1","pages":"1 - 26"},"PeriodicalIF":2.7,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74135108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1