首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Cluster Head Selection for Energy Balancing in Wireless Sensor Networks Using Modified Salp Swarm Optimization 基于改进Salp群优化的无线传感器网络能量平衡簇头选择
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218508
G. S. Kumar, G. Sahu, Mayank Mathur
– In today’s realm, Wireless Sensor Network (WSN) has been emerged as a prominent research topic due to the advances in the design of small and low cost sensors for an extensive sort of applications. A battery powers the sensor nodes that make up the WSNs. The restricted quantity of electricity available within WSN nodes is considered as one of the important research issues. Researchers have offered a variety of proposals from various angles to maximize the use of energy resources. Clustering nodes has shown to be one of the most effective ways for WSNs to save energy. The traditional Salp Swarm Algorithm (SSA) has a slow convergence rate and local optima stagnation, and thus produces disappointing results on higher-dimensional issues. Convergence inefficiency is caused by SSA's lack of exploration and exploitation. Improvements to the original population update method are made in this study, and a Modified Salp Swarm Algorithm (MSSA) is provided for achieving energy stability and sustaining network life time through effective cluster head selection throughout the clustering process. Furthermore, the performance of MSSA is validated and equated to other start-of-the art optimization algorithms under different WSN deployments. The suggested model outperforms competing algorithms in terms of sustained operation time, longevity of the network, and total energy consumption, as shown by the simulation results.
–在当今领域,无线传感器网络(WSN)已成为一个突出的研究课题,这是因为在设计用于广泛应用的小型低成本传感器方面取得了进展。电池为构成无线传感器网络的传感器节点供电。WSN节点内可用电量的限制被认为是一个重要的研究问题。研究人员从各个角度提出了各种建议,以最大限度地利用能源。集群节点已被证明是无线传感器网络最有效的节能方式之一。传统的Salp Swarm算法(SSA)收敛速度慢,局部最优停滞,在高维问题上产生了令人失望的结果。SSA缺乏探索和开发,导致收敛效率低下。本研究对原有的种群更新方法进行了改进,提出了一种改进的Salp Swarm算法(MSSA),通过在整个聚类过程中有效地选择簇头来实现能量稳定性和维持网络寿命。此外,在不同的WSN部署下,MSSA的性能得到了验证,并与其他现有技术的优化算法相当。仿真结果表明,所提出的模型在持续运行时间、网络寿命和总能耗方面优于竞争算法。
{"title":"Cluster Head Selection for Energy Balancing in Wireless Sensor Networks Using Modified Salp Swarm Optimization","authors":"G. S. Kumar, G. Sahu, Mayank Mathur","doi":"10.22247/ijcna/2023/218508","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218508","url":null,"abstract":"– In today’s realm, Wireless Sensor Network (WSN) has been emerged as a prominent research topic due to the advances in the design of small and low cost sensors for an extensive sort of applications. A battery powers the sensor nodes that make up the WSNs. The restricted quantity of electricity available within WSN nodes is considered as one of the important research issues. Researchers have offered a variety of proposals from various angles to maximize the use of energy resources. Clustering nodes has shown to be one of the most effective ways for WSNs to save energy. The traditional Salp Swarm Algorithm (SSA) has a slow convergence rate and local optima stagnation, and thus produces disappointing results on higher-dimensional issues. Convergence inefficiency is caused by SSA's lack of exploration and exploitation. Improvements to the original population update method are made in this study, and a Modified Salp Swarm Algorithm (MSSA) is provided for achieving energy stability and sustaining network life time through effective cluster head selection throughout the clustering process. Furthermore, the performance of MSSA is validated and equated to other start-of-the art optimization algorithms under different WSN deployments. The suggested model outperforms competing algorithms in terms of sustained operation time, longevity of the network, and total energy consumption, as shown by the simulation results.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42023817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT) 面向物联网中更高不可抵赖性的多方计算框架
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218513
Divya K.S, Roopashree H.R, Yogeesh A.C
– Multiparty computation is essential in offering a better form of non-repudiation, which is not much explored in past research work. A review of existing non-repudiation-based approaches found various shortcomings that do not offer a good balance between robust security and algorithm efficiency. Therefore, the proposed study presents a novel yet simple multiparty computation framework to ensure a higher degree of non-repudiation considering a use-case of a highly distributed and large network, i.e., Internet-of-Things (IoT). The study implements a unique encryption mechanism that uses a transformation strategy to perform encoding while using split key management to retain maximal secrecy and multiparty authentication for enhanced security. The simulation outcome of the study showcases that the proposed scheme offers approximately a 48% reduction in computation overhead, 54% minimization in delay, and 58% faster processing in contrast to frequently reported non-repudiation schemes.
多方计算对于提供一种更好的不可抵赖性形式至关重要,这在过去的研究工作中没有得到太多的探索。对现有的基于不可否认的方法的回顾发现了各种缺点,这些缺点不能在鲁棒安全性和算法效率之间提供良好的平衡。因此,提出的研究提出了一种新颖而简单的多方计算框架,以确保高度分布式和大型网络(即物联网(IoT))的用例具有更高程度的不可否认性。该研究实现了一种独特的加密机制,该机制使用转换策略进行编码,同时使用分割密钥管理来保持最大的保密性和多方身份验证以增强安全性。研究的模拟结果表明,与经常报道的不可否认方案相比,所提出的方案提供了大约48%的计算开销减少,54%的延迟最小化,58%的处理速度加快。
{"title":"Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT)","authors":"Divya K.S, Roopashree H.R, Yogeesh A.C","doi":"10.22247/ijcna/2023/218513","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218513","url":null,"abstract":"– Multiparty computation is essential in offering a better form of non-repudiation, which is not much explored in past research work. A review of existing non-repudiation-based approaches found various shortcomings that do not offer a good balance between robust security and algorithm efficiency. Therefore, the proposed study presents a novel yet simple multiparty computation framework to ensure a higher degree of non-repudiation considering a use-case of a highly distributed and large network, i.e., Internet-of-Things (IoT). The study implements a unique encryption mechanism that uses a transformation strategy to perform encoding while using split key management to retain maximal secrecy and multiparty authentication for enhanced security. The simulation outcome of the study showcases that the proposed scheme offers approximately a 48% reduction in computation overhead, 54% minimization in delay, and 58% faster processing in contrast to frequently reported non-repudiation schemes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41833975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ornstein Uhlenbeck Cache Obliviousness Neural Congestion Control in Wireless Network for IOT Data Transmission 用于物联网数据传输的无线网络中的Ornstein-Uhlenbeck缓存遗忘神经拥塞控制
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218512
N. Thrimoorthy, Somashekhara Reddy D, C. R., Soumya Unnikrishnan, Vanitha K
– Wireless Network is one of the Internet-of-Things (IoT) prototypes that come up with monitoring services, therefore, influencing the life of human beings. To ensure efficiency and robustness, Quality-of-Service (QoS) is of the predominant point at issue. Congestion in wireless networks will moreover minimize the anticipated QoS of the related applications. Motivated by this, a novel method called, Ornstein– Uhlenbeck Transition and Cache Obliviousness Neural Adaptive (OUT-CONA) to improve congestion control of wireless mesh networks is presented. Adaptive actor-critic deep reinforcement learning scheme on Ornstein–Uhlenbeck State Transition scheduling model to address handovers during data transmission for IoT-enabled Wireless Networks is first designed. Here, by employing the Ornstein–Uhlenbeck state transition scheduling model, both the advantages of the Gauss and Markov Processes are exploited, therefore reducing the energy consumption involved while performing the transition. Next, in the OUT-CONA method, LSTM is imposed for learning the current state representation. The LSTM with the current state representation achieves the objective of controlling congestion with cache obliviousness. The Cache Obliviousness-based Congestion method is utilized for congestion control with obliviousness caching using coherent shielding among organized as well as disorganized data. Furthermore, the performance of the OUT-CONA method is evaluated and compares the results with the performances of conventional techniques, adaptive aggregation as well as hybrid deep learning. The evaluation of the OUT-CONA congestion control method attains better network using lesser misclassification rate, consumption of energy, delay as well as higher goodput using conventional methods in Wireless Mesh Networks.
——无线网络是物联网(IoT)的雏形之一,可以提供监控服务,从而影响人类的生活。为了保证效率和鲁棒性,服务质量(QoS)是一个重要的问题。此外,无线网络中的拥塞将使相关应用的预期QoS最小化。在此基础上,提出了一种改进无线网状网络拥塞控制的新方法——Ornstein - Uhlenbeck转换和缓存遗忘神经自适应(OUT-CONA)。首先设计了基于Ornstein-Uhlenbeck状态转移调度模型的自适应actor-critic深度强化学习方案,以解决物联网无线网络数据传输过程中的切换问题。在这里,通过采用Ornstein-Uhlenbeck状态转移调度模型,利用了高斯过程和马尔可夫过程的优点,从而减少了执行转移时所涉及的能量消耗。接下来,在OUT-CONA方法中,施加LSTM来学习当前状态表示。具有当前状态表示的LSTM通过缓存遗忘实现了控制拥塞的目的。基于缓存遗忘的拥塞方法用于拥塞控制,使用在有组织和无组织数据之间使用一致屏蔽的遗忘缓存。此外,评估了OUT-CONA方法的性能,并将结果与传统技术、自适应聚合和混合深度学习的性能进行了比较。在无线Mesh网络中,对OUT-CONA拥塞控制方法进行了评价,以较低的误分类率、较低的能耗、较低的时延和较高的good - put获得了较好的网络效果。
{"title":"Ornstein Uhlenbeck Cache Obliviousness Neural Congestion Control in Wireless Network for IOT Data Transmission","authors":"N. Thrimoorthy, Somashekhara Reddy D, C. R., Soumya Unnikrishnan, Vanitha K","doi":"10.22247/ijcna/2023/218512","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218512","url":null,"abstract":"– Wireless Network is one of the Internet-of-Things (IoT) prototypes that come up with monitoring services, therefore, influencing the life of human beings. To ensure efficiency and robustness, Quality-of-Service (QoS) is of the predominant point at issue. Congestion in wireless networks will moreover minimize the anticipated QoS of the related applications. Motivated by this, a novel method called, Ornstein– Uhlenbeck Transition and Cache Obliviousness Neural Adaptive (OUT-CONA) to improve congestion control of wireless mesh networks is presented. Adaptive actor-critic deep reinforcement learning scheme on Ornstein–Uhlenbeck State Transition scheduling model to address handovers during data transmission for IoT-enabled Wireless Networks is first designed. Here, by employing the Ornstein–Uhlenbeck state transition scheduling model, both the advantages of the Gauss and Markov Processes are exploited, therefore reducing the energy consumption involved while performing the transition. Next, in the OUT-CONA method, LSTM is imposed for learning the current state representation. The LSTM with the current state representation achieves the objective of controlling congestion with cache obliviousness. The Cache Obliviousness-based Congestion method is utilized for congestion control with obliviousness caching using coherent shielding among organized as well as disorganized data. Furthermore, the performance of the OUT-CONA method is evaluated and compares the results with the performances of conventional techniques, adaptive aggregation as well as hybrid deep learning. The evaluation of the OUT-CONA congestion control method attains better network using lesser misclassification rate, consumption of energy, delay as well as higher goodput using conventional methods in Wireless Mesh Networks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46126228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach 基于弹性共识的无线传感器网络时间同步分布式Sybil攻击检测策略:一种图论方法
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218510
S. K. Jha, Anil Gupta, Niranjan Panigrahi
– Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n 2 ). The algorithm is validated through extensive simulation results.
—对时间同步服务的安全攻击会导致无线传感器网络(wsn)无法持续运行,甚至可能导致系统完全瘫痪。最脆弱的攻击类型之一是Sybil攻击,其中一个节点错误地假设了许多身份。尽管WSN中基于共识的时间同步(CTS)算法因其简单性和分布式特性而受到广泛关注,但当受到Sybil攻击时,CTS算法并不表现出鲁棒性。在此背景下,采用图论方法提出了一种消息级Sybil检测机制,即Sybil弹性一致时间同步协议(SRCTS)。提出了一种基于连接组件理论的分布式Sybil消息检测和过滤机制。鲁棒安全时间同步协议(RTSP)和基于节点识别的安全时间同步协议(nsts)在检测和收敛速度方面进行了比较。与SRCTS和RTSP相比,Sybil消息检测率提高了6%,与SRCTS和nist相比提高了14%。仿真结果表明,SRCTS算法在收敛速度上比nsts算法提高62%,比RTSP算法提高45%。通过深入的数学分析,证明了算法的正确性,并证明了消息复杂度为O(n 2)。仿真结果验证了该算法的有效性。
{"title":"Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach","authors":"S. K. Jha, Anil Gupta, Niranjan Panigrahi","doi":"10.22247/ijcna/2023/218510","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218510","url":null,"abstract":"– Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n 2 ). The algorithm is validated through extensive simulation results.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41635983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm 基于信任和k -均值聚类算法的战场物联网黑洞攻击安全模型
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218514
P. Rutravigneshwaran, G. Anitha
– The Internet of Things (IoT) acts an imperative part in the Battlefield Network (BN) for group-based communication. The new technology is called Internet of Battlefield Things (IoBT) that delivers intelligence services on the battlefield to soldiers and commanders equipped with smart devices. Though it provides numerous benefits, it is also susceptible to many attacks, because of the open and remote deployment of Battlefield Things (BTs). It is more critical to provide security in such networks than in commercial IoT applications because they must contend with both IoT networks and tactical battlefield environments. Because of restricted resources, an attacker may compromise the BTs. The BT that has been seized by the adversary is called a malicious BT and it may launch several security attacks on the BN. To identify these malicious BTs, the IoBT network requires a reputation-based trust model. To address the black hole attack or malicious attack over Routing Protocol for Low Power and Lossy Networks (RPL) is a key objective of the proposed work. The proposed work is the combination of both machine learning algorithm and trust management and it is named as KmCtrust model. By removing malicious BTs from the network, only BTs participating in the mission are trusted, which improves mission performance in the IoBT network. The simulation analysis of KmCtrust model has witnessed the better results in terms of various performance
物联网(IoT)在战场网络(BN)中起着至关重要的作用,用于基于群的通信。这项新技术被称为战场物联网(IoBT),它可以向配备智能设备的士兵和指挥官提供战场上的情报服务。尽管它提供了许多好处,但由于战场物(bt)的开放和远程部署,它也容易受到许多攻击。与商业物联网应用相比,在此类网络中提供安全性更为关键,因为它们必须同时应对物联网网络和战术战场环境。由于资源有限,攻击者可能会危及bt。被攻击者捕获的BT被称为恶意BT,它可能对BN发起多次安全攻击。为了识别这些恶意bt, IoBT网络需要基于声誉的信任模型。解决黑洞攻击或针对低功耗和有损网络路由协议(RPL)的恶意攻击是提出工作的一个关键目标。该算法将机器学习算法与信任管理相结合,并将其命名为KmCtrust模型。通过将恶意bt从网络中移除,只有参与任务的bt是可信的,从而提高了IoBT网络中的任务性能。仿真分析表明,KmCtrust模型在各项性能方面都取得了较好的效果
{"title":"Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm","authors":"P. Rutravigneshwaran, G. Anitha","doi":"10.22247/ijcna/2023/218514","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218514","url":null,"abstract":"– The Internet of Things (IoT) acts an imperative part in the Battlefield Network (BN) for group-based communication. The new technology is called Internet of Battlefield Things (IoBT) that delivers intelligence services on the battlefield to soldiers and commanders equipped with smart devices. Though it provides numerous benefits, it is also susceptible to many attacks, because of the open and remote deployment of Battlefield Things (BTs). It is more critical to provide security in such networks than in commercial IoT applications because they must contend with both IoT networks and tactical battlefield environments. Because of restricted resources, an attacker may compromise the BTs. The BT that has been seized by the adversary is called a malicious BT and it may launch several security attacks on the BN. To identify these malicious BTs, the IoBT network requires a reputation-based trust model. To address the black hole attack or malicious attack over Routing Protocol for Low Power and Lossy Networks (RPL) is a key objective of the proposed work. The proposed work is the combination of both machine learning algorithm and trust management and it is named as KmCtrust model. By removing malicious BTs from the network, only BTs participating in the mission are trusted, which improves mission performance in the IoBT network. The simulation analysis of KmCtrust model has witnessed the better results in terms of various performance","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68278489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Framework for Resource Management in IoT Ecosystem Over 5G Network 5G网络上物联网生态系统资源管理的调度框架
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218515
G. S. Rapate, N. Naveen
– Resource management in the 5G network is one of the critical concerns which is increasingly seeking attention from the research community; however, a review of existing literature showcases very less usage of scheduling and more inclination towards sophisticated approaches of resource management which are practically infeasible to be executed over resource-constrained devices over Internet-of-Things (IoT). Therefore, the proposed scheme presents a unique framework for effective resource management in a 5G network using a unique scheduling approach. The system executes a novel routine management of time slots considering operational time and transition states of IoT nodes to balance the state of active and passive radio mode operation. The simulated outcome of the study shows that the proposed scheme offers approximately 35% of more residual energy, 47% of reduced energy dissipation, 25% of reduced delay, and 43% of faster processing speed in contrast to existing scheduling schemes in the IoT environment.
–5G网络中的资源管理是研究界日益关注的关键问题之一;然而,对现有文献的回顾表明,调度的使用非常少,更倾向于复杂的资源管理方法,这些方法在物联网(IoT)上的资源受限设备上执行实际上是不可行的。因此,所提出的方案使用独特的调度方法为5G网络中的有效资源管理提供了一个独特的框架。该系统执行一种新的时隙例行管理,考虑到物联网节点的运行时间和过渡状态,以平衡主动和被动无线电模式运行的状态。研究的模拟结果表明,与物联网环境中的现有调度方案相比,所提出的方案提供了大约35%的剩余能量、47%的能量耗散、25%的延迟和43%的更快处理速度。
{"title":"Scheduling Framework for Resource Management in IoT Ecosystem Over 5G Network","authors":"G. S. Rapate, N. Naveen","doi":"10.22247/ijcna/2023/218515","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218515","url":null,"abstract":"– Resource management in the 5G network is one of the critical concerns which is increasingly seeking attention from the research community; however, a review of existing literature showcases very less usage of scheduling and more inclination towards sophisticated approaches of resource management which are practically infeasible to be executed over resource-constrained devices over Internet-of-Things (IoT). Therefore, the proposed scheme presents a unique framework for effective resource management in a 5G network using a unique scheduling approach. The system executes a novel routine management of time slots considering operational time and transition states of IoT nodes to balance the state of active and passive radio mode operation. The simulated outcome of the study shows that the proposed scheme offers approximately 35% of more residual energy, 47% of reduced energy dissipation, 25% of reduced delay, and 43% of faster processing speed in contrast to existing scheduling schemes in the IoT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46475279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NDTRA-MAT: A Novel Technique for Evaluating the Data Transfer Rate, Reducing the False Alarm Rate, and avoiding Packet Droppings Rate against Malicious Activity in Wireless Sensor Networks NDTRA-MAT:一种评估无线传感器网络中数据传输速率、降低误报率和避免恶意活动丢包率的新技术
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218507
Minakshi Sahu, Nilambar Sethi, Susant Kumar Das, Umashankar Ghugar
– Wireless Sensor Networks (WSN) are under attack from insider packet drops. Each node will employ a trust mechanism to assess the trustworthiness of its neighbor nodes to send packets to only the trustworthy neighbors to distinguish packets dropped by inside intruders from network faults. The false alert arises when a normal node's trust value decreases and is removed from the routing paths using trust-aware routing algorithms. Optimizing the packet delivery ratio is a critical design consideration for WSNs. WSNs have long benefited from a secure zone-based routing mechanism already in place. A new routing criterion was developed for packet transfer in multi-hop communication. The routing metric was designed to protect against message manipulation, dropping, and flooding assaults. The method used an alternative way to route a packet while avoiding dangerous zones safely and efficiently in the routing process. Despite energy conservation and greater attack resilience, congestion in the WSN has increased, and the packet delivery ratio has been reduced. Each node has computing power that serves as a transceiver for the network. A packet-dropping node is hacked and forwards any or all the packets it receives. All or some boxes are packages modified by a hacked node that is intended to deliver them. In multi-hop sensor networks, packet dropping and alteration are two popular methods that an adversary can use to interrupt communication. The proposed model NDTRA-MAT is used to avoid packet loss with reduced false alarms. It is compared with the existing models, and the performance is calculated in terms of Malicious Node Detection Accuracy Levels
–无线传感器网络(WSN)正受到内部数据包丢失的攻击。每个节点将采用信任机制来评估其邻居节点的可信度,以仅向可信任的邻居发送分组,从而将内部入侵者丢弃的分组与网络故障区分开来。当正常节点的信任值降低并使用信任感知路由算法从路由路径中删除时,会出现错误警报。优化数据包传输率是无线传感器网络的一个关键设计考虑因素。长期以来,无线传感器网络一直受益于已经存在的基于安全区域的路由机制。针对多跳通信中的数据包传输问题,提出了一种新的路由准则。路由度量旨在防止消息操纵、丢弃和泛滥攻击。该方法使用了一种替代方法来路由数据包,同时在路由过程中安全有效地避开危险区域。尽管节省了能源并提高了攻击弹性,但WSN中的拥塞增加了,并且降低了数据包传输率。每个节点都具有作为网络收发器的计算能力。数据包丢弃节点被黑客入侵并转发它接收到的任何或所有数据包。所有或一些盒子都是被黑客入侵的节点修改的包,目的是传递它们。在多跳传感器网络中,数据包丢弃和更改是对手用来中断通信的两种常用方法。所提出的模型NDTRA-MAT用于避免分组丢失,同时减少了误报。将其与现有模型进行比较,并根据恶意节点检测精度级别计算性能
{"title":"NDTRA-MAT: A Novel Technique for Evaluating the Data Transfer Rate, Reducing the False Alarm Rate, and avoiding Packet Droppings Rate against Malicious Activity in Wireless Sensor Networks","authors":"Minakshi Sahu, Nilambar Sethi, Susant Kumar Das, Umashankar Ghugar","doi":"10.22247/ijcna/2023/218507","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218507","url":null,"abstract":"– Wireless Sensor Networks (WSN) are under attack from insider packet drops. Each node will employ a trust mechanism to assess the trustworthiness of its neighbor nodes to send packets to only the trustworthy neighbors to distinguish packets dropped by inside intruders from network faults. The false alert arises when a normal node's trust value decreases and is removed from the routing paths using trust-aware routing algorithms. Optimizing the packet delivery ratio is a critical design consideration for WSNs. WSNs have long benefited from a secure zone-based routing mechanism already in place. A new routing criterion was developed for packet transfer in multi-hop communication. The routing metric was designed to protect against message manipulation, dropping, and flooding assaults. The method used an alternative way to route a packet while avoiding dangerous zones safely and efficiently in the routing process. Despite energy conservation and greater attack resilience, congestion in the WSN has increased, and the packet delivery ratio has been reduced. Each node has computing power that serves as a transceiver for the network. A packet-dropping node is hacked and forwards any or all the packets it receives. All or some boxes are packages modified by a hacked node that is intended to deliver them. In multi-hop sensor networks, packet dropping and alteration are two popular methods that an adversary can use to interrupt communication. The proposed model NDTRA-MAT is used to avoid packet loss with reduced false alarms. It is compared with the existing models, and the performance is calculated in terms of Malicious Node Detection Accuracy Levels","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41664421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing 基于私有区块链的HDFS数据存储云计算安全存储和数据共享方案
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218509
G. Shrivastava, Sachin Patel
– The storage of a vast quantity of data in the cloud, which is then delivered via the internet, enables Cloud Computing to make doing business easier by providing smooth access to the data and eliminating device compatibility limits. Data that is in transit, on the other hand, may be intercepted by a man-in-the-middle attack, a known plain text assault, a selected cypher text attack, a related key attack, or a pollution attack. Uploading data to a single cloud might, as a result, increase the likelihood that the secret data would be damaged. A distributed file system extensively used in huge data analysis for frameworks such as Hadoop is known as the Hadoop Distributed File System, more commonly referred to as HDFS. Because with HDFS, it is possible to manage enormous volumes of data while using standard hardware that is not very costly. On the other hand, HDFS has several security flaws that might be used for malicious purposes. This highlights how critical it is to implement stringent security measures to make it easier for users to share files inside Hadoop and to have a reliable system in place to validate the shared files' validity claims. The major focus of this article is to discuss our efforts to improve the security of HDFS by using an approach made possible by blockchain technology (hereafter referred to as BlockHDFS). To be more precise, the proposed BlockHDFS uses the Hyperledger Fabric platform, which was developed for business applications, to extract the most value possible from the data inside files to provide reliable data protection and traceability in HDFS. In the results section, the performance of AES is superior to that of other encryption algorithms because it ranges from 1.2 milliseconds to 1.9 milliseconds. In contrast, DES ranges from 1.3 milliseconds to 3.1 milliseconds, three milliseconds to 3.6 millimetres, RC2 milliseconds to 3.9 milliseconds, and RSA milliseconds to 1.4 milliseconds, with data sizes ranging from 910 kilos.
–将大量数据存储在云中,然后通过互联网传输,使云计算能够通过提供对数据的平滑访问和消除设备兼容性限制,使业务更轻松。另一方面,传输中的数据可能会被中间人攻击、已知的纯文本攻击、选定的密码文本攻击、相关的密钥攻击或污染攻击拦截。因此,将数据上传到单个云可能会增加机密数据被损坏的可能性。一种广泛用于Hadoop等框架的海量数据分析的分布式文件系统被称为Hadoop分布式文件系统,通常被称为HDFS。因为使用HDFS,可以在使用成本不高的标准硬件的同时管理大量数据。另一方面,HDFS存在一些可能被用于恶意目的的安全缺陷。这突出表明,实施严格的安全措施,让用户更容易在Hadoop中共享文件,并有一个可靠的系统来验证共享文件的有效性声明是多么重要。本文的主要重点是讨论我们通过使用区块链技术(以下简称BlockHDFS)实现的方法来提高HDFS的安全性。更准确地说,所提出的BlockHDFS使用为商业应用程序开发的Hyperledger Fabric平台,从文件中的数据中提取最大可能的价值,以在HDFS中提供可靠的数据保护和可追溯性。在结果部分,AES的性能优于其他加密算法,因为它的范围从1.2毫秒到1.9毫秒。相反,DES的范围从1.3毫秒到3.1毫秒,3毫秒到3.6毫米,RC2毫秒到3.9毫秒,RSA毫秒到1.4毫秒,数据大小从910公斤不等。
{"title":"Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing","authors":"G. Shrivastava, Sachin Patel","doi":"10.22247/ijcna/2023/218509","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218509","url":null,"abstract":"– The storage of a vast quantity of data in the cloud, which is then delivered via the internet, enables Cloud Computing to make doing business easier by providing smooth access to the data and eliminating device compatibility limits. Data that is in transit, on the other hand, may be intercepted by a man-in-the-middle attack, a known plain text assault, a selected cypher text attack, a related key attack, or a pollution attack. Uploading data to a single cloud might, as a result, increase the likelihood that the secret data would be damaged. A distributed file system extensively used in huge data analysis for frameworks such as Hadoop is known as the Hadoop Distributed File System, more commonly referred to as HDFS. Because with HDFS, it is possible to manage enormous volumes of data while using standard hardware that is not very costly. On the other hand, HDFS has several security flaws that might be used for malicious purposes. This highlights how critical it is to implement stringent security measures to make it easier for users to share files inside Hadoop and to have a reliable system in place to validate the shared files' validity claims. The major focus of this article is to discuss our efforts to improve the security of HDFS by using an approach made possible by blockchain technology (hereafter referred to as BlockHDFS). To be more precise, the proposed BlockHDFS uses the Hyperledger Fabric platform, which was developed for business applications, to extract the most value possible from the data inside files to provide reliable data protection and traceability in HDFS. In the results section, the performance of AES is superior to that of other encryption algorithms because it ranges from 1.2 milliseconds to 1.9 milliseconds. In contrast, DES ranges from 1.3 milliseconds to 3.1 milliseconds, three milliseconds to 3.6 millimetres, RC2 milliseconds to 3.9 milliseconds, and RSA milliseconds to 1.4 milliseconds, with data sizes ranging from 910 kilos.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42147348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Optimization Enabled Routing Protocol for Enhancing Source Location Privacy in Wireless Sensor Networks 增强无线传感器网络源位置保密性的混合优化路由协议
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218511
Chinnu Mary, Gayathri K M, Reeja S R
– Wireless sensor networks (WSN) are utilized in various application domains concerning monitoring and smart application, in which highly sensitive information in healthcare and military applications is also employed using the WSN. The openness and unattended nature of the WSN make security as a challenging task. The information eavesdropping is employed by the network intruder from the source node; hence the location of the source node needs to be protected for the acquisition of information security. Thus, this research introduces a privacy preservation of the source location method using the hybrid optimization based secure routing. For this, Shuffled Shepherd-Coot (SS-Coot) optimization is proposed by hybridizing the foraging behavior of the Coot, a water bird, with the shepherd's behavior in herding the animal community. The incorporation of the herding behavior of the shepherd with Coot's foraging behavior helps to enhance the diversification phase to obtain the best solution by avoiding premature convergence. In the proposed source location privacy preservation, the network boundary radiuses are obtained optimally using the SS-Coot algorithm during the network initialization. Then, the routing through the various boundaries of the network with multi-hop helps to protect the location of the source by confusing the intruder's backtrace process. The analysis is performed based on Packet Delivery Ratio (PDR), throughput, energy consumption, and delivery latency and obtained the values of 1.02867, 1.02909, 0.30171, and 0.00165, respectively.
–无线传感器网络(WSN)被用于与监控和智能应用有关的各种应用领域,其中医疗保健和军事应用中的高度敏感信息也使用WSN。WSN的开放性和无人值守特性使安全成为一项具有挑战性的任务。网络入侵者从源节点进行信息窃听;因此,为了获取信息安全性,需要保护源节点的位置。因此,本研究引入了一种基于混合优化的安全路由的源位置隐私保护方法。为此,Shuffled Shepherd Coot(SS Coot)优化是通过将水鸟Coot的觅食行为与牧羊人在放牧动物群落中的行为相混合而提出的。牧羊人的放牧行为与库特的觅食行为相结合,有助于通过避免过早收敛来增强多样化阶段,以获得最佳解决方案。在所提出的源位置隐私保护中,在网络初始化期间使用SS Coot算法最优地获得网络边界半径。然后,通过多跳网络的各种边界进行路由,通过混淆入侵者的回溯过程,有助于保护源的位置。基于分组传送率(PDR)、吞吐量、能耗和传送延迟进行分析,并分别获得1.02867、1.02909、0.30171和0.00165的值。
{"title":"Hybrid Optimization Enabled Routing Protocol for Enhancing Source Location Privacy in Wireless Sensor Networks","authors":"Chinnu Mary, Gayathri K M, Reeja S R","doi":"10.22247/ijcna/2023/218511","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218511","url":null,"abstract":"– Wireless sensor networks (WSN) are utilized in various application domains concerning monitoring and smart application, in which highly sensitive information in healthcare and military applications is also employed using the WSN. The openness and unattended nature of the WSN make security as a challenging task. The information eavesdropping is employed by the network intruder from the source node; hence the location of the source node needs to be protected for the acquisition of information security. Thus, this research introduces a privacy preservation of the source location method using the hybrid optimization based secure routing. For this, Shuffled Shepherd-Coot (SS-Coot) optimization is proposed by hybridizing the foraging behavior of the Coot, a water bird, with the shepherd's behavior in herding the animal community. The incorporation of the herding behavior of the shepherd with Coot's foraging behavior helps to enhance the diversification phase to obtain the best solution by avoiding premature convergence. In the proposed source location privacy preservation, the network boundary radiuses are obtained optimally using the SS-Coot algorithm during the network initialization. Then, the routing through the various boundaries of the network with multi-hop helps to protect the location of the source by confusing the intruder's backtrace process. The analysis is performed based on Packet Delivery Ratio (PDR), throughput, energy consumption, and delivery latency and obtained the values of 1.02867, 1.02909, 0.30171, and 0.00165, respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41451303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System 面向5G智能交通系统的区块链安全物联网通信
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218518
S. Kumaresh
– Intelligent Transportation System (ITS) with the internet of things (IoT) plays an integral role in smart city developments and enables substantial developments in modern human lifestyles. With the emergence of Fifth-Generation (5G) communication technologies, high-speed communications are enabled among multiple internet-connected devices. However, security, reliability, and scalability are significant factors that affect the communication performance of ITS. The conventional security models are mostly centralized and unsuitable for distributed low-powered IoT-enabled 5G ITS. The new-age distributed ledger technology blockchain can improve the security and reliability of ITS services. Therefore, this paper investigates a blockchain-based security mechanism, Blockchain-based Secure IoT Communication (BSIC), that protects the 5G-ITS from potential security threats. The BSIC utilizes a consortium blockchain model with Improved Proof of Reputation (IPoR) to achieve its objectives. It handles the resource limitation issues of IoT by integrating Vehicular Edge Computing (VEC) services. Further, the BSIC design includes two main components: reputation computation strategy and the IPoR mining process. The proposed model successfully builds a secure IoT communication system by integrating multi-criteria factors in subjective logic-based reputation estimation. It selects the miners by adjusting the consensus pool size according to network density and reputation and improves the consensus efficiency with minimum delay. Moreover, the experimental evaluations are carried out to analyze the efficiency of BSIC using performance metrics such as attack detection rate, consensus delay, and reputation estimation accuracy.
-智能交通系统(ITS)与物联网(IoT)在智慧城市发展中发挥着不可或缺的作用,使现代人类生活方式得到实质性发展。随着第五代(5G)通信技术的出现,多个联网设备之间的高速通信成为可能。而安全性、可靠性和可扩展性是影响ITS通信性能的重要因素。传统的安全模型大多是集中式的,不适合分布式低功耗物联网5G ITS。新时代的分布式账本技术区块链可以提高ITS服务的安全性和可靠性。因此,本文研究了一种基于区块链的安全机制,即基于区块链的安全物联网通信(BSIC),它可以保护5G-ITS免受潜在的安全威胁。BSIC利用具有改进信誉证明(IPoR)的财团区块链模型来实现其目标。它通过集成车辆边缘计算(VEC)服务来处理物联网的资源限制问题。此外,BSIC设计包括两个主要部分:声誉计算策略和IPoR挖掘过程。该模型通过集成基于主观逻辑的声誉评估中的多标准因素,成功构建了安全的物联网通信系统。它根据网络密度和信誉来调整共识池的大小来选择矿工,并以最小的延迟提高共识效率。此外,利用攻击检测率、一致性延迟和信誉估计精度等性能指标对BSIC的效率进行了实验评估。
{"title":"Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System","authors":"S. Kumaresh","doi":"10.22247/ijcna/2023/218518","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218518","url":null,"abstract":"– Intelligent Transportation System (ITS) with the internet of things (IoT) plays an integral role in smart city developments and enables substantial developments in modern human lifestyles. With the emergence of Fifth-Generation (5G) communication technologies, high-speed communications are enabled among multiple internet-connected devices. However, security, reliability, and scalability are significant factors that affect the communication performance of ITS. The conventional security models are mostly centralized and unsuitable for distributed low-powered IoT-enabled 5G ITS. The new-age distributed ledger technology blockchain can improve the security and reliability of ITS services. Therefore, this paper investigates a blockchain-based security mechanism, Blockchain-based Secure IoT Communication (BSIC), that protects the 5G-ITS from potential security threats. The BSIC utilizes a consortium blockchain model with Improved Proof of Reputation (IPoR) to achieve its objectives. It handles the resource limitation issues of IoT by integrating Vehicular Edge Computing (VEC) services. Further, the BSIC design includes two main components: reputation computation strategy and the IPoR mining process. The proposed model successfully builds a secure IoT communication system by integrating multi-criteria factors in subjective logic-based reputation estimation. It selects the miners by adjusting the consensus pool size according to network density and reputation and improves the consensus efficiency with minimum delay. Moreover, the experimental evaluations are carried out to analyze the efficiency of BSIC using performance metrics such as attack detection rate, consensus delay, and reputation estimation accuracy.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1