首页 > 最新文献

Future Internet最新文献

英文 中文
Recent Advances in Information-Centric Networks (ICNs) 以信息为中心的网络(ICN)的最新进展
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-01 DOI: 10.3390/fi15120392
J. López-Ardao, M. Rodríguez-Pérez, S. Herrería-Alonso
The great success of the Internet has been essentially based on the simplicity and versatility of its TCP/IP architecture, which imposes almost no restrictions on either the underlying network technology or on the data being transmitted [...]
Internet的巨大成功本质上是基于其TCP/IP架构的简单性和多功能性,它对底层网络技术或传输的数据几乎没有任何限制。
{"title":"Recent Advances in Information-Centric Networks (ICNs)","authors":"J. López-Ardao, M. Rodríguez-Pérez, S. Herrería-Alonso","doi":"10.3390/fi15120392","DOIUrl":"https://doi.org/10.3390/fi15120392","url":null,"abstract":"The great success of the Internet has been essentially based on the simplicity and versatility of its TCP/IP architecture, which imposes almost no restrictions on either the underlying network technology or on the data being transmitted [...]","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 47","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Distillation-Based GPS Spoofing Detection for Small UAV 基于知识蒸馏的小型无人机 GPS 欺骗检测
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.3390/fi15120389
Yingying Ren, Ryan D. Restivo, Wenkai Tan, Jian Wang, Yongxin Liu, Bin Jiang, Huihui Wang, H. Song
As a core component of small unmanned aerial vehicles (UAVs), GPS is playing a critical role in providing localization for UAV navigation. UAVs are an important factor in the large-scale deployment of the Internet of Things (IoT) and cyber–physical systems (CPS). However, GPS is vulnerable to spoofing attacks that can mislead a UAV to fly into a sensitive area and threaten public safety and private security. The conventional spoofing detection methods need too much overhead, which stops efficient detection from working in a computation-constrained UAV and provides an efficient response to attacks. In this paper, we propose a novel approach to obtain a lightweight detection model in the UAV system so that GPS spoofing attacks can be detected from a long distance. With long-short term memory (LSTM), we propose a lightweight detection model on the ground control stations, and then we distill it into a compact size that is able to run in the control system of the UAV with knowledge distillation. The experimental results show that our lightweight detection algorithm runs in UAV systems reliably and can achieve good performance in GPS spoofing detection.
作为小型无人机(UAV)的核心部件,GPS 在为无人机导航提供定位方面发挥着至关重要的作用。无人机是大规模部署物联网(IoT)和网络物理系统(CPS)的重要因素。然而,GPS 易受欺骗攻击,可能误导无人机飞入敏感区域,威胁公共安全和私人安全。传统的欺骗检测方法需要过多的开销,因此无法在计算受限的无人机中进行高效检测,也无法对攻击做出高效响应。在本文中,我们提出了一种在无人机系统中获得轻量级检测模型的新方法,从而可以从很远的距离检测到 GPS 欺骗攻击。通过长短期记忆(LSTM),我们在地面控制站提出了一个轻量级检测模型,然后将其提炼成一个小巧的模型,通过知识提炼使其能够在无人机控制系统中运行。实验结果表明,我们的轻量级检测算法能在无人机系统中可靠运行,并能在 GPS 欺骗检测中取得良好的性能。
{"title":"Knowledge Distillation-Based GPS Spoofing Detection for Small UAV","authors":"Yingying Ren, Ryan D. Restivo, Wenkai Tan, Jian Wang, Yongxin Liu, Bin Jiang, Huihui Wang, H. Song","doi":"10.3390/fi15120389","DOIUrl":"https://doi.org/10.3390/fi15120389","url":null,"abstract":"As a core component of small unmanned aerial vehicles (UAVs), GPS is playing a critical role in providing localization for UAV navigation. UAVs are an important factor in the large-scale deployment of the Internet of Things (IoT) and cyber–physical systems (CPS). However, GPS is vulnerable to spoofing attacks that can mislead a UAV to fly into a sensitive area and threaten public safety and private security. The conventional spoofing detection methods need too much overhead, which stops efficient detection from working in a computation-constrained UAV and provides an efficient response to attacks. In this paper, we propose a novel approach to obtain a lightweight detection model in the UAV system so that GPS spoofing attacks can be detected from a long distance. With long-short term memory (LSTM), we propose a lightweight detection model on the ground control stations, and then we distill it into a compact size that is able to run in the control system of the UAV with knowledge distillation. The experimental results show that our lightweight detection algorithm runs in UAV systems reliably and can achieve good performance in GPS spoofing detection.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"15 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139201172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey Exploring the Multifaceted Interplay between Mobile Edge Computing and Vehicular Networks 探索移动边缘计算与车载网络多方面相互作用的综合调查
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.3390/fi15120391
Ali Pashazadeh, G. Nardini, G. Stea
In recent years, the need for computation-intensive applications in mobile networks requiring more storage, powerful processors, and real-time responses has risen substantially. Vehicular networks play an important role in this ecosystem, as they must support multiple services, such as traffic monitoring or sharing of data involving different aspects of the vehicular traffic. Moreover, new resource-hungry applications have been envisaged, such as autonomous driving or in-cruise entertainment, hence making the demand for computation and storage resources one of the most important challenges in vehicular networks. In this context, Mobile Edge Computing (MEC) has become the key technology to handle these problems by providing cloud-like capabilities at the edge of mobile networks to support delay-sensitive and computation-intensive tasks. In the meantime, researchers have envisaged use of onboard vehicle resources to extend the computing capabilities of MEC systems. This paper presents a comprehensive review of the most recent works related to MEC-assisted vehicular networks, as well as vehicle-assisted MEC systems. We illustrate the MEC system architecture and discuss its deployment in vehicular environments, as well as the key technologies to realize this integration. After that, we review the recent literature by identifying three different areas, i.e.: (i) MEC providing additional resources to vehicles (e.g., for task offloading); (ii) MEC enabling innovative vehicular applications (e.g., platooning), and (iii) vehicular networks providing additional resources to MEC systems. Finally, we discuss open challenges and future research directions, addressing the possible interplays between MEC systems and vehicular networks.
近年来,移动网络对计算密集型应用的需求大幅增加,这些应用需要更多的存储空间、强大的处理器和实时响应。车载网络在这一生态系统中扮演着重要角色,因为它们必须支持多种服务,如交通监控或涉及车载交通不同方面的数据共享。此外,自动驾驶或车载娱乐等对资源要求极高的新应用已经出现,因此对计算和存储资源的需求成为车载网络面临的最重要挑战之一。在这种情况下,移动边缘计算(MEC)通过在移动网络边缘提供类似云的功能来支持对延迟敏感的计算密集型任务,已成为解决这些问题的关键技术。同时,研究人员还设想利用车载资源来扩展 MEC 系统的计算能力。本文全面回顾了与 MEC 辅助车载网络以及车载 MEC 系统相关的最新研究成果。我们阐述了 MEC 系统架构,讨论了其在车载环境中的部署,以及实现这种集成的关键技术。之后,我们回顾了近期的文献,确定了三个不同的领域,即:(i) 为车辆提供额外资源的 MEC(例如,用于任务卸载);(ii) 支持创新车辆应用的 MEC(例如,排队);以及 (iii) 为 MEC 系统提供额外资源的车辆网络。最后,我们讨论了 MEC 系统与车载网络之间可能存在的相互作用,并探讨了公开挑战和未来研究方向。
{"title":"A Comprehensive Survey Exploring the Multifaceted Interplay between Mobile Edge Computing and Vehicular Networks","authors":"Ali Pashazadeh, G. Nardini, G. Stea","doi":"10.3390/fi15120391","DOIUrl":"https://doi.org/10.3390/fi15120391","url":null,"abstract":"In recent years, the need for computation-intensive applications in mobile networks requiring more storage, powerful processors, and real-time responses has risen substantially. Vehicular networks play an important role in this ecosystem, as they must support multiple services, such as traffic monitoring or sharing of data involving different aspects of the vehicular traffic. Moreover, new resource-hungry applications have been envisaged, such as autonomous driving or in-cruise entertainment, hence making the demand for computation and storage resources one of the most important challenges in vehicular networks. In this context, Mobile Edge Computing (MEC) has become the key technology to handle these problems by providing cloud-like capabilities at the edge of mobile networks to support delay-sensitive and computation-intensive tasks. In the meantime, researchers have envisaged use of onboard vehicle resources to extend the computing capabilities of MEC systems. This paper presents a comprehensive review of the most recent works related to MEC-assisted vehicular networks, as well as vehicle-assisted MEC systems. We illustrate the MEC system architecture and discuss its deployment in vehicular environments, as well as the key technologies to realize this integration. After that, we review the recent literature by identifying three different areas, i.e.: (i) MEC providing additional resources to vehicles (e.g., for task offloading); (ii) MEC enabling innovative vehicular applications (e.g., platooning), and (iii) vehicular networks providing additional resources to MEC systems. Finally, we discuss open challenges and future research directions, addressing the possible interplays between MEC systems and vehicular networks.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"46 6","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139205774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICN-Based Enhanced Content Delivery for CDN 基于 ICN 的 CDN 增强内容交付
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.3390/fi15120390
Lei Gao, Xiaoyong Zhu
With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitations, among which Information-Centric Networking (ICN) is one of the most prominent. ICN features the decoupling of content (service) from the physical devices storing (providing) it through location-independent naming, and offers inherent enhancement to network performance, such as multicast and in-network caching. ICN in-network caching has been extensively studied, and we believe that it may also be the main incentive for ISPs to deploy ICN. A CDN (content delivery network) is a typical content-oriented network paradigm that aims to provide the fast delivery of content. In this paper, we leverage the advantages of the in-network caching of ICN to enhance the content delivery efficiency of CDN by integrating ICN as a service. First, we present our design of a content delivery network enhanced with ICN, called IECDN. Additionally, we formulate a mathematical model to optimize the performance of our proposed design and conduct a series of evaluations. The results indicate that our proposed design provides significant performance gains while reducing bandwidth consumption and shows better resilience to traffic surge.
随着互联网流量的快速增长,传统的主机到主机 TCP/IP 架构在面向内容的应用中受到了许多服务限制。为了解决这些限制,人们提出了各种新型网络架构,其中最突出的是以信息为中心的网络(ICN)。ICN 的特点是通过与位置无关的命名将内容(服务)与存储(提供)内容(服务)的物理设备解耦,并提供固有的网络性能增强功能,如组播和网内缓存。ICN 的网内缓存已得到广泛研究,我们认为这也可能是互联网服务提供商部署 ICN 的主要动力。CDN(内容交付网络)是一种典型的面向内容的网络范例,旨在提供快速的内容交付。在本文中,我们利用 ICN 的网内缓存优势,通过将 ICN 整合为一项服务来提高 CDN 的内容交付效率。首先,我们介绍了利用 ICN 增强的内容交付网络(称为 IECDN)的设计。此外,我们还建立了一个数学模型来优化所提设计的性能,并进行了一系列评估。结果表明,我们提出的设计在降低带宽消耗的同时显著提高了性能,并对流量激增表现出更好的弹性。
{"title":"ICN-Based Enhanced Content Delivery for CDN","authors":"Lei Gao, Xiaoyong Zhu","doi":"10.3390/fi15120390","DOIUrl":"https://doi.org/10.3390/fi15120390","url":null,"abstract":"With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitations, among which Information-Centric Networking (ICN) is one of the most prominent. ICN features the decoupling of content (service) from the physical devices storing (providing) it through location-independent naming, and offers inherent enhancement to network performance, such as multicast and in-network caching. ICN in-network caching has been extensively studied, and we believe that it may also be the main incentive for ISPs to deploy ICN. A CDN (content delivery network) is a typical content-oriented network paradigm that aims to provide the fast delivery of content. In this paper, we leverage the advantages of the in-network caching of ICN to enhance the content delivery efficiency of CDN by integrating ICN as a service. First, we present our design of a content delivery network enhanced with ICN, called IECDN. Additionally, we formulate a mathematical model to optimize the performance of our proposed design and conduct a series of evaluations. The results indicate that our proposed design provides significant performance gains while reducing bandwidth consumption and shows better resilience to traffic surge.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"9 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139201149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Hybrid ITS Networks: A Comprehensive Security Approach 保护混合智能交通系统网络:综合安全方法
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.3390/fi15120388
Ricardo Severino, José Simão, Nuno Datia, António Serrador
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.
合作智能交通系统(C-ITS)不断得到开发,以提高交通安全性和可持续性。然而,"车对物"(V2X)系统的通信本质上是开放的,这就导致了攻击者可以利用的漏洞。这对所有道路使用者都构成了威胁,因为安全故障可能导致侵犯隐私,甚至造成死亡。此外,软移动道路用户的死亡率也很高。因此,在开发 C-ITS 系统时,必须将关注点从联网车辆扩大到软移动用户和传统车辆。这项研究提出了一种在新兴混合网络背景下开发的新方法,将在 5.9 GHz(ITS-G5)频率下运行的智能交通系统与无线移动蜂窝技术相结合。在开发的 C-ITS 混合环境中,实施并评估了两个协议,以在通信中引入安全保障(如隐私和完整性)。因此,这项工作通过蜂窝网络将 G5 连接的智能交通系统站和软移动用户通过智能手机应用程序安全地集成在一起。为实现这一目标,我们使用了商用设备,包括车载设备和路边设备。计算、传输和端到端延迟被用来评估系统的性能。所实施的协议在混合通信中引入了 11% 的额外端到端延迟。此外,采用混合通信的工作流平均额外增加了 28.29 毫秒的端到端延迟。该建议显示出良好的前景,因为它所达到的端到端时间低于大多数 C-ITS 用例所要求的延迟时间。
{"title":"Protecting Hybrid ITS Networks: A Comprehensive Security Approach","authors":"Ricardo Severino, José Simão, Nuno Datia, António Serrador","doi":"10.3390/fi15120388","DOIUrl":"https://doi.org/10.3390/fi15120388","url":null,"abstract":"Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"300 ","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139202780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transmission Rate Control Method for Active Congestion Reduction Based on Network Node Bandwidth Allocation 基于网络节点带宽分配的主动减少拥塞的传输速率控制方法
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-29 DOI: 10.3390/fi15120385
Hongyu Liu, Hong Ni, Rui Han
The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwarding data, while the sending node should manage control. However, sending nodes often lack information about network resources and must use slow-start algorithms to increase the transmission rate, potentially leading to wasted bandwidth and network congestion. Furthermore, incorrect judgments about network congestion by sending nodes may further reduce network throughput. The emergence of new Internet architectures, such as information-centric networks (ICNn), has empowered network nodes with more capabilities, including computation and caching. This paper proposes a method for transmission rate control that actively avoids congestion through network node bandwidth allocation. The sending, network, and receiving nodes each calculate the available transmission rate, and the sending node negotiates with the other nodes through a rate negotiation message to obtain the maximum transmission rate possible given the current state of the network. The network nodes notify the sending node to adjust the transmission rate to adapt to changes in the network through a rate adjustment message. Simulation experiments show that the proposed method is better than traditional methods in reducing network congestion, providing a stable transmission rate, increasing the network throughput capacity, and improving performance in high-latency and high-bandwidth networks. Additionally, the proposed transmission rate control method is fairer than traditional methods.
传输速率控制是当前网络研究的一个重要课题,因为它在决定网络性能方面发挥着重要作用。传统的网络设计原则认为,网络节点应只负责转发数据,而发送节点应负责管理控制。然而,发送节点往往缺乏网络资源信息,必须使用慢速启动算法来提高传输速率,从而可能导致带宽浪费和网络拥塞。此外,发送节点对网络拥塞的错误判断可能会进一步降低网络吞吐量。以信息为中心的网络(ICNn)等新型互联网架构的出现,赋予了网络节点更多的能力,包括计算和缓存。本文提出了一种传输速率控制方法,可通过网络节点带宽分配主动避免拥塞。发送节点、网络节点和接收节点各自计算可用传输速率,发送节点通过速率协商信息与其他节点协商,以获得当前网络状态下可能的最大传输速率。网络节点通过速率调整信息通知发送节点调整传输速率,以适应网络的变化。仿真实验表明,在减少网络拥塞、提供稳定的传输速率、提高网络吞吐能力以及改善高延迟和高带宽网络性能方面,建议的方法优于传统方法。此外,建议的传输速率控制方法比传统方法更公平。
{"title":"A Transmission Rate Control Method for Active Congestion Reduction Based on Network Node Bandwidth Allocation","authors":"Hongyu Liu, Hong Ni, Rui Han","doi":"10.3390/fi15120385","DOIUrl":"https://doi.org/10.3390/fi15120385","url":null,"abstract":"The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwarding data, while the sending node should manage control. However, sending nodes often lack information about network resources and must use slow-start algorithms to increase the transmission rate, potentially leading to wasted bandwidth and network congestion. Furthermore, incorrect judgments about network congestion by sending nodes may further reduce network throughput. The emergence of new Internet architectures, such as information-centric networks (ICNn), has empowered network nodes with more capabilities, including computation and caching. This paper proposes a method for transmission rate control that actively avoids congestion through network node bandwidth allocation. The sending, network, and receiving nodes each calculate the available transmission rate, and the sending node negotiates with the other nodes through a rate negotiation message to obtain the maximum transmission rate possible given the current state of the network. The network nodes notify the sending node to adjust the transmission rate to adapt to changes in the network through a rate adjustment message. Simulation experiments show that the proposed method is better than traditional methods in reducing network congestion, providing a stable transmission rate, increasing the network throughput capacity, and improving performance in high-latency and high-bandwidth networks. Additionally, the proposed transmission rate control method is fairer than traditional methods.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"138 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139214556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare 基于下一代物联网的智能医疗保健的轻量级隐私保护远程用户身份验证和密钥协议协议
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-29 DOI: 10.3390/fi15120386
Zeeshan Ashraf, Zahid Mahmood, Muddesar Iqbal
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been promoted. Wireless body area network technology frameworks help sufferers in remotely obtaining scientific remedies from physicians through the Internet without paying a visit to the clinics. IoT sensor nodes are incorporated into the clinical device to allow health workers to consult the patients’ fitness conditions in real time. Insecure wireless communication channels make unauthorized access to fitness-related records and manipulation of IoT sensor nodes attached to the patient’s bodies possible, as a result of security flaws. As a result, IoT-enabled devices are threatened by a number of well-known attacks, including impersonation, replay, man-in-the-middle, and denial-of-service assaults. Modern authentication schemes do solve these issues, but they frequently involve challenging mathematical concepts that raise processing and transmission costs. In this paper, we propose a lightweight, secure, and efficient symmetric key exchange algorithm and remote user authentication scheme. Our research proposal presents a successful privacy-protecting method for remote users and provides protection against known attacks. When compared to conventional options, this technique significantly reduces calculation costs by up to 37.68% and transmission costs by up to 32.55%.
包括物联网在内的无线通信技术的进步和创新极大地改变了基于健康的服务模式。特别是在 COVID-19 大流行期间,在家工作的趋势得到了推广。无线体域网技术框架帮助患者通过互联网远程获得医生提供的科学疗法,而无需前往诊所就诊。物联网传感器节点被集成到临床设备中,使医护人员能够实时咨询患者的身体状况。由于存在安全漏洞,不安全的无线通信信道使未经授权访问与健身相关的记录和操纵连接在患者身体上的物联网传感器节点成为可能。因此,物联网设备面临着许多众所周知的攻击威胁,包括假冒、重放、中间人和拒绝服务攻击。现代身份验证方案确实能解决这些问题,但它们经常涉及具有挑战性的数学概念,从而提高了处理和传输成本。在本文中,我们提出了一种轻量级、安全、高效的对称密钥交换算法和远程用户验证方案。我们的研究方案为远程用户提供了一种成功的隐私保护方法,并能抵御已知的攻击。与传统方案相比,该技术大大降低了计算成本达 37.68%,降低了传输成本达 32.55%。
{"title":"Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare","authors":"Zeeshan Ashraf, Zahid Mahmood, Muddesar Iqbal","doi":"10.3390/fi15120386","DOIUrl":"https://doi.org/10.3390/fi15120386","url":null,"abstract":"The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been promoted. Wireless body area network technology frameworks help sufferers in remotely obtaining scientific remedies from physicians through the Internet without paying a visit to the clinics. IoT sensor nodes are incorporated into the clinical device to allow health workers to consult the patients’ fitness conditions in real time. Insecure wireless communication channels make unauthorized access to fitness-related records and manipulation of IoT sensor nodes attached to the patient’s bodies possible, as a result of security flaws. As a result, IoT-enabled devices are threatened by a number of well-known attacks, including impersonation, replay, man-in-the-middle, and denial-of-service assaults. Modern authentication schemes do solve these issues, but they frequently involve challenging mathematical concepts that raise processing and transmission costs. In this paper, we propose a lightweight, secure, and efficient symmetric key exchange algorithm and remote user authentication scheme. Our research proposal presents a successful privacy-protecting method for remote users and provides protection against known attacks. When compared to conventional options, this technique significantly reduces calculation costs by up to 37.68% and transmission costs by up to 32.55%.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"19 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography 利用多方程多密钥混合加密法实现安全视频通信
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-29 DOI: 10.3390/fi15120387
Youcef Fouzar, A. Lakhssassi, Ramakrishna Mundugar
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content providers has resulted in security breaches within entertainment applications, hence causing a reduction in the client base. This research aimed to enhance the security measures employed for video content by implementing a multi-key approach for encryption and decryption processes. The aforementioned objective was successfully accomplished through the use of hybrid methodologies, the production of dynamic keys, and the implementation of user-attribute-based techniques. The main aim of the study was to improve the security measures associated with the process of generating video material. The proposed methodology integrates a system of mathematical equations and a pseudorandom key within its execution. This novel approach significantly augments the degree of security the encryption mechanism provides. The proposed methodology utilises a set of mathematical equations that are randomly employed to achieve encryption. Using a random selection procedure contributes to the overall enhancement of the system’s security. The suggested methodology entails the division of the video into smaller entities known as chunks. Following this, every segment is subjected to encryption using unique keys that are produced dynamically in real-time. The proposed methodology is executed via Android platforms. The transmitter application is tasked with the responsibility of facilitating the streaming of the video content, whereas the receiver application serves the purpose of presenting the video to the user. A careful study was conducted to compare and contrast the suggested method with other similar methods that were already in use. The results of the study strongly support the safety and dependability of the procedure that was made available.
视频内容的知识产权保护和隐私维护与互联网流媒体平台采用的安全协议的有效性密切相关。由于内容提供商未充分实施安全措施,导致娱乐应用中出现安全漏洞,从而造成客户群减少。这项研究旨在通过实施多密钥加密和解密方法,加强视频内容的安全措施。通过使用混合方法、制作动态密钥和实施基于用户属性的技术,成功实现了上述目标。这项研究的主要目的是改进与视频材料生成过程相关的安全措施。所提出的方法在其执行过程中集成了数学方程系统和伪随机密钥。这种新颖的方法大大提高了加密机制的安全程度。建议的方法利用一组随机使用的数学公式来实现加密。使用随机选择程序有助于全面提高系统的安全性。所建议的方法需要将视频分割成更小的实体,称为 "块"。然后,使用实时动态生成的唯一密钥对每个片段进行加密。建议的方法通过安卓平台执行。发射器应用程序的任务是促进视频内容的流式传输,而接收器应用程序的目的是将视频呈现给用户。为了将建议的方法与其他已在使用的类似方法进行比较和对比,我们进行了仔细的研究。研究结果有力地证明了该程序的安全性和可靠性。
{"title":"Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography","authors":"Youcef Fouzar, A. Lakhssassi, Ramakrishna Mundugar","doi":"10.3390/fi15120387","DOIUrl":"https://doi.org/10.3390/fi15120387","url":null,"abstract":"The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content providers has resulted in security breaches within entertainment applications, hence causing a reduction in the client base. This research aimed to enhance the security measures employed for video content by implementing a multi-key approach for encryption and decryption processes. The aforementioned objective was successfully accomplished through the use of hybrid methodologies, the production of dynamic keys, and the implementation of user-attribute-based techniques. The main aim of the study was to improve the security measures associated with the process of generating video material. The proposed methodology integrates a system of mathematical equations and a pseudorandom key within its execution. This novel approach significantly augments the degree of security the encryption mechanism provides. The proposed methodology utilises a set of mathematical equations that are randomly employed to achieve encryption. Using a random selection procedure contributes to the overall enhancement of the system’s security. The suggested methodology entails the division of the video into smaller entities known as chunks. Following this, every segment is subjected to encryption using unique keys that are produced dynamically in real-time. The proposed methodology is executed via Android platforms. The transmitter application is tasked with the responsibility of facilitating the streaming of the video content, whereas the receiver application serves the purpose of presenting the video to the user. A careful study was conducted to compare and contrast the suggested method with other similar methods that were already in use. The results of the study strongly support the safety and dependability of the procedure that was made available.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"2 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139211556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance BlenderBot 3 中的增强功能:超越单一模型管理并提高生成性能
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-28 DOI: 10.3390/fi15120384
Ondrej Kobza, David Herel, Jan Cuhel, Tommaso Gargiani, Jan Pichl, Petr Marek, Jakub Konrád, Jan Sedivy
This paper provides a pioneering examination and enhancement of generative chat models, with a specific focus on the BlenderBot 3 model. Through meticulous interaction with a diverse set of human participants, we dissected the fundamental components of these models, unveiling several deficiencies, including long-term memory and entity recognition. Leveraging these insights, we engineered refined, streamlined iterations, culminating in a chatbot that transcends the capabilities of all existing models. Our work follows Occam’s razor principle and proves that, for tasks with relatively low complexity, using large overparameterized models instead of smaller ones does not bring significant benefits but increases latency, which may result in a lowered overall user experience. In upholding our commitment to transparency and the progression of shared knowledge, we have made our improved model universally accessible through open-source distribution.
本文以 BlenderBot 3 模型为重点,对生成式聊天模型进行了开创性的研究和改进。通过与不同的人类参与者进行细致的互动,我们剖析了这些模型的基本组成部分,发现了一些不足之处,包括长期记忆和实体识别。利用这些洞察力,我们对迭代模型进行了改进和精简,最终开发出了超越所有现有模型的聊天机器人。我们的工作遵循奥卡姆剃刀原理,证明了对于复杂度相对较低的任务,使用大型过参数化模型而不是小型模型并不会带来显著优势,反而会增加延迟,从而可能导致用户整体体验下降。为了恪守透明和知识共享的承诺,我们通过开源发布的方式,使我们改进后的模型可以被普遍访问。
{"title":"Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance","authors":"Ondrej Kobza, David Herel, Jan Cuhel, Tommaso Gargiani, Jan Pichl, Petr Marek, Jakub Konrád, Jan Sedivy","doi":"10.3390/fi15120384","DOIUrl":"https://doi.org/10.3390/fi15120384","url":null,"abstract":"This paper provides a pioneering examination and enhancement of generative chat models, with a specific focus on the BlenderBot 3 model. Through meticulous interaction with a diverse set of human participants, we dissected the fundamental components of these models, unveiling several deficiencies, including long-term memory and entity recognition. Leveraging these insights, we engineered refined, streamlined iterations, culminating in a chatbot that transcends the capabilities of all existing models. Our work follows Occam’s razor principle and proves that, for tasks with relatively low complexity, using large overparameterized models instead of smaller ones does not bring significant benefits but increases latency, which may result in a lowered overall user experience. In upholding our commitment to transparency and the progression of shared knowledge, we have made our improved model universally accessible through open-source distribution.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"46 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139227091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions 智能物联网系统的开放式无线接入网络:技术现状与未来方向
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-27 DOI: 10.3390/fi15120380
A. Musa, Adamu Hussaini, Cheng Qian, Yifan Guo, Wei Yu
The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the collection and exchange of copious data across networked communications. IoT empowers extensive monitoring and control over a myriad of objects, enabling them to gather and disseminate data that bolster applications, thereby enhancing the system’s capacity for informed decision making, environmental surveillance, and autonomous inter-object interaction, all without the need for direct human involvement. These systems have achieved seamless connectivity requirements using the next-generation wireless network infrastructures (5G, 6G, etc.), while their diverse reliability and quality of service (QoS) requirements across various domains require more efficient solutions. Open RAN (O-RAN), i.e., open radio open access network (RAN), promotes flexibility and intelligence in the next-generation RAN. This article reviews the applications of O-RAN in supporting the next-generation smart world IoT systems by conducting a thorough survey. We propose a generic problem space, which consists of (i) IoT Systems: transportation, industry, healthcare, and energy; (ii) targets: reliable communication, real-time analytics, fault tolerance, interoperability, and integration; and (iii) artificial intelligence and machine learning (AI/ML): reinforcement learning (RL), deep neural networks (DNNs), etc. Furthermore, we outline future research directions concerning robust and scalable solutions, interoperability and standardization, privacy, and security. We present a taxonomy to unveil the security threats to emerge from the O-RAN-assisted IoT systems and the feasible directions to move this research forward.
物联网(IoT)是一个庞大的网络,由物理设备、车辆、建筑物和其他配备传感器、执行器和软件的物品等各种组件组成。这些组件相互连接,有助于通过网络通信收集和交换大量数据。物联网赋予了对无数物体进行广泛监测和控制的能力,使它们能够收集和传播支持应用的数据,从而增强系统在知情决策、环境监测和物体间自主互动方面的能力,而这一切都不需要人类的直接参与。这些系统利用下一代无线网络基础设施(5G、6G 等)实现了无缝连接的要求,而它们在不同领域对可靠性和服务质量(QoS)的不同要求需要更高效的解决方案。开放 RAN(O-RAN),即开放无线电开放接入网(RAN),促进了下一代 RAN 的灵活性和智能性。本文通过深入调查,回顾了 O-RAN 在支持下一代智能世界物联网系统中的应用。我们提出了一个通用问题空间,其中包括:(i) 物联网系统:交通、工业、医疗保健和能源;(ii) 目标:可靠通信、实时分析、容错、互操作性和集成;(iii) 人工智能和机器学习(AI/ML):强化学习(RL)、深度神经网络(DNN)等。此外,我们还概述了有关稳健和可扩展解决方案、互操作性和标准化、隐私和安全的未来研究方向。我们提出了一个分类法,以揭示 O-RAN 辅助物联网系统可能出现的安全威胁,以及推动这项研究向前发展的可行方向。
{"title":"Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions","authors":"A. Musa, Adamu Hussaini, Cheng Qian, Yifan Guo, Wei Yu","doi":"10.3390/fi15120380","DOIUrl":"https://doi.org/10.3390/fi15120380","url":null,"abstract":"The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the collection and exchange of copious data across networked communications. IoT empowers extensive monitoring and control over a myriad of objects, enabling them to gather and disseminate data that bolster applications, thereby enhancing the system’s capacity for informed decision making, environmental surveillance, and autonomous inter-object interaction, all without the need for direct human involvement. These systems have achieved seamless connectivity requirements using the next-generation wireless network infrastructures (5G, 6G, etc.), while their diverse reliability and quality of service (QoS) requirements across various domains require more efficient solutions. Open RAN (O-RAN), i.e., open radio open access network (RAN), promotes flexibility and intelligence in the next-generation RAN. This article reviews the applications of O-RAN in supporting the next-generation smart world IoT systems by conducting a thorough survey. We propose a generic problem space, which consists of (i) IoT Systems: transportation, industry, healthcare, and energy; (ii) targets: reliable communication, real-time analytics, fault tolerance, interoperability, and integration; and (iii) artificial intelligence and machine learning (AI/ML): reinforcement learning (RL), deep neural networks (DNNs), etc. Furthermore, we outline future research directions concerning robust and scalable solutions, interoperability and standardization, privacy, and security. We present a taxonomy to unveil the security threats to emerge from the O-RAN-assisted IoT systems and the feasible directions to move this research forward.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"176 3 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1