首页 > 最新文献

Future Internet最新文献

英文 中文
An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts 一种基于一次性账户的防止内部物流数据泄露的身份隐私保护方案
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-05 DOI: 10.3390/fi15110361
Nigang Sun, Chenyang Zhu, Yuanyi Zhang, Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent accelerated growth of logistics companies also significantly hinders the safeguarding of individual privacy. Digital identity has ascended to having the status of a prevalent privacy-protection solution, principally due to its efficacy in mitigating privacy compromises. However, the extant schemes fall short of addressing the issue of privacy breaches engendered by insider maleficence. This paper proposes an innovative identity privacy-preserving scheme aimed at addressing the quandary of internal data breaches. In this scheme, the identity provider furnishes one-time-use accounts for logistics users, thereby obviating the protracted retention of logistics data within the internal database. The scheme also employs ciphertext policy attribute-based encryption (CP-ABE) to encrypt address nodes, wherein the access privileges accorded to logistics companies are circumscribed. Therefore, internal logistics staff have to secure unequivocal authorization from users prior to accessing identity-specific data and privacy protection of user information is also concomitantly strengthened. Crucially, this scheme ameliorates internal privacy concerns, rendering it infeasible for internal interlopers to correlate the users’ authentic identities with their digital wallets. Finally, the effectiveness and reliability of the scheme are demonstrated through simulation experiments and discussions of security.
物联网(IoT)技术的广泛应用引发的物流业数字化转型,促使物流企业发生了重大变革,进一步为社会带来巨大红利。然而,与此同时,物流公司的加速增长也严重阻碍了个人隐私的保护。数字身份已经上升到具有普遍的隐私保护解决方案的地位,主要是因为它在减轻隐私妥协方面的有效性。然而,现有的计划未能解决由内部恶意行为造成的隐私泄露问题。本文提出了一种创新的身份隐私保护方案,旨在解决内部数据泄露的困境。在这个方案中,身份提供者为物流用户提供一次性使用的账户,从而避免了物流数据在内部数据库中的长期保留。该方案还采用密文策略属性加密(CP-ABE)对地址节点进行加密,对物流公司的访问权限进行限制。因此,内部物流人员在访问特定身份数据之前必须获得用户的明确授权,用户信息的隐私保护也随之加强。至关重要的是,该方案改善了内部隐私问题,使内部入侵者无法将用户的真实身份与其数字钱包关联起来。最后,通过仿真实验和安全性讨论验证了该方案的有效性和可靠性。
{"title":"An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts","authors":"Nigang Sun, Chenyang Zhu, Yuanyi Zhang, Yining Liu","doi":"10.3390/fi15110361","DOIUrl":"https://doi.org/10.3390/fi15110361","url":null,"abstract":"Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent accelerated growth of logistics companies also significantly hinders the safeguarding of individual privacy. Digital identity has ascended to having the status of a prevalent privacy-protection solution, principally due to its efficacy in mitigating privacy compromises. However, the extant schemes fall short of addressing the issue of privacy breaches engendered by insider maleficence. This paper proposes an innovative identity privacy-preserving scheme aimed at addressing the quandary of internal data breaches. In this scheme, the identity provider furnishes one-time-use accounts for logistics users, thereby obviating the protracted retention of logistics data within the internal database. The scheme also employs ciphertext policy attribute-based encryption (CP-ABE) to encrypt address nodes, wherein the access privileges accorded to logistics companies are circumscribed. Therefore, internal logistics staff have to secure unequivocal authorization from users prior to accessing identity-specific data and privacy protection of user information is also concomitantly strengthened. Crucially, this scheme ameliorates internal privacy concerns, rendering it infeasible for internal interlopers to correlate the users’ authentic identities with their digital wallets. Finally, the effectiveness and reliability of the scheme are demonstrated through simulation experiments and discussions of security.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"24 S10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of In-Band Full-Duplex Using Software Defined Radio with Adaptive Filter-Based Self-Interference Cancellation 利用基于自适应滤波器的自干扰消除的软件无线电实现带内全双工
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-03 DOI: 10.3390/fi15110360
Wei-Shun Liao, Ou Zhao, Keren Li, Hikaru Kawasaki, Takeshi Matsumura
For next generation wireless communication systems, high throughput, low latency, and large user accommodation are popular and important required characteristics. To achieve these requirements for next generation wireless communication systems, an in-band full-duplex (IBFD) communication system is one of the possible candidate technologies. However, to realize IBFD systems, there is an essential problem that there exists a large self-interference (SI) due to the simultaneous signal transmission and reception in the IBFD systems. Therefore, to implement the IBFD system, it is necessary to realize a series of effective SI cancellation processes. In this study, we implemented a prototype of SI cancellation processes with our designed antenna, analog circuit, and digital cancellation function using an adaptive filter. For system implementation, we introduce software-defined radio (SDR) devices in this study. By using SDR devices, which can be customized by users, the evaluations of complicated wireless access systems like IBFD can be realized easily. Besides the validation stage of system practicality, the system development can be more effective by using SDR devices. Therefore, we utilize SDR devices to implement the proposed IBFD system and conduct experiments to evaluate its performance. The results show that the SI cancellation effect can reach nearly 100 dB with 10−3 order bit error rate (BER) after signal demodulation. From the experiment results, it can be seen obviously that the implemented prototype can effectively cancel the large amount of SI and obtain satisfied digital demodulation results, which validates the effectiveness of the developed system.
对于下一代无线通信系统,高吞吐量、低延迟和大用户容纳是流行和重要的必要特征。为了实现下一代无线通信系统的这些要求,带内全双工(IBFD)通信系统是可能的候选技术之一。然而,为了实现IBFD系统,有一个本质问题,即IBFD系统中由于信号收发同时进行而存在较大的自干扰(SI)。因此,要实现IBFD系统,需要实现一系列有效的SI对消过程。在本研究中,我们使用我们设计的天线、模拟电路和使用自适应滤波器的数字对消功能实现了SI对消过程的原型。为了实现系统,我们在本研究中引入了软件定义无线电(SDR)设备。利用用户可定制的SDR设备,可以轻松实现对IBFD等复杂无线接入系统的评估。除了系统实用性的验证阶段外,使用SDR器件可以更有效地开发系统。因此,我们利用SDR器件实现了所提出的IBFD系统,并进行了实验来评估其性能。结果表明,信号解调后的SI对消效果可达到近100 dB,误码率为10−3阶。从实验结果可以明显看出,所实现的样机可以有效地抵消大量的SI,并获得满意的数字解调结果,验证了所开发系统的有效性。
{"title":"Implementation of In-Band Full-Duplex Using Software Defined Radio with Adaptive Filter-Based Self-Interference Cancellation","authors":"Wei-Shun Liao, Ou Zhao, Keren Li, Hikaru Kawasaki, Takeshi Matsumura","doi":"10.3390/fi15110360","DOIUrl":"https://doi.org/10.3390/fi15110360","url":null,"abstract":"For next generation wireless communication systems, high throughput, low latency, and large user accommodation are popular and important required characteristics. To achieve these requirements for next generation wireless communication systems, an in-band full-duplex (IBFD) communication system is one of the possible candidate technologies. However, to realize IBFD systems, there is an essential problem that there exists a large self-interference (SI) due to the simultaneous signal transmission and reception in the IBFD systems. Therefore, to implement the IBFD system, it is necessary to realize a series of effective SI cancellation processes. In this study, we implemented a prototype of SI cancellation processes with our designed antenna, analog circuit, and digital cancellation function using an adaptive filter. For system implementation, we introduce software-defined radio (SDR) devices in this study. By using SDR devices, which can be customized by users, the evaluations of complicated wireless access systems like IBFD can be realized easily. Besides the validation stage of system practicality, the system development can be more effective by using SDR devices. Therefore, we utilize SDR devices to implement the proposed IBFD system and conduct experiments to evaluate its performance. The results show that the SI cancellation effect can reach nearly 100 dB with 10−3 order bit error rate (BER) after signal demodulation. From the experiment results, it can be seen obviously that the implemented prototype can effectively cancel the large amount of SI and obtain satisfied digital demodulation results, which validates the effectiveness of the developed system.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"44 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning vs. Computational Intelligence: Comparing Service Management Approaches for the Cloud Continuum 强化学习与计算智能:比较云连续体的服务管理方法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-31 DOI: 10.3390/fi15110359
Filippo Poltronieri, Cesare Stefanelli, Mauro Tortonesi, Mattia Zaccarini
Modern computing environments, thanks to the advent of enabling technologies such as Multi-access Edge Computing (MEC), effectively represent a Cloud Continuum, a capillary network of computing resources that extend from the Edge of the network to the Cloud, which enables a dynamic and adaptive service fabric. Efficiently coordinating resource allocation, exploitation, and management in the Cloud Continuum represents quite a challenge, which has stimulated researchers to investigate innovative solutions based on smart techniques such as Reinforcement Learning and Computational Intelligence. In this paper, we make a comparison of different optimization algorithms and a first investigation of how they can perform in this kind of scenario. Specifically, this comparison included the Deep Q-Network, Proximal Policy Optimization, Genetic Algorithms, Particle Swarm Optimization, Quantum-inspired Particle Swarm Optimization, Multi-Swarm Particle Optimization, and the Grey-Wolf Optimizer. We demonstrate how all approaches can solve the service management problem with similar performance—with a different sample efficiency—if a high number of samples can be evaluated for training and optimization. Finally, we show that, if the scenario conditions change, Deep-Reinforcement-Learning-based approaches can exploit the experience built during training to adapt service allocation according to the modified conditions.
由于多访问边缘计算(MEC)等使能技术的出现,现代计算环境有效地代表了云连续体,这是一个从网络边缘延伸到云的计算资源的毛细管网络,它实现了动态和自适应的服务结构。在云连续体中有效地协调资源分配、开发和管理是一个相当大的挑战,这刺激了研究人员研究基于智能技术(如强化学习和计算智能)的创新解决方案。在本文中,我们对不同的优化算法进行了比较,并对它们在这种情况下的表现进行了初步研究。具体来说,这种比较包括Deep Q-Network, Proximal Policy Optimization,遗传算法,粒子群优化,量子启发粒子群优化,多群粒子优化和灰狼优化器。我们演示了所有方法如何以相似的性能(不同的样本效率)解决服务管理问题——如果可以评估大量样本以进行训练和优化。最后,我们表明,如果场景条件发生变化,基于深度强化学习的方法可以利用训练期间建立的经验来根据修改后的条件调整服务分配。
{"title":"Reinforcement Learning vs. Computational Intelligence: Comparing Service Management Approaches for the Cloud Continuum","authors":"Filippo Poltronieri, Cesare Stefanelli, Mauro Tortonesi, Mattia Zaccarini","doi":"10.3390/fi15110359","DOIUrl":"https://doi.org/10.3390/fi15110359","url":null,"abstract":"Modern computing environments, thanks to the advent of enabling technologies such as Multi-access Edge Computing (MEC), effectively represent a Cloud Continuum, a capillary network of computing resources that extend from the Edge of the network to the Cloud, which enables a dynamic and adaptive service fabric. Efficiently coordinating resource allocation, exploitation, and management in the Cloud Continuum represents quite a challenge, which has stimulated researchers to investigate innovative solutions based on smart techniques such as Reinforcement Learning and Computational Intelligence. In this paper, we make a comparison of different optimization algorithms and a first investigation of how they can perform in this kind of scenario. Specifically, this comparison included the Deep Q-Network, Proximal Policy Optimization, Genetic Algorithms, Particle Swarm Optimization, Quantum-inspired Particle Swarm Optimization, Multi-Swarm Particle Optimization, and the Grey-Wolf Optimizer. We demonstrate how all approaches can solve the service management problem with similar performance—with a different sample efficiency—if a high number of samples can be evaluated for training and optimization. Finally, we show that, if the scenario conditions change, Deep-Reinforcement-Learning-based approaches can exploit the experience built during training to adapt service allocation according to the modified conditions.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"2001 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135813260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Evaluation of a Federated Learning Framework on Raspberry PI Platforms for IoT 6G Applications 物联网6G应用的树莓派平台上联邦学习框架的实现与评估
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-31 DOI: 10.3390/fi15110358
Lorenzo Ridolfi, David Naseh, Swapnil Sadashiv Shinde, Daniele Tarchi
With the advent of 6G technology, the proliferation of interconnected devices necessitates a robust, fully connected intelligence network. Federated Learning (FL) stands as a key distributed learning technique, showing promise in recent advancements. However, the integration of novel Internet of Things (IoT) applications and virtualization technologies has introduced diverse and heterogeneous devices into wireless networks. This diversity encompasses variations in computation, communication, storage resources, training data, and communication modes among connected nodes. In this context, our study presents a pivotal contribution by analyzing and implementing FL processes tailored for 6G standards. Our work defines a practical FL platform, employing Raspberry Pi devices and virtual machines as client nodes, with a Windows PC serving as a parameter server. We tackle the image classification challenge, implementing the FL model via PyTorch, augmented by the specialized FL library, Flower. Notably, our analysis delves into the impact of computational resources, data availability, and heating issues across heterogeneous device sets. Additionally, we address knowledge transfer and employ pre-trained networks in our FL performance evaluation. This research underscores the indispensable role of artificial intelligence in IoT scenarios within the 6G landscape, providing a comprehensive framework for FL implementation across diverse and heterogeneous devices.
随着6G技术的出现,互联设备的激增需要一个强大的、完全连接的智能网络。联邦学习(FL)作为一种关键的分布式学习技术,在最近的进展中显示出了前景。然而,新型物联网(IoT)应用和虚拟化技术的集成已经将各种异构设备引入无线网络。这种多样性包括计算、通信、存储资源、训练数据和连接节点之间的通信模式的变化。在此背景下,我们的研究通过分析和实施针对6G标准量身定制的FL流程,做出了关键贡献。我们的工作定义了一个实用的FL平台,使用树莓派设备和虚拟机作为客户端节点,使用Windows PC作为参数服务器。我们解决了图像分类的挑战,通过PyTorch实现FL模型,并通过专门的FL库Flower进行增强。值得注意的是,我们的分析深入研究了跨异构设备集的计算资源、数据可用性和加热问题的影响。此外,我们解决了知识转移问题,并在我们的FL绩效评估中使用了预训练的网络。这项研究强调了人工智能在6G环境下物联网场景中不可或缺的作用,为跨各种异构设备的FL实施提供了一个全面的框架。
{"title":"Implementation and Evaluation of a Federated Learning Framework on Raspberry PI Platforms for IoT 6G Applications","authors":"Lorenzo Ridolfi, David Naseh, Swapnil Sadashiv Shinde, Daniele Tarchi","doi":"10.3390/fi15110358","DOIUrl":"https://doi.org/10.3390/fi15110358","url":null,"abstract":"With the advent of 6G technology, the proliferation of interconnected devices necessitates a robust, fully connected intelligence network. Federated Learning (FL) stands as a key distributed learning technique, showing promise in recent advancements. However, the integration of novel Internet of Things (IoT) applications and virtualization technologies has introduced diverse and heterogeneous devices into wireless networks. This diversity encompasses variations in computation, communication, storage resources, training data, and communication modes among connected nodes. In this context, our study presents a pivotal contribution by analyzing and implementing FL processes tailored for 6G standards. Our work defines a practical FL platform, employing Raspberry Pi devices and virtual machines as client nodes, with a Windows PC serving as a parameter server. We tackle the image classification challenge, implementing the FL model via PyTorch, augmented by the specialized FL library, Flower. Notably, our analysis delves into the impact of computational resources, data availability, and heating issues across heterogeneous device sets. Additionally, we address knowledge transfer and employ pre-trained networks in our FL performance evaluation. This research underscores the indispensable role of artificial intelligence in IoT scenarios within the 6G landscape, providing a comprehensive framework for FL implementation across diverse and heterogeneous devices.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Scheduling for Federated Learning in Edge Cloud Computing Environments by Using Adaptive-Greedy Dingo Optimization Algorithm and Binary Salp Swarm Algorithm 基于自适应贪心Dingo优化算法和二元Salp群算法的边缘云环境下联邦学习任务调度
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-30 DOI: 10.3390/fi15110357
Weihong Cai, Fengxi Duan
With the development of computationally intensive applications, the demand for edge cloud computing systems has increased, creating significant challenges for edge cloud computing networks. In this paper, we consider a simple three-tier computational model for multiuser mobile edge computing (MEC) and introduce two major problems of task scheduling for federated learning in MEC environments: (1) the transmission power allocation (PA) problem, and (2) the dual decision-making problems of joint request offloading and computational resource scheduling (JRORS). At the same time, we factor in server pricing and task completion, in order to improve the user-friendliness and fairness in scheduling decisions. The solving of these problems simultaneously ensures both scheduling efficiency and system quality of service (QoS), to achieve a balance between efficiency and user satisfaction. Then, we propose an adaptive greedy dingo optimization algorithm (AGDOA) based on greedy policies and parameter adaptation to solve the PA problem and construct a binary salp swarm algorithm (BSSA) that introduces binary coding to solve the discrete JRORS problem. Finally, simulations were conducted to verify the better performance compared to the traditional algorithms. The proposed algorithm improved the convergence speed of the algorithm in terms of scheduling efficiency, improved the system response rate, and found solutions with a lower energy consumption. In addition, the search results had a higher fairness and system welfare in terms of system quality of service.
随着计算密集型应用的发展,对边缘云计算系统的需求不断增加,给边缘云计算网络带来了巨大的挑战。本文考虑了多用户移动边缘计算(MEC)的一个简单的三层计算模型,并介绍了MEC环境下联邦学习任务调度的两个主要问题:(1)传输功率分配(PA)问题,(2)联合请求卸载和计算资源调度(JRORS)的双重决策问题。同时,我们考虑了服务器定价和任务完成情况,以提高调度决策的用户友好性和公平性。这些问题的解决同时保证了调度效率和系统服务质量(QoS),在效率和用户满意度之间取得平衡。然后,我们提出了一种基于贪心策略和参数自适应的贪心野狗优化算法(AGDOA)来解决PA问题,构造了一种引入二进制编码的二元salp群算法(BSSA)来解决离散JRORS问题。最后通过仿真验证了该算法的性能优于传统算法。该算法在调度效率方面提高了算法的收敛速度,提高了系统响应率,并找到了能耗较低的解。此外,在系统服务质量方面,搜索结果具有较高的公平性和系统福利。
{"title":"Task Scheduling for Federated Learning in Edge Cloud Computing Environments by Using Adaptive-Greedy Dingo Optimization Algorithm and Binary Salp Swarm Algorithm","authors":"Weihong Cai, Fengxi Duan","doi":"10.3390/fi15110357","DOIUrl":"https://doi.org/10.3390/fi15110357","url":null,"abstract":"With the development of computationally intensive applications, the demand for edge cloud computing systems has increased, creating significant challenges for edge cloud computing networks. In this paper, we consider a simple three-tier computational model for multiuser mobile edge computing (MEC) and introduce two major problems of task scheduling for federated learning in MEC environments: (1) the transmission power allocation (PA) problem, and (2) the dual decision-making problems of joint request offloading and computational resource scheduling (JRORS). At the same time, we factor in server pricing and task completion, in order to improve the user-friendliness and fairness in scheduling decisions. The solving of these problems simultaneously ensures both scheduling efficiency and system quality of service (QoS), to achieve a balance between efficiency and user satisfaction. Then, we propose an adaptive greedy dingo optimization algorithm (AGDOA) based on greedy policies and parameter adaptation to solve the PA problem and construct a binary salp swarm algorithm (BSSA) that introduces binary coding to solve the discrete JRORS problem. Finally, simulations were conducted to verify the better performance compared to the traditional algorithms. The proposed algorithm improved the convergence speed of the algorithm in terms of scheduling efficiency, improved the system response rate, and found solutions with a lower energy consumption. In addition, the search results had a higher fairness and system welfare in terms of system quality of service.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"186 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136022936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Access to Confidential Documents: A Case Study of an Email Security Tool 管理对机密文件的访问:电子邮件安全工具的案例研究
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-28 DOI: 10.3390/fi15110356
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo, Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwarding, persistent protection, and watermarking. Previous studies have suggested that protective attitudes and behaviors could improve the adoption of new security technologies. Therefore, we conducted a user study on 19 participants to understand their perceptions of an email security tool and how they use it to manage access control to confidential information such as medical, tax, and employee information if sent via email. Our results showed that the participants’ first impression upon receiving an end-to-end encrypted email was that it looked suspicious, especially when received from an unknown person. After the participants were informed about the importance of the investigated tool, they were comfortable sharing medical, tax, and employee information via this tool. Regarding access control management of the three types of confidential information, the expiration time and disabling forwarding were most useful for the participants in preventing unauthorized and continued access. While the participants did not understand how the persistent protection feature worked, many still chose to use it, assuming it provided some extra layer of protection to confidential information and prevented unauthorized access. Watermarking was the least useful feature for the participants, as many were unsure of its usage. Our participants were concerned about data leaks from recipients’ devices if they set a longer expiration date, such as a year. We provide the practical implications of our findings.
用户采用和使用端到端加密工具是一个正在进行的研究课题。这些工具的一个子集允许用户加密机密电子邮件,以及使用过期时间、禁用转发、持久保护和水印等特性来管理他们的访问控制。先前的研究表明,保护性的态度和行为可以促进新安全技术的采用。因此,我们对19名参与者进行了一项用户研究,以了解他们对电子邮件安全工具的看法,以及他们如何使用它来管理通过电子邮件发送的机密信息(如医疗、税务和员工信息)的访问控制。我们的研究结果表明,参与者收到端到端加密电子邮件的第一印象是,它看起来很可疑,尤其是来自一个不知名的人。在参与者被告知被调查工具的重要性之后,他们会通过该工具轻松地分享医疗、税务和员工信息。对于三种类型机密信息的访问控制管理,过期时间和禁用转发对参与者防止未经授权和持续访问最有用。虽然参与者不明白持久保护功能是如何工作的,但许多人仍然选择使用它,假设它为机密信息提供了一些额外的保护层,并防止未经授权的访问。对于参与者来说,水印是最没用的功能,因为许多人不确定它的用法。我们的参与者担心,如果他们设置了较长的截止日期,比如一年,收件人的设备就会泄露数据。我们提供了我们的发现的实际意义。
{"title":"Managing Access to Confidential Documents: A Case Study of an Email Security Tool","authors":"Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo, Mohamed Shehab","doi":"10.3390/fi15110356","DOIUrl":"https://doi.org/10.3390/fi15110356","url":null,"abstract":"User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwarding, persistent protection, and watermarking. Previous studies have suggested that protective attitudes and behaviors could improve the adoption of new security technologies. Therefore, we conducted a user study on 19 participants to understand their perceptions of an email security tool and how they use it to manage access control to confidential information such as medical, tax, and employee information if sent via email. Our results showed that the participants’ first impression upon receiving an end-to-end encrypted email was that it looked suspicious, especially when received from an unknown person. After the participants were informed about the importance of the investigated tool, they were comfortable sharing medical, tax, and employee information via this tool. Regarding access control management of the three types of confidential information, the expiration time and disabling forwarding were most useful for the participants in preventing unauthorized and continued access. While the participants did not understand how the persistent protection feature worked, many still chose to use it, assuming it provided some extra layer of protection to confidential information and prevented unauthorized access. Watermarking was the least useful feature for the participants, as many were unsure of its usage. Our participants were concerned about data leaks from recipients’ devices if they set a longer expiration date, such as a year. We provide the practical implications of our findings.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Intelligence through Machine Learning from Satellite Remote Sensing Data 通过卫星遥感数据的机器学习实现商业智能
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-27 DOI: 10.3390/fi15110355
Christos Kyriakos, Manolis Vavalis
Several cities have been greatly affected by economic crisis, unregulated gentrification, and the pandemic, resulting in increased vacancy rates. Abandoned buildings have various negative implications on their neighborhoods, including an increased chance of fire and crime and a drastic reduction in their monetary value. This paper focuses on the use of satellite data and machine learning to provide insights for businesses and policymakers within Greece and beyond. Our objective is two-fold: to provide a comprehensive literature review on recent results concerning the opportunities offered by satellite images for business intelligence and to design and implement an open-source software system for the detection of abandoned or disused buildings based on nighttime lights and built-up area indices. Our preliminary experimentation provides promising results that can be used for location intelligence and beyond.
一些城市受到经济危机、无管制的高档化和疫情的严重影响,导致空置率上升。废弃的建筑对其所在社区有各种负面影响,包括火灾和犯罪的可能性增加,以及货币价值的急剧下降。本文侧重于利用卫星数据和机器学习为希腊内外的企业和政策制定者提供见解。我们的目标有两个:一是对卫星图像为商业智能提供的机会的最新结果进行全面的文献综述,二是设计和实施一个开源软件系统,用于基于夜间灯光和建成区指数检测废弃或废弃建筑。我们的初步实验提供了有希望的结果,可以用于定位智能和其他领域。
{"title":"Business Intelligence through Machine Learning from Satellite Remote Sensing Data","authors":"Christos Kyriakos, Manolis Vavalis","doi":"10.3390/fi15110355","DOIUrl":"https://doi.org/10.3390/fi15110355","url":null,"abstract":"Several cities have been greatly affected by economic crisis, unregulated gentrification, and the pandemic, resulting in increased vacancy rates. Abandoned buildings have various negative implications on their neighborhoods, including an increased chance of fire and crime and a drastic reduction in their monetary value. This paper focuses on the use of satellite data and machine learning to provide insights for businesses and policymakers within Greece and beyond. Our objective is two-fold: to provide a comprehensive literature review on recent results concerning the opportunities offered by satellite images for business intelligence and to design and implement an open-source software system for the detection of abandoned or disused buildings based on nighttime lights and built-up area indices. Our preliminary experimentation provides promising results that can be used for location intelligence and beyond.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"48 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136235851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications 基于RFID的NFC应用的认证和威胁挑战的系统文献综述
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-27 DOI: 10.3390/fi15110354
Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri
The Internet of Things (IoT) concept is tremendously applied in our current daily lives. The IoT involves Radio Frequency Identification (RFID) as a part of the infrastructure that helps with the data gathering from different types of sensors. In general, security worries have increased significantly as these types of technologies have become more common. For this reason, manifold realizations and studies have been carried out to address this matter. In this work, we tried to provide a thorough analysis of the cryptography-based solutions for RFID cards (MIFARE cards as a case study) by performing a Systematic Literature Review (SLR) to deliver the up-to-date trends and outlooks on this topic.
物联网(IoT)概念在我们的日常生活中得到了广泛的应用。物联网涉及射频识别(RFID)作为基础设施的一部分,有助于从不同类型的传感器收集数据。总的来说,随着这些类型的技术变得越来越普遍,对安全的担忧也显著增加。为此,已经进行了多种认识和研究来解决这个问题。在这项工作中,我们试图通过执行系统文献综述(SLR)来提供有关该主题的最新趋势和前景,从而对基于加密的RFID卡解决方案(以MIFARE卡为例研究)进行全面分析。
{"title":"A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications","authors":"Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri","doi":"10.3390/fi15110354","DOIUrl":"https://doi.org/10.3390/fi15110354","url":null,"abstract":"The Internet of Things (IoT) concept is tremendously applied in our current daily lives. The IoT involves Radio Frequency Identification (RFID) as a part of the infrastructure that helps with the data gathering from different types of sensors. In general, security worries have increased significantly as these types of technologies have become more common. For this reason, manifold realizations and studies have been carried out to address this matter. In this work, we tried to provide a thorough analysis of the cryptography-based solutions for RFID cards (MIFARE cards as a case study) by performing a Systematic Literature Review (SLR) to deliver the up-to-date trends and outlooks on this topic.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136235247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency-Aware Semi-Synchronous Client Selection and Model Aggregation for Wireless Federated Learning 无线联邦学习的延迟感知半同步客户端选择和模型聚合
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-26 DOI: 10.3390/fi15110352
Liangkun Yu, Xiang Sun, Rana Albelaihi, Chen Yi
Federated learning (FL) is a collaborative machine-learning (ML) framework particularly suited for ML models requiring numerous training samples, such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Random Forest, in the context of various applications, e.g., next-word prediction and eHealth. FL involves various clients participating in the training process by uploading their local models to an FL server in each global iteration. The server aggregates these models to update a global model. The traditional FL process may encounter bottlenecks, known as the straggler problem, where slower clients delay the overall training time. This paper introduces the Latency-awarE Semi-synchronous client Selection and mOdel aggregation for federated learNing (LESSON) method. LESSON allows clients to participate at different frequencies: faster clients contribute more frequently, therefore mitigating the straggler problem and expediting convergence. Moreover, LESSON provides a tunable trade-off between model accuracy and convergence rate by setting varying deadlines. Simulation results show that LESSON outperforms two baseline methods, namely FedAvg and FedCS, in terms of convergence speed and maintains higher model accuracy compared to FedCS.
联邦学习(FL)是一种协作式机器学习(ML)框架,特别适用于需要大量训练样本的ML模型,例如卷积神经网络(cnn)、循环神经网络(rnn)和随机森林,适用于各种应用的上下文中,例如下一个单词预测和电子健康。FL涉及到参与训练过程的各种客户端,在每次全局迭代中将他们的本地模型上传到FL服务器。服务器聚合这些模型以更新全局模型。传统的FL过程可能会遇到瓶颈,即所谓的离散问题,其中较慢的客户端会延迟整个培训时间。介绍了基于延迟感知的半同步客户端选择和模型聚合的联邦学习(LESSON)方法。LESSON允许客户端以不同的频率参与:速度越快的客户端贡献频率越高,因此减轻了离散问题并加快了收敛速度。此外,通过设置不同的截止日期,LESSON在模型精度和收敛率之间提供了可调的权衡。仿真结果表明,与fedc相比,LESSON在收敛速度上优于FedAvg和fedc两种基线方法,并且保持了更高的模型精度。
{"title":"Latency-Aware Semi-Synchronous Client Selection and Model Aggregation for Wireless Federated Learning","authors":"Liangkun Yu, Xiang Sun, Rana Albelaihi, Chen Yi","doi":"10.3390/fi15110352","DOIUrl":"https://doi.org/10.3390/fi15110352","url":null,"abstract":"Federated learning (FL) is a collaborative machine-learning (ML) framework particularly suited for ML models requiring numerous training samples, such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Random Forest, in the context of various applications, e.g., next-word prediction and eHealth. FL involves various clients participating in the training process by uploading their local models to an FL server in each global iteration. The server aggregates these models to update a global model. The traditional FL process may encounter bottlenecks, known as the straggler problem, where slower clients delay the overall training time. This paper introduces the Latency-awarE Semi-synchronous client Selection and mOdel aggregation for federated learNing (LESSON) method. LESSON allows clients to participate at different frequencies: faster clients contribute more frequently, therefore mitigating the straggler problem and expediting convergence. Moreover, LESSON provides a tunable trade-off between model accuracy and convergence rate by setting varying deadlines. Simulation results show that LESSON outperforms two baseline methods, namely FedAvg and FedCS, in terms of convergence speed and maintains higher model accuracy compared to FedCS.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"30 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136381333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New RFI Model for Behavioral Audience Segmentation in Wi-Fi Advertising System Wi-Fi广告系统中行为受众细分的新RFI模型
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-26 DOI: 10.3390/fi15110351
Shueh-Ting Lim, Lee-Yeng Ong, Meng-Chew Leow
In this technological era, businesses tend to place advertisements via the medium of Wi-Fi advertising to expose their brands and products to the public. Wi-Fi advertising offers a platform for businesses to leverage their marketing strategies to achieve desired goals, provided they have a thorough understanding of their audience’s behaviors. This paper aims to formulate a new RFI (recency, frequency, and interest) model that is able to analyze the behavior of the audience towards the advertisement. The audience’s interest is measured based on the relationship between their total view duration on an advertisement and its corresponding overall click received. With the help of a clustering algorithm to perform the dynamic segmentation, the patterns of the audience behaviors are then being interpreted by segmenting the audience based on their engagement behaviors. In the experiments, two different Wi-Fi advertising attributes are tested to prove the new RFI model is applicable to effectively interpret the audience engagement behaviors with the proposed dynamic characteristics range table. The weak and strongly engaged behavioral characteristics of the segmented behavioral patterns of the audience, such as in a one-time audience, are interpreted successfully with the dynamic-characteristics range table.
在这个科技时代,企业倾向于通过Wi-Fi广告这一媒介投放广告,向公众展示自己的品牌和产品。Wi-Fi广告为企业提供了一个平台,可以利用他们的营销策略来实现预期目标,前提是他们对受众的行为有透彻的了解。本文旨在建立一个新的RFI(最近,频率和兴趣)模型,能够分析观众对广告的行为。观众的兴趣是根据他们在广告上的总观看时间和相应的总点击量之间的关系来衡量的。利用聚类算法对受众进行动态细分,根据受众的参与行为对受众进行细分,从而解读受众的行为模式。在实验中,对两种不同的Wi-Fi广告属性进行了测试,以证明新的RFI模型适用于使用所提出的动态特征范围表有效地解释受众参与行为。受众细分行为模式的弱参与和强参与的行为特征,例如一次性受众,可以用动态特征范围表成功地解释。
{"title":"New RFI Model for Behavioral Audience Segmentation in Wi-Fi Advertising System","authors":"Shueh-Ting Lim, Lee-Yeng Ong, Meng-Chew Leow","doi":"10.3390/fi15110351","DOIUrl":"https://doi.org/10.3390/fi15110351","url":null,"abstract":"In this technological era, businesses tend to place advertisements via the medium of Wi-Fi advertising to expose their brands and products to the public. Wi-Fi advertising offers a platform for businesses to leverage their marketing strategies to achieve desired goals, provided they have a thorough understanding of their audience’s behaviors. This paper aims to formulate a new RFI (recency, frequency, and interest) model that is able to analyze the behavior of the audience towards the advertisement. The audience’s interest is measured based on the relationship between their total view duration on an advertisement and its corresponding overall click received. With the help of a clustering algorithm to perform the dynamic segmentation, the patterns of the audience behaviors are then being interpreted by segmenting the audience based on their engagement behaviors. In the experiments, two different Wi-Fi advertising attributes are tested to prove the new RFI model is applicable to effectively interpret the audience engagement behaviors with the proposed dynamic characteristics range table. The weak and strongly engaged behavioral characteristics of the segmented behavioral patterns of the audience, such as in a one-time audience, are interpreted successfully with the dynamic-characteristics range table.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"31 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136381872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1