首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems ONMCA:可定制资产导向区块链系统的一网多链架构
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-11 DOI: 10.1007/s12083-024-01698-8
Liang Wang, Wenying Zhou, Lina Zuo, Haibo Liu, Wenchi Ying

The development of modern digital economies requires trusted digital asset management (DAM), for which blockchain technology is increasingly being adopted. However, the current architecture for constructing blockchain-based DAM systems (BDAMSs) is inadequate. Existing BDAMSs adopt a modified layered architecture, which enriches the database layer by adding a blockchain platform that acts as a third party to process DAM business logic with pre-written smart contracts. This architecture faces four issues that make it non-credible and non-customizable to DAM demands: 1) pseudo decentralization, 2) not asset-oriented, 3) contract dependency, and 4) high load of chains. To overcome these issues, we propose the One-Network-Multi-Chain Architecture (ONMCA), which allows multiple heterogeneous chains to be established within a same network. ONMCA enables diverse digital assets to be managed in a customizable way through the following features: 1) asset stakeholders are allowed to join the blockchain network, eliminating third parties; 2) transactions are designed to portray the changes in asset states, making the system asset-oriented; and 3) a control layer is added to take over business logic, and smart contracts are forced to regulate asset transactions full-time. We formalize ONMCA and analyze it comprehensively, and the results show that ONMCA meets the requirements of DAM and is qualified to build credible and adaptive BDAMSs.

现代数字经济的发展需要可信的数字资产管理(DAM),而区块链技术正越来越多地被采用。然而,目前构建基于区块链的数字资产管理系统(BDAMS)的架构并不完善。现有的 BDAMS 采用经过修改的分层架构,通过添加一个区块链平台来丰富数据库层,该平台作为第三方使用预先编写的智能合约来处理 DAM 业务逻辑。这种架构面临四个问题,使其不可信,也无法满足 DAM 的需求:1) 伪去中心化;2) 不以资产为导向;3) 合约依赖性;4) 链负载高。为了克服这些问题,我们提出了单网络多链架构(ONMCA),允许在同一网络内建立多个异构链。ONMCA 可通过以下功能以可定制的方式管理各种数字资产:1)允许资产利益相关者加入区块链网络,消除第三方;2)设计交易来描绘资产状态的变化,使系统以资产为导向;3)添加控制层来接管业务逻辑,强制智能合约全时监管资产交易。我们将ONMCA形式化并进行了全面分析,结果表明ONMCA符合DAM的要求,有资格构建可信的自适应BDAMS。
{"title":"ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems","authors":"Liang Wang, Wenying Zhou, Lina Zuo, Haibo Liu, Wenchi Ying","doi":"10.1007/s12083-024-01698-8","DOIUrl":"https://doi.org/10.1007/s12083-024-01698-8","url":null,"abstract":"<p>The development of modern digital economies requires trusted digital asset management (DAM), for which blockchain technology is increasingly being adopted. However, the current architecture for constructing blockchain-based DAM systems (BDAMSs) is inadequate. Existing BDAMSs adopt a modified layered architecture, which enriches the database layer by adding a blockchain platform that acts as a third party to process DAM business logic with pre-written smart contracts. This architecture faces four issues that make it non-credible and non-customizable to DAM demands: 1) pseudo decentralization, 2) not asset-oriented, 3) contract dependency, and 4) high load of chains. To overcome these issues, we propose the One-Network-Multi-Chain Architecture (ONMCA), which allows multiple heterogeneous chains to be established within a same network. ONMCA enables diverse digital assets to be managed in a customizable way through the following features: 1) asset stakeholders are allowed to join the blockchain network, eliminating third parties; 2) transactions are designed to portray the changes in asset states, making the system asset-oriented; and 3) a control layer is added to take over business logic, and smart contracts are forced to regulate asset transactions full-time. We formalize ONMCA and analyze it comprehensively, and the results show that ONMCA meets the requirements of DAM and is qualified to build credible and adaptive BDAMSs.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"94 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization 利用区间-2 型模糊逻辑修正的 dingo 优化,为 WSN 制定基于集群的高能效多目标路由协议
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-11 DOI: 10.1007/s12083-024-01696-w
S. Kishore Verma, K. Lokeshwaran, J. Martin Sahayaraj, J. S. Adeline Johnsana

In the design of Wireless sensor networks (WSNs), maximizing network lifetime and sustaining energy stability is identified as the challenging problem since it comprises of compact sized and energy limited sensor nodes that cooperates during data routing. The existing clustering-based routing mechanisms accomplished energy efficiency and attempted to minimize the distance between the cluster head (CH) and the sink node for network lifetime improvement. The adoption of swarm intelligence algorithms and fuzzy logic is determined to the ideal computational intelligence techniques which are suitable for NP-hard problem like the multi-hop route selection process. In this paper, A Modified Dingo Optimization Algorithm-based Clustering Mechanism (MDOACM) is proposed for addressing the limitations of the clustering protocol with respect to cluster head (CH) lifetime and cluster quality. This MDOACM-based clustering protocol utilized Interval Type-2 Fuzzy Logic (IT2FL) for determining the trust level of each sensor node since the existence of an untrustworthy node introduces adverse impact on the data quality and reliability. It specifically used MDOA for achieving better clustering with balanced trade-off between the rate of exploration and exploitation such that frequent re-clustering is prevented. It effectively prevented malicious nodes with minimized energy consumption and enhanced network lifetime. It also adopted a communication system that supports the sensors in attaining the objective with reduced energy and maximized confidence level during the transmission of full exploration data. The results of MDOACM confirmed an average improvement in network lifetime of 23.18% and 25.16% with respect to different energy levels and density of sensor nodes.

在无线传感器网络(WSN)的设计中,最大限度地延长网络寿命和保持能量稳定性被认为是一个具有挑战性的问题,因为它由体积小巧、能量有限的传感器节点组成,这些节点在数据路由过程中相互合作。现有的基于聚类的路由机制实现了能源效率,并试图最小化簇头(CH)与汇节点之间的距离,以提高网络寿命。蜂群智能算法和模糊逻辑的采用被认为是理想的计算智能技术,适用于像多跳路由选择过程这样的 NP-hard问题。本文提出了一种基于丁戈优化算法的修正聚类机制(MDOACM),以解决聚类协议在簇头(CH)寿命和聚类质量方面的局限性。该基于 MDOACM 的聚类协议利用 Interval Type-2 Fuzzy Logic(IT2FL)来确定每个传感器节点的信任度,因为不可信节点的存在会对数据质量和可靠性产生不利影响。它特别使用 MDOA 来实现更好的聚类,并在探索率和利用率之间进行平衡权衡,从而防止频繁的重新聚类。它有效地防止了恶意节点,最大限度地减少了能量消耗,提高了网络寿命。它还采用了一种通信系统,支持传感器在传输完整勘探数据期间以更低的能耗和最大化的置信度实现目标。MDOACM 的结果证实,在不同的能量水平和传感器节点密度下,网络寿命平均提高了 23.18% 和 25.16%。
{"title":"Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization","authors":"S. Kishore Verma, K. Lokeshwaran, J. Martin Sahayaraj, J. S. Adeline Johnsana","doi":"10.1007/s12083-024-01696-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01696-w","url":null,"abstract":"<p>In the design of Wireless sensor networks (WSNs), maximizing network lifetime and sustaining energy stability is identified as the challenging problem since it comprises of compact sized and energy limited sensor nodes that cooperates during data routing. The existing clustering-based routing mechanisms accomplished energy efficiency and attempted to minimize the distance between the cluster head (CH) and the sink node for network lifetime improvement. The adoption of swarm intelligence algorithms and fuzzy logic is determined to the ideal computational intelligence techniques which are suitable for NP-hard problem like the multi-hop route selection process. In this paper, A Modified Dingo Optimization Algorithm-based Clustering Mechanism (MDOACM) is proposed for addressing the limitations of the clustering protocol with respect to cluster head (CH) lifetime and cluster quality. This MDOACM-based clustering protocol utilized Interval Type-2 Fuzzy Logic (IT2FL) for determining the trust level of each sensor node since the existence of an untrustworthy node introduces adverse impact on the data quality and reliability. It specifically used MDOA for achieving better clustering with balanced trade-off between the rate of exploration and exploitation such that frequent re-clustering is prevented. It effectively prevented malicious nodes with minimized energy consumption and enhanced network lifetime. It also adopted a communication system that supports the sensors in attaining the objective with reduced energy and maximized confidence level during the transmission of full exploration data. The results of MDOACM confirmed an average improvement in network lifetime of 23.18% and 25.16% with respect to different energy levels and density of sensor nodes.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"5 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving byzantine fault tolerance based on stake evaluation and consistent hashing 基于利害关系评估和一致散列改进拜占庭容错性
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-11 DOI: 10.1007/s12083-024-01700-3
Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu

In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain in enhancing the security and reliability of Byzantine fault-tolerant systems. This paper addresses these challenges by improving a Byzantine fault-tolerant approach based on stake evaluation and improved consistency hashing. We propose a method that leverages node stakes to enhance system security and reliability by allocating different trust values. Additionally, we introduce improvements to the consistency hashing technique, enabling its effective operation in a Byzantine fault-tolerant environment. By introducing redundant nodes on the hash ring to mitigate the impact of malicious nodes, we enhance system fault tolerance and scalability. Experimental results demonstrate a significant improvement in system security and performance using this approach. These findings suggest that our method holds considerable potential for widespread application in the field of Byzantine fault tolerance, supporting the development of more reliable blockchain systems.

在分布式系统中,拜占庭容错在确保系统正常运行方面发挥着至关重要的作用,尤其是在面对恶意节点时。然而,在提高拜占庭容错系统的安全性和可靠性方面仍然存在挑战。本文通过改进基于利害关系评估和改进的一致性哈希算法的拜占庭容错方法来应对这些挑战。我们提出了一种利用节点利害关系的方法,通过分配不同的信任值来增强系统的安全性和可靠性。此外,我们还对一致性散列技术进行了改进,使其能够在拜占庭容错环境中有效运行。通过在哈希环上引入冗余节点以减轻恶意节点的影响,我们增强了系统的容错性和可扩展性。实验结果表明,采用这种方法后,系统的安全性和性能都得到了显著提高。这些研究结果表明,我们的方法在拜占庭容错领域具有相当大的广泛应用潜力,可为开发更可靠的区块链系统提供支持。
{"title":"Improving byzantine fault tolerance based on stake evaluation and consistent hashing","authors":"Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu","doi":"10.1007/s12083-024-01700-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01700-3","url":null,"abstract":"<p>In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain in enhancing the security and reliability of Byzantine fault-tolerant systems. This paper addresses these challenges by improving a Byzantine fault-tolerant approach based on stake evaluation and improved consistency hashing. We propose a method that leverages node stakes to enhance system security and reliability by allocating different trust values. Additionally, we introduce improvements to the consistency hashing technique, enabling its effective operation in a Byzantine fault-tolerant environment. By introducing redundant nodes on the hash ring to mitigate the impact of malicious nodes, we enhance system fault tolerance and scalability. Experimental results demonstrate a significant improvement in system security and performance using this approach. These findings suggest that our method holds considerable potential for widespread application in the field of Byzantine fault tolerance, supporting the development of more reliable blockchain systems.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"4 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A supervised privacy preservation transaction system for aviation business 航空业务隐私保护交易监督系统
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-10 DOI: 10.1007/s12083-024-01647-5
Xingguang Zhou, Weihan Li, Lin Zhong

Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.

数据安全是航空商业交易的一个关键问题。为了防止业务参与者的隐私泄露,必须构建一个可信的交易环境。为此,我们构建了一种基于联盟区块链的严格加密方案,该方案涉及两个关键方面。首先,我们提出了一种基于身份的同态方案,从而可以正确计算和验证流动金额的封装交易结果。其次,在同构方案中加入了监督功能。加密陷阱门中增加了一个公钥,该公钥分配给监督员。因此,作为两个接收者的航空公司和监管者都可以独立解密密文,而无需耗时的交互。实验结果表明,该系统的加密时间为 15 毫秒,两个接收者的解密时间分别为 15 毫秒和 15.45 毫秒。与流行的加密货币方案相比,该系统在不影响效率的情况下极大地实现了监督功能。最后,提出了受监督的隐私保护交易系统的应用网络架构。
{"title":"A supervised privacy preservation transaction system for aviation business","authors":"Xingguang Zhou, Weihan Li, Lin Zhong","doi":"10.1007/s12083-024-01647-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01647-5","url":null,"abstract":"<p>Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"214 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140596182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT 物联网中基于模糊安全路由协议的高能效天鹅智能聚类技术(SICT)
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-04 DOI: 10.1007/s12083-024-01670-6
R. Shanmugapriya, Santhosh Kumar SVN

Internet of Things (IoT) is the collection of physical objects which consists of integrated technologies to sense, interact and collaborate with other smart objects to collect the data from the deployed environment and send it to the base station. Data dissemination is a network management service which is provided to devices of IoT, by the base station to monitor and manage the device related configuration parameter in the network. In data dissemination, it is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network. Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very essential. Therefore, efficient security authentication mechanism is required to prevent the various types of attacks which occurs during data dissemination. In this paper, an energy efficient Swan Intelligent based Clustering Technique (SICT) has been proposed to provide efficient clustering of nodes in the network. Moreover, trust based secured lightweight authentication protocol is proposed to provide better authentication and secure data dissemination to the devices of IoT. Additionally, the proposed protocol employs fuzzy logic to discover optimal route by selecting only trusted nodes during routing process. The advantages of the proposed system are it improves the security during data dissemination and optimizes the energy by identifying the relevant devices which are required for configuration parameters during data dissemination. The proposed system is implemented in NS3 simulation with realistic simulation parameters namely energy efficiency, network lifetime, throughput, computational cost, communication cost, average signing time, average verification time, packet delivery ratio and network delay. The simulation results justifies that the proposed protocol improves average energy consumption by 34%, computational cost by 41.85%, communication cost by 36.83%, network delay by 31.66%, signing time by 26.25% and verification time by 33.46%. Moreover, the proposed system improves packet delivery ratio by 30% and provides efficient authentication to mitigate various types of attacks during data dissemination when it is compared with other existing protocols in IoT environment.

物联网(IoT)是物理对象的集合,由综合技术组成,用于感知、交互和与其他智能对象协作,从部署的环境中收集数据并将其发送到基站。数据传播是一种网络管理服务,由基站提供给物联网设备,以监控和管理网络中与设备相关的配置参数。在数据传播过程中,必须识别出合法节点,以便在数据传输过程中对设备配置进行重新编程和重新配置,从而确保网络的安全性和可靠性。由于在物联网中,越来越多的设备被重新编程以自主交换数据和命令,因此为所传播的配置参数提供安全保障非常重要。因此,需要高效的安全认证机制来防止数据传播过程中发生的各类攻击。本文提出了一种基于天鹅智能聚类技术(SICT)的高能效网络节点聚类技术。此外,还提出了基于信任的安全轻量级认证协议,为物联网设备提供更好的认证和安全数据传播。此外,所提出的协议采用模糊逻辑,在路由过程中只选择受信任的节点,从而发现最佳路由。所提系统的优势在于,它提高了数据传播过程中的安全性,并通过识别数据传播过程中需要配置参数的相关设备来优化能源。建议的系统是在 NS3 仿真中实现的,仿真参数符合实际情况,即能源效率、网络寿命、吞吐量、计算成本、通信成本、平均签署时间、平均验证时间、数据包传送率和网络延迟。仿真结果表明,所提协议的平均能耗降低了 34%,计算成本降低了 41.85%,通信成本降低了 36.83%,网络延迟降低了 31.66%,签署时间降低了 26.25%,验证时间降低了 33.46%。此外,与物联网环境中的其他现有协议相比,建议的系统提高了 30% 的数据包传送率,并提供了有效的身份验证,以减轻数据传播过程中的各种攻击。
{"title":"An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT","authors":"R. Shanmugapriya, Santhosh Kumar SVN","doi":"10.1007/s12083-024-01670-6","DOIUrl":"https://doi.org/10.1007/s12083-024-01670-6","url":null,"abstract":"<p>Internet of Things (IoT) is the collection of physical objects which consists of integrated technologies to sense, interact and collaborate with other smart objects to collect the data from the deployed environment and send it to the base station. Data dissemination is a network management service which is provided to devices of IoT, by the base station to monitor and manage the device related configuration parameter in the network. In data dissemination, it is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network. Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very essential. Therefore, efficient security authentication mechanism is required to prevent the various types of attacks which occurs during data dissemination. In this paper, an energy efficient Swan Intelligent based Clustering Technique (SICT) has been proposed to provide efficient clustering of nodes in the network. Moreover, trust based secured lightweight authentication protocol is proposed to provide better authentication and secure data dissemination to the devices of IoT. Additionally, the proposed protocol employs fuzzy logic to discover optimal route by selecting only trusted nodes during routing process. The advantages of the proposed system are it improves the security during data dissemination and optimizes the energy by identifying the relevant devices which are required for configuration parameters during data dissemination. The proposed system is implemented in NS3 simulation with realistic simulation parameters namely energy efficiency, network lifetime, throughput, computational cost, communication cost, average signing time, average verification time, packet delivery ratio and network delay. The simulation results justifies that the proposed protocol improves average energy consumption by 34%, computational cost by 41.85%, communication cost by 36.83%, network delay by 31.66%, signing time by 26.25% and verification time by 33.46%. Moreover, the proposed system improves packet delivery ratio by 30% and provides efficient authentication to mitigate various types of attacks during data dissemination when it is compared with other existing protocols in IoT environment.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"213 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting efficient video file streaming in P2P cloud storage 支持 P2P 云存储中的高效视频文件流
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-04 DOI: 10.1007/s12083-024-01691-1
Jinsung Kim, Eunsam Kim

Peer-to-Peer cloud storage has emerged as an alternative to address the high installation and maintenance costs in conventional cloud storage based on client/server architectures. Since P2P cloud storage must guarantee the same level of data availability as conventional cloud storage, it has employed replication and erasure coding to redundantly store data among peers in P2P environments where the peer churn rate is high. However, most studies using two techniques have focused only on increasing data availability. Especially for video files stored in P2P cloud storage, in addition to guaranteeing their availability, it is critical but challenging to ensure that they are played back in real time by video player applications as if they were being read from local storage. To address this challenge in this paper, we propose a novel hybrid redundancy scheme to support efficient video file streaming while ensuring the availability of video files in P2P cloud storage. The main contributions of our work are threefold. First, we can achieve higher storage efficiency and better streaming performance by employing both erasure coding and replication simultaneously. Second, we can maximize the number of concurrent playback requests supported while minimizing the decrease in file availability by dynamically adjusting the redundancy degree of each video file according to its popularity. Third, we can further improve the performance by efficiently using storage space with our proposed two-phase replacement policy. Finally, we demonstrate through extensive experiments that our scheme outperforms other techniques by utilizing the benefits of both replication and erasure coding.

点对点云存储的出现,解决了基于客户端/服务器架构的传统云存储安装和维护成本高的问题。由于点对点云存储必须保证与传统云存储相同水平的数据可用性,因此它采用了复制和擦除编码技术,以便在点对点环境中冗余存储点对点之间的数据,因为点对点环境中的点对点流失率很高。不过,大多数使用这两种技术的研究都只关注提高数据可用性。特别是对于存储在 P2P 云存储中的视频文件,除了要保证其可用性外,确保视频播放器应用程序能实时播放这些文件,就像从本地存储中读取一样,这一点至关重要,但也极具挑战性。为了应对这一挑战,我们在本文中提出了一种新颖的混合冗余方案,以支持高效的视频文件流,同时确保视频文件在 P2P 云存储中的可用性。我们的工作主要有三方面的贡献。首先,我们可以通过同时采用擦除编码和复制实现更高的存储效率和更好的流性能。其次,我们可以根据每个视频文件的受欢迎程度动态调整其冗余度,从而最大限度地增加支持的并发播放请求数量,同时最大限度地减少文件可用性的降低。第三,利用我们提出的两阶段替换策略,有效利用存储空间,从而进一步提高性能。最后,我们通过大量实验证明,通过利用复制和擦除编码的优势,我们的方案优于其他技术。
{"title":"Supporting efficient video file streaming in P2P cloud storage","authors":"Jinsung Kim, Eunsam Kim","doi":"10.1007/s12083-024-01691-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01691-1","url":null,"abstract":"<p>Peer-to-Peer cloud storage has emerged as an alternative to address the high installation and maintenance costs in conventional cloud storage based on client/server architectures. Since P2P cloud storage must guarantee the same level of data availability as conventional cloud storage, it has employed replication and erasure coding to redundantly store data among peers in P2P environments where the peer churn rate is high. However, most studies using two techniques have focused only on increasing data availability. Especially for video files stored in P2P cloud storage, in addition to guaranteeing their availability, it is critical but challenging to ensure that they are played back in real time by video player applications as if they were being read from local storage. To address this challenge in this paper, we propose a novel hybrid redundancy scheme to support efficient video file streaming while ensuring the availability of video files in P2P cloud storage. The main contributions of our work are threefold. First, we can achieve higher storage efficiency and better streaming performance by employing both erasure coding and replication simultaneously. Second, we can maximize the number of concurrent playback requests supported while minimizing the decrease in file availability by dynamically adjusting the redundancy degree of each video file according to its popularity. Third, we can further improve the performance by efficiently using storage space with our proposed two-phase replacement policy. Finally, we demonstrate through extensive experiments that our scheme outperforms other techniques by utilizing the benefits of both replication and erasure coding.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"1 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing 面向物联网边缘计算的基于弗兰克-沃尔夫学习和迪里夏特-高斯邻域的安全认证
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-04 DOI: 10.1007/s12083-024-01667-1

Abstract

With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.

摘要 随着物联网(IoT)的发展,许多用户通过传感器参与到不同的应用中。在物联网边缘计算系统中选择最机密的用户或传感器仍然是首要问题。在这种情况下,终端用户和边缘服务器都有可能是恶意或受损的传感器。在识别和隔离恶意终端用户或边缘服务器方面已有多项研究成果。我们的工作主要集中在物联网边缘服务器的安全方面。我们利用弗兰克-沃尔夫最优服务请求(FWOSR)算法来评估逻辑回归模型的边界或极限,其中线性近似下的凸问题是针对权重稀疏性(即多个用户请求竞争最近的边缘服务器)求解的,以避免在监督机器学习过程中出现过度拟合。我们设计了弗兰克-沃尔夫监督机器学习(FWSL)技术来选择最佳边缘服务器,并进一步最小化用户请求与边缘服务器之间的计算和通信成本。接下来,我们提出了云网络中基于位置服务的 Dirichlet Gaussian Blocked Gibbs Vicinity 认证模型。在这里,基于接收信号强度指示器(RSSI)、MAC 地址和数据包到达时间的邻域认证得以实现。这样,通过在邻近测试中引入高斯函数,提高了认证准确性,并通过考虑多个位置,提供了灵活的邻近范围控制。仿真和实验还验证了计算成本、通信成本、时间复杂性和检测错误率。
{"title":"Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing","authors":"","doi":"10.1007/s12083-024-01667-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01667-1","url":null,"abstract":"<h3>Abstract</h3> <p>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"55 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient hybrid resource allocation for uplink and downlink device-to-device underlay communication in 5G and beyond wireless networks 在 5G 及以后的无线网络中,为上行和下行设备对设备底层通信分配高效混合资源
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-02 DOI: 10.1007/s12083-024-01680-4
Malle Gopal, T. Velmurugan

The device-to-device communication (D2D) concept allows direct communication between nearby devices without a base station. At the same time, cellular resources are reused. It reduces the end-to-end delay of D2D active users significantly. Most of the traditional methods consider allocating resources by downlink or uplink alone. The present study considers a novel hybrid approach for joint downlink and uplink to allocate resources, maximizing the network throughput. Further, it minimally restricts cellular and D2D pairs’ interference and ensures smooth D2D communication. The challenge is that power control and Quality of service constraints are seriously degraded by strong intra-cell and inter-cell interference due to spectrum reusability and deployment. A hybrid structure that exploits efficient resource allocation is needed to tackle this situation. The optimization problem is formulated as a mixed-integer non-linear problem that is usually NP-hard. Such a problem is divided into two stages, namely channel assignment and power allocation. The factors considered for the objective problem of resource allocation are the transmission power of the cellular user, D2D active user, base station, connection distance, and Quality of Service constraints. The proposed novel hybrid scheme can improve network throughput and improves spectrum efficiency. The numerical results imply that the hybrid method in the proposal functions efficiently and is verified by comparing it with the present joint resource allocation methods.

设备对设备通信(D2D)概念允许附近的设备在没有基站的情况下直接通信。与此同时,蜂窝资源得到重复使用。这大大减少了 D2D 活动用户的端到端延迟。大多数传统方法只考虑通过下行链路或上行链路分配资源。本研究考虑了一种新颖的混合方法,即联合下行链路和上行链路来分配资源,从而最大限度地提高网络吞吐量。此外,它还能最大限度地限制蜂窝和 D2D 对的干扰,确保 D2D 通信的顺畅。面临的挑战是,由于频谱的可重用性和部署,小区内和小区间的强干扰会严重降低功率控制和服务质量约束。要解决这种情况,需要一种利用高效资源分配的混合结构。优化问题是一个混合整数非线性问题,通常具有 NP 难度。该问题分为两个阶段,即信道分配和功率分配。资源分配目标问题考虑的因素包括蜂窝用户、D2D 活动用户、基站的传输功率、连接距离和服务质量约束。所提出的新型混合方案可以提高网络吞吐量并改善频谱效率。数值结果表明,提案中的混合方法能有效发挥作用,并通过与现有的联合资源分配方法进行比较得到了验证。
{"title":"Efficient hybrid resource allocation for uplink and downlink device-to-device underlay communication in 5G and beyond wireless networks","authors":"Malle Gopal, T. Velmurugan","doi":"10.1007/s12083-024-01680-4","DOIUrl":"https://doi.org/10.1007/s12083-024-01680-4","url":null,"abstract":"<p>The device-to-device communication (D2D) concept allows direct communication between nearby devices without a base station. At the same time, cellular resources are reused. It reduces the end-to-end delay of D2D active users significantly. Most of the traditional methods consider allocating resources by downlink or uplink alone. The present study considers a novel hybrid approach for joint downlink and uplink to allocate resources, maximizing the network throughput. Further, it minimally restricts cellular and D2D pairs’ interference and ensures smooth D2D communication. The challenge is that power control and Quality of service constraints are seriously degraded by strong intra-cell and inter-cell interference due to spectrum reusability and deployment. A hybrid structure that exploits efficient resource allocation is needed to tackle this situation. The optimization problem is formulated as a mixed-integer non-linear problem that is usually NP-hard. Such a problem is divided into two stages, namely channel assignment and power allocation. The factors considered for the objective problem of resource allocation are the transmission power of the cellular user, D2D active user, base station, connection distance, and Quality of Service constraints. The proposed novel hybrid scheme can improve network throughput and improves spectrum efficiency. The numerical results imply that the hybrid method in the proposal functions efficiently and is verified by comparing it with the present joint resource allocation methods.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"41 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IGWOA: Improved Grey Wolf optimization algorithm for resource scheduling in cloud-fog environment for delay-sensitive applications IGWOA:改进的灰狼优化算法,用于云雾环境中延迟敏感应用的资源调度
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1007/s12083-024-01642-w

Abstract

Fog computing, a technology that offers adaptable and scalable computing resources, facing a significant difficulty in task scheduling, affecting system performance and customer satisfaction. Finding solutions to the task scheduling problem is challenging due to its NP-completeness. Researchers suggest a hybrid approach that combines the Grey Wolf Optimization Algorithm (GWO) and Heterogeneous earliest finishing time (HEFT) to address this problem. The hybrid IGWOA (Improved Grey Wolf optimization algorithm) method seeks to minimize makespan and throughput while focusing on multi-objective resource scheduling in Fog computing. Proposed algorithm is suggested to improve the exploration and exploitation phases of the traditional grey wolf algorithm. Furthermore, the HEFT-based GWO algorithm has the benefit of faster convergence in larger scheduling problems. The effectiveness of the suggested algorithm in comparison to existing techniques has been evaluated using the iFogsim toolkit. Real data set and pseudo workloads both are used for working. The statistical method Analysis of Variance (ANOVA) is used to confirm the results. The effectiveness of it in reducing makespan, and throughput is demonstrated by experimental results on 200–1000 tasks. Particularly, the proposed approach outperforms peer competing techniques AEOSSA, HHO, PSO, and FA in relation to makespan and throughput; successfully, improvement is noticed on makespan up to 9.34% over the AEOSSA and up to 72.56% over other optimization techniques for pseudo workload. Additionally, it also showed improvement on makespan up to 6.89% over the AEOSSA and up to 69.73% over other optimization techniques on NASA iPSC and HPC2N real data sets, while improving throughput by 62.4%, 52.8%, and 41.6% on pseudo workload, NASA iPSC, and HPC2N data sets, respectively. These results show proposed approach solves the resource scheduling issue in Fog computing settings.

摘要 雾计算是一种提供适应性强、可扩展计算资源的技术,但在任务调度方面面临着巨大困难,影响着系统性能和客户满意度。由于任务调度问题具有 NP-完备性,因此寻找任务调度问题的解决方案极具挑战性。研究人员提出了一种结合灰狼优化算法(GWO)和异构最早完成时间(HEFT)的混合方法来解决这一问题。混合 IGWOA(改进的灰狼优化算法)方法旨在最大限度地减少时间跨度和吞吐量,同时关注雾计算中的多目标资源调度。建议采用所提出的算法来改进传统灰狼算法的探索和开发阶段。此外,基于 HEFT 的 GWO 算法还具有在较大调度问题中收敛更快的优点。使用 iFogsim 工具包评估了建议算法与现有技术相比的有效性。工作中使用了真实数据集和伪工作负载。统计方法方差分析(ANOVA)用于确认结果。通过对 200-1000 个任务的实验结果,证明了该方法在减少时间跨度(makespan)和吞吐量(throughput)方面的有效性。特别是,在时间跨度和吞吐量方面,所提出的方法优于同类竞争技术 AEOSSA、HHO、PSO 和 FA;在伪工作量方面,成功地比 AEOSSA 的时间跨度提高了 9.34%,比其他优化技术提高了 72.56%。此外,在 NASA iPSC 和 HPC2N 真实数据集上,与 AEOSSA 相比,成功改善了 Makepan 达 6.89%,与其他优化技术相比,成功改善了 Makepan 达 69.73%,而在伪工作负载、NASA iPSC 和 HPC2N 数据集上,吞吐量分别提高了 62.4%、52.8% 和 41.6%。这些结果表明,所提出的方法解决了雾计算环境中的资源调度问题。
{"title":"IGWOA: Improved Grey Wolf optimization algorithm for resource scheduling in cloud-fog environment for delay-sensitive applications","authors":"","doi":"10.1007/s12083-024-01642-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01642-w","url":null,"abstract":"<h3>Abstract</h3> <p>Fog computing, a technology that offers adaptable and scalable computing resources, facing a significant difficulty in task scheduling, affecting system performance and customer satisfaction. Finding solutions to the task scheduling problem is challenging due to its NP-completeness. Researchers suggest a hybrid approach that combines the Grey Wolf Optimization Algorithm (GWO) and Heterogeneous earliest finishing time (HEFT) to address this problem. The hybrid IGWOA (Improved Grey Wolf optimization algorithm) method seeks to minimize makespan and throughput while focusing on multi-objective resource scheduling in Fog computing. Proposed algorithm is suggested to improve the exploration and exploitation phases of the traditional grey wolf algorithm. Furthermore, the HEFT-based GWO algorithm has the benefit of faster convergence in larger scheduling problems. The effectiveness of the suggested algorithm in comparison to existing techniques has been evaluated using the iFogsim toolkit. Real data set and pseudo workloads both are used for working. The statistical method Analysis of Variance (ANOVA) is used to confirm the results. The effectiveness of it in reducing makespan, and throughput is demonstrated by experimental results on 200–1000 tasks. Particularly, the proposed approach outperforms peer competing techniques AEOSSA, HHO, PSO, and FA in relation to makespan and throughput; successfully, improvement is noticed on makespan up to 9.34% over the AEOSSA and up to 72.56% over other optimization techniques for pseudo workload. Additionally, it also showed improvement on makespan up to 6.89% over the AEOSSA and up to 69.73% over other optimization techniques on NASA iPSC and HPC2N real data sets, while improving throughput by 62.4%, 52.8%, and 41.6% on pseudo workload, NASA iPSC, and HPC2N data sets, respectively. These results show proposed approach solves the resource scheduling issue in Fog computing settings.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"30 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs ARSL-V:在 VANET 中使用强化学习的风险感知中继选择方案
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-27 DOI: 10.1007/s12083-023-01589-4
Xuejiao Liu, Chuanhua Wang, Lingfeng Huang, Yingjie Xia

In high-speed and dynamic Vehicular Ad-hoc Networks (VANETs), cooperative transmission mechanism is a promising scheme to ensure the sustainable transmission of data. However, due to the possible malicious behavior of vehicles and the dynamic network topology of VANETs, not all vehicles are trustworthy to become relays and perform the cooperative transmission task reliably. Therefore, how to ensure the security and reliability of the selected vehicles is still an urgent problem to be solved. In this paper, we propose a risk-aware relay selection scheme (ARSL-V) using reinforcement learning in VANETs. Specifically, we design a risk assessment mechanism based on multiple parameters to dynamically assess the potential risk of relay vehicles by considering the reputation variability, abnormal behavior, and environmental impact of vehicles. Also, we model the relay selection problem as an improved Kuhn-Munkres algorithm based on the risk assessment to realize relay selection in multi-relay and multi-target vehicle scenarios. Besides, we use a reinforcement learning algorithm combined with feedback data to achieve dynamic adjustment of the parameter weights. Simulation results show that compared with the existing schemes, ARSL-V can improve the detection rate of malicious behavior and cooperative transmission success rate by about 25% and 6%, respectively.

在高速动态的车载 Ad-hoc 网络(VANET)中,合作传输机制是确保数据可持续传输的一种有前途的方案。然而,由于车辆可能存在恶意行为以及 VANET 的动态网络拓扑结构,并非所有车辆都能成为值得信赖的中继并可靠地执行合作传输任务。因此,如何确保所选车辆的安全性和可靠性仍是一个亟待解决的问题。本文提出了一种在 VANET 中使用强化学习的风险感知中继选择方案(ARSL-V)。具体来说,我们设计了一种基于多参数的风险评估机制,通过考虑车辆的信誉变化、异常行为和环境影响,动态评估中继车辆的潜在风险。同时,我们将中继选择问题建模为基于风险评估的改进型 Kuhn-Munkres 算法,以实现多中继和多目标车辆场景下的中继选择。此外,我们采用强化学习算法,结合反馈数据实现参数权重的动态调整。仿真结果表明,与现有方案相比,ARSL-V 能将恶意行为检测率和合作传输成功率分别提高约 25% 和 6%。
{"title":"ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs","authors":"Xuejiao Liu, Chuanhua Wang, Lingfeng Huang, Yingjie Xia","doi":"10.1007/s12083-023-01589-4","DOIUrl":"https://doi.org/10.1007/s12083-023-01589-4","url":null,"abstract":"<p>In high-speed and dynamic Vehicular Ad-hoc Networks (VANETs), cooperative transmission mechanism is a promising scheme to ensure the sustainable transmission of data. However, due to the possible malicious behavior of vehicles and the dynamic network topology of VANETs, not all vehicles are trustworthy to become relays and perform the cooperative transmission task reliably. Therefore, how to ensure the security and reliability of the selected vehicles is still an urgent problem to be solved. In this paper, we propose a risk-aware relay selection scheme (ARSL-V) using reinforcement learning in VANETs. Specifically, we design a risk assessment mechanism based on multiple parameters to dynamically assess the potential risk of relay vehicles by considering the reputation variability, abnormal behavior, and environmental impact of vehicles. Also, we model the relay selection problem as an improved Kuhn-Munkres algorithm based on the risk assessment to realize relay selection in multi-relay and multi-target vehicle scenarios. Besides, we use a reinforcement learning algorithm combined with feedback data to achieve dynamic adjustment of the parameter weights. Simulation results show that compared with the existing schemes, ARSL-V can improve the detection rate of malicious behavior and cooperative transmission success rate by about 25% and 6%, respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"33 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140311138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1