首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF CrowdChain:基于区块链和 PUF 的隐私保护众筹系统
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s12083-024-01785-w
Yueyue He, Koji Inoue

Crowdfunding refers to the online collection of certain capital from a vast number of individuals or groups that each contribute a relatively small amount. Recently, the credibility of crowdfunding platforms has been undermined by fraudulent projects, inadequate fund management, and other forms of disorder. The decentralization and anti-tampering features of blockchain provide the possibility to solve the above problems, and many studies have proposed blockchain-based crowdfunding schemes. However, the existing state-of-the-art methods do not provide user authentication, transaction auditing, and identity management in a privacy-preserving way. Accordingly, this paper presents a novel blockchain-based crowdfunding system called CrowdChain. Initially, the distributed identity and BLS signature are employed to establish a user authentication mechanism, enabling CrowdChain to withstand Sybil attacks while preserving the non-linkability of user identities. Secondly, the physically unclonable function (PUF) is used to generate keys associated with digital identities that are not stored in external devices to resist physical attacks. Subsequently, a crowdfunding mechanism is constructed utilizing zero-knowledge proofs to facilitate streamlined auditing procedures while safeguarding the confidentiality of transactions. Additionally, the formal security analysis proves the security of the CrowdChain scheme. The system prototype is implemented on the Hyperledger Fabric. Empirical evidence indicates the viable efficiency of CrowdChain.

众筹是指从众多个人或团体中以相对较小的金额在线募集一定的资金。近来,众筹平台的公信力受到欺诈项目、资金管理不到位等乱象的影响。区块链的去中心化和防篡改特性为解决上述问题提供了可能,许多研究都提出了基于区块链的众筹方案。然而,现有的先进方法无法以保护隐私的方式提供用户身份验证、交易审计和身份管理。因此,本文提出了一种新颖的基于区块链的众筹系统--CrowdChain。首先,利用分布式身份和 BLS 签名建立用户身份验证机制,使 CrowdChain 能够抵御 Sybil 攻击,同时保留用户身份的不可链接性。其次,利用物理不可克隆函数(PUF)生成与数字身份相关的密钥,这些密钥不存储在外部设备中,以抵御物理攻击。随后,利用零知识证明构建了一种众筹机制,以简化审计程序,同时保护交易的机密性。此外,形式安全分析证明了众筹链方案的安全性。系统原型在超级账本架构(Hyperledger Fabric)上实现。经验证据表明,CrowdChain 的效率是可行的。
{"title":"CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF","authors":"Yueyue He, Koji Inoue","doi":"10.1007/s12083-024-01785-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01785-w","url":null,"abstract":"<p>Crowdfunding refers to the online collection of certain capital from a vast number of individuals or groups that each contribute a relatively small amount. Recently, the credibility of crowdfunding platforms has been undermined by fraudulent projects, inadequate fund management, and other forms of disorder. The decentralization and anti-tampering features of blockchain provide the possibility to solve the above problems, and many studies have proposed blockchain-based crowdfunding schemes. However, the existing state-of-the-art methods do not provide user authentication, transaction auditing, and identity management in a privacy-preserving way. Accordingly, this paper presents a novel blockchain-based crowdfunding system called CrowdChain. Initially, the distributed identity and BLS signature are employed to establish a user authentication mechanism, enabling CrowdChain to withstand Sybil attacks while preserving the non-linkability of user identities. Secondly, the physically unclonable function (PUF) is used to generate keys associated with digital identities that are not stored in external devices to resist physical attacks. Subsequently, a crowdfunding mechanism is constructed utilizing zero-knowledge proofs to facilitate streamlined auditing procedures while safeguarding the confidentiality of transactions. Additionally, the formal security analysis proves the security of the CrowdChain scheme. The system prototype is implemented on the Hyperledger Fabric. Empirical evidence indicates the viable efficiency of CrowdChain.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"69 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks MRNQ:基于机器学习的可靠节点查询器,用于水下声学传感器网络的可靠通信
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s12083-024-01772-1
Yogita Singh, Navneet Singh Aulakh, Inderdeep K. Aulakh, Shyama Barna Bhattacharjee, Sudesh Kumari, Sunita Rani, Gaurav Sharma, Savita Khurana, Shilpi Harnal, Nitin Goyal

Ensuring effective and reliable communication within underwater sensor networks (UWSNs) is a formidable challenge due to their unique characteristics, which include offshore exploration, underwater surveillance and monitoring. UWSNs have proven to be a promising approach in various fields, including research investigations, surveillance operations and underwater disaster response. To advance this field, numerous researchers have dedicated themselves to developing new protocols tailored to UWSNs or refining existing protocols, all with the goal of improving research. One important aspect that continues to attract the attention of researchers is the reliability factor in the underwater environment, leading to constant efforts to improve the overall efficiency of the network and optimize energy consumption. In this work, a machine learning based node reliability calculation algorithm (MRNQ) has been proposed, which takes into account numerous parameters such as the success rate, transmission time, node efficiency, and the network efficiency. The proposed approach outperforms CSLT and TMHCV across key metrics with notable percentage improvements. It achieves a 5.16% higher packet delivery rate, a 22.06% reduction in packet drop rates, a 42.4% extension in network lifetime, and a 0.87676% improvement in malicious node detection.

水下传感器网络(UWSN)具有独特的特点,包括近海勘探、水下监视和监测,因此确保水下传感器网络(UWSN)内有效可靠的通信是一项艰巨的挑战。事实证明,水下传感器网络在研究调查、监视行动和水下灾难响应等多个领域都是一种前景广阔的方法。为了推动这一领域的发展,众多研究人员致力于开发适合 UWSN 的新协议或完善现有协议,目的都是为了改进研究工作。研究人员持续关注的一个重要方面是水下环境中的可靠性因素,从而不断努力提高网络的整体效率并优化能源消耗。本研究提出了一种基于机器学习的节点可靠性计算算法(MRNQ),该算法考虑了成功率、传输时间、节点效率和网络效率等众多参数。所提出的方法在关键指标上优于 CSLT 和 TMHCV,并有显著的百分比改进。它的数据包交付率提高了 5.16%,数据包丢包率降低了 22.06%,网络寿命延长了 42.4%,恶意节点检测率提高了 0.87676%。
{"title":"MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks","authors":"Yogita Singh, Navneet Singh Aulakh, Inderdeep K. Aulakh, Shyama Barna Bhattacharjee, Sudesh Kumari, Sunita Rani, Gaurav Sharma, Savita Khurana, Shilpi Harnal, Nitin Goyal","doi":"10.1007/s12083-024-01772-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01772-1","url":null,"abstract":"<p>Ensuring effective and reliable communication within underwater sensor networks (UWSNs) is a formidable challenge due to their unique characteristics, which include offshore exploration, underwater surveillance and monitoring. UWSNs have proven to be a promising approach in various fields, including research investigations, surveillance operations and underwater disaster response. To advance this field, numerous researchers have dedicated themselves to developing new protocols tailored to UWSNs or refining existing protocols, all with the goal of improving research. One important aspect that continues to attract the attention of researchers is the reliability factor in the underwater environment, leading to constant efforts to improve the overall efficiency of the network and optimize energy consumption. In this work, a machine learning based node reliability calculation algorithm (MRNQ) has been proposed, which takes into account numerous parameters such as the success rate, transmission time, node efficiency, and the network efficiency. The proposed approach outperforms CSLT and TMHCV across key metrics with notable percentage improvements. It achieves a 5.16% higher packet delivery rate, a 22.06% reduction in packet drop rates, a 42.4% extension in network lifetime, and a 0.87676% improvement in malicious node detection.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"2 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks 针对异步占空比物联网网络的分布式和延迟感知信标功能
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1007/s12083-024-01788-7
Ming Yi, Qinglin Xie, Peng Long, Yuhang Wu, Quan Chen, Fanlong Zhang, Wenchao Xu

Beaconing is a fundamental task in IoT networks, where each node tries to locally broadcast a packet to all its neighbors. Unfortunately, the problem of Minimum Latency Beaconing Schedule (MLBS), which tries to obtain the fastest and collision-free schedule, is not well studied when the IoT devices employ the duty-cycled working mode. The existing works have rigid assumptions that there exists a single channel and can only work in a centralized fashion. Aiming at making the work more practical and general, in this paper, we investigate the first distributed method for the MLBS problem in Multi-channel asynchronous Duty-cycled IoT networks (MLBSMD problem). The MLBSMD problem is first formulated and proved to be NP-hard. To avoid collisions locally, several special structures are designed which can work in (varvec{O}(varvec{Delta }^{2})) time, where (varvec{Delta }) denotes the maximum node degree in the network. Then, a distributed beaconing scheduling method that can compute a low-latency and collision-free schedule is proposed with a theoretical bound, taking the active time slots of each node into account. Finally, the extensive simulation results demonstrate the effectiveness of the proposed algorithm in terms of latency.

信标是物联网网络中的一项基本任务,每个节点都试图在本地向其所有邻居广播数据包。遗憾的是,当物联网设备采用占空比工作模式时,试图获得最快且无碰撞时间表的最小延迟信标时间表(MLBS)问题却没有得到很好的研究。现有的工作都有一个僵化的假设,即存在单一信道,并且只能以集中方式工作。为了使工作更实用、更通用,本文首次研究了多通道异步占空比物联网网络中 MLBS 问题(MLBSMD 问题)的分布式方法。我们首先提出了 MLBSMD 问题,并证明它是 NP 难问题。为了避免局部碰撞,设计了几种特殊结构,它们可以在 (varvec{O}(varvec{Delta }^{2})) 时间内工作,其中 (varvec{Delta }) 表示网络中的最大节点度。然后,考虑到每个节点的活动时隙,提出了一种分布式信标调度方法,该方法可以计算出低延迟、无碰撞的调度,并给出了理论约束。最后,大量的仿真结果证明了所提算法在延迟方面的有效性。
{"title":"Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks","authors":"Ming Yi, Qinglin Xie, Peng Long, Yuhang Wu, Quan Chen, Fanlong Zhang, Wenchao Xu","doi":"10.1007/s12083-024-01788-7","DOIUrl":"https://doi.org/10.1007/s12083-024-01788-7","url":null,"abstract":"<p>Beaconing is a fundamental task in IoT networks, where each node tries to locally broadcast a packet to all its neighbors. Unfortunately, the problem of Minimum Latency Beaconing Schedule (MLBS), which tries to obtain the fastest and collision-free schedule, is not well studied when the IoT devices employ the duty-cycled working mode. The existing works have rigid assumptions that there exists a single channel and can only work in a centralized fashion. Aiming at making the work more practical and general, in this paper, we investigate the first distributed method for the MLBS problem in Multi-channel asynchronous Duty-cycled IoT networks (MLBSMD problem). The MLBSMD problem is first formulated and proved to be NP-hard. To avoid collisions locally, several special structures are designed which can work in <span>(varvec{O}(varvec{Delta }^{2}))</span> time, where <span>(varvec{Delta })</span> denotes the maximum node degree in the network. Then, a distributed beaconing scheduling method that can compute a low-latency and collision-free schedule is proposed with a theoretical bound, taking the active time slots of each node into account. Finally, the extensive simulation results demonstrate the effectiveness of the proposed algorithm in terms of latency.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"61 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems SRFE:网络入侵检测系统的逐步递归特征消除方法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1007/s12083-024-01763-2
Abdelaziz Alshaikh Qasem, Mahmoud H. Qutqut, Fatima Alhaj, Asem Kitana

Network intrusion detection systems (NIDSs) have evolved into a significant subject in cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also led to the usage of machine learning (ML) to advance and enhance NIDSs. A NIDS is the first line of defense in any environment, and it detects external and internal attacks. Recently, intrusion mechanisms have become more sophisticated and challenging to detect. Researchers have applied techniques such as ML to detect intruders and secure networks. This paper proposes a novel approach called SRFE (Stepwise Recursive Feature Elimination) to improve the performance and efficiency of predictive models for NIDSs. Our approach depends primarily on recursive feature elimination, which operates on a simple yet effective principle. We experimented with four classification algorithms, namely Support Vector Machine (SVM), Naive Bayes (NB), J48, and Random Forest (RF), on the most widely used dataset in the cybersecurity domain (NSL-KDD). The approach is mainly built on the features’ significance ranking using the Information Gain (IG) method. We conduct multiple experiments according to three scenarios. Each scenario contains various rounds, and in each round, we train the classifiers to eliminate the three lowest-ranked features stepwise. Our experiments show that the RF and J48 classifiers outperform other binary classifiers with an accuracy of 99.80% and 99.66%, respectively. Furthermore, both classifiers obtained the best results in the multiclass classification task; J48 achieved an accuracy of 99.53% in round number seven, and the RF achieved 99.69% in the fifth round.

网络入侵检测系统(NIDS)已发展成为网络安全研究的一个重要课题,这主要是由于网络攻击和情报的增长,这也导致了机器学习(ML)的使用,以推进和增强 NIDS。NIDS 是任何环境中的第一道防线,可检测外部和内部攻击。最近,入侵机制变得越来越复杂,检测难度也越来越大。研究人员已经应用了 ML 等技术来检测入侵者并确保网络安全。本文提出了一种名为 SRFE(逐步递归特征消除)的新方法,以提高 NIDS 预测模型的性能和效率。我们的方法主要依赖于递归特征消除,其原理简单而有效。我们在网络安全领域使用最广泛的数据集(NSL-KDD)上试验了四种分类算法,即支持向量机(SVM)、奈夫贝叶斯(NB)、J48 和随机森林(RF)。该方法主要基于使用信息增益(IG)方法进行的特征重要性排序。我们根据三个场景进行了多次实验。每个场景都包含不同的轮次,在每一轮中,我们训练分类器逐步剔除排名最低的三个特征。实验结果表明,RF 和 J48 分类器的准确率分别为 99.80% 和 99.66%,优于其他二元分类器。此外,这两种分类器在多类分类任务中都取得了最佳成绩;J48 在第七轮中取得了 99.53% 的准确率,RF 在第五轮中取得了 99.69% 的准确率。
{"title":"SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems","authors":"Abdelaziz Alshaikh Qasem, Mahmoud H. Qutqut, Fatima Alhaj, Asem Kitana","doi":"10.1007/s12083-024-01763-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01763-2","url":null,"abstract":"<p>Network intrusion detection systems (NIDSs) have evolved into a significant subject in cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also led to the usage of machine learning (ML) to advance and enhance NIDSs. A NIDS is the first line of defense in any environment, and it detects external and internal attacks. Recently, intrusion mechanisms have become more sophisticated and challenging to detect. Researchers have applied techniques such as ML to detect intruders and secure networks. This paper proposes a novel approach called SRFE (Stepwise Recursive Feature Elimination) to improve the performance and efficiency of predictive models for NIDSs. Our approach depends primarily on recursive feature elimination, which operates on a simple yet effective principle. We experimented with four classification algorithms, namely Support Vector Machine (SVM), Naive Bayes (NB), J48, and Random Forest (RF), on the most widely used dataset in the cybersecurity domain (NSL-KDD). The approach is mainly built on the features’ significance ranking using the Information Gain (IG) method. We conduct multiple experiments according to three scenarios. Each scenario contains various rounds, and in each round, we train the classifiers to eliminate the three lowest-ranked features stepwise. Our experiments show that the RF and J48 classifiers outperform other binary classifiers with an accuracy of 99.80% and 99.66%, respectively. Furthermore, both classifiers obtained the best results in the multiclass classification task; J48 achieved an accuracy of 99.53% in round number seven, and the RF achieved 99.69% in the fifth round.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"22 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET 面向 VANET 中 6G 网络的安全智能交通系统的节能访问控制
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-21 DOI: 10.1007/s12083-024-01768-x
Manoj Kumar Pulligilla, C. Vanmathi

The Intelligent Transport System (ITS) is very prominent due to its connection with the Internet of Things (IoT), which enhances passenger security and comfort. The Vehicular Ad-hoc Network (VANET) is a component of ITS. It manages the techniques used for routing and privacy in autonomous cars. The increasing number of autonomous cars has exceeded the capacity of current wireless networks for transmission. It is expected that the proposed 6G wireless network can meet VANET criteria. Very little research has investigated the privacy concerns of VANETs in 6G networking connections. This work presents a method for dealing with authentic and privacy concerns for automobiles in VANETs. Our solution strengthens the vehicle's connectivity system by detecting malicious attacks like replay attacks, DoS attacks, and impersonification attacks. The proposed system uses batch authentication to reduce traffic and workload on the network. The proposed system employs both ID-based authentication and deep learning methods. Where the role of ID-based authentication is to check for access in the network, deep learning takes on the role of identifying all the malicious packets in the system. Our result also shows that the proposed system can identify malicious packets with an accuracy of 98.25% and works successfully in 6G networking communication.

智能交通系统(ITS)因其与物联网(IoT)的连接而变得非常突出,它提高了乘客的安全性和舒适度。车载 Ad-hoc 网络(VANET)是智能交通系统的一个组成部分。它管理用于自动驾驶汽车路由选择和隐私保护的技术。自动驾驶汽车数量的不断增加已经超出了当前无线网络的传输能力。预计拟议的 6G 无线网络能满足 VANET 标准。很少有研究对 6G 网络连接中的 VANET 的隐私问题进行调查。本研究提出了一种处理 VANET 中汽车的真实性和隐私问题的方法。我们的解决方案通过检测重放攻击、DoS 攻击和冒充攻击等恶意攻击来加强车辆的连接系统。建议的系统采用批量验证,以减少网络流量和工作量。该系统同时采用了基于 ID 的身份验证和深度学习方法。基于 ID 的身份验证的作用是检查网络访问情况,而深度学习的作用则是识别系统中的所有恶意数据包。我们的结果还显示,所提出的系统能以 98.25% 的准确率识别恶意数据包,并能在 6G 网络通信中成功运行。
{"title":"An energy efficient access control for secured intelligent transportation system for 6G networking in VANET","authors":"Manoj Kumar Pulligilla, C. Vanmathi","doi":"10.1007/s12083-024-01768-x","DOIUrl":"https://doi.org/10.1007/s12083-024-01768-x","url":null,"abstract":"<p>The Intelligent Transport System (ITS) is very prominent due to its connection with the Internet of Things (IoT), which enhances passenger security and comfort. The Vehicular Ad-hoc Network (VANET) is a component of ITS. It manages the techniques used for routing and privacy in autonomous cars. The increasing number of autonomous cars has exceeded the capacity of current wireless networks for transmission. It is expected that the proposed 6G wireless network can meet VANET criteria. Very little research has investigated the privacy concerns of VANETs in 6G networking connections. This work presents a method for dealing with authentic and privacy concerns for automobiles in VANETs. Our solution strengthens the vehicle's connectivity system by detecting malicious attacks like replay attacks, DoS attacks, and impersonification attacks. The proposed system uses batch authentication to reduce traffic and workload on the network. The proposed system employs both ID-based authentication and deep learning methods. Where the role of ID-based authentication is to check for access in the network, deep learning takes on the role of identifying all the malicious packets in the system. Our result also shows that the proposed system can identify malicious packets with an accuracy of 98.25% and works successfully in 6G networking communication.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"44 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SusChain: a sustainable sharding scheme for UAV blockchain networks SusChain:无人机区块链网络的可持续分片方案
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1007/s12083-024-01777-w
Jiale Chen, Haoxiang Luo

With the continuous development of information technology, drones have become the supporting technology for sustainable smart cities. Currently, the blockchain that guarantees the information security of the unmanned aerial vehicle (UAV) network has become the focus of academic attention. However, due to the small size of the drone, and its limited storage and battery capacity, it is difficult to support the sustainable work of the UAV blockchain network. Therefore, this paper proposes the concept of sustainable blockchain (SusChain) and empowers the UAV blockchain network to better apply it to sustainable smart cities. In particular, we have introduced and improved the Ultra-Low Storage Overhead-Practical Byzantine Fault Tolerance (ULS-PBFT) consensus in the UAV blockchain network, making it a sharding scheme with extremely low storage overhead and energy consumption. Meanwhile, we design a reptation-and-matching-based UAV clustering scheme to ensure that each shard and SusChain have a high consensus success rate. The simulation results show that SusChain has a significant advantage in the key indicators of sustainability. In specific cases, it has a 9–227%, 11–58%, and 27–56% improvement effect in consensus security, consensus delay, and energy consumption, compared to other sharding schemes.

随着信息技术的不断发展,无人机已成为可持续智慧城市的支撑技术。目前,保障无人机网络信息安全的区块链已成为学术界关注的焦点。然而,由于无人机体积小,存储和电池容量有限,难以支撑无人机区块链网络的可持续工作。因此,本文提出了可持续区块链(SusChain)的概念,并为无人机区块链网络赋能,使其更好地应用于可持续智慧城市。其中,我们在无人机区块链网络中引入并改进了超低存储开销-实用拜占庭容错(ULS-PBFT)共识,使其成为一种具有极低存储开销和能耗的分片方案。同时,我们设计了一种基于重定位和匹配的无人机聚类方案,以确保每个分片和SusChain都有较高的共识成功率。仿真结果表明,SusChain 在可持续性的关键指标上具有显著优势。具体来说,与其他分片方案相比,它在共识安全性、共识延迟和能耗方面分别有9-227%、11-58%和27-56%的改进效果。
{"title":"SusChain: a sustainable sharding scheme for UAV blockchain networks","authors":"Jiale Chen, Haoxiang Luo","doi":"10.1007/s12083-024-01777-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01777-w","url":null,"abstract":"<p>With the continuous development of information technology, drones have become the supporting technology for sustainable smart cities. Currently, the blockchain that guarantees the information security of the unmanned aerial vehicle (UAV) network has become the focus of academic attention. However, due to the small size of the drone, and its limited storage and battery capacity, it is difficult to support the sustainable work of the UAV blockchain network. Therefore, this paper proposes the concept of sustainable blockchain (SusChain) and empowers the UAV blockchain network to better apply it to sustainable smart cities. In particular, we have introduced and improved the Ultra-Low Storage Overhead-Practical Byzantine Fault Tolerance (ULS-PBFT) consensus in the UAV blockchain network, making it a sharding scheme with extremely low storage overhead and energy consumption. Meanwhile, we design a reptation-and-matching-based UAV clustering scheme to ensure that each shard and SusChain have a high consensus success rate. The simulation results show that SusChain has a significant advantage in the key indicators of sustainability. In specific cases, it has a 9–227%, 11–58%, and 27–56% improvement effect in consensus security, consensus delay, and energy consumption, compared to other sharding schemes.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"45 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens EduCopyRight-Chain:利用无权限区块链和不可篡改代币的教育资源版权保护系统
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1007/s12083-024-01781-0
Prity Rani, Rohit Kumar Sachan, Sonal Kukreja

Blockchain technology and non-fungible tokens have gained significant attention and widespread adoption due to their unique characteristics and potential for innovation in numerous industries, including education. In recent years, there has been a significant increase in digital learning resources such as multimedia-rich learning content, audio content, and online course content. The advancement of these learning resources has introduced several copyright challenges, such as copyright ownership, fair use of resources, licensing agreements, open educational resources and Creative Commons licenses, digital piracy, and international considerations. Copyright infringement in educational learning resources poses a significant concern that impacts content creators hugely and raises concerns regarding the quality and reliability of the content. This work proposes a copyright protection framework named EduCopyRight-Chain for educational resources using the Ethereum blockchain and non-fungible tokens to overcome concerning challenges. This work also presents a sharding approach within the proposed framework to enhance scalability. Additionally, this work proposes wallet generation, network joining, educational resource tokenization, and a verification approach by utilizing blockchain and non-fungible tokens. The proposed framework uses a Proof-of-Authority consensus mechanism to validate transactions over the peer-to-peer network, and an inter-planetary file system is used for the decentralized storage of associated records. This framework uses Remix IDE, MetaMask wallet, and the Sepolia test network. We use the BlockSim simulation toolkit to conduct experiments to evaluate the performance of the proposed framework in terms of throughput, latency, response time, and standard deviation. The proposed framework achieves an average throughput of 354.26 TPS, a latency of 62.2 milliseconds, a response time of 124.1 milliseconds, and a standard deviation of 144.2 milliseconds. This work also conducts a comparative analysis to assess security features and limitations between the proposed framework and related work. Our observation reveals that the proposed EduCopyRight-Chain framework has better features.

区块链技术和不可篡改代币因其独特的特性和创新潜力,在包括教育在内的众多行业中获得了极大关注和广泛采用。近年来,富含多媒体的学习内容、音频内容和在线课程内容等数字学习资源大幅增加。这些学习资源的发展带来了一些版权方面的挑战,如版权所有权、资源的合理使用、许可协议、开放教育资源和知识共享许可、数字盗版以及国际因素。教育学习资源中的版权侵犯是一个重大问题,对内容创作者造成了巨大影响,并引发了对内容质量和可靠性的担忧。本作品提出了一个名为 "EduCopyRight-Chain "的教育资源版权保护框架,利用以太坊区块链和不可篡改代币来克服相关挑战。本作品还在拟议框架中提出了一种分片方法,以增强可扩展性。此外,这项工作还提出了钱包生成、网络加入、教育资源代币化以及利用区块链和不可篡改代币进行验证的方法。提议的框架使用权威证明共识机制来验证点对点网络上的交易,并使用星际文件系统来分散存储相关记录。该框架使用 Remix IDE、MetaMask 钱包和 Sepolia 测试网络。我们使用 BlockSim 仿真工具包进行实验,从吞吐量、延迟、响应时间和标准偏差等方面评估拟议框架的性能。拟议框架的平均吞吐量为 354.26 TPS,延迟时间为 62.2 毫秒,响应时间为 124.1 毫秒,标准偏差为 144.2 毫秒。这项工作还进行了比较分析,以评估拟议框架与相关工作之间的安全特性和局限性。我们的观察结果表明,拟议的 EduCopyRight-Chain 框架具有更好的功能。
{"title":"EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens","authors":"Prity Rani, Rohit Kumar Sachan, Sonal Kukreja","doi":"10.1007/s12083-024-01781-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01781-0","url":null,"abstract":"<p>Blockchain technology and non-fungible tokens have gained significant attention and widespread adoption due to their unique characteristics and potential for innovation in numerous industries, including education. In recent years, there has been a significant increase in digital learning resources such as multimedia-rich learning content, audio content, and online course content. The advancement of these learning resources has introduced several copyright challenges, such as copyright ownership, fair use of resources, licensing agreements, open educational resources and Creative Commons licenses, digital piracy, and international considerations. Copyright infringement in educational learning resources poses a significant concern that impacts content creators hugely and raises concerns regarding the quality and reliability of the content. This work proposes a copyright protection framework named EduCopyRight-Chain for educational resources using the Ethereum blockchain and non-fungible tokens to overcome concerning challenges. This work also presents a sharding approach within the proposed framework to enhance scalability. Additionally, this work proposes wallet generation, network joining, educational resource tokenization, and a verification approach by utilizing blockchain and non-fungible tokens. The proposed framework uses a Proof-of-Authority consensus mechanism to validate transactions over the peer-to-peer network, and an inter-planetary file system is used for the decentralized storage of associated records. This framework uses Remix IDE, MetaMask wallet, and the Sepolia test network. We use the BlockSim simulation toolkit to conduct experiments to evaluate the performance of the proposed framework in terms of throughput, latency, response time, and standard deviation. The proposed framework achieves an average throughput of 354.26 TPS, a latency of 62.2 milliseconds, a response time of 124.1 milliseconds, and a standard deviation of 144.2 milliseconds. This work also conducts a comparative analysis to assess security features and limitations between the proposed framework and related work. Our observation reveals that the proposed EduCopyRight-Chain framework has better features.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"22 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm 利用先进的人工蜂群算法优化无线传感器网络的部署
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1007/s12083-024-01771-2
Jueyu Zhu, Jifang Rong, Zhi Gong, Ying Liu, Wenjun Li, Fayez Alqahtani, Amr Tolba, Jinbin Hu

With the widespread implementation of artificial intelligence techniques and self-driving systems in smart cars, providing excellent coverage of wireless sensor networks is critical for stable and effective tasks. Coverage control is an essential task for the design of wireless sensor networks. However, considering the influence of network resources and coverage features, several normal optimization methods are hard to carry out, yet heuristic iterative algorithms could generate an estimated ideal feasible solution for this issue. We present an artificial bee colony algorithm based on random dual strategies, called RDABC. Specifically, RDABC modifies the optimization direction through alternating between dual search techniques with the goal to find further excellent feasible solution. At the same time, through incorporating cross-mutation strategy to improve variety, and increase the algorithm’s optimization efficiency. According to simulation experiments, RDABC outperforms four well-known algorithms in terms of coverage optimization. As a whole, RDABC optimizes the location and deployment of wireless sensors, enhances the overall performance and stability of intelligent transportation systems, and simplifies vehicle monitoring and traffic sign tasks.

随着人工智能技术和自动驾驶系统在智能汽车中的广泛应用,为无线传感器网络提供良好的覆盖对于稳定有效地执行任务至关重要。覆盖控制是无线传感器网络设计的一项基本任务。然而,考虑到网络资源和覆盖特性的影响,几种普通的优化方法都很难实现,而启发式迭代算法却能为这一问题生成一个估计的理想可行解决方案。我们提出了一种基于随机对偶策略的人工蜂群算法,称为 RDABC。具体来说,RDABC 通过交替使用对偶搜索技术来修改优化方向,目的是进一步找到优秀的可行方案。同时,通过结合交叉突变策略来改善多样性,提高算法的优化效率。根据仿真实验,RDABC 在覆盖优化方面优于四种著名算法。总体而言,RDABC 优化了无线传感器的位置和部署,提高了智能交通系统的整体性能和稳定性,简化了车辆监控和交通标志任务。
{"title":"Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm","authors":"Jueyu Zhu, Jifang Rong, Zhi Gong, Ying Liu, Wenjun Li, Fayez Alqahtani, Amr Tolba, Jinbin Hu","doi":"10.1007/s12083-024-01771-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01771-2","url":null,"abstract":"<p>With the widespread implementation of artificial intelligence techniques and self-driving systems in smart cars, providing excellent coverage of wireless sensor networks is critical for stable and effective tasks. Coverage control is an essential task for the design of wireless sensor networks. However, considering the influence of network resources and coverage features, several normal optimization methods are hard to carry out, yet heuristic iterative algorithms could generate an estimated ideal feasible solution for this issue. We present an artificial bee colony algorithm based on random dual strategies, called RDABC. Specifically, RDABC modifies the optimization direction through alternating between dual search techniques with the goal to find further excellent feasible solution. At the same time, through incorporating cross-mutation strategy to improve variety, and increase the algorithm’s optimization efficiency. According to simulation experiments, RDABC outperforms four well-known algorithms in terms of coverage optimization. As a whole, RDABC optimizes the location and deployment of wireless sensors, enhances the overall performance and stability of intelligent transportation systems, and simplifies vehicle monitoring and traffic sign tasks.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS 利用二叉 FOX 优化和 V 型传递函数的网络 IDS 特征选择模型
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1007/s12083-024-01720-z
Babita Majhi, Prastavana

There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.

互联网在日常生活中的日常使用方式大幅增加。在连接物联网、通过在线教育提供帮助、通过在线游戏提供娱乐、做出商业决策等方面都有显著的表现。因此,所有这些活动都会产生大量数据,也需要对其进行管理。有必要确保这些网络免受恶意攻击,以防止任何有害行为。网络安全仍然是一个具有吸引力的研究课题。本文在实验中考虑了基于网流的数据集 NF-UNSWNB15-v2,并试图解决在构建 IDS 时遇到的问题。通过利用 FOX 优化和 V 型传递函数进行二值化,并选择最佳特征,解决了处理大量特征等问题。使用 Light-GBM 对其进行进一步分类,并评估二元分类和多类分类的结果。与其他现有方法相比,所提出的模型能为二元分类和多类分类选择最少的特征。在对各种参数进行进一步评估后,发现所提出的方法性能令人满意,并提高了对 DoS、Exploits、Fuzzers 等各种攻击的检测率。
{"title":"A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS","authors":"Babita Majhi, Prastavana","doi":"10.1007/s12083-024-01720-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01720-z","url":null,"abstract":"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"8 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive 多接收器无证书公钥可搜索加密:无字段子集连接和不连接
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-31 DOI: 10.1007/s12083-024-01767-y
Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali

Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called "Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive." Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.

基于云的远程医疗利用强大的数据处理技术来改善远程医疗服务。这有助于提高医疗服务的可及性和效率,使患者和医疗服务提供者都能从中受益。然而,患者敏感数据的安全性和隐私性,尤其是在外包给云服务时,仍然是一个重大问题。为解决这一问题,患者数据以加密格式存储在云服务器上。采用可搜索加密机制可在不损害信息保密性的情况下对加密数据进行高效搜索。虽然大多数可搜索加密方案在单接收器和多接收器场景下都支持连接字段关键字搜索,但它们往往会导致与搜索关键字相关的部分信息泄露。此外,还开发了一种基于拉格朗日多项式概念的新方案,以支持单接收器情况下的无连接字段搜索。然而,该方案并不适用于多接收器场景,而且在认证管理方面存在挑战。为了克服这些限制,我们提出了一种名为 "多接收器无证书公钥可搜索加密 "的创新方法:无字段子集连接和断开"。我们的方案以倒易图为基础,利用拉格朗日多项式作为基本工具。它具有多种优势,包括利用决定性线性 Diffie-Hellman 假设的硬度,使密码索引无差别地对抗所选关键词攻击。理论和实验分析表明,我们提出的方案在计算效率和通信开销方面与现有方案性能相当。
{"title":"A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive","authors":"Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali","doi":"10.1007/s12083-024-01767-y","DOIUrl":"https://doi.org/10.1007/s12083-024-01767-y","url":null,"abstract":"<p>Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called \"Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive.\" Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"119 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141863846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1