首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
A delay aware routing approach for FANET based on emperor penguins colony algorithm 基于帝企鹅群算法的 FANET 延迟感知路由方法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-31 DOI: 10.1007/s12083-024-01764-1
Mahyar Sadrishojaei

Many drones work together in an ad hoc manner to form flying ad hoc networks. While these networks have opened up new possibilities for a wide range of applications like the commercial, and residential, they have also presented several problems, including high-speed nodes, limited density, and abrupt dynamic topology. Therefore, routing is a complex problem in such networks. The optimized link state routing protocol served as an inspiration for this plan. This article proposes a delay-conscious routing protocol for flying ad hoc networks and offers a new method for calculating the link lifespan among two unmanned aerial vehicles based on factors such as their distance apart, relative speed, and the direction in which they travel. An approach is presented in which the emperor penguin colony algorithm is used to select multi-point relay nodes. A node's ability to serve as a multi-point relay node is based on its remaining energy, link lifespan, neighboring degree, and eagerness. In sum up, the suggested approach generates paths between nodes taking energy and lifespan into account. The performance evaluation of the proposed routing is done against ML-OLSR and MP-OLSR. At a minimum, a 15% and 32% increase in latency and energy consumption were achieved by implementing the proposed technique.

许多无人机以临时方式共同组成飞行临时网络。虽然这些网络为商业和住宅等广泛应用提供了新的可能性,但也带来了一些问题,包括高速节点、有限的密度和突然的动态拓扑。因此,在这类网络中,路由选择是一个复杂的问题。优化链路状态路由协议为本计划提供了灵感。本文提出了一种适用于飞行 ad hoc 网络的具有延迟意识的路由协议,并提供了一种根据两架无人飞行器之间的距离、相对速度和行进方向等因素计算其链路寿命的新方法。本文介绍了一种使用帝企鹅殖民地算法选择多点中继节点的方法。节点作为多点中继节点的能力取决于其剩余能量、链路寿命、邻接度和热心程度。总之,建议的方法在生成节点间路径时考虑了能量和寿命。建议路由的性能评估是对照 ML-OLSR 和 MP-OLSR 进行的。通过实施所建议的技术,延迟和能耗至少分别增加了 15% 和 32%。
{"title":"A delay aware routing approach for FANET based on emperor penguins colony algorithm","authors":"Mahyar Sadrishojaei","doi":"10.1007/s12083-024-01764-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01764-1","url":null,"abstract":"<p>Many drones work together in an ad hoc manner to form flying ad hoc networks. While these networks have opened up new possibilities for a wide range of applications like the commercial, and residential, they have also presented several problems, including high-speed nodes, limited density, and abrupt dynamic topology. Therefore, routing is a complex problem in such networks. The optimized link state routing protocol served as an inspiration for this plan. This article proposes a delay-conscious routing protocol for flying ad hoc networks and offers a new method for calculating the link lifespan among two unmanned aerial vehicles based on factors such as their distance apart, relative speed, and the direction in which they travel. An approach is presented in which the emperor penguin colony algorithm is used to select multi-point relay nodes. A node's ability to serve as a multi-point relay node is based on its remaining energy, link lifespan, neighboring degree, and eagerness. In sum up, the suggested approach generates paths between nodes taking energy and lifespan into account. The performance evaluation of the proposed routing is done against ML-OLSR and MP-OLSR. At a minimum, a 15% and 32% increase in latency and energy consumption were achieved by implementing the proposed technique.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"17 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141863839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks 考虑边缘计算网络中群体合作拓扑特征的多边缘联合卸载方法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-30 DOI: 10.1007/s12083-024-01766-z
Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi

Mobile Edge Computing (MEC) is a new computing paradigm that has shown great potential. How to extract the cooperative topological relationship between MEC servers to realize jointly computing is the key problem to solve the bottleneck of MEC computational capability. In previous studies, multi-MEC servers are regarded as unit computing nodes with the same cooperation relationship to jointly schedule offloading tasks, without considering the hierarchical and clustered topology of the server collaborative work. As a result, in the scenario of unbalanced distribution of computing resources, it is difficult to obtain the optimal joint scheduling strategy for offloading tasks according to the cooperation relationship and resource differences among MEC servers. Therefore, this paper considers introducing the topological relationship of group cooperation among multi-MEC servers to optimize the joint scheduling strategy, and proposes a Multi-Agent Hierarchical Graph Attention Soft Actor-Critic algorithm (MHSAC). Firstly, based on the differences in their own resources and the demands of the tasks they undertake, MEC servers are divided into series clusters. Then, a Hierarchical Graph Attention Network (HGAT) is used to model each agent to extract the physical communication topology information of the MEC server and the group topology information of multi-edge cooperation. The multi-agent soft Actor-Critic algorithm is used to obtain the offloading scheduling decision of multi-edge cooperation. Experiments show that the MHSAC algorithm that considering the topological relationship of multi-edge group cooperation can optimize load distribution under low latency and resource-limited requirements, achieving optimal load balancing values and task drop rates.

移动边缘计算(MEC)是一种新的计算模式,已显示出巨大的潜力。如何提取 MEC 服务器之间的协同拓扑关系实现联合计算,是解决 MEC 计算能力瓶颈的关键问题。在以往的研究中,多台 MEC 服务器被视为具有相同协作关系的单元计算节点来联合调度卸载任务,而没有考虑服务器协作工作的分层和集群拓扑结构。因此,在计算资源分布不均衡的情况下,很难根据 MEC 服务器之间的合作关系和资源差异获得卸载任务的最优联合调度策略。因此,本文考虑引入多MEC服务器之间的群体合作拓扑关系来优化联合调度策略,并提出了一种多代理分层图注意软代理批判算法(MHSAC)。首先,根据MEC服务器自身资源和所承担任务需求的差异,将MEC服务器划分为系列集群。然后,利用层次图注意力网络(HGAT)为每个代理建模,提取 MEC 服务器的物理通信拓扑信息和多边缘合作的组拓扑信息。采用多代理软代理批判算法获得多边缘合作的卸载调度决策。实验表明,考虑多边缘群合作拓扑关系的 MHSAC 算法能在低延迟和资源有限的要求下优化负载分配,实现最优负载均衡值和任务丢弃率。
{"title":"A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks","authors":"Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi","doi":"10.1007/s12083-024-01766-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01766-z","url":null,"abstract":"<p>Mobile Edge Computing (MEC) is a new computing paradigm that has shown great potential. How to extract the cooperative topological relationship between MEC servers to realize jointly computing is the key problem to solve the bottleneck of MEC computational capability. In previous studies, multi-MEC servers are regarded as unit computing nodes with the same cooperation relationship to jointly schedule offloading tasks, without considering the hierarchical and clustered topology of the server collaborative work. As a result, in the scenario of unbalanced distribution of computing resources, it is difficult to obtain the optimal joint scheduling strategy for offloading tasks according to the cooperation relationship and resource differences among MEC servers. Therefore, this paper considers introducing the topological relationship of group cooperation among multi-MEC servers to optimize the joint scheduling strategy, and proposes a Multi-Agent Hierarchical Graph Attention Soft Actor-Critic algorithm (MHSAC). Firstly, based on the differences in their own resources and the demands of the tasks they undertake, MEC servers are divided into series clusters. Then, a Hierarchical Graph Attention Network (HGAT) is used to model each agent to extract the physical communication topology information of the MEC server and the group topology information of multi-edge cooperation. The multi-agent soft Actor-Critic algorithm is used to obtain the offloading scheduling decision of multi-edge cooperation. Experiments show that the MHSAC algorithm that considering the topological relationship of multi-edge group cooperation can optimize load distribution under low latency and resource-limited requirements, achieving optimal load balancing values and task drop rates.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"194 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporary relay: A more flexible way to cross chains 临时中继:更灵活的跨链方式
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-27 DOI: 10.1007/s12083-024-01762-3
Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu

As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.

随着区块链技术的发展,跨链资产转移已成为实现不同区块链网络之间互操作性的关键问题。然而,现有的跨链解决方案往往需要较高的信任要求和复杂的通信协议,这阻碍了其可用性和灵活性。为了解决这些问题,这项工作引入了临时中继,这是一种新型的跨链资产转移模式,无需持续的区块链网络存在和频繁的链间通信。在技术上,临时中继使用非交互式零知识证明来验证交易和保护隐私,同时确保临时中继关闭后区块链的不可篡改性和可追溯性。我们详细介绍了临时中继的构造,并分析了零知识证明所构建电路的安全性。在 Substrate 区块链平台上的原型实现和实验评估证明了临时中继的可行性。此外,在我们的模型中,零知识证明的验证时间很短。
{"title":"Temporary relay: A more flexible way to cross chains","authors":"Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu","doi":"10.1007/s12083-024-01762-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01762-3","url":null,"abstract":"<p>As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"93 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing paillier to fully homomorphic encryption with semi-honest TEE 用半诚实 TEE 将 paillier 加密增强为完全同态加密
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1007/s12083-024-01752-5
Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang

Homomorphic encryption (HE) is an innovative privacy protection technique supporting homomorphic addition and multiplication. It has been widely applied in the applications of peer-to-peer networks, such as secure data sharing and privacy-preserving search. Existing HE schemes can be roughly categorized into partially HE and fully HE (FHE). The former is computationally efficient but only supports either additive or multiplicative homomorphic operations. The latter can simultaneously support both additive and multiplicative operations, but the corresponding computational costs are intensive. Recently, some works leverage trusted execution environment (TEE) to optimize the efficiency of FHE. However, they suffer from the limitations of ciphertext expansion and the strong trust assumption for TEE. To address these limitations, we present a new fully homomorphic encryption scheme named Paillier FHE (PFHE) by employing TEE to extend the additive Paillier HE to support multiplicative operations and further optimizing the computational efficiency, where TEE is assumed to be semi-honest to avoid the strong trust assumption. Specifically, we first design a Paillier multiplication protocol (PMUL) to achieve the ciphertext multiplication without bootstrapping. Based on the protocol, we utilize the packing technique to design a Paillier inner product protocol (PVMUL) and a Paillier matrix multiplication protocol (PMMUL) to support the inner product and matrix multiplication operations efficiently. Moreover, we provide the detailed security analysis for our protocols. We compare our PFHE with typical fully homomorphic encryption libraries by experiments, and at the same security level, our scheme demonstrates significant advantages.

同态加密(HE)是一种创新的隐私保护技术,支持同态加法和乘法。它已广泛应用于点对点网络,如安全数据共享和隐私保护搜索。现有的 HE 方案可大致分为部分 HE 和完全 HE(FHE)。前者计算效率高,但只支持加法或乘法同态操作。后者可以同时支持加法和乘法运算,但相应的计算成本很高。最近,一些研究利用可信执行环境(TEE)来优化 FHE 的效率。然而,它们受到密文扩展和 TEE 强信任假设的限制。为了解决这些局限性,我们提出了一种名为 Paillier FHE(PFHE)的新型全同态加密方案,利用 TEE 将加法 Paillier HE 扩展为支持乘法运算,并进一步优化计算效率,同时假定 TEE 为半诚信,以避免强信任假设。具体来说,我们首先设计了一个 Paillier 乘法协议(PMUL),以实现无需引导的密文乘法。在该协议的基础上,我们利用打包技术设计了 Paillier 内积协议(PVMUL)和 Paillier 矩阵乘法协议(PMMUL),以高效支持内积和矩阵乘法操作。此外,我们还对协议进行了详细的安全性分析。我们通过实验将我们的 PFHE 与典型的全同态加密库进行了比较,在相同的安全等级下,我们的方案具有显著的优势。
{"title":"Enhancing paillier to fully homomorphic encryption with semi-honest TEE","authors":"Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang","doi":"10.1007/s12083-024-01752-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01752-5","url":null,"abstract":"<p>Homomorphic encryption (HE) is an innovative privacy protection technique supporting homomorphic addition and multiplication. It has been widely applied in the applications of peer-to-peer networks, such as secure data sharing and privacy-preserving search. Existing HE schemes can be roughly categorized into partially HE and fully HE (FHE). The former is computationally efficient but only supports either additive or multiplicative homomorphic operations. The latter can simultaneously support both additive and multiplicative operations, but the corresponding computational costs are intensive. Recently, some works leverage trusted execution environment (TEE) to optimize the efficiency of FHE. However, they suffer from the limitations of ciphertext expansion and the strong trust assumption for TEE. To address these limitations, we present a new fully homomorphic encryption scheme named Paillier FHE (PFHE) by employing TEE to extend the additive Paillier HE to support multiplicative operations and further optimizing the computational efficiency, where TEE is assumed to be semi-honest to avoid the strong trust assumption. Specifically, we first design a Paillier multiplication protocol (PMUL) to achieve the ciphertext multiplication without bootstrapping. Based on the protocol, we utilize the packing technique to design a Paillier inner product protocol (PVMUL) and a Paillier matrix multiplication protocol (PMMUL) to support the inner product and matrix multiplication operations efficiently. Moreover, we provide the detailed security analysis for our protocols. We compare our PFHE with typical fully homomorphic encryption libraries by experiments, and at the same security level, our scheme demonstrates significant advantages.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proxy re-signature scheme with cryptographic reverse firewall for medical data security 采用加密反向防火墙的代理再签名方案确保医疗数据安全
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1007/s12083-024-01769-w
Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang

To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.

为了加强医疗数据的安全性,政府和医疗机构必须收集和分析大量信息,以便迅速发现异常模式并及时发出准确警告。这对于预防和遏制医疗数据安全的潜在威胁至关重要。然而,如何安全地共享和转换这些数据是一项重大挑战,尤其是在医疗机构的开放式无线接入网络中。代理再签名(PRS)不仅具有签名转换功能,还具有匿名性,可保障数据的可靠性和真实性。然而,当前的代理重签名技术忽略了算法替换攻击(ASA)的可能性。因此,我们利用加密反向防火墙(CRF)技术,专门针对医疗领域推出了一种新型代理重签名方案。此外,我们还进行了严格的安全分析和模拟实验,以验证我们方案的实际有效性。这种方法满足了医疗机构、管理中心和研究机构等不同实体之间安全共享数据的需求,确保了关键医疗信息的完整性和保密性。
{"title":"Proxy re-signature scheme with cryptographic reverse firewall for medical data security","authors":"Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang","doi":"10.1007/s12083-024-01769-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01769-w","url":null,"abstract":"<p>To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals 基于区块链的多签名智能合约电子印章定位移动物联网终端
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-21 DOI: 10.1007/s12083-024-01765-0
Chunyan Liu, Tao Feng

The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.

人们对数字化的兴趣与日俱增,为数字化商业模式的研究注入了新的活力。移动物联网(IoT)终端将达到数十亿台,成为数字化和智能化社会的重要基础设施。在物联网终端的数字化商业模式中,商业合同的电子印章是特别需要研究的,以提供与传统印章同等的安全保障。然而,现有的电子印章只适用于集中式网络应用,严重依赖证书颁发机构。本文提出了一种基于区块链的多签名智能合约电子印章方案。我们设计的关键是在以太坊上为业务方部署智能合约,以实现面向移动物联网终端的安全电子印章。与传统印章不同,该电子印章由所有挖矿节点集体验证和管理。结合智能合约中编码的多重签名算法的优化,我们的设计为终端的所有业务参与者实现了完整的数字合约功能。我们以以太坊网络的 Goerli 测试网为例,展示了智能合约部署的实施情况。安全分析和评估表明,我们的设计在多签名实现中是安全的,可以在实践中使用。
{"title":"Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals","authors":"Chunyan Liu, Tao Feng","doi":"10.1007/s12083-024-01765-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01765-0","url":null,"abstract":"<p>The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach 智能电网中提高能效和降低成本的动态负载调度和功率分配:一种 RL-SAL-BWO 方法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1007/s12083-024-01760-5
S. Shiny, M. Marsaline Beno

The demand-side management (DSM) research field has expanded due to rising energy consumption. In the traditional electrical grid, unknown energy usage results in high costs. This paper introduces a reinforcement learning-based self-adaptive learning-black widow optimization (RL-SAL-BWO) approach for dynamic load scheduling and power allocation, aimed at improving energy efficiency and reducing costs and energy consumption. The proposed strategy utilizes pricing signals and real-time load profiles to estimate the changing energy consumption within residential buildings. To optimize energy allocation across different appliances, this algorithm considers both energy efficiency and load characteristics. The RL agent, comprising action space, reward function, and Q-value function, is utilized for decision-making on power allocation and load scheduling. The SAL algorithm automatically adjusts the exploration rate and learning rate which leads to enhanced efficiency. By exploring the solution space, the BWO improves the learning process. Through the integration of RL, SAL, and BWO techniques, energy efficiency is increased, energy consumption is reduced, and electricity costs are lowered. The smart grid is utilized for estimating changes in energy consumption. The purpose of this is to estimate changes in energy consumption, aiding in informed decisions about energy management and infrastructure planning. The proposed approach is implemented using MATLAB R2021b software, followed by the evaluation and calculation of performance metrics. The findings demonstrate that the proposed strategy significantly enhances energy efficiency by 18.5%, reduces energy consumption by 31.91%, and decreases electricity costs by 40.66%. Furthermore, the computation time reduction of the proposed approach is 13.7 s.

由于能源消耗不断增加,需求侧管理(DSM)研究领域也随之扩大。在传统电网中,未知的能源使用情况会导致高昂的成本。本文介绍了一种基于强化学习的自适应学习-黑寡妇优化(RL-SAL-BWO)方法,用于动态负荷调度和电力分配,旨在提高能源效率,降低成本和能耗。所提出的策略利用价格信号和实时负载曲线来估算住宅楼内不断变化的能源消耗。为了优化不同设备之间的能源分配,该算法同时考虑了能源效率和负载特征。RL 代理由行动空间、奖励函数和 Q 值函数组成,用于功率分配和负载调度决策。SAL 算法可自动调整探索率和学习率,从而提高效率。通过探索解空间,BWO 改进了学习过程。通过整合 RL、SAL 和 BWO 技术,提高了能源效率,减少了能源消耗,降低了电力成本。智能电网可用于估算能源消耗的变化。这样做的目的是估算能源消耗的变化,从而帮助做出有关能源管理和基础设施规划的明智决策。建议的方法使用 MATLAB R2021b 软件实现,然后对性能指标进行评估和计算。研究结果表明,所提出的策略能显著提高能源效率 18.5%,降低能耗 31.91%,降低电费 40.66%。此外,建议方法的计算时间减少了 13.7 秒。
{"title":"Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach","authors":"S. Shiny, M. Marsaline Beno","doi":"10.1007/s12083-024-01760-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01760-5","url":null,"abstract":"<p>The demand-side management (DSM) research field has expanded due to rising energy consumption. In the traditional electrical grid, unknown energy usage results in high costs. This paper introduces a reinforcement learning-based self-adaptive learning-black widow optimization (RL-SAL-BWO) approach for dynamic load scheduling and power allocation, aimed at improving energy efficiency and reducing costs and energy consumption. The proposed strategy utilizes pricing signals and real-time load profiles to estimate the changing energy consumption within residential buildings. To optimize energy allocation across different appliances, this algorithm considers both energy efficiency and load characteristics. The RL agent, comprising action space, reward function, and Q-value function, is utilized for decision-making on power allocation and load scheduling. The SAL algorithm automatically adjusts the exploration rate and learning rate which leads to enhanced efficiency. By exploring the solution space, the BWO improves the learning process. Through the integration of RL, SAL, and BWO techniques, energy efficiency is increased, energy consumption is reduced, and electricity costs are lowered. The smart grid is utilized for estimating changes in energy consumption. The purpose of this is to estimate changes in energy consumption, aiding in informed decisions about energy management and infrastructure planning. The proposed approach is implemented using MATLAB R2021b software, followed by the evaluation and calculation of performance metrics. The findings demonstrate that the proposed strategy significantly enhances energy efficiency by 18.5%, reduces energy consumption by 31.91%, and decreases electricity costs by 40.66%. Furthermore, the computation time reduction of the proposed approach is 13.7 s.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN VSN 中基于相似性引导图神经网络和金鹰优化决策树的节能路由机制
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1007/s12083-024-01747-2
K Rajkumar, B Paramasivan

Recent developments in low power sensors have prompted the creation of Visual Sensor Network (VSN). Coverage, availability, network life duration, and energy usage are important issues that arise in VSN. However several energy-efficient protocols have been developed, but those protocols have transmission collisions and energy loss due to increased data redundancy. In order to overcome these challenges, an Energy Efficient Routing based Sleep Scheduling Mechanism (EERSSM) is developed. Camera nodes are randomly deployed in the Visual Sensor Network, and the data is received from the network through a relay node. Energy, distance, and node stability are taken into account while identifying the relay node. The next step is to use a Similarity Graph guided Neural Network (SGGNN) to determine whether neighboring nodes detect similar data. If similar information is detected, a similarity measure is computed. When the value of the similarity measure exceeds the threshold, the node goes into the sleep stage while the other nodes are in the wakeup stage. A decision tree is used to calculate the sleep cycle depending on a few factors. The decision tree has a number of hyperparameters, and those parameters are tuned using Golden Eagle Optimization (GEO). When the update cycle is over, the node awakens and joins in the transmission procedure. This proposed energy efficient routing algorithm is tested with several metrics that attain better performance, like 14.42 J average residual energy, 93% packet delivery ratio, 9.3% throughput value, and 770 s network lifetime. Thus, the techniques used in the proposed approach are the better choice for solving the availability, energy consumption, and network lifetime issues in VSN.

低功耗传感器的最新发展推动了可视传感器网络(VSN)的建立。覆盖范围、可用性、网络寿命和能源使用是视觉传感器网络中出现的重要问题。虽然已经开发了几种节能协议,但由于数据冗余增加,这些协议存在传输碰撞和能量损耗问题。为了克服这些挑战,我们开发了一种基于睡眠调度机制的高能效路由机制(ERSSM)。摄像头节点随机部署在视觉传感器网络中,通过中继节点接收来自网络的数据。在确定中继节点时要考虑能量、距离和节点稳定性。下一步是使用相似性图引导神经网络(SGGNN)来确定相邻节点是否检测到相似数据。如果检测到相似信息,则计算相似度量。当相似度测量值超过阈值时,该节点进入睡眠阶段,而其他节点则进入唤醒阶段。决策树用于计算睡眠周期,取决于几个因素。决策树有许多超参数,这些参数通过金鹰优化(GEO)进行调整。当更新周期结束时,节点会被唤醒并加入传输过程。该建议的节能路由算法经过多项指标测试,取得了较好的性能,如 14.42 J 的平均剩余能量、93% 的数据包传送率、9.3% 的吞吐量值和 770 s 的网络寿命。因此,建议方法中使用的技术是解决 VSN 可用性、能耗和网络寿命问题的更好选择。
{"title":"Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN","authors":"K Rajkumar, B Paramasivan","doi":"10.1007/s12083-024-01747-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01747-2","url":null,"abstract":"<p>Recent developments in low power sensors have prompted the creation of Visual Sensor Network (VSN). Coverage, availability, network life duration, and energy usage are important issues that arise in VSN. However several energy-efficient protocols have been developed, but those protocols have transmission collisions and energy loss due to increased data redundancy. In order to overcome these challenges, an Energy Efficient Routing based Sleep Scheduling Mechanism (EERSSM) is developed. Camera nodes are randomly deployed in the Visual Sensor Network, and the data is received from the network through a relay node. Energy, distance, and node stability are taken into account while identifying the relay node. The next step is to use a Similarity Graph guided Neural Network (SGGNN) to determine whether neighboring nodes detect similar data. If similar information is detected, a similarity measure is computed. When the value of the similarity measure exceeds the threshold, the node goes into the sleep stage while the other nodes are in the wakeup stage. A decision tree is used to calculate the sleep cycle depending on a few factors. The decision tree has a number of hyperparameters, and those parameters are tuned using Golden Eagle Optimization (GEO). When the update cycle is over, the node awakens and joins in the transmission procedure. This proposed energy efficient routing algorithm is tested with several metrics that attain better performance, like 14.42 J average residual energy, 93% packet delivery ratio, 9.3% throughput value, and 770 s network lifetime. Thus, the techniques used in the proposed approach are the better choice for solving the availability, energy consumption, and network lifetime issues in VSN.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"10 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical hybrid intrusion detection model for industrial internet of things 面向工业物联网的分层混合入侵检测模型
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s12083-024-01749-0
Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan

With the continual evolution of network technologies, the Internet of Things (IoT) has permeated various sectors of society. However, over the past decade, the annual discovery of cyberattacks has shown an exponential surge, inflicting severe damage to economic development. Aiming at the high false alarm rate, poor classification performance and overfitting problems in current intrusion detection systems, this paper proposes an efficient hierarchical intrusion detection model named ET-DCANET. Initially, the extreme random tree algorithm is employed for feature selection to meticulously curate the optimal feature subset. Subsequently, the dilated convolution and dual attention mechanism (including channel attention and spatial attention) are introduced, and a strategy of gradual transition from coarse-grained learning to fine-grained learning is proposed by gradually narrowing the expansion rate of cavity convolution, and the DCNN and dual attention modules are progressively refined to effectively utilize the synergy of DCNN and Attention to extract spatial and temporal features. This gradual transition from coarse-grained learning to fine-grained learning helps to better balance global and local information when dealing with complex data, and improves the performance and generalization ability of the model. To confront the class imbalance issue within the dataset, a novel loss function, EQLv2, is introduced as a substitute for the conventional cross-entropy (CE) loss. This innovation directs the model's focus toward minority class samples, ultimately enhancing the overall performance of the model. The proposed model shows excellent intrusion detection on the NSL-KDD, UNSW-NB15, and X-IIoTID datasets with accuracy rates of 99.68%, 98.50%, and 99.85%, respectively.

随着网络技术的不断发展,物联网(IoT)已经渗透到社会的各个领域。然而,近十年来,每年发现的网络攻击呈指数级激增,对经济发展造成了严重破坏。针对当前入侵检测系统中存在的误报率高、分类性能差、过拟合等问题,本文提出了一种名为 ET-DCANET 的高效分层入侵检测模型。首先,采用极端随机树算法进行特征选择,精心策划出最优特征子集。随后,引入了扩张卷积和双注意机制(包括通道注意和空间注意),并提出了从粗粒度学习逐步过渡到细粒度学习的策略,即逐步缩小空穴卷积的扩张率,并逐步完善 DCNN 和双注意模块,以有效利用 DCNN 和注意的协同作用来提取空间和时间特征。这种从粗粒度学习到细粒度学习的渐进过渡,有助于在处理复杂数据时更好地平衡全局信息和局部信息,提高模型的性能和泛化能力。为了解决数据集中的类不平衡问题,我们引入了一种新的损失函数 EQLv2 来替代传统的交叉熵(CE)损失。这一创新将模型的重点引向少数类别样本,最终提高了模型的整体性能。所提出的模型在 NSL-KDD、UNSW-NB15 和 X-IIoTID 数据集上显示出卓越的入侵检测能力,准确率分别为 99.68%、98.50% 和 99.85%。
{"title":"A hierarchical hybrid intrusion detection model for industrial internet of things","authors":"Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan","doi":"10.1007/s12083-024-01749-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01749-0","url":null,"abstract":"<p>With the continual evolution of network technologies, the Internet of Things (IoT) has permeated various sectors of society. However, over the past decade, the annual discovery of cyberattacks has shown an exponential surge, inflicting severe damage to economic development. Aiming at the high false alarm rate, poor classification performance and overfitting problems in current intrusion detection systems, this paper proposes an efficient hierarchical intrusion detection model named ET-DCANET. Initially, the extreme random tree algorithm is employed for feature selection to meticulously curate the optimal feature subset. Subsequently, the dilated convolution and dual attention mechanism (including channel attention and spatial attention) are introduced, and a strategy of gradual transition from coarse-grained learning to fine-grained learning is proposed by gradually narrowing the expansion rate of cavity convolution, and the DCNN and dual attention modules are progressively refined to effectively utilize the synergy of DCNN and Attention to extract spatial and temporal features. This gradual transition from coarse-grained learning to fine-grained learning helps to better balance global and local information when dealing with complex data, and improves the performance and generalization ability of the model. To confront the class imbalance issue within the dataset, a novel loss function, EQLv2, is introduced as a substitute for the conventional cross-entropy (CE) loss. This innovation directs the model's focus toward minority class samples, ultimately enhancing the overall performance of the model. The proposed model shows excellent intrusion detection on the NSL-KDD, UNSW-NB15, and X-IIoTID datasets with accuracy rates of 99.68%, 98.50%, and 99.85%, respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme 使用混合奖励评估方案的水下无线传感器网络灵活定位协议
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-12 DOI: 10.1007/s12083-024-01758-z
Rupinder Kaur, Sonia Goyal

Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is difficult to find in the acoustic communication environment. Underwater sensor node localization research has yet to accomplish accuracy, propagation error, restricted coverage, and QoS. A novel solution for static and dynamic UWSNs called the Reward-based distance vector Hop Localization (RDVHL) protocol is proposed. The reward for each underwater sensor node is computed periodically using the different reward measures in RDVHL. RDVHL first divides the deployed UWSNs dynamically into several clusters. Then Anchor Nodes (AN) are localized for each cluster using the reward measures periodically. After localizing the AN, they broadcast the localization information to the ordinary sensor nodes. The ordinary nodes are localized during the route formation for reliable data transmission using periodically computed reward scores. The correct localization of the sensor nodes enables the fast transmission of the underwater data from the source to the intended sink nodes. The proposed reward-based approach achieves accurate sensor node localization and reduces void communication and collisions in the acoustic communication channels. The RDVHL protocol outperforms the state-of-the-art in average throughput, average latency, average accuracy, and average energy consumption. RDVHL throughput increases by 12.54%. The average energy consumption drops 12.82%, localization inaccuracy drops 29.44%, and communication latency drops 3.72%.

水下无线传感器网络(UWSN)必须识别传感器节点并估计其位置。在声学通信环境中,很难找到可靠的水下数据转发中继器。水下传感器节点定位研究尚未实现准确性、传播误差、有限覆盖和服务质量。针对静态和动态 UWSNs 提出了一种新的解决方案,称为基于奖励的距离矢量跳转定位(RDVHL)协议。RDVHL 中使用不同的奖励措施定期计算每个水下传感器节点的奖励。RDVHL 首先将已部署的 UWSN 动态划分为几个簇。然后使用奖励措施定期为每个簇定位锚节点(AN)。定位锚节点后,它们将定位信息广播给普通传感器节点。普通节点在路由形成过程中利用定期计算的奖励分数进行定位,以实现可靠的数据传输。传感器节点的正确定位使水下数据能从源节点快速传输到预定的汇节点。所提出的基于奖励的方法实现了传感器节点的精确定位,并减少了声学通信信道中的无效通信和碰撞。RDVHL 协议在平均吞吐量、平均延迟、平均精确度和平均能耗方面都优于最先进的协议。RDVHL 吞吐量提高了 12.54%。平均能耗降低了 12.82%,定位不精确度降低了 29.44%,通信延迟降低了 3.72%。
{"title":"Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme","authors":"Rupinder Kaur, Sonia Goyal","doi":"10.1007/s12083-024-01758-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01758-z","url":null,"abstract":"<p>Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is difficult to find in the acoustic communication environment. Underwater sensor node localization research has yet to accomplish accuracy, propagation error, restricted coverage, and QoS. A novel solution for static and dynamic UWSNs called the Reward-based distance vector Hop Localization (RDVHL) protocol is proposed. The reward for each underwater sensor node is computed periodically using the different reward measures in RDVHL. RDVHL first divides the deployed UWSNs dynamically into several clusters. Then Anchor Nodes (AN) are localized for each cluster using the reward measures periodically. After localizing the AN, they broadcast the localization information to the ordinary sensor nodes. The ordinary nodes are localized during the route formation for reliable data transmission using periodically computed reward scores. The correct localization of the sensor nodes enables the fast transmission of the underwater data from the source to the intended sink nodes. The proposed reward-based approach achieves accurate sensor node localization and reduces void communication and collisions in the acoustic communication channels. The RDVHL protocol outperforms the state-of-the-art in average throughput, average latency, average accuracy, and average energy consumption. RDVHL throughput increases by 12.54%. The average energy consumption drops 12.82%, localization inaccuracy drops 29.44%, and communication latency drops 3.72%.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"61 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1