首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking 基于区块链完整性检查的智能农业中基于物联网的 WSN 结构的优化安全集群路由协议
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-22 DOI: 10.1007/s12083-024-01748-1
Ashutosh Kumar Rao, Kapil Kumar Nagwanshi, Manoj Kumar Shukla

In the context of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs) for smart agriculture, ensuring efficient resource utilization, prolonged network lifespan and robust security mechanisms is paramount. This paper addresses these challenges by introducing an optimized secure cluster-based routing protocol with blockchain. The algorithm initiates with node ID assignment, followed by the use of Distributed Fuzzy Cognitive Maps (DFCM) to select Cluster Heads (CHs) based on energy, proximity to the Base Station (BS) and neighbor count. DFCM aims for balanced CH distribution to optimize energy usage. The secure routing protocol, employing Earthworm-based Deer Hunting Optimization Algorithm (EW-DHOA) and blockchain, ensures reliable data transmission. Through extensive comparative analyses with existing techniques, including GA-PSO, CI-ROA, ACI-GSO and P-WWO, our approach consistently outperforms in critical parameters. At varying node densities, the proposed method demonstrates a substantial improvement in network lifetime, achieving a 60% increase over GA-PSO and maintaining a superior average of 3200 rounds. Energy consumption is notably reduced, with a 33.3% improvement compared to GA-PSO at a density of 100 nodes. The packet delivery ratio reaches 98%, showcasing a 4% enhancement over the best-performing existing technique P-WWO. Throughput at a density of 500 nodes achieves an impressive 33.3% increase, reaching 0.8 Mbps. Notably, our methodology excels in preserving active nodes, sustaining a network lifetime of 66.7% more than competing techniques at the 3500th round. The proposed approach demonstrates a higher detection rate, ranging from 75% to 90% and exhibits a significantly higher convergence rate. Therefore, our Optimized Secure Cluster-Based Routing Protocol with Blockchain-Based Integrity Checking presents a comprehensive and superior solution for enhancing the efficiency, resilience and security of WSNs in smart agriculture.

在基于物联网(IoT)的无线传感器网络(WSN)用于智能农业的背景下,确保高效的资源利用、延长网络寿命和稳健的安全机制至关重要。本文通过引入一种基于区块链的优化安全集群路由协议来应对这些挑战。该算法首先进行节点 ID 分配,然后使用分布式模糊认知图 (DFCM) 根据能量、与基站 (BS) 的距离和邻居数量选择簇头 (CH)。DFCM 的目标是均衡分配 CH,优化能源使用。采用基于蚯蚓的猎鹿优化算法(EW-DHOA)和区块链的安全路由协议可确保可靠的数据传输。通过与现有技术(包括 GA-PSO、CI-ROA、ACI-GSO 和 P-WWO)进行广泛的比较分析,我们的方法在关键参数上始终优于现有技术。在节点密度不同的情况下,所提出的方法大大提高了网络寿命,比 GA-PSO 提高了 60%,并保持了 3200 轮的出色平均值。能耗显著降低,在节点密度为 100 个时,比 GA-PSO 提高了 33.3%。数据包传送率达到 98%,比性能最好的现有技术 P-WWO 提高了 4%。在节点密度为 500 的情况下,吞吐量显著提高了 33.3%,达到 0.8 Mbps。值得注意的是,我们的方法在保留活跃节点方面表现出色,在第 3500 轮时,网络寿命比竞争技术多出 66.7%。所提出的方法检测率更高,从 75% 到 90%,收敛速度也显著提高。因此,我们的基于区块链完整性检查的优化安全集群路由协议为提高智慧农业中 WSN 的效率、弹性和安全性提供了一种全面而卓越的解决方案。
{"title":"An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking","authors":"Ashutosh Kumar Rao, Kapil Kumar Nagwanshi, Manoj Kumar Shukla","doi":"10.1007/s12083-024-01748-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01748-1","url":null,"abstract":"<p>In the context of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs) for smart agriculture, ensuring efficient resource utilization, prolonged network lifespan and robust security mechanisms is paramount. This paper addresses these challenges by introducing an optimized secure cluster-based routing protocol with blockchain. The algorithm initiates with node ID assignment, followed by the use of Distributed Fuzzy Cognitive Maps (DFCM) to select Cluster Heads (CHs) based on energy, proximity to the Base Station (BS) and neighbor count. DFCM aims for balanced CH distribution to optimize energy usage. The secure routing protocol, employing Earthworm-based Deer Hunting Optimization Algorithm (EW-DHOA) and blockchain, ensures reliable data transmission. Through extensive comparative analyses with existing techniques, including GA-PSO, CI-ROA, ACI-GSO and P-WWO, our approach consistently outperforms in critical parameters. At varying node densities, the proposed method demonstrates a substantial improvement in network lifetime, achieving a 60% increase over GA-PSO and maintaining a superior average of 3200 rounds. Energy consumption is notably reduced, with a 33.3% improvement compared to GA-PSO at a density of 100 nodes. The packet delivery ratio reaches 98%, showcasing a 4% enhancement over the best-performing existing technique P-WWO. Throughput at a density of 500 nodes achieves an impressive 33.3% increase, reaching 0.8 Mbps. Notably, our methodology excels in preserving active nodes, sustaining a network lifetime of 66.7% more than competing techniques at the 3500th round. The proposed approach demonstrates a higher detection rate, ranging from 75% to 90% and exhibits a significantly higher convergence rate. Therefore, our Optimized Secure Cluster-Based Routing Protocol with Blockchain-Based Integrity Checking presents a comprehensive and superior solution for enhancing the efficiency, resilience and security of WSNs in smart agriculture.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"342 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure location management scheme in an LEO-satellite network with dual-mobility 低地轨道卫星双移动网络中的安全定位管理方案
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-21 DOI: 10.1007/s12083-024-01742-7
Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao

Low Earth orbit (LEO) communication satellite constellation provides network service to remote areas without terrestrialnetwork coverage. In sparsely populated areas, the deployment of ground stations is also scarce, due to geographic constraints and the lack of terrestrial backhaul. Due to the constant orbiting of the satellite constellation, location management in LEO satellite-assisted vehicular networks faces the challenges of the dual mobility of access points and users. In this paper, we propose a privacy-preserving location management scheme in an LEO satellite network with sparsely deployed ground stations. Specifically, the proposed scheme exploits the RSA-based accumulator and the Non-Interactive Proof-of-Knowledge of Exponent ((textsf{NI})-(textsf{PoKE})) protocol to verify the linkages between satellites and vehicles. Meanwhile, our scheme combines the homomorphic Symmetric Homomorphic Encryption ((textsf{SHE})) cryptosystem, the Secure Less than ((textsf{SLESS})) protocol, and the KdTree structure, to identify the potential set of accessing satellites. Security analysis shows that the proposed scheme achieves privacy preservation and authentication. Performance evaluations show that ours achieve high computation and communication efficiency.

低地球轨道(LEO)通信卫星星座为没有地面网络覆盖的偏远地区提供网络服务。在人口稀少的地区,由于地理限制和缺乏地面回程,地面站的部署也很稀少。由于卫星星座的持续轨道运行,低地轨道卫星辅助车载网络的定位管理面临着接入点和用户双重移动性的挑战。本文提出了一种在地面站部署稀疏的低地轨道卫星网络中保护隐私的定位管理方案。具体来说,该方案利用基于RSA的累加器和非交互式指数知识证明((textsf{NI})-(textsf{PoKE}))协议来验证卫星和飞行器之间的联系。同时,我们的方案结合了同态对称同态加密((textsf{SHE}))密码系统、安全小于((textsf{SLESS}))协议和KdTree结构,来识别接入卫星的潜在集合。安全性分析表明,所提出的方案实现了隐私保护和身份验证。性能评估表明,我们实现了较高的计算和通信效率。
{"title":"A secure location management scheme in an LEO-satellite network with dual-mobility","authors":"Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao","doi":"10.1007/s12083-024-01742-7","DOIUrl":"https://doi.org/10.1007/s12083-024-01742-7","url":null,"abstract":"<p>Low Earth orbit (LEO) communication satellite constellation provides network service to remote areas without terrestrialnetwork coverage. In sparsely populated areas, the deployment of ground stations is also scarce, due to geographic constraints and the lack of terrestrial backhaul. Due to the constant orbiting of the satellite constellation, location management in LEO satellite-assisted vehicular networks faces the challenges of the dual mobility of access points and users. In this paper, we propose a privacy-preserving location management scheme in an LEO satellite network with sparsely deployed ground stations. Specifically, the proposed scheme exploits the RSA-based accumulator and the Non-Interactive Proof-of-Knowledge of Exponent (<span>(textsf{NI})</span>-<span>(textsf{PoKE})</span>) protocol to verify the linkages between satellites and vehicles. Meanwhile, our scheme combines the homomorphic Symmetric Homomorphic Encryption (<span>(textsf{SHE})</span>) cryptosystem, the Secure Less than (<span>(textsf{SLESS})</span>) protocol, and the KdTree structure, to identify the potential set of accessing satellites. Security analysis shows that the proposed scheme achieves privacy preservation and authentication. Performance evaluations show that ours achieve high computation and communication efficiency.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"9 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation BranchFusionNet:用于高级视网膜血管分割的高能效轻量级框架
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-20 DOI: 10.1007/s12083-024-01738-3
Jing Qin, Zhiguang Qin, Peng Xiao

In the rapidly advancing field of medical image analysis, accurate and efficient segmentation of retinal vessels is paramount for diagnosing ocular diseases, especially diabetic retinopathy. With the increasing emphasis on environmental sustainability, this paper presents BranchFusionNet, a novel lightweight neural network architecture tailored for retinal vessel segmentation. Embodying the principles of energy conservation, BranchFusionNet integrates multi-branch and lightweight dual-branch modules to optimize computational demands without sacrificing segmentation precision. This study not only contributes to the domain of retinal vessel segmentation but also showcases the potential of crafting energy-conscious deep learning methodologies in medical imaging applications.

在快速发展的医学图像分析领域,准确高效地分割视网膜血管对于诊断眼部疾病,尤其是糖尿病视网膜病变至关重要。随着对环境可持续性的日益重视,本文介绍了为视网膜血管分割量身定制的新型轻量级神经网络架构 BranchFusionNet。BranchFusionNet 体现了节能原则,集成了多分支和轻量级双分支模块,在不牺牲分割精度的情况下优化了计算需求。这项研究不仅为视网膜血管分割领域做出了贡献,还展示了在医疗成像应用中精心设计具有能量意识的深度学习方法的潜力。
{"title":"BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation","authors":"Jing Qin, Zhiguang Qin, Peng Xiao","doi":"10.1007/s12083-024-01738-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01738-3","url":null,"abstract":"<p>In the rapidly advancing field of medical image analysis, accurate and efficient segmentation of retinal vessels is paramount for diagnosing ocular diseases, especially diabetic retinopathy. With the increasing emphasis on environmental sustainability, this paper presents BranchFusionNet, a novel lightweight neural network architecture tailored for retinal vessel segmentation. Embodying the principles of energy conservation, BranchFusionNet integrates multi-branch and lightweight dual-branch modules to optimize computational demands without sacrificing segmentation precision. This study not only contributes to the domain of retinal vessel segmentation but also showcases the potential of crafting energy-conscious deep learning methodologies in medical imaging applications.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"126 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141516098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of edge server group collaboration architecture strategy in IoT smart cities application 优化物联网智慧城市应用中的边缘服务器群组协作架构策略
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1007/s12083-024-01739-2
Fangfang Gou, Jia Wu

With the development of big data and communication technologies, the Internet of Things (IoT) has permeated all aspects of smart cities. IoT smart city application scenarios are distributed with a large number of edge servers to accomplish large-scale data collection, transmission, analysis, and decision-making. However, in many emergency services, network communication faces data congestion and insufficient computational resources for nodes. To alleviate the situation that some nodes operate efficiently with insufficient cache and resource shortages, edge servers need to collaborate to handle tasks together and form an edge service community to realize fast message reception, response, and processing. Based on this, this study proposes an optimized edge server group collaboration architecture strategy in IoT smart cities application (ESGCA). It is based on the coalition to accomplish the optimal edge service community generation to collaborate on the messaging task. We design a multivariate discrete particle swarm optimization algorithm based on the discrete nearest past position update policy to improve the search utility. The algorithm can effectively solve the problem that current algorithms are prone to falling into local optimal solutions, long running times, and instability in the case of too many transmission tasks and edge nodes. Experimental results show that in the environment of insufficient node cache space and urgent transmission tasks, our ESGCA method can equalize the energy consumption of nodes, conserve computational resources, reduce the message transmission delay and the data loss rate.

随着大数据和通信技术的发展,物联网(IoT)已经渗透到智慧城市的方方面面。物联网智慧城市应用场景分布着大量的边缘服务器,以完成大规模的数据采集、传输、分析和决策。然而,在许多应急服务中,网络通信面临着数据拥塞和节点计算资源不足的问题。为了缓解部分节点在缓存不足、资源短缺的情况下高效运行,边缘服务器需要协同处理任务,形成边缘服务社区,实现信息的快速接收、响应和处理。基于此,本研究提出了物联网智慧城市应用中优化的边缘服务器群协作架构策略(ESGCA)。它以联盟为基础,完成最优边缘服务社区的生成,以协同完成消息传递任务。我们设计了一种基于离散最近位置更新策略的多变量离散粒子群优化算法,以提高搜索效用。该算法能有效解决目前算法在传输任务和边缘节点过多的情况下容易陷入局部最优解、运行时间长、不稳定等问题。实验结果表明,在节点缓存空间不足、传输任务紧迫的环境下,我们的 ESGCA 方法可以均衡节点能耗、节约计算资源、减少信息传输延迟和数据丢失率。
{"title":"Optimization of edge server group collaboration architecture strategy in IoT smart cities application","authors":"Fangfang Gou, Jia Wu","doi":"10.1007/s12083-024-01739-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01739-2","url":null,"abstract":"<p>With the development of big data and communication technologies, the Internet of Things (IoT) has permeated all aspects of smart cities. IoT smart city application scenarios are distributed with a large number of edge servers to accomplish large-scale data collection, transmission, analysis, and decision-making. However, in many emergency services, network communication faces data congestion and insufficient computational resources for nodes. To alleviate the situation that some nodes operate efficiently with insufficient cache and resource shortages, edge servers need to collaborate to handle tasks together and form an edge service community to realize fast message reception, response, and processing. Based on this, this study proposes an optimized edge server group collaboration architecture strategy in IoT smart cities application (ESGCA). It is based on the coalition to accomplish the optimal edge service community generation to collaborate on the messaging task. We design a multivariate discrete particle swarm optimization algorithm based on the discrete nearest past position update policy to improve the search utility. The algorithm can effectively solve the problem that current algorithms are prone to falling into local optimal solutions, long running times, and instability in the case of too many transmission tasks and edge nodes. Experimental results show that in the environment of insufficient node cache space and urgent transmission tasks, our ESGCA method can equalize the energy consumption of nodes, conserve computational resources, reduce the message transmission delay and the data loss rate.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"55 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading 基于区块链的隐私保护框架与多渠道资产交易访问控制模型
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-04 DOI: 10.1007/s12083-024-01732-9
Jing Cai, Haihui Huang, Chuang Ma, Jun Liu

With development of e-commerce and intelligent devices, large amounts of asset transaction data and traders’ identity information have been generated. It poses huge challenges to the data security and privacy when data are stored in a centralized trading system. Here, considering the need of data sharing and data privacy in asset trading, we proposed a blockchain-based privacy protecting framework to accommodate both aspects of these requirements. The proposed framework combines a multi-channel access control model and smart contracts to enhance the security and transparency of asset trading within permissioned channels while maintaining privacy for transactions occurring outside of these channels. Furthermore, regarding market efficiency and transaction fairness, we design trading algorithm of double auction to make transaction more automated and intelligent. Finally, we implement asset trading prototype based on Hyperledger Fabric and evaluate the performance of model. The experimental results show that the proposed multi-channel blockchain-based framework realized intra-channel date sharing and extra-channel privacy protection. Our framework achieves enhanced security, high efficiency and strong traceability for assert trading.

随着电子商务和智能设备的发展,产生了大量的资产交易数据和交易者身份信息。当数据存储在中心化的交易系统中时,对数据的安全性和隐私性提出了巨大的挑战。在此,考虑到资产交易中数据共享和数据隐私的需求,我们提出了一个基于区块链的隐私保护框架,以满足这两方面的要求。所提出的框架结合了多通道访问控制模型和智能合约,以提高许可通道内资产交易的安全性和透明度,同时维护这些通道外交易的隐私。此外,在市场效率和交易公平性方面,我们设计了双重拍卖的交易算法,使交易更加自动化和智能化。最后,我们基于 Hyperledger Fabric 实现了资产交易原型,并对模型的性能进行了评估。实验结果表明,所提出的基于多通道区块链的框架实现了通道内的日期共享和通道外的隐私保护。我们的框架为资产交易实现了更高的安全性、高效性和可追溯性。
{"title":"A blockchain-based privacy protecting framework with multi-channel access control model for asset trading","authors":"Jing Cai, Haihui Huang, Chuang Ma, Jun Liu","doi":"10.1007/s12083-024-01732-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01732-9","url":null,"abstract":"<p>With development of e-commerce and intelligent devices, large amounts of asset transaction data and traders’ identity information have been generated. It poses huge challenges to the data security and privacy when data are stored in a centralized trading system. Here, considering the need of data sharing and data privacy in asset trading, we proposed a blockchain-based privacy protecting framework to accommodate both aspects of these requirements. The proposed framework combines a multi-channel access control model and smart contracts to enhance the security and transparency of asset trading within permissioned channels while maintaining privacy for transactions occurring outside of these channels. Furthermore, regarding market efficiency and transaction fairness, we design trading algorithm of double auction to make transaction more automated and intelligent. Finally, we implement asset trading prototype based on Hyperledger Fabric and evaluate the performance of model. The experimental results show that the proposed multi-channel blockchain-based framework realized intra-channel date sharing and extra-channel privacy protection. Our framework achieves enhanced security, high efficiency and strong traceability for assert trading.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"22 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT in energy: a comprehensive review of technologies, applications, and future directions 能源领域的物联网:技术、应用和未来方向综合评述
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-04 DOI: 10.1007/s12083-024-01725-8
Oroos Arshi, Akanksha Rai, Gauri Gupta, Jitendra Kumar Pandey, Surajit Mondal

The integration of IoT (Internet of Things) in the energy sector has the potential to transform the way it generates, distributes, and consumes energy. IoT can enable real-time monitoring, control, and optimization of energy systems, leading to improved efficiency, reliability, and sustainability. This work is an attempt to provide an in-depth analysis of the integration of the IoT in the energy sector, examining the characteristics of IoT, its components, and protocols. It also explores the architecture of IoT, the latest advancements and challenges in the field of IoT, including the IoT communications model, IoT sensor boards, and the current challenges facing the industry and related security threats, and also provides suggestions for solutions to address IoT vulnerabilities. The work further delves into IoT in the energy sector aspect and explores the latest advancements and challenges in the field of IoT, including IoT in energy generation, smart cities, smart grids, smart buildings, and intelligent transportation. Additionally, the work explores the challenges of applying IoT in the energy sector discusses future trends in IoT in the energy sector, and aims to provide a detailed understanding of the latest developments and challenges of IoT in the energy sector, as well as its potential impact on the future of the industry. The work critically analyzes securing IoT devices and offers practical solutions to mitigate risks associated with IoT vulnerabilities. This work serves as a valuable resource for researchers, policymakers, and practitioners interested in understanding the impact of IoT on energy security.

Graphical Abstract

Taxonomy of the study.

物联网(IoT)与能源行业的结合有可能改变能源的生产、分配和消费方式。物联网可以对能源系统进行实时监测、控制和优化,从而提高效率、可靠性和可持续性。这项工作试图深入分析物联网在能源领域的整合,研究物联网的特点、组件和协议。它还探讨了物联网的架构、物联网领域的最新进展和挑战,包括物联网通信模式、物联网传感器板、当前行业面临的挑战和相关的安全威胁,并提出了解决物联网漏洞的建议。该作品进一步深入研究了能源领域的物联网,探讨了物联网领域的最新进展和挑战,包括物联网在能源生产、智能城市、智能电网、智能建筑和智能交通中的应用。此外,该作品还探讨了在能源领域应用物联网所面临的挑战,讨论了物联网在能源领域的未来趋势,旨在让人们详细了解物联网在能源领域的最新发展和挑战,以及物联网对该行业未来的潜在影响。作品对物联网设备的安全进行了批判性分析,并提供了实用的解决方案,以降低与物联网漏洞相关的风险。对于有兴趣了解物联网对能源安全影响的研究人员、政策制定者和从业人员来说,这部作品是一个宝贵的资源。
{"title":"IoT in energy: a comprehensive review of technologies, applications, and future directions","authors":"Oroos Arshi, Akanksha Rai, Gauri Gupta, Jitendra Kumar Pandey, Surajit Mondal","doi":"10.1007/s12083-024-01725-8","DOIUrl":"https://doi.org/10.1007/s12083-024-01725-8","url":null,"abstract":"<p>The integration of IoT (Internet of Things) in the energy sector has the potential to transform the way it generates, distributes, and consumes energy. IoT can enable real-time monitoring, control, and optimization of energy systems, leading to improved efficiency, reliability, and sustainability. This work is an attempt to provide an in-depth analysis of the integration of the IoT in the energy sector, examining the characteristics of IoT, its components, and protocols. It also explores the architecture of IoT, the latest advancements and challenges in the field of IoT, including the IoT communications model, IoT sensor boards, and the current challenges facing the industry and related security threats, and also provides suggestions for solutions to address IoT vulnerabilities. The work further delves into IoT in the energy sector aspect and explores the latest advancements and challenges in the field of IoT, including IoT in energy generation, smart cities, smart grids, smart buildings, and intelligent transportation. Additionally, the work explores the challenges of applying IoT in the energy sector discusses future trends in IoT in the energy sector, and aims to provide a detailed understanding of the latest developments and challenges of IoT in the energy sector, as well as its potential impact on the future of the industry. The work critically analyzes securing IoT devices and offers practical solutions to mitigate risks associated with IoT vulnerabilities. This work serves as a valuable resource for researchers, policymakers, and practitioners interested in understanding the impact of IoT on energy security.</p><h3 data-test=\"abstract-sub-heading\">Graphical Abstract</h3><p>Taxonomy of the study.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"6 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141254792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based auditable deduplication scheme for multi-cloud storage 基于区块链的多云存储可审计重复数据删除方案
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-04 DOI: 10.1007/s12083-024-01734-7
Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng

Cloud storage has attracted widespread attention due to its advantages such as convenience, low cost, and easy scalability. With the explosion of cloud data volumes, security and performance issues are becoming major concerns. Countermeasures like data deduplication and integrity auditing techniques have been extensively studied. However, traditional auditable deduplication protocols face significant challenges related to confidentiality, reliability, and efficiency. Aiming to address these challenges, a blockchain-based auditable deduplication scheme for multi-cloud storage is proposed in this paper. Specifically, this scheme leverages blockchain technology and bilinear pairing cryptosystem to achieve an auditable deduplication mechanism that not only saves storage space but also checks data integrity. Furthermore, convergent encryption and threshold secret sharing algorithms are utilized to enhance storage confidentiality and system reliability. Batch auditing and anti-repeated auditing techniques are also adopted to improve auditing efficiency. Finally, security analysis and performance evaluation reveal that the proposed scheme achieves the expected security and performance requirements.

云存储因其便捷、低成本和易于扩展等优势而受到广泛关注。随着云数据量的爆炸式增长,安全和性能问题正成为人们关注的主要问题。重复数据删除和完整性审计技术等对策已被广泛研究。然而,传统的可审计重复数据删除协议在保密性、可靠性和效率方面面临着巨大挑战。为了应对这些挑战,本文提出了一种基于区块链的多云存储可审计重复数据删除方案。具体来说,该方案利用区块链技术和双线性配对密码系统实现了可审计重复数据删除机制,不仅节省了存储空间,还能检查数据的完整性。此外,还采用了聚合加密和阈值秘密共享算法,以提高存储保密性和系统可靠性。此外,还采用了批量审计和反重复审计技术来提高审计效率。最后,安全分析和性能评估表明,拟议方案达到了预期的安全和性能要求。
{"title":"A blockchain-based auditable deduplication scheme for multi-cloud storage","authors":"Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng","doi":"10.1007/s12083-024-01734-7","DOIUrl":"https://doi.org/10.1007/s12083-024-01734-7","url":null,"abstract":"<p>Cloud storage has attracted widespread attention due to its advantages such as convenience, low cost, and easy scalability. With the explosion of cloud data volumes, security and performance issues are becoming major concerns. Countermeasures like data deduplication and integrity auditing techniques have been extensively studied. However, traditional auditable deduplication protocols face significant challenges related to confidentiality, reliability, and efficiency. Aiming to address these challenges, a blockchain-based auditable deduplication scheme for multi-cloud storage is proposed in this paper. Specifically, this scheme leverages blockchain technology and bilinear pairing cryptosystem to achieve an auditable deduplication mechanism that not only saves storage space but also checks data integrity. Furthermore, convergent encryption and threshold secret sharing algorithms are utilized to enhance storage confidentiality and system reliability. Batch auditing and anti-repeated auditing techniques are also adopted to improve auditing efficiency. Finally, security analysis and performance evaluation reveal that the proposed scheme achieves the expected security and performance requirements.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141254958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks 用于无线传感器网络安全路由和恶意节点检测的混合启发式辅助深度学习
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-03 DOI: 10.1007/s12083-024-01735-6
Dingari Kalpana, P. Ajitha

Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.

为了提高数据包传输的效率,人们采用了多种路由和安全协议,然而,寻找最佳路径却极具挑战性,因为这会降低传感器网络传输的一致性。本文提出了一种新的元启发式算法和深度学习框架,以增强无线传感器网络(WSN)路由的安全性。所设计的 WSN 模型由多种模型组成,如信任模型、路由模型、聚类模型和节能模型。此外,在信任模型中,恶意节点或攻击检测是通过 "双向长短期记忆(Bi-LSTM)与循环神经网络(RNN)"完成的。通过选择最佳路径,实现了安全数据传输的高能效路由选择。在这里,安全路由是通过名为 "基于探索的鹈鹕黑洞优化(E-PBHO)"的混合优化算法实现的。通过评估活节点和死节点、网络寿命、吞吐量和能耗等标准性能指标,提高了整体性能。其中,所开发模型的准确率和灵敏度分别达到 92% 和 93%。因此,建议模型的经验结果比现有方法性能更优越。
{"title":"A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks","authors":"Dingari Kalpana, P. Ajitha","doi":"10.1007/s12083-024-01735-6","DOIUrl":"https://doi.org/10.1007/s12083-024-01735-6","url":null,"abstract":"<p>Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141254957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing security and efficiency in MANET using dynamic algorithm switching 利用动态算法切换提高城域网的安全性和效率
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-03 DOI: 10.1007/s12083-024-01697-9
M. Vijay Anand, Anand Krishnamurthy, Karuppiah Subramanian, Saravanan Raju

MANET is widely utilized for interactions among devices without relying on a central governing body. The frequent changes in network topologies expose it to various security vulnerabilities. Enhancing security within MANET is of paramount concern and demands resolution. Addressing these security-related issues stands as the sole approach to ensuring proper data sharing in MANET. Numerous security-oriented techniques have been introduced, but they have encountered several challenges, leading to increased costs and time complexity. These difficulties have necessitated additional resources to be allocated towards mitigating issues and grappling with the growing complexity, thereby introducing a layer of complexity that can impede seamless implementation and efficacy. In this context, a Dynamic Algorithm Switching (DAS) algorithm is proposed to strengthen security in MANET. The process begins with Node clustering, followed by cluster formation through the implementation of the Modified Density-Based Spatial Clustering of Applications (DBSCAN). The proposed method incorporates Cluster Head selection (CHS), which in turn enhances energy efficiency within MANET. The effectiveness of the DAS method is evaluated through experimentation, measuring key aspects such as Packet Delivery Ratio (PDR), end-to-end delay, throughput97.9, network lifetime, and energy consumption with the attained values 98.7%, 15.81mas, 97.9% 952 s as well as 11 J/s respectively. However the existing approaches such as ANFIS-EESC, QoSDSBS, EBR and IBADConBE achieved rate of PDR as 98.3%, 97.6%, 97.1% and 96.9% that diminished the performance. Comparative analysis demonstrates that the proposed method outperforms other techniques across all metrics, establishing its superior efficiency.

城域网被广泛用于设备之间的交互,而无需依赖中央管理机构。网络拓扑结构的频繁变化使其面临各种安全漏洞。加强城域网内的安全性是最重要的问题,也是必须解决的问题。解决这些与安全相关的问题是确保城域网适当数据共享的唯一方法。目前已经引入了许多以安全为导向的技术,但也遇到了一些挑战,导致成本和时间复杂性增加。这些困难使得有必要分配更多资源来缓解问题和应对日益增长的复杂性,从而引入了一层复杂性,阻碍了无缝实施和功效的发挥。在这种情况下,我们提出了一种动态算法切换(DAS)算法来加强城域网的安全性。该过程从节点聚类开始,然后通过实施修改后的基于密度的应用空间聚类(DBSCAN)形成聚类。建议的方法包含簇头选择(CHS),这反过来又提高了城域网内的能源效率。通过实验评估了 DAS 方法的有效性,测量了数据包交付率(PDR)、端到端延迟、吞吐量 97.9、网络寿命和能耗等关键指标,结果分别为 98.7%、15.81mas、97.9% 952 s 和 11 J/s。而 ANFIS-EESC、QoSDSBS、EBR 和 IBADConBE 等现有方法的 PDR 分别为 98.3%、97.6%、97.1% 和 96.9%,性能有所下降。对比分析表明,所提出的方法在所有指标上都优于其他技术,从而确立了其卓越的效率。
{"title":"Advancing security and efficiency in MANET using dynamic algorithm switching","authors":"M. Vijay Anand, Anand Krishnamurthy, Karuppiah Subramanian, Saravanan Raju","doi":"10.1007/s12083-024-01697-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01697-9","url":null,"abstract":"<p>MANET is widely utilized for interactions among devices without relying on a central governing body. The frequent changes in network topologies expose it to various security vulnerabilities. Enhancing security within MANET is of paramount concern and demands resolution. Addressing these security-related issues stands as the sole approach to ensuring proper data sharing in MANET. Numerous security-oriented techniques have been introduced, but they have encountered several challenges, leading to increased costs and time complexity. These difficulties have necessitated additional resources to be allocated towards mitigating issues and grappling with the growing complexity, thereby introducing a layer of complexity that can impede seamless implementation and efficacy. In this context, a Dynamic Algorithm Switching (DAS) algorithm is proposed to strengthen security in MANET. The process begins with Node clustering, followed by cluster formation through the implementation of the Modified Density-Based Spatial Clustering of Applications (DBSCAN). The proposed method incorporates Cluster Head selection (CHS), which in turn enhances energy efficiency within MANET. The effectiveness of the DAS method is evaluated through experimentation, measuring key aspects such as Packet Delivery Ratio (PDR), end-to-end delay, throughput97.9, network lifetime, and energy consumption with the attained values 98.7%, 15.81mas, 97.9% 952 s as well as 11 J/s respectively. However the existing approaches such as ANFIS-EESC, QoSDSBS, EBR and IBADConBE achieved rate of PDR as 98.3%, 97.6%, 97.1% and 96.9% that diminished the performance. Comparative analysis demonstrates that the proposed method outperforms other techniques across all metrics, establishing its superior efficiency.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature fusion federated learning for privacy-aware indoor localization 针对隐私感知室内定位的特征融合联合学习
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-03 DOI: 10.1007/s12083-024-01736-5
Omid Tasbaz, Bahar Farahani, Vahideh Moghtadaiee

In recent years, Indoor Positioning Systems (IPS) have emerged as a critical technology to enable a diverse range of Location-based Services (LBS) across different sectors, such as retail, healthcare, and transportation. Despite their strong demand and importance, existing implementations of IPS face significant challenges concerning accuracy and privacy. The accuracy issue is mainly rooted in the inherent characteristics of Received Signal Strength (RSS), which is widely integrated into current IPS as it only requires readily available WiFi infrastructure. Several studies have demonstrated that RSS suffers from instability and inaccuracy in the presence of environmental changes, making it an inadequate choice for precise IPS. Furthermore, most state-of-the-art IPS encounter privacy and data security issues as they often require users to share their privacy-sensitive location data with a centralized server. Unfortunately, centralized data collection and processing potentially expose users to privacy breaches. To tackle these shortcomings, we advocate for a comprehensive, accurate, and multifaceted solution that enables users to harness the benefits of IPS without provoking privacy concerns. First, we address the positional inaccuracy problem by combining the strengths and synergies between RSS and Channel State Information (CSI). Fusing these complementary metrics delivers increased stability against environmental fluctuations. Thereby, it provides a robust foundation for reliable and accurate positioning outcomes. Second, to address the privacy challenge, we integrate Federated Learning (FL) into the proposed solution to enable the collaborative development of machine learning-based IPS models while ensuring that user data remains decentralized. We conducted a comprehensive assessment to evaluate the performance of the proposed IPS and the corresponding overheads compared to established baseline techniques that utilize either RSS or CSI independently. The results indicate significant enhancements, highlighting our solution’s ability to effectively address accuracy and privacy challenges.

近年来,室内定位系统(IPS)已成为一项关键技术,在零售、医疗保健和交通等不同领域支持各种基于位置的服务(LBS)。尽管需求旺盛且十分重要,但现有的室内定位系统在准确性和隐私保护方面仍面临巨大挑战。准确性问题主要源于接收信号强度(RSS)的固有特性,RSS 只需要现成的 WiFi 基础设施,因此被广泛集成到当前的 IPS 中。一些研究表明,RSS 在环境变化时存在不稳定性和不准确性,因此不能作为精确 IPS 的选择。此外,大多数最先进的 IPS 还存在隐私和数据安全问题,因为它们通常要求用户与中央服务器共享对隐私敏感的位置数据。遗憾的是,集中式数据收集和处理可能会使用户的隐私受到侵犯。为了解决这些缺陷,我们主张采用一种全面、准确和多方面的解决方案,使用户既能利用 IPS 的优势,又不会引发隐私问题。首先,我们通过结合 RSS 和信道状态信息 (CSI) 的优势和协同作用来解决位置不准确的问题。将这些互补指标融合在一起,可以提高稳定性,抵御环境波动。因此,它为可靠和准确的定位结果奠定了坚实的基础。其次,为了应对隐私挑战,我们将联邦学习(FL)集成到了拟议的解决方案中,以实现基于机器学习的 IPS 模型的协作开发,同时确保用户数据保持分散。我们进行了一项综合评估,以评估与独立使用 RSS 或 CSI 的既定基线技术相比,所提出的 IPS 的性能和相应的开销。评估结果表明,我们的解决方案在有效解决准确性和隐私挑战方面有明显的提升。
{"title":"Feature fusion federated learning for privacy-aware indoor localization","authors":"Omid Tasbaz, Bahar Farahani, Vahideh Moghtadaiee","doi":"10.1007/s12083-024-01736-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01736-5","url":null,"abstract":"<p>In recent years, Indoor Positioning Systems (IPS) have emerged as a critical technology to enable a diverse range of Location-based Services (LBS) across different sectors, such as retail, healthcare, and transportation. Despite their strong demand and importance, existing implementations of IPS face significant challenges concerning accuracy and privacy. The accuracy issue is mainly rooted in the inherent characteristics of Received Signal Strength (RSS), which is widely integrated into current IPS as it only requires readily available WiFi infrastructure. Several studies have demonstrated that RSS suffers from instability and inaccuracy in the presence of environmental changes, making it an inadequate choice for precise IPS. Furthermore, most state-of-the-art IPS encounter privacy and data security issues as they often require users to share their privacy-sensitive location data with a centralized server. Unfortunately, centralized data collection and processing potentially expose users to privacy breaches. To tackle these shortcomings, we advocate for a comprehensive, accurate, and multifaceted solution that enables users to harness the benefits of IPS without provoking privacy concerns. First, we address the positional inaccuracy problem by combining the strengths and synergies between RSS and Channel State Information (CSI). Fusing these complementary metrics delivers increased stability against environmental fluctuations. Thereby, it provides a robust foundation for reliable and accurate positioning outcomes. Second, to address the privacy challenge, we integrate Federated Learning (FL) into the proposed solution to enable the collaborative development of machine learning-based IPS models while ensuring that user data remains decentralized. We conducted a comprehensive assessment to evaluate the performance of the proposed IPS and the corresponding overheads compared to established baseline techniques that utilize either RSS or CSI independently. The results indicate significant enhancements, highlighting our solution’s ability to effectively address accuracy and privacy challenges.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"34 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1