首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
Truthful double auction based incentive mechanism for participatory sensing systems 基于真实双重拍卖的参与式传感系统激励机制
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-20 DOI: 10.1007/s12083-024-01681-3
Asif Iqbal Middya, Sarbani Roy

The sensors available in the smartphones are useful to explore a diverse range of city dynamics (e.g. noise pollution, road condition, traffic condition, etc.). The potential of the smartphone sensors coupled with their widespread availability help to emerge a new paradigm of sensing known as participatory sensing. It uses the power of smartphone equipped sensors to collect, store, and analyze data with high spatiotemporal granularity. In a participatory sensing based system, a task provider (also known as a crowdsourcer) may have a set of sensing tasks regarding different dynamics of a city. Here, adequate users’ participation is necessary to acquire a sufficient amount of data which is a key factor for the participatory sensing based systems to provide good service quality. The task providers appoint a set of task executors (smartphone users i.e. participants of crowdsensing tasks) to execute those sensing tasks. But, existing works on sensing task allocation suffer from lack of good incentive mechanisms that are attractive for the task executors. In order to address this issue, in this paper, a double auction based incentive mechanism called TATA (Truthful Double Auction for Task Allocation) is proposed for participatory sensing. TATA performs fair allocation of tasks which is leading to efficient incentive mechanism. In the case of TATA, the fair allocation of sensing tasks of the task providers to the task executers indicates that the proposed double auction mechanism is able to satisfy the truthfulness property in order to resist market manipulation (i.e., untruthful bidding and asking). Specifically, TATA achieves all the desirable properties like individual rationality, truthfulness (i.e. incentive compatibility), budget balance, etc. TATA is also computationally efficient and yields high system efficiency. Additionally, the performance of the proposed incentive mechanism is evaluated and compared with the existing mechanisms through extensive simulations based on the real-world data from Amazon Mechanical Turk. TATA yields high utility and satisfaction for the task providers and executors as compared to the existing mechanisms.

智能手机中的传感器可用于探索各种城市动态(如噪音污染、道路状况、交通状况等)。智能手机传感器的潜力及其广泛的可用性有助于形成一种新的传感模式,即参与式传感。它利用智能手机传感器的强大功能来收集、存储和分析高时空粒度的数据。在基于参与式传感的系统中,任务提供者(也称为众包者)可能会有一组关于城市不同动态的传感任务。在这里,用户的充分参与是获取足够数据量的必要条件,这也是基于参与式传感的系统提供优质服务的关键因素。任务提供者指定一组任务执行者(智能手机用户,即众传感任务的参与者)来执行这些传感任务。但是,现有的感知任务分配工作缺乏对任务执行者有吸引力的良好激励机制。为了解决这个问题,本文提出了一种基于双重拍卖的激励机制,称为 TATA(Truthful Double Auction for Task Allocation,任务分配的真实双重拍卖),用于参与式传感。TATA 可以公平分配任务,从而形成高效的激励机制。就 TATA 而言,任务提供者向任务执行者公平分配传感任务表明,所提出的双重拍卖机制能够满足真实性属性,从而抵制市场操纵(即不真实的出价和要价)。具体来说,TATA 实现了个人理性、真实性(即激励相容)、预算平衡等所有理想属性。TATA 还具有很高的计算效率和系统效率。此外,我们还根据亚马逊 Mechanical Turk 的真实数据进行了大量模拟,对所提出的激励机制的性能进行了评估,并与现有机制进行了比较。与现有机制相比,TATA 为任务提供者和执行者带来了更高的效用和满意度。
{"title":"Truthful double auction based incentive mechanism for participatory sensing systems","authors":"Asif Iqbal Middya, Sarbani Roy","doi":"10.1007/s12083-024-01681-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01681-3","url":null,"abstract":"<p>The sensors available in the smartphones are useful to explore a diverse range of city dynamics (e.g. noise pollution, road condition, traffic condition, etc.). The potential of the smartphone sensors coupled with their widespread availability help to emerge a new paradigm of sensing known as participatory sensing. It uses the power of smartphone equipped sensors to collect, store, and analyze data with high spatiotemporal granularity. In a participatory sensing based system, a task provider (also known as a crowdsourcer) may have a set of sensing tasks regarding different dynamics of a city. Here, adequate users’ participation is necessary to acquire a sufficient amount of data which is a key factor for the participatory sensing based systems to provide good service quality. The task providers appoint a set of task executors (smartphone users i.e. participants of crowdsensing tasks) to execute those sensing tasks. But, existing works on sensing task allocation suffer from lack of good incentive mechanisms that are attractive for the task executors. In order to address this issue, in this paper, a double auction based incentive mechanism called TATA (<b>T</b>ruthful Double <b>A</b>uction for <b>T</b>ask <b>A</b>llocation) is proposed for participatory sensing. TATA performs fair allocation of tasks which is leading to efficient incentive mechanism. In the case of TATA, the fair allocation of sensing tasks of the task providers to the task executers indicates that the proposed double auction mechanism is able to satisfy the truthfulness property in order to resist market manipulation (i.e., untruthful bidding and asking). Specifically, TATA achieves all the desirable properties like individual rationality, truthfulness (i.e. incentive compatibility), budget balance, etc. TATA is also computationally efficient and yields high system efficiency. Additionally, the performance of the proposed incentive mechanism is evaluated and compared with the existing mechanisms through extensive simulations based on the real-world data from Amazon Mechanical Turk. TATA yields high utility and satisfaction for the task providers and executors as compared to the existing mechanisms.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"51 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140623744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism 基于级联网络和轻量级关注机制的复杂场景下绝缘体缺陷检测
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-20 DOI: 10.1007/s12083-024-01682-2
Yang Ning, Li Xiang, Jing Hongyuan, Shang Xinna, Shen Ping, Chen Aidong

The power system stands as a crucial infrastructure pivotal to the country’s modern economic, security and social development. This paper addresses challenges in insulator fault detection on power transmission towers, leveraging the advancements in unmanned aerial vehicles equipped with target detection methods. We propose a novel method for insulator defect detection based on YOLOv5 (You Only Look Once), aiming to mitigate the issues associated with high missed detection rates. Small insulator faults and the limitation of unmanned aerial vehicle on-board capacity make it difficult to detect comprehensively. Firstly, the cluster analysis was carried out on the training data to obtain 9 kinds of better preset anchors for insulator detection, which improved the accuracy of the model to identify the location of targets. Secondly, the base-model is used to detect the insulator region, and the detection results are input into the sub-model to detect the location of faults, so as to form a cascade model, and make full use of the advantages of the two models to solve the problem of high missed detection rate. Finally, a lightweight attention module combining channel attention module and spatial attention module is added in YOLOv5 to improve the base-model’s attention to insulator region and suppress complex background features. Experimental results show that compared with the original model, the average precision of the proposed method for insulator detection is increased by 6.9%, and the missed detection rate of the fault location is 30% lower. Significant improvements in insulator detection performance have been achieved using the method proposed in this paper. It can not only effectively improve the detection accuracy, but also make the missed detection rate lower to meet the requirements of insulator defect detection and fault warning applications in complex environments, which proves that it has a wide range of application prospects in practice, especially in the field of power industry.

电力系统是关系到国家现代经济、安全和社会发展的重要基础设施。本文利用配备目标检测方法的无人飞行器的先进技术,探讨输电塔绝缘体故障检测所面临的挑战。我们提出了一种基于 YOLOv5(只看一次)的绝缘体缺陷检测新方法,旨在缓解与高漏检率相关的问题。由于绝缘子故障较小,加上无人机机载能力的限制,很难进行全面检测。首先,对训练数据进行聚类分析,得到 9 种较好的绝缘体检测预设锚点,提高了模型识别目标位置的准确性。其次,利用基础模型检测绝缘子区域,并将检测结果输入子模型检测故障位置,从而形成级联模型,充分发挥两个模型的优势,解决漏检率高的问题。最后,在 YOLOv5 中加入了轻量级关注模块,将通道关注模块和空间关注模块相结合,提高了基础模型对绝缘体区域的关注度,抑制了复杂背景特征。实验结果表明,与原始模型相比,所提方法的绝缘体检测平均精度提高了 6.9%,故障定位的漏检率降低了 30%。本文提出的方法显著提高了绝缘子检测性能。它不仅能有效提高检测精度,还能使漏检率降低,满足复杂环境下绝缘子缺陷检测和故障预警应用的要求,这证明它在实际应用中,尤其是在电力行业领域具有广泛的应用前景。
{"title":"Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism","authors":"Yang Ning, Li Xiang, Jing Hongyuan, Shang Xinna, Shen Ping, Chen Aidong","doi":"10.1007/s12083-024-01682-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01682-2","url":null,"abstract":"<p>The power system stands as a crucial infrastructure pivotal to the country’s modern economic, security and social development. This paper addresses challenges in insulator fault detection on power transmission towers, leveraging the advancements in unmanned aerial vehicles equipped with target detection methods. We propose a novel method for insulator defect detection based on YOLOv5 (You Only Look Once), aiming to mitigate the issues associated with high missed detection rates. Small insulator faults and the limitation of unmanned aerial vehicle on-board capacity make it difficult to detect comprehensively. Firstly, the cluster analysis was carried out on the training data to obtain 9 kinds of better preset anchors for insulator detection, which improved the accuracy of the model to identify the location of targets. Secondly, the base-model is used to detect the insulator region, and the detection results are input into the sub-model to detect the location of faults, so as to form a cascade model, and make full use of the advantages of the two models to solve the problem of high missed detection rate. Finally, a lightweight attention module combining channel attention module and spatial attention module is added in YOLOv5 to improve the base-model’s attention to insulator region and suppress complex background features. Experimental results show that compared with the original model, the average precision of the proposed method for insulator detection is increased by 6.9%, and the missed detection rate of the fault location is 30% lower. Significant improvements in insulator detection performance have been achieved using the method proposed in this paper. It can not only effectively improve the detection accuracy, but also make the missed detection rate lower to meet the requirements of insulator defect detection and fault warning applications in complex environments, which proves that it has a wide range of application prospects in practice, especially in the field of power industry.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"117 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140623741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart grid security based on blockchain and smart contract 基于区块链和智能合约的智能电网安全
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-20 DOI: 10.1007/s12083-024-01703-0
Ming Zhang, Yutong Liu, Qian Cheng, Hui Li, Dan Liao, Huiyong Li

With the advent of the Fourth Industrial Revolution, the use of the smart grid is becoming more and more widespread. However, a large number of distributed smart grid devices currently have insecure authentication and low information sharing. As the use of blockchain technology can provide a secure and trustworthy interaction environment for smart grids, this paper proposes a blockchain-based smart grid security architecture, which resolves the conflict between distributed smart grid devices and centralized management is resolved. In the proposed architecture, we have newly designed blocks and gateway nodes, which improve the security and credibility of smart grid device identity authentication. Then we design a Computing Balance based Exchange (CBE) algorithm to improve the interaction efficiency between smart grid devices. In addition, the multi-layer smart contract based on smart grid is proposed to solve the problems of lack of mutual trust and information sharing between smart grid devices. Finally, the blockchain-based smart grid security architecture and multi-layer smart contract can achieve secure interaction and efficient identity authentication among smart grid devices.

随着第四次工业革命的到来,智能电网的应用越来越广泛。然而,目前大量分布式智能电网设备存在认证不安全、信息共享程度低等问题。由于区块链技术的应用可以为智能电网提供安全可信的交互环境,本文提出了一种基于区块链的智能电网安全架构,解决了分布式智能电网设备与集中式管理之间的矛盾。在提出的架构中,我们新设计了区块和网关节点,提高了智能电网设备身份认证的安全性和可信度。然后,我们设计了一种基于计算平衡的交换(CBE)算法,以提高智能电网设备之间的交互效率。此外,还提出了基于智能电网的多层智能合约,解决了智能电网设备之间缺乏互信和信息共享的问题。最后,基于区块链的智能电网安全架构和多层智能合约可以实现智能电网设备间的安全交互和高效身份认证。
{"title":"Smart grid security based on blockchain and smart contract","authors":"Ming Zhang, Yutong Liu, Qian Cheng, Hui Li, Dan Liao, Huiyong Li","doi":"10.1007/s12083-024-01703-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01703-0","url":null,"abstract":"<p>With the advent of the Fourth Industrial Revolution, the use of the smart grid is becoming more and more widespread. However, a large number of distributed smart grid devices currently have insecure authentication and low information sharing. As the use of blockchain technology can provide a secure and trustworthy interaction environment for smart grids, this paper proposes a blockchain-based smart grid security architecture, which resolves the conflict between distributed smart grid devices and centralized management is resolved. In the proposed architecture, we have newly designed blocks and gateway nodes, which improve the security and credibility of smart grid device identity authentication. Then we design a Computing Balance based Exchange (CBE) algorithm to improve the interaction efficiency between smart grid devices. In addition, the multi-layer smart contract based on smart grid is proposed to solve the problems of lack of mutual trust and information sharing between smart grid devices. Finally, the blockchain-based smart grid security architecture and multi-layer smart contract can achieve secure interaction and efficient identity authentication among smart grid devices.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"38 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140623738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques 使用混合加密技术在启用的 vanet 系统中使用雾节点的创新隐私保护和安全框架
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1007/s12083-024-01672-4
M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, E Mohan, A. Rajesh

Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET systems that exist nowadays have issues regarding user privacy and authentication. In internal vehicles, the fake message broadcasting should be stopped to protect the vulnerability of these vehicles from privacy issues. Additionally, the traditional manner of storing transmitted data lacks a decentralized and distributed security system, making it easily vulnerable for third parties to provoke malicious activities within the VANET system. VANET is an autonomous and open-access network, so, privacy and security are the main issues. Hence, it is essential to rectify the complications that are present in the traditional security and privacy preservation models in the VANET system. Thus, an innovative privacy preservation and security scheme with fog enabled VANET system is implemented by considering the complications in the existing models. The major that take place in the recommended framework are (a) Node Authentication, (b) Privacy Preservation, and (c) Message Verification. Initially, the node authentication is performed in the recommended framework using an Adaptive Deep Bayesian network (ADBN) in order to ensure an enhanced permissibility rate in the vehicular node. Then, messages are authenticated to protect the virtue of the messages. The parameters in the ADBN are tuned using the aid of Integrated Fire Hawk with Tunicate Swarm Algorithm (IFHTSA). Next, the privacy preservation procedure in the VANET model is carried out using Hybrid Attribute-Based Advanced Encryption Standard (HABAES) encryption techniques. The keys obtained on the encryption of the messages are signed digitally. Moreover, the suggested model utilized the fog node for the analysis instead of Road-Side Units (RSUs), because of its effectiveness in minimizing the latency rate with an increased throughput rate. In the message verification node, once the Fog Edge Node (FEN) receives the signed message from the vehicles, then it checks the validity of the vehicle node by comparing it with the signed messages. Finally, the experimentation is done based on various standard performance metrics. However, the developed model achieves 94% and 93% in terms of accuracy and precision. Hence, the suggested technique offers minimal computation and communication overhead in different experimental observations over the classical technique.

智能交通和智能车辆之间的有效通信是通过车载 Ad-Hoc 网络(VANET)实现的。目前存在的 VANET 系统在用户隐私和身份验证方面存在问题。在内部车辆中,应停止虚假信息广播,以保护这些车辆免受隐私问题的侵害。此外,传统的传输数据存储方式缺乏分散的分布式安全系统,很容易被第三方在 VANET 系统中挑起恶意活动。VANET 是一个自主和开放访问的网络,因此隐私和安全是主要问题。因此,必须纠正 VANET 系统中传统安全和隐私保护模式存在的复杂问题。因此,考虑到现有模型中存在的复杂问题,我们实施了一种具有雾功能的 VANET 系统的创新隐私保护和安全方案。建议的框架主要包括:(a)节点认证;(b)隐私保护;(c)信息验证。首先,在推荐框架中使用自适应深贝叶斯网络(ADBN)进行节点验证,以确保提高车辆节点的许可率。然后,对信息进行验证,以保护信息的可靠性。ADBN 的参数借助集成火鹰与调谐蜂群算法(IFHTSA)进行调整。接下来,在 VANET 模型中使用基于属性的混合高级加密标准(HABAES)加密技术执行隐私保护程序。对加密信息获得的密钥进行数字签名。此外,建议的模型利用雾节点进行分析,而不是路侧单元(RSU),因为雾节点可以有效地降低延迟率,提高吞吐率。在信息验证节点中,一旦雾边缘节点(FEN)收到来自车辆的签名信息,它就会通过与签名信息进行比较来检查车辆节点的有效性。最后,根据各种标准性能指标进行了实验。然而,所开发的模型在准确率和精确度方面分别达到了 94% 和 93%。因此,与传统技术相比,建议的技术在不同的实验观测中提供了最小的计算和通信开销。
{"title":"An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques","authors":"M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, E Mohan, A. Rajesh","doi":"10.1007/s12083-024-01672-4","DOIUrl":"https://doi.org/10.1007/s12083-024-01672-4","url":null,"abstract":"<p>Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET systems that exist nowadays have issues regarding user privacy and authentication. In internal vehicles, the fake message broadcasting should be stopped to protect the vulnerability of these vehicles from privacy issues. Additionally, the traditional manner of storing transmitted data lacks a decentralized and distributed security system, making it easily vulnerable for third parties to provoke malicious activities within the VANET system. VANET is an autonomous and open-access network, so, privacy and security are the main issues. Hence, it is essential to rectify the complications that are present in the traditional security and privacy preservation models in the VANET system. Thus, an innovative privacy preservation and security scheme with fog enabled VANET system is implemented by considering the complications in the existing models. The major that take place in the recommended framework are (a) Node Authentication, (b) Privacy Preservation, and (c) Message Verification. Initially, the node authentication is performed in the recommended framework using an Adaptive Deep Bayesian network (ADBN) in order to ensure an enhanced permissibility rate in the vehicular node. Then, messages are authenticated to protect the virtue of the messages. The parameters in the ADBN are tuned using the aid of Integrated Fire Hawk with Tunicate Swarm Algorithm (IFHTSA). Next, the privacy preservation procedure in the VANET model is carried out using Hybrid Attribute-Based Advanced Encryption Standard (HABAES) encryption techniques. The keys obtained on the encryption of the messages are signed digitally. Moreover, the suggested model utilized the fog node for the analysis instead of Road-Side Units (RSUs), because of its effectiveness in minimizing the latency rate with an increased throughput rate. In the message verification node, once the Fog Edge Node (FEN) receives the signed message from the vehicles, then it checks the validity of the vehicle node by comparing it with the signed messages. Finally, the experimentation is done based on various standard performance metrics. However, the developed model achieves 94% and 93% in terms of accuracy and precision. Hence, the suggested technique offers minimal computation and communication overhead in different experimental observations over the classical technique.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"304 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140614758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements 全面回顾城市和高速公路场景下的车载 ad-hoc 网络路由协议、研究差距和未来改进
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1007/s12083-024-01683-1
Ishita Seth, Kalpna Guleria, Surya Narayan Panda

Vehicular Ad-hoc Networks (VANETs) have received extensive consideration from the industry and the research community because of their expanding emphasis on constructing Intelligent Transportation Systems (ITS) to enhance road safety. ITS is a collection of technologies and applications that aim to improve transportation safety and mobility while lowering the number of accidents. In VANET, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in VANET and inconsistent network coverage in different areas make routing a challenging task. As a result, ensuring that the VANET routing protocol has the maximum packet delivery ratio (PDR) and low latency is of utmost necessity. Due to the high dynamicity of the VANET environment, position-based routing protocols are paramount for VANET communication. VANET is subjected to frequent network disconnection due to the varied speeds of moving vehicles. Managing and controlling network connections among V2V and V2I is the most critical issue in VANET communication. Therefore, reliable routing protocols that can adapt to frequent network failures and select alternative paths are still an area to be explored further. Majorly, VANET routing protocols follow the greedy approach; once the local maximum is reached, the packets start dropping, resulting in a lower packet delivery ratio. Therefore, lower PDR is still an issue to be resolved in VANET's routing protocols. This paper investigates recent position-based routing protocols proposed for VANET communication in urban and highway scenarios. It also elaborates on topology-based routing, which was initially used in VANET, and its research gaps, which are the major reason for the advent of position-based routing techniques proposed for VANET communication by various researchers. It provides an in-depth comparison of different routing protocols based on their performance metrics and communication strategies. The paper highlights various application areas of the VANET, research challenges encountered, and possible solutions. Further, a summary and discussion on topology-based and position-based routing protocols mark the strengths, limitations, application areas, and future enhancements in this domain.

车载 Ad-hoc 网络(VANET)受到了业界和研究界的广泛关注,因为它们越来越重视构建智能交通系统(ITS),以加强道路安全。智能交通系统是一系列技术和应用的集合,旨在提高交通安全性和流动性,同时降低事故数量。在 VANET 中,路由协议在提高交通系统通信安全方面发挥着重要作用。VANET 中节点的高流动性和不同地区网络覆盖的不一致性使得路由选择成为一项具有挑战性的任务。因此,确保 VANET 路由协议具有最大的数据包传送率(PDR)和较低的延迟至关重要。由于 VANET 环境的高动态性,基于位置的路由协议对 VANET 通信至关重要。由于行驶车辆的速度各不相同,VANET 会经常出现网络断开的情况。管理和控制 V2V 和 V2I 之间的网络连接是 VANET 通信中最关键的问题。因此,能够适应频繁网络故障并选择替代路径的可靠路由协议仍是一个有待进一步探索的领域。VANET 路由协议主要采用贪婪方法,一旦达到本地最大值,数据包就会开始丢弃,导致数据包传输率降低。因此,降低 PDR 仍是 VANET 路由协议需要解决的问题。本文研究了最近针对城市和高速公路场景中的 VANET 通信提出的基于位置的路由协议。本文还阐述了最初用于 VANET 的基于拓扑的路由协议及其研究空白,这也是不同研究人员为 VANET 通信提出基于位置的路由技术的主要原因。论文根据不同路由协议的性能指标和通信策略对其进行了深入比较。论文重点介绍了 VANET 的各种应用领域、遇到的研究挑战以及可能的解决方案。此外,还对基于拓扑和基于位置的路由协议进行了总结和讨论,指出了这一领域的优势、局限性、应用领域和未来改进方向。
{"title":"A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements","authors":"Ishita Seth, Kalpna Guleria, Surya Narayan Panda","doi":"10.1007/s12083-024-01683-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01683-1","url":null,"abstract":"<p>Vehicular Ad-hoc Networks (VANETs) have received extensive consideration from the industry and the research community because of their expanding emphasis on constructing Intelligent Transportation Systems (ITS) to enhance road safety. ITS is a collection of technologies and applications that aim to improve transportation safety and mobility while lowering the number of accidents. In VANET, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in VANET and inconsistent network coverage in different areas make routing a challenging task. As a result, ensuring that the VANET routing protocol has the maximum packet delivery ratio (PDR) and low latency is of utmost necessity. Due to the high dynamicity of the VANET environment, position-based routing protocols are paramount for VANET communication. VANET is subjected to frequent network disconnection due to the varied speeds of moving vehicles. Managing and controlling network connections among V2V and V2I is the most critical issue in VANET communication. Therefore, reliable routing protocols that can adapt to frequent network failures and select alternative paths are still an area to be explored further. Majorly, VANET routing protocols follow the greedy approach; once the local maximum is reached, the packets start dropping, resulting in a lower packet delivery ratio. Therefore, lower PDR is still an issue to be resolved in VANET's routing protocols. This paper investigates recent position-based routing protocols proposed for VANET communication in urban and highway scenarios. It also elaborates on topology-based routing, which was initially used in VANET, and its research gaps, which are the major reason for the advent of position-based routing techniques proposed for VANET communication by various researchers. It provides an in-depth comparison of different routing protocols based on their performance metrics and communication strategies. The paper highlights various application areas of the VANET, research challenges encountered, and possible solutions. Further, a summary and discussion on topology-based and position-based routing protocols mark the strengths, limitations, application areas, and future enhancements in this domain.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"179 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140614759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT 物联网 seCK 模型下基于下轮晶格的匿名 AKA
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1007/s12083-024-01676-0
Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang

The authenticated key agreement (AKA) method used in the Internet of Things (IoT) provides identity authentication and agreed symmetric keys to encrypt large amounts of communication messages for devices and servers. With the rapid development of quantum computers and quantum algorithms, classical cryptographic algorithms become vulnerable to attacks by adversaries, leading to significant risks in IoT communication systems. Numerous lattice-based authentication key agreement (AKA) schemes have emerged to fortify communication systems against quantum attacks. However, due to the large size of the lattice cryptography public key, an excessive number of communication rounds can cause significant time delays. Meanwhile, many current lattice-based AKA schemes rely on weak security models like BR, CK, and ROR. These models can only capture partial adversary attacks. To this end, we propose a lower communication rounds lattice-based anonymous authenticated key agreement (LA-AKA) protocol under the seCK model. This protocol aims to achieve lower communication rounds under the robust security model, ensuring heightened security and efficiency within IoT communication systems.

物联网(IoT)中使用的认证密钥协议(AKA)方法提供身份认证和商定的对称密钥,为设备和服务器的大量通信信息加密。随着量子计算机和量子算法的快速发展,经典加密算法变得容易受到对手的攻击,从而给物联网通信系统带来巨大风险。为了加强通信系统抵御量子攻击,出现了许多基于网格的验证密钥协议(AKA)方案。然而,由于网格加密公钥的大小较大,过多的通信轮次会造成严重的时间延迟。同时,目前许多基于晶格的 AKA 方案都依赖于 BR、CK 和 ROR 等较弱的安全模型。这些模型只能捕捉到部分对手攻击。为此,我们在 seCK 模型下提出了一种通信轮数更低的基于网格的匿名认证密钥协议(LA-AKA)。该协议旨在稳健安全模型下实现更低的通信轮数,确保提高物联网通信系统的安全性和效率。
{"title":"Lower rounds lattice-based anonymous AKA under the seCK model for the IoT","authors":"Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang","doi":"10.1007/s12083-024-01676-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01676-0","url":null,"abstract":"<p>The authenticated key agreement (AKA) method used in the Internet of Things (IoT) provides identity authentication and agreed symmetric keys to encrypt large amounts of communication messages for devices and servers. With the rapid development of quantum computers and quantum algorithms, classical cryptographic algorithms become vulnerable to attacks by adversaries, leading to significant risks in IoT communication systems. Numerous lattice-based authentication key agreement (AKA) schemes have emerged to fortify communication systems against quantum attacks. However, due to the large size of the lattice cryptography public key, an excessive number of communication rounds can cause significant time delays. Meanwhile, many current lattice-based AKA schemes rely on weak security models like BR, CK, and ROR. These models can only capture partial adversary attacks. To this end, we propose a lower communication rounds lattice-based anonymous authenticated key agreement (LA-AKA) protocol under the seCK model. This protocol aims to achieve lower communication rounds under the robust security model, ensuring heightened security and efficiency within IoT communication systems.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140614483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning DIEET:基于深度学习的社交媒体中的知识注入式事件追踪
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1007/s12083-024-01677-z
Jun Ge, Lei-lei Shi, Lu liu, Zi-xuan Han, Anthony Miller

The rapid expansion of the mobile Internet has led to online social networks becoming an increasingly integral part of our daily lives, this offers a new perspective in the study of human behavior. Existing methods can not effectively monitor the real-time evolution of user interests based on the previous diffusion behavior of influence disseminators and to anticipate future diffusion behavior of users. In order to address these challenges, this study proposes a knowledge-infused deep learning-based event tracking model named DIEET (Diffusion and Interest Evolution behavior modeling for Event Tracking). This model accurately predicts the propagation and interest evolution behavior in event tracking by considering both propagation and interest evolution behavior. Specifically, the DIEET model incorporates the interval time, the number of times, the sequence interval time, and finally user preference for the event of interest, greatly improving the accuracy and efficiency of event evolution prediction. The experiments conducted on real Twitter datasets detail the proposed DIEET models’ ability to greatly improve the tracking of the state of user interest alongside the popularity of event propagation, and DIEET also has superior prediction performance compared to state-of-the-art models in terms of identifying user dynamic interest. Therefore, the aforementioned model offers promising potential in the ability for predicting and tracking the evolution of user interest and event propagation behavior on online social networks.

移动互联网的快速发展使在线社交网络日益成为我们日常生活中不可或缺的一部分,这为人类行为研究提供了新的视角。现有方法无法根据影响力传播者之前的传播行为有效监测用户兴趣的实时演变,也无法预测用户未来的传播行为。为了应对这些挑战,本研究提出了一种基于知识注入深度学习的事件追踪模型,命名为 DIEET(Diffusion and Interest Evolution behavior modeling for Event Tracking)。该模型通过同时考虑传播和兴趣演化行为,准确预测事件追踪中的传播和兴趣演化行为。具体来说,DIEET 模型综合考虑了传播间隔时间、传播次数、序列间隔时间以及用户对兴趣事件的偏好,大大提高了事件演化预测的准确性和效率。在真实 Twitter 数据集上进行的实验详细说明了所提出的 DIEET 模型能够在事件传播流行度的同时极大地提高对用户兴趣状态的跟踪能力,而且与最先进的模型相比,DIEET 在识别用户动态兴趣方面也具有更优越的预测性能。因此,上述模型在预测和跟踪在线社交网络中用户兴趣和事件传播行为的演变方面具有很大的潜力。
{"title":"DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning","authors":"Jun Ge, Lei-lei Shi, Lu liu, Zi-xuan Han, Anthony Miller","doi":"10.1007/s12083-024-01677-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01677-z","url":null,"abstract":"<p>The rapid expansion of the mobile Internet has led to online social networks becoming an increasingly integral part of our daily lives, this offers a new perspective in the study of human behavior. Existing methods can not effectively monitor the real-time evolution of user interests based on the previous diffusion behavior of influence disseminators and to anticipate future diffusion behavior of users. In order to address these challenges, this study proposes a knowledge-infused deep learning-based event tracking model named DIEET (Diffusion and Interest Evolution behavior modeling for Event Tracking). This model accurately predicts the propagation and interest evolution behavior in event tracking by considering both propagation and interest evolution behavior. Specifically, the DIEET model incorporates the interval time, the number of times, the sequence interval time, and finally user preference for the event of interest, greatly improving the accuracy and efficiency of event evolution prediction. The experiments conducted on real Twitter datasets detail the proposed DIEET models’ ability to greatly improve the tracking of the state of user interest alongside the popularity of event propagation, and DIEET also has superior prediction performance compared to state-of-the-art models in terms of identifying user dynamic interest. Therefore, the aforementioned model offers promising potential in the ability for predicting and tracking the evolution of user interest and event propagation behavior on online social networks.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"38 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140614755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network 基于支持 SDN 的物联网和异构上下文感知图卷积网络的混合多路径路由簇头预测
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-15 DOI: 10.1007/s12083-024-01685-z
R. Prabha, Senthil G. A, G. P. Bharathi, S. Sridevi

Intelligent technology and devices have affected nearly every aspect of human lives. The type of connection and means of communication among such a huge number of devices has led to development of Internet of Things (IoT), broad sector that has considerably increased awareness of the problem of energy management and lengthened the lifespan of networks. The design of networks has been made more difficult by complex communications. In this paper, a Hybrid Multipath Routing Cluster head prediction based on software defined networking enabled IoT and Heterogeneous context-aware graph convolution network Using Eagle Swarm Optimization (SDN-IOT-HCAGCN) is proposed. In this method, cluster is formed by coati optimization and cluster head selection by Heterogeneous context-aware graph convolution network, after that Eagle Swarm Optimization is used for multipath routing. The simulations are executed in MATLAB. The proposed technique is evaluated through different metrics, likes delay, number of dead nodes, packet delivery ratio, number of alive node, energy consumption and network life time. The proposed SDN-IOT-HCAGCN model provides 34.49%, 26.44% and 20.51% highest number of alive sensor nodes, 39.45%, 22.44% and 30.24% lowest number of delay when analyzed with the existing models, like Intelligent Energy-Aware Routing Protocol in Mobile IoT depending upon SDN (SDN IEAR-IOT-SDN), Edge-based Optimal Routing in SDN-enabled Industrial Internet of Things (EOR-SDN-IOT), Cooperative Self-scheduling routing protocol basis IoT communication for increasing lifetime duty cycled energy efficient protocol in SDN controlled embedded network (CSR-IOT-SDN) respectively.

智能技术和设备几乎影响了人类生活的方方面面。数量如此庞大的设备之间的连接类型和通信手段导致了物联网(IoT)的发展,这一广泛领域大大提高了人们对能源管理问题的认识,并延长了网络的使用寿命。复杂的通信增加了网络设计的难度。本文提出了一种基于启用了软件定义网络的物联网和异构上下文感知图卷积网络的鹰群优化(SDN-IOT-HCAGCN)混合多路径路由簇头预测方法。在这种方法中,簇是通过协同优化形成的,簇头是通过异构上下文感知图卷积网络选择的。模拟在 MATLAB 中执行。建议的技术通过不同的指标进行评估,如延迟、死亡节点数、数据包传送率、存活节点数、能耗和网络寿命。拟议的 SDN-IOT-HCAGCN 模型可提供 34.49%、26.44% 和 20.51% 的最高存活传感器节点数,39.45%、22.44% 和 30.24% 的最低延迟数。在与现有模型进行分析时,如基于 SDN 的移动物联网中的智能能量感知路由协议(SDN IEAR-IOT-SDN)、基于 SDN 的工业物联网中的边缘优化路由(EOR-SDN-IOT)、基于 SDN 控制的嵌入式网络中的合作自调度路由协议(CSR-IOT-SDN),这些模型分别提供了 34.49%、26.44% 和 20.51%的最高存活传感器节点数、39.45%、22.44% 和 30.24%的最低延迟数。
{"title":"Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network","authors":"R. Prabha, Senthil G. A, G. P. Bharathi, S. Sridevi","doi":"10.1007/s12083-024-01685-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01685-z","url":null,"abstract":"<p>Intelligent technology and devices have affected nearly every aspect of human lives. The type of connection and means of communication among such a huge number of devices has led to development of Internet of Things (IoT), broad sector that has considerably increased awareness of the problem of energy management and lengthened the lifespan of networks. The design of networks has been made more difficult by complex communications. In this paper, a Hybrid Multipath Routing Cluster head prediction based on software defined networking enabled IoT and Heterogeneous context-aware graph convolution network Using Eagle Swarm Optimization (SDN-IOT-HCAGCN) is proposed. In this method, cluster is formed by coati optimization and cluster head selection by Heterogeneous context-aware graph convolution network, after that Eagle Swarm Optimization is used for multipath routing. The simulations are executed in MATLAB. The proposed technique is evaluated through different metrics, likes delay, number of dead nodes, packet delivery ratio, number of alive node, energy consumption and network life time. The proposed SDN-IOT-HCAGCN model provides 34.49%, 26.44% and 20.51% highest number of alive sensor nodes, 39.45%, 22.44% and 30.24% lowest number of delay when analyzed with the existing models, like Intelligent Energy-Aware Routing Protocol in Mobile IoT depending upon SDN (SDN IEAR-IOT-SDN), Edge-based Optimal Routing in SDN-enabled Industrial Internet of Things (EOR-SDN-IOT), Cooperative Self-scheduling routing protocol basis IoT communication for increasing lifetime duty cycled energy efficient protocol in SDN controlled embedded network (CSR-IOT-SDN) respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"68 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation 基于深度强化学习的车辆任务卸载和资源分配联合优化模型
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-13 DOI: 10.1007/s12083-024-01693-z
Zhi-Yuan Li, Zeng-Xiang Zhang

With the rapid advancement of Internet of vehicles and autonomous driving technology, there is a growing need for increased computing power in vehicle operations. However, the strict latency requirements of vehicle tasks may pose challenges to communication and computing resources within the vehicle edge computing network. This paper introduces a two-stage joint optimization to address challenges, focusing on minimizing vehicle task latency and optimizing resource allocation. In addition, the task completion rate is considered an important indicator to ensure safety and reliability in practical application scenarios. Next, we propose a global adaptive offloading and resource allocation optimization model named GOAL. The GOAL model dynamically adjusts the weight coefficients of the reward function to optimize the model, integrating the actor-critic algorithm to effectively adapt to uncertain environments. Through experimental comparisons of various weight coefficients for task arrival rates and reward functions, we were able to determine the optimal hyperparameters for our proposed model. The simulation results show that the GOAL model outperforms the benchmark methods by over 30% in reward value. It also performs better in terms of task delay and energy consumption. Additionally, the GOAL model has a higher task completion rate compared to the benchmark methods, and it exhibits strong search capabilities and faster convergence speed.

随着车联网和自动驾驶技术的快速发展,车辆运行对计算能力的需求日益增加。然而,车辆任务对延迟的严格要求可能会给车辆边缘计算网络内的通信和计算资源带来挑战。本文介绍了一种两阶段联合优化方法来应对挑战,重点是最小化车辆任务延迟和优化资源分配。此外,在实际应用场景中,任务完成率被认为是确保安全性和可靠性的重要指标。接下来,我们提出了一种名为 GOAL 的全局自适应卸载和资源分配优化模型。GOAL 模型通过动态调整奖励函数的权重系数来优化模型,并集成了演员批判算法,从而有效地适应不确定的环境。通过对任务到达率和奖励函数的各种权重系数进行实验比较,我们确定了所提模型的最佳超参数。模拟结果表明,GOAL 模型的奖励值比基准方法高出 30% 以上。在任务延迟和能耗方面,它也表现得更好。此外,与基准方法相比,GOAL 模型的任务完成率更高,而且搜索能力更强,收敛速度更快。
{"title":"Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation","authors":"Zhi-Yuan Li, Zeng-Xiang Zhang","doi":"10.1007/s12083-024-01693-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01693-z","url":null,"abstract":"<p>With the rapid advancement of Internet of vehicles and autonomous driving technology, there is a growing need for increased computing power in vehicle operations. However, the strict latency requirements of vehicle tasks may pose challenges to communication and computing resources within the vehicle edge computing network. This paper introduces a two-stage joint optimization to address challenges, focusing on minimizing vehicle task latency and optimizing resource allocation. In addition, the task completion rate is considered an important indicator to ensure safety and reliability in practical application scenarios. Next, we propose a global adaptive offloading and resource allocation optimization model named GOAL. The GOAL model dynamically adjusts the weight coefficients of the reward function to optimize the model, integrating the actor-critic algorithm to effectively adapt to uncertain environments. Through experimental comparisons of various weight coefficients for task arrival rates and reward functions, we were able to determine the optimal hyperparameters for our proposed model. The simulation results show that the GOAL model outperforms the benchmark methods by over 30% in reward value. It also performs better in terms of task delay and energy consumption. Additionally, the GOAL model has a higher task completion rate compared to the benchmark methods, and it exhibits strong search capabilities and faster convergence speed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"7 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bsfra: Blockchain based smart forward-reverse agrichain Bsfra:基于区块链的智能正向逆向农业链
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-12 DOI: 10.1007/s12083-024-01626-w
Rishikesh, Ditipriya Sinha

The agriculture supply chain is an integral part of the whole agriculture sector. A top-notch cost efficient supply chain management system that can protect itself from outside security attacks and also from malicious activities by supply chain participants without third party intervention is highly demanded in the agriculture field. In this paper, a smart contract based forward and reverse agriculture supply chain management system is proposed that takes into account both internal and external security attacks. Here, peer-to-peer Certificate Authorities provide the rate of the crops and the farmer puts this in the forward supply chain with its price as well as communicates directly with distributors for making transactions with customers through the smart contracts. After receiving the requested crops from the farmer through the distributor, the customer initiates payment contract for the transaction. On the other hand, if a customer is not satisfied, he or she initiates a reverse supply chain. In order to maintain its level of security, this model applies blockchain technology in conjunction with a session key technique. The system computes cost analysis to ensure the immutability of costs and predict future expenses as well as compared with benchmark data. The Real or Random (RoR) based formal as well as informal security analysis is presented here to demonstrate the system’s robustness against a wide range of potential security threats and the malicious behavior of different entities. Our results analysis demonstrates the system evaluation in terms of throughput, latency, transmitted message size among different entities and gas consumption. It is observed that the proposed model outperforms than other existing approaches.

农业供应链是整个农业部门不可分割的一部分。农业领域亟需一个具有成本效益的顶级供应链管理系统,既能抵御外部安全攻击,又能在没有第三方干预的情况下防止供应链参与者的恶意活动。本文提出了一种基于智能合约的正向和反向农业供应链管理系统,它同时考虑到了内部和外部的安全攻击。在这里,点对点证书颁发机构提供农作物的价格,农民将其与价格一起放入正向供应链,并通过智能合约与分销商直接沟通,与客户进行交易。客户通过分销商从农民那里收到所需的农作物后,就会启动交易支付合约。另一方面,如果客户不满意,就会启动反向供应链。为了保持其安全级别,该模型结合会话密钥技术应用了区块链技术。该系统计算成本分析,以确保成本的不变性,并预测未来支出以及与基准数据进行比较。这里介绍了基于真实或随机(RoR)的正式和非正式安全分析,以展示该系统在应对各种潜在安全威胁和不同实体的恶意行为时的稳健性。我们的结果分析展示了系统在吞吐量、延迟、不同实体间传输信息的大小和耗气量方面的评估。据观察,所提出的模型优于其他现有方法。
{"title":"Bsfra: Blockchain based smart forward-reverse agrichain","authors":"Rishikesh, Ditipriya Sinha","doi":"10.1007/s12083-024-01626-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01626-w","url":null,"abstract":"<p>The agriculture supply chain is an integral part of the whole agriculture sector. A top-notch cost efficient supply chain management system that can protect itself from outside security attacks and also from malicious activities by supply chain participants without third party intervention is highly demanded in the agriculture field. In this paper, a smart contract based forward and reverse agriculture supply chain management system is proposed that takes into account both internal and external security attacks. Here, peer-to-peer Certificate Authorities provide the rate of the crops and the farmer puts this in the forward supply chain with its price as well as communicates directly with distributors for making transactions with customers through the smart contracts. After receiving the requested crops from the farmer through the distributor, the customer initiates payment contract for the transaction. On the other hand, if a customer is not satisfied, he or she initiates a reverse supply chain. In order to maintain its level of security, this model applies blockchain technology in conjunction with a session key technique. The system computes cost analysis to ensure the immutability of costs and predict future expenses as well as compared with benchmark data. The Real or Random (RoR) based formal as well as informal security analysis is presented here to demonstrate the system’s robustness against a wide range of potential security threats and the malicious behavior of different entities. Our results analysis demonstrates the system evaluation in terms of throughput, latency, transmitted message size among different entities and gas consumption. It is observed that the proposed model outperforms than other existing approaches.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1