首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Research on disaster information dissemination based on social sensor networks 基于社会传感器网络的灾害信息传播研究
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221080666
Shanshan Wan, Zhuo Chen, Cheng Lyu, Ruofan Li, Yuntao Yue, Y. Liu
Sudden disaster events are usually unpredictable and uncontrollable, and how to achieve efficient and accurate disaster information dissemination is an important topic for society security. At present, social sensor networks which integrate human mobile sensors and traditional physical sensors are widely used in dealing with emergencies. Previous studies mainly focused on the impact of human mobility patterns on social sensor networks. In this article, based on the inherent autonomy property of human individuals, we propose a social sensor information dissemination model, which mainly focuses on the impact of the individual characteristics, social characteristics, and group information dissemination mode on social sensor networks. Specifically, the human sensor model is first constructed based on the inherent social and psychological attributes of human autonomy. Then, various information dissemination models such as one-to-one, one-to-many, and peer-to-peer are proposed by considering different transmission media and human interaction preferences. We simulate the environment of information dissemination in disaster events based on the NetLogo platform. Evaluation matrix is applied to test the performance of social sensor information dissemination model, such as event dissemination coverage, event delivery time, and event delivery rate. With the comparisons to epidemic model, social sensor information dissemination model shows excellent performance in improving the efficiency and accuracy of information transmission in disaster events.
突发灾害事件通常具有不可预测性和不可控性,如何实现灾害信息的高效准确传播是社会安全的重要课题。目前,将人类移动传感器和传统物理传感器相结合的社交传感器网络被广泛应用于突发事件的处理。先前的研究主要集中在人类流动模式对社交传感器网络的影响上。本文基于人类个体固有的自主性,提出了一种社会传感器信息传播模型,主要研究个体特征、社会特征和群体信息传播模式对社会传感器网络的影响。具体而言,人类传感器模型首先是基于人类自主性固有的社会和心理属性构建的。然后,通过考虑不同的传播媒介和人类互动偏好,提出了一对一、一对多和对等等各种信息传播模型。我们基于NetLogo平台模拟了灾害事件中的信息传播环境。评价矩阵用于测试社交传感器信息传播模型的性能,如事件传播覆盖率、事件传递时间和事件传递率。与流行病模型相比,社会传感器信息传播模型在提高灾害事件中信息传播的效率和准确性方面表现出优异的性能。
{"title":"Research on disaster information dissemination based on social sensor networks","authors":"Shanshan Wan, Zhuo Chen, Cheng Lyu, Ruofan Li, Yuntao Yue, Y. Liu","doi":"10.1177/15501329221080666","DOIUrl":"https://doi.org/10.1177/15501329221080666","url":null,"abstract":"Sudden disaster events are usually unpredictable and uncontrollable, and how to achieve efficient and accurate disaster information dissemination is an important topic for society security. At present, social sensor networks which integrate human mobile sensors and traditional physical sensors are widely used in dealing with emergencies. Previous studies mainly focused on the impact of human mobility patterns on social sensor networks. In this article, based on the inherent autonomy property of human individuals, we propose a social sensor information dissemination model, which mainly focuses on the impact of the individual characteristics, social characteristics, and group information dissemination mode on social sensor networks. Specifically, the human sensor model is first constructed based on the inherent social and psychological attributes of human autonomy. Then, various information dissemination models such as one-to-one, one-to-many, and peer-to-peer are proposed by considering different transmission media and human interaction preferences. We simulate the environment of information dissemination in disaster events based on the NetLogo platform. Evaluation matrix is applied to test the performance of social sensor information dissemination model, such as event dissemination coverage, event delivery time, and event delivery rate. With the comparisons to epidemic model, social sensor information dissemination model shows excellent performance in improving the efficiency and accuracy of information transmission in disaster events.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47478869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A content awareness module for predictive lossless image compression to achieve high throughput data sharing over the network storage 用于预测无损图像压缩的内容感知模块,以实现通过网络存储的高吞吐量数据共享
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221083168
A. Rajput, Jianqiang Li, F. Akhtar, Zahid Hussain Khand, Jason C. Hung, Yan Pei, A. Börner
The idea of applying integer Reversible Colour Transform to increase compression ratios in lossless image compression is a well-established and widely used practice. Although various colour transformations have been introduced and investigated in the past two decades, the process of determining the best colour scheme in a reasonable time remains an open challenge. For instance, the overhead time (i.e. to determine a suitable colour transformation) of the traditional colour selector mechanism can take up to 50% of the actual compression time. To avoid such high overhead, usually, one pre-specified transformation is applied regardless of the nature of the image and/or correlation of the colour components. We propose a robust selection mechanism capable of reducing the overhead time to 20% of the actual compression time. It is postulated that implementing the proposed selection mechanism within the actual compression scheme such as JPEG-LS can further reduce the overhead time to 10%. In addition, the proposed scheme can also be extended to facilitate network-based compression–decompression mechanism over distributed systems.
在无损图像压缩中,利用整数可逆颜色变换提高压缩比的思想已经得到了广泛的应用。尽管在过去的二十年中已经引入和研究了各种颜色转换,但在合理的时间内确定最佳配色方案的过程仍然是一个开放的挑战。例如,传统颜色选择器机制的开销时间(即确定合适的颜色转换)可能占用实际压缩时间的50%。为了避免如此高的开销,通常,无论图像的性质和/或颜色成分的相关性如何,都应用一个预先指定的转换。我们提出了一种健壮的选择机制,能够将开销时间减少到实际压缩时间的20%。假设在实际的压缩方案(如JPEG-LS)中实现所提出的选择机制可以进一步将开销时间减少到10%。此外,该方案还可以扩展到分布式系统上基于网络的压缩-解压缩机制。
{"title":"A content awareness module for predictive lossless image compression to achieve high throughput data sharing over the network storage","authors":"A. Rajput, Jianqiang Li, F. Akhtar, Zahid Hussain Khand, Jason C. Hung, Yan Pei, A. Börner","doi":"10.1177/15501329221083168","DOIUrl":"https://doi.org/10.1177/15501329221083168","url":null,"abstract":"The idea of applying integer Reversible Colour Transform to increase compression ratios in lossless image compression is a well-established and widely used practice. Although various colour transformations have been introduced and investigated in the past two decades, the process of determining the best colour scheme in a reasonable time remains an open challenge. For instance, the overhead time (i.e. to determine a suitable colour transformation) of the traditional colour selector mechanism can take up to 50% of the actual compression time. To avoid such high overhead, usually, one pre-specified transformation is applied regardless of the nature of the image and/or correlation of the colour components. We propose a robust selection mechanism capable of reducing the overhead time to 20% of the actual compression time. It is postulated that implementing the proposed selection mechanism within the actual compression scheme such as JPEG-LS can further reduce the overhead time to 10%. In addition, the proposed scheme can also be extended to facilitate network-based compression–decompression mechanism over distributed systems.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":"37 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65535113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent control system of smart home for context awareness 智能家居环境感知智能控制系统
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221082030
Minbo Li, Yu Wu
In recent years, the rapid development of Internet of Things smart hardware has increased the demand for intelligent control of devices, mainly in the smart home industry. The framework to solve the problem of equipment intelligent control is studied. The advantages and disadvantages of existing context modeling strategies are analyzed. According to the characteristics of household context activities, combined with the design principles of graph databases, a new context modeling method based on object and attribute graph is proposed, which is suitable for Internet of Things scenarios with limited resources. Rule control, mode control, and voice control approaches of smart home interaction are designed. An inference engine is used to map the data of context awareness to the Internet of Things control services that executed automatic control of the system, and a framework of smart control system based on context awareness of Internet of Things is proposed. Considering the behavior habits of users, the concept of user preference is introduced to provide more personalized services. Performance tests with simulated data show that the new context modeling method has a faster system response time than the ontology modeling control mode.
近年来,物联网智能硬件的快速发展增加了对设备智能控制的需求,主要体现在智能家居行业。研究了解决设备智能控制问题的框架。分析了现有上下文建模策略的优缺点。根据家庭上下文活动的特点,结合图数据库的设计原则,提出了一种新的基于对象和属性图的上下文建模方法,适用于资源有限的物联网场景。设计了智能家居交互的规则控制、模式控制和语音控制方法。利用推理机将上下文感知数据映射到执行系统自动控制的物联网控制服务,提出了一种基于上下文感知的物联网智能控制系统框架。考虑到用户的行为习惯,引入了用户偏好的概念,以提供更个性化的服务。仿真数据的性能测试表明,新的上下文建模方法比本体建模控制模式具有更快的系统响应时间。
{"title":"Intelligent control system of smart home for context awareness","authors":"Minbo Li, Yu Wu","doi":"10.1177/15501329221082030","DOIUrl":"https://doi.org/10.1177/15501329221082030","url":null,"abstract":"In recent years, the rapid development of Internet of Things smart hardware has increased the demand for intelligent control of devices, mainly in the smart home industry. The framework to solve the problem of equipment intelligent control is studied. The advantages and disadvantages of existing context modeling strategies are analyzed. According to the characteristics of household context activities, combined with the design principles of graph databases, a new context modeling method based on object and attribute graph is proposed, which is suitable for Internet of Things scenarios with limited resources. Rule control, mode control, and voice control approaches of smart home interaction are designed. An inference engine is used to map the data of context awareness to the Internet of Things control services that executed automatic control of the system, and a framework of smart control system based on context awareness of Internet of Things is proposed. Considering the behavior habits of users, the concept of user preference is introduced to provide more personalized services. Performance tests with simulated data show that the new context modeling method has a faster system response time than the ontology modeling control mode.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46887648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks 人工智能物联网:分布式传感器网络的新范式
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501477211062835
K. Seng, L. Ang, Ericmoore Ngharamike
The advances and convergence in sensor, information processing, and communication technologies have shaped the Internet of Things of today. The rapid increase of data and service requirements brings new challenges for Internet of Thing. Emerging technologies and intelligent techniques can play a compelling role in prompting the development of intelligent architectures and services in Internet of Things to form the artificial intelligence Internet of Things. In this article, we give an introduction and review recent developments of artificial intelligence Internet of Things, the various artificial intelligence Internet of Things computational frameworks and highlight the challenges and opportunities for effective deployment of artificial intelligence Internet of Things technology to address complex problems for various applications. This article surveys the recent developments and discusses the convergence of artificial intelligence and Internet of Things from four aspects: (1) architectures, techniques, and hardware platforms for artificial intelligence Internet of Things; (2) sensors, devices, and energy approaches for artificial intelligence Internet of Things; (3) communication and networking for artificial intelligence Internet of Things; and (4) applications for artificial intelligence Internet of Things. The article also discusses the combination of smart sensors, edge computing, and software-defined networks as enabling technologies for the artificial intelligence Internet of Things.
传感器、信息处理和通信技术的进步和融合塑造了今天的物联网。数据和服务需求的快速增长给物联网带来了新的挑战。新兴技术和智能技术可以在推动物联网智能架构和服务的发展方面发挥引人注目的作用,形成人工智能物联网。在这篇文章中,我们介绍和回顾了人工智能物联网的最新发展,各种人工智能物联计算框架,并强调了有效部署人工智能物链技术以解决各种应用的复杂问题的挑战和机遇。本文从四个方面综述了人工智能和物联网的最新发展,并讨论了人工智能与物联网的融合:(1)人工智能物联网的体系结构、技术和硬件平台;(2) 人工智能物联网的传感器、设备和能源方法;(3) 人工智能物联网的通信和联网;以及(4)人工智能物联网应用。文章还讨论了智能传感器、边缘计算和软件定义网络的结合,作为人工智能物联网的赋能技术。
{"title":"Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks","authors":"K. Seng, L. Ang, Ericmoore Ngharamike","doi":"10.1177/15501477211062835","DOIUrl":"https://doi.org/10.1177/15501477211062835","url":null,"abstract":"The advances and convergence in sensor, information processing, and communication technologies have shaped the Internet of Things of today. The rapid increase of data and service requirements brings new challenges for Internet of Thing. Emerging technologies and intelligent techniques can play a compelling role in prompting the development of intelligent architectures and services in Internet of Things to form the artificial intelligence Internet of Things. In this article, we give an introduction and review recent developments of artificial intelligence Internet of Things, the various artificial intelligence Internet of Things computational frameworks and highlight the challenges and opportunities for effective deployment of artificial intelligence Internet of Things technology to address complex problems for various applications. This article surveys the recent developments and discusses the convergence of artificial intelligence and Internet of Things from four aspects: (1) architectures, techniques, and hardware platforms for artificial intelligence Internet of Things; (2) sensors, devices, and energy approaches for artificial intelligence Internet of Things; (3) communication and networking for artificial intelligence Internet of Things; and (4) applications for artificial intelligence Internet of Things. The article also discusses the combination of smart sensors, edge computing, and software-defined networks as enabling technologies for the artificial intelligence Internet of Things.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46530420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A case study of newly tunnels over-crossing the existing subway tunnels 以新建隧道跨越现有地铁隧道为例
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221087183
Ben Wu, Wei Liu, P. Shi, Xiangyang Xu, Yingjing Liu
Due to the continuous expansion of congested urban areas, many new tunnels are inevitable to over-cross the existing subway lines and may even affect the operation of existing lines. It is vital to investigate the response of existing tunnel caused by over-crossing tunneling. In this study, a case history of closely spaced twin tunnels excavated above the existing tunnels in soft soil stratum was presented. The deformation of the existing tunnels induced by the excavation of the new tunnels was automatically monitored. In-situ monitoring results showed that the vertical displacement of the existing tunnels was mainly uplift and its development showed obvious phase characteristics. The increase rate of the vertical displacement in Phase I and II induced by the second over-crossing was smaller than that of the first over-crossing. A superposition method was employed to describe the uplift section characteristics of the existing tunnels. The influence ranges of tunnel excavation on the left and right lines of the existing tunnels were approximately 5.5D and 4.5D, respectively. The torsional deformation of the rail bed and the convergence of the existing tunnels are explored, and the reasons for the changes of the over-crossing sections are analyzed at the same time.
由于城市拥挤地区的不断扩大,许多新建隧道不可避免地要与现有地铁线路交叉,甚至可能影响现有地铁线路的运行。研究跨隧道施工对既有隧道的响应具有重要意义。本文介绍了软土地层中在既有隧道之上开挖密距双隧道的实例。对新隧道开挖引起的既有隧道变形进行了自动监测。现场监测结果表明,既有隧道竖向位移以上拔为主,其发展具有明显的阶段性特征。第2次过桥引起的第1期和第2期垂直位移增幅小于第1次过桥。采用叠加法对既有隧道的上拔断面特征进行了描述。隧道开挖对既有隧道左右线的影响范围分别约为5.5D和4.5D。探讨了轨道床的扭转变形和既有隧道的收敛,同时分析了跨断面变化的原因。
{"title":"A case study of newly tunnels over-crossing the existing subway tunnels","authors":"Ben Wu, Wei Liu, P. Shi, Xiangyang Xu, Yingjing Liu","doi":"10.1177/15501329221087183","DOIUrl":"https://doi.org/10.1177/15501329221087183","url":null,"abstract":"Due to the continuous expansion of congested urban areas, many new tunnels are inevitable to over-cross the existing subway lines and may even affect the operation of existing lines. It is vital to investigate the response of existing tunnel caused by over-crossing tunneling. In this study, a case history of closely spaced twin tunnels excavated above the existing tunnels in soft soil stratum was presented. The deformation of the existing tunnels induced by the excavation of the new tunnels was automatically monitored. In-situ monitoring results showed that the vertical displacement of the existing tunnels was mainly uplift and its development showed obvious phase characteristics. The increase rate of the vertical displacement in Phase I and II induced by the second over-crossing was smaller than that of the first over-crossing. A superposition method was employed to describe the uplift section characteristics of the existing tunnels. The influence ranges of tunnel excavation on the left and right lines of the existing tunnels were approximately 5.5D and 4.5D, respectively. The torsional deformation of the rail bed and the convergence of the existing tunnels are explored, and the reasons for the changes of the over-crossing sections are analyzed at the same time.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48727531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A security detection approach based on autonomy-oriented user sensor in social recommendation network 社交推荐网络中一种基于自主用户传感器的安全检测方法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221082415
Shanshan Wan, Y. Liu
User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.
基于用户社交网络的推荐系统在当前的推荐领域取得了显著的成绩。然而,开放性的特点给推荐系统的安全性带来了极大的隐患。Shilling攻击者可以通过查找用户关系来更改推荐。大多数先令攻击检测方法都依赖于明确的用户历史数据来定位先令攻击者。社交网络中的一些重要特征,如信息传播和用户的社交反馈,没有被注意到。我们提出了一种基于面向自主的用户传感器(AOUSD)的安全检测方法来识别先令攻击者。具体而言,(1)将用户模拟为具有自主能力的社交传感器,(2)基于社交传感器的信息传播、信息反馈和信息消失机制建立用户交互模型,并考虑可变时间函数形成用户动态知识图,(3)采用层次聚类方法生成初步的可疑候选群,并在动态知识图上应用图社区检测聚类方法检测攻击者。然后,首先在NetLogo上对AOUSD进行了仿真,并与其他基于亚马逊数据的算法进行了比较。结果证明了AOUSD在先令攻击检测的效率和准确性方面的优势。
{"title":"A security detection approach based on autonomy-oriented user sensor in social recommendation network","authors":"Shanshan Wan, Y. Liu","doi":"10.1177/15501329221082415","DOIUrl":"https://doi.org/10.1177/15501329221082415","url":null,"abstract":"User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47658399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the vulnerability in the inference phase of advanced persistent threats 探索高级持续威胁推断阶段的漏洞
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221080417
Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng
In recent years, the Internet of Things has been widely used in modern life. Advanced persistent threats are long-term network attacks on specific targets with attackers using advanced attack methods. The Internet of Things targets have also been threatened by advanced persistent threats with the widespread application of Internet of Things. The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning methods whether host-based detection or network-based detection. However, models using machine learning methods lack robustness because it can be attacked easily by adversarial examples. In this article, we summarize the characteristics of advanced persistent threats traffic and propose the algorithm to make adversarial examples for the advanced persistent threat detection model. We first train advanced persistent threat detection models using different machine learning methods, among which the highest F1-score is 0.9791. Then, we use the algorithm proposed to grey-box attack one of models and the detection success rate of the model drop from 98.52% to 1.47%. We prove that advanced persistent threats adversarial examples are transitive and we successfully black-box attack other models according to this. The detection success rate of the attacked model with the best attacked effect dropped from 98.66% to 0.13%.
近年来,物联网在现代生活中得到了广泛应用。高级持续威胁是指攻击者采用高级攻击手段,对特定目标进行的长期网络攻击。随着物联网的广泛应用,物联网目标也受到了高级持续性威胁的威胁。传感器等物联网设备的安全性弱于主机。在高级持续威胁检测领域,无论是基于主机的检测还是基于网络的检测,大多数工作都使用了机器学习方法。然而,使用机器学习方法的模型缺乏鲁棒性,因为它很容易被对抗性示例攻击。在本文中,我们总结了高级持续威胁流量的特点,并提出了为高级持续威胁检测模型制作对抗示例的算法。我们首先使用不同的机器学习方法训练高级持续威胁检测模型,其中f1得分最高为0.9791。然后,我们使用提出的算法对其中一个模型进行灰盒攻击,模型的检测成功率从98.52%下降到1.47%。我们证明了高级持续威胁的对抗例子是可传递的,并在此基础上成功地对其他模型进行了黑盒攻击。攻击效果最好的被攻击模型的检测成功率从98.66%下降到0.13%。
{"title":"Exploring the vulnerability in the inference phase of advanced persistent threats","authors":"Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng","doi":"10.1177/15501329221080417","DOIUrl":"https://doi.org/10.1177/15501329221080417","url":null,"abstract":"In recent years, the Internet of Things has been widely used in modern life. Advanced persistent threats are long-term network attacks on specific targets with attackers using advanced attack methods. The Internet of Things targets have also been threatened by advanced persistent threats with the widespread application of Internet of Things. The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning methods whether host-based detection or network-based detection. However, models using machine learning methods lack robustness because it can be attacked easily by adversarial examples. In this article, we summarize the characteristics of advanced persistent threats traffic and propose the algorithm to make adversarial examples for the advanced persistent threat detection model. We first train advanced persistent threat detection models using different machine learning methods, among which the highest F1-score is 0.9791. Then, we use the algorithm proposed to grey-box attack one of models and the detection success rate of the model drop from 98.52% to 1.47%. We prove that advanced persistent threats adversarial examples are transitive and we successfully black-box attack other models according to this. The detection success rate of the attacked model with the best attacked effect dropped from 98.66% to 0.13%.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44427350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks 软件定义无线传感器网络中基于乘加权voronoi的传感器协同重新部署
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501477211069903
Minghua Wang, Ran Ou, Yan Wang
Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. In this article, we first develop an original confident information coverage–based multiplicatively weighted Voronoi diagram through sensor clustering and sensor collaborative sensing. And then, we propose two sensor collaborative redeployment algorithms based on the novel confident information coverage–based multiplicatively weighted Voronoi diagram and software-defined wireless sensor networks architecture to provide high-confidence coverage and improve the coverage ratio. Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.
大规模部署的移动无线传感器网络已被广泛应用于一些危险和敌对的城市安全监控场景。作为一种新的网络架构,软件定义网络被引入无线传感器网络中,形成了一个新的软件定义无线传感器网络,以解决传感器网络均衡大规模部署的问题,简化网络管理的复杂性。在本文中,我们首先通过传感器聚类和传感器协作感知,开发了一个基于原始置信信息覆盖率的乘法加权Voronoi图。然后,我们提出了两种基于新的基于置信信息覆盖的乘法加权Voronoi图和软件定义的无线传感器网络架构的传感器协同重新部署算法,以提供高置信覆盖并提高覆盖率。最后,我们通过一系列实验证明了基于置信信息覆盖的乘法加权Voronoi图的优越性以及我们提出的算法的有效性和效率。
{"title":"Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks","authors":"Minghua Wang, Ran Ou, Yan Wang","doi":"10.1177/15501477211069903","DOIUrl":"https://doi.org/10.1177/15501477211069903","url":null,"abstract":"Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. In this article, we first develop an original confident information coverage–based multiplicatively weighted Voronoi diagram through sensor clustering and sensor collaborative sensing. And then, we propose two sensor collaborative redeployment algorithms based on the novel confident information coverage–based multiplicatively weighted Voronoi diagram and software-defined wireless sensor networks architecture to provide high-confidence coverage and improve the coverage ratio. Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43208309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A controllable privacy data transmission mechanism for Internet of things system based on blockchain 基于区块链的物联网系统隐私数据传输机制
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221088450
Zixiang Nie, YuanZhenTai Long, Senlin Zhang, Yueming Lu
With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated from various application scenarios. Structural health monitoring is a scene that requires recurrent data transmission in Internet of things, and the wireless sensor networks in Internet of things not only have storage and communication capabilities, but also have computing capabilities. Therefore, the demand for intelligent and decentralized data exchange between them has increased significantly which brings challenges with respect to low data reliability, chaotic data circulation, provenance tracking, and data accountability investigating, threatening the data security of structural health monitoring in Internet of things utilization. In this article, we propose a controllable data transmission mechanism based on the consortium blockchain to content the requirements of the Internet of things scenario. We identify a version-based, fine-grained, and privacy-protected data structure and propose the corresponding smart contracts for our mechanism to ensure the trusted data transmission. To prove the feasibility of our mechanism, a prototype system is implemented based on the Hyperledger Fabric, an open-source consortium blockchain framework. Our experimental results show in practice the usability and scalability of the approach in this article.
随着传统产业与物联网信息技术的深度融合,无线传感器网络被更频繁地用于传输各种应用场景产生的数据。结构健康监测是物联网中需要重复数据传输的场景,而物联网中的无线传感器网络不仅具有存储和通信能力,还具有计算能力。因此,它们之间对智能化和去中心化数据交换的需求显著增加,这给数据可靠性低、数据流通混乱、来源跟踪和数据问责调查带来了挑战,威胁到物联网应用中结构健康监测的数据安全。在本文中,我们提出了一种基于联盟区块链的可控数据传输机制,以满足物联网场景的要求。我们确定了一个基于版本、细粒度和隐私保护的数据结构,并为我们的机制提出了相应的智能合约,以确保可信的数据传输。为了证明我们机制的可行性,基于开源联盟区块链框架Hyperledger Fabric实现了一个原型系统。我们的实验结果在实践中表明了本文方法的可用性和可扩展性。
{"title":"A controllable privacy data transmission mechanism for Internet of things system based on blockchain","authors":"Zixiang Nie, YuanZhenTai Long, Senlin Zhang, Yueming Lu","doi":"10.1177/15501329221088450","DOIUrl":"https://doi.org/10.1177/15501329221088450","url":null,"abstract":"With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated from various application scenarios. Structural health monitoring is a scene that requires recurrent data transmission in Internet of things, and the wireless sensor networks in Internet of things not only have storage and communication capabilities, but also have computing capabilities. Therefore, the demand for intelligent and decentralized data exchange between them has increased significantly which brings challenges with respect to low data reliability, chaotic data circulation, provenance tracking, and data accountability investigating, threatening the data security of structural health monitoring in Internet of things utilization. In this article, we propose a controllable data transmission mechanism based on the consortium blockchain to content the requirements of the Internet of things scenario. We identify a version-based, fine-grained, and privacy-protected data structure and propose the corresponding smart contracts for our mechanism to ensure the trusted data transmission. To prove the feasibility of our mechanism, a prototype system is implemented based on the Hyperledger Fabric, an open-source consortium blockchain framework. Our experimental results show in practice the usability and scalability of the approach in this article.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45618609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Second-degree branch structure blockchain expansion model 二度分支结构区块链展开模型
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501477211064755
Qiang Liu, Baoyan Song, Junlu Wang
The blockchain runs in a complex topological network which is affected by the principle of consensus, and data storage between nodes needs to maintain global consistency in the entire network, which causes the data storage inefficient. At the same time, the information exchange between large-scale communication node groups leads to the problems of bandwidth expropriation and excessive network load. In response to these problems, this article proposes a second-degree branch structure blockchain expansion model. First, a ternary storage structure is established. Data use the way of fully integrated storage, multi-cell storage, and fully split storage, and data are classified and stored in parallel between the structures. Second, a second-degree branch chain model is constructed. The main chain forks into multiple sub-chains, and a free competition chain structure and a Z-type chain structure are defined; a two-way rotation mechanism is introduced to realize the integration and transition between chain structures. Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. Experiment shows that the second-degree branch structure expansion model proposed in this article has great advantages in data storage efficiency and network load.
区块链运行在一个受共识原则影响的复杂拓扑网络中,节点之间的数据存储需要在整个网络中保持全局一致性,这导致数据存储效率低下。同时,大规模通信节点群之间的信息交换导致了带宽占用和网络负载过大的问题。针对这些问题,本文提出了二级分支结构的区块链扩展模型。首先,建立了三元存储结构。数据采用完全集成存储、多单元存储和完全拆分存储的方式,数据在结构之间并行分类存储。其次,建立了二阶分支链模型。主链分叉为多个子链,定义了自由竞争链结构和Z型链结构;介绍了一种双向旋转机构,实现了链结构之间的集成和过渡。最后,模拟了一组恶意攻击,实现了区块链的安全约束,验证了二级分支链模型的安全性。实验表明,本文提出的二阶分支结构扩展模型在数据存储效率和网络负载方面具有很大的优势。
{"title":"Second-degree branch structure blockchain expansion model","authors":"Qiang Liu, Baoyan Song, Junlu Wang","doi":"10.1177/15501477211064755","DOIUrl":"https://doi.org/10.1177/15501477211064755","url":null,"abstract":"The blockchain runs in a complex topological network which is affected by the principle of consensus, and data storage between nodes needs to maintain global consistency in the entire network, which causes the data storage inefficient. At the same time, the information exchange between large-scale communication node groups leads to the problems of bandwidth expropriation and excessive network load. In response to these problems, this article proposes a second-degree branch structure blockchain expansion model. First, a ternary storage structure is established. Data use the way of fully integrated storage, multi-cell storage, and fully split storage, and data are classified and stored in parallel between the structures. Second, a second-degree branch chain model is constructed. The main chain forks into multiple sub-chains, and a free competition chain structure and a Z-type chain structure are defined; a two-way rotation mechanism is introduced to realize the integration and transition between chain structures. Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. Experiment shows that the second-degree branch structure expansion model proposed in this article has great advantages in data storage efficiency and network load.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43170182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1