首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things 物联网环境下多域协同通信网络的演化建模与鲁棒性分析
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-01 DOI: 10.1177/15501329221135160
Jianrong Wang, P. Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang
In the future, the Internet of things will reduce the cell radius and increase the number of low-power nodes to support thousands of times of traffic growth under 5G. As a virtual multiple input multiple output technology, cooperative communication technology can solve these problems effectively. According to the evolution characteristics of cooperative communication networks, a multi-domain cooperative communication network evolution model with preferential attachment and random attachment is constructed in this article. And then, the network properties and robustness are analyzed using the mean-field method and different attacks. Aiming at the resource constraints and resource allocation problems of communication nodes, a relay selection strategy based on the combination of maximum degree and minimum clustering coefficient is proposed. The simulation results show that the relay node selection strategy based on the combination of maximum degree and minimum clustering coefficient has significant advantages in selection steps and selection time, which greatly enhanced the performance of relay selection in multi-domain cooperative communication networks. Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.
未来,物联网将缩小小区半径,增加低功耗节点数量,以支持5G下数千倍的流量增长。协同通信技术作为一种虚拟多输入多输出技术,可以有效地解决这些问题。根据合作通信网络的演化特点,构建了一个具有优先附着和随机附着的多域合作通信网络演化模型。然后,使用平均场方法和不同的攻击对网络的性能和鲁棒性进行了分析。针对通信节点的资源约束和资源分配问题,提出了一种基于最大度和最小聚类系数相结合的中继选择策略。仿真结果表明,基于最大度和最小聚类系数相结合的中继节点选择策略在选择步骤和选择时间上具有显著优势,大大提高了多域协作通信网络中中继节点的选择性能。通过对多域协同通信网络性能和安全指标的实时监测和更新,为物联网协同通信系统的节点部署和安全管理提供了有力保障。
{"title":"Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things","authors":"Jianrong Wang, P. Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang","doi":"10.1177/15501329221135160","DOIUrl":"https://doi.org/10.1177/15501329221135160","url":null,"abstract":"In the future, the Internet of things will reduce the cell radius and increase the number of low-power nodes to support thousands of times of traffic growth under 5G. As a virtual multiple input multiple output technology, cooperative communication technology can solve these problems effectively. According to the evolution characteristics of cooperative communication networks, a multi-domain cooperative communication network evolution model with preferential attachment and random attachment is constructed in this article. And then, the network properties and robustness are analyzed using the mean-field method and different attacks. Aiming at the resource constraints and resource allocation problems of communication nodes, a relay selection strategy based on the combination of maximum degree and minimum clustering coefficient is proposed. The simulation results show that the relay node selection strategy based on the combination of maximum degree and minimum clustering coefficient has significant advantages in selection steps and selection time, which greatly enhanced the performance of relay selection in multi-domain cooperative communication networks. Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41601399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain entity identity association analysis and prediction based on representation learning 基于表示学习的跨领域实体身份关联分析与预测
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-01 DOI: 10.1177/15501329221135060
Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu
Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying mapping, threat tracking, and intelligent recommendation. This task usually adds additional difficulty to the research in practical applications due to the need to link across multiple platforms. The existing entity identity association methods in cross-domain networks mainly use the attribute information, generated content, and network structure information of network user entities but do not fully use the inherent strong positioning characteristics of active nodes in the network. In this article, we analyzed the structural characteristics of existing relational networks. We found that the hub node has the role of identity association positioning, and the importance of identity association reflected by different nodes is different. Moreover, we creatively designed a network representation learning method. We proposed a supervised learning identity association model combined with a representation learning method. Experiments on the public data set show that using the identity association method proposed in this article, the ranking accuracy of user entity association similarity is about 30% and 25% higher than the existing two typical methods.
网络实体的跨域身份关联是物联网中物间关系发现和服务推荐、网络空间资源测绘、威胁跟踪、智能推荐等方面的重要研究课题和重要应用价值。由于该任务需要跨多个平台的链接,通常会给实际应用中的研究增加额外的难度。现有的跨域网络实体身份关联方法主要利用网络用户实体的属性信息、生成内容和网络结构信息,没有充分利用网络中活动节点固有的强定位特性。在本文中,我们分析了现有关系网络的结构特征。我们发现枢纽节点具有身份关联定位的作用,不同节点所反映的身份关联重要性不同。此外,我们创造性地设计了一种网络表示学习方法。提出了一种结合表征学习方法的监督学习身份关联模型。在公共数据集上的实验表明,使用本文提出的身份关联方法,用户实体关联相似度的排序准确率比现有两种典型方法分别提高了30%和25%左右。
{"title":"Cross-domain entity identity association analysis and prediction based on representation learning","authors":"Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu","doi":"10.1177/15501329221135060","DOIUrl":"https://doi.org/10.1177/15501329221135060","url":null,"abstract":"Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying mapping, threat tracking, and intelligent recommendation. This task usually adds additional difficulty to the research in practical applications due to the need to link across multiple platforms. The existing entity identity association methods in cross-domain networks mainly use the attribute information, generated content, and network structure information of network user entities but do not fully use the inherent strong positioning characteristics of active nodes in the network. In this article, we analyzed the structural characteristics of existing relational networks. We found that the hub node has the role of identity association positioning, and the importance of identity association reflected by different nodes is different. Moreover, we creatively designed a network representation learning method. We proposed a supervised learning identity association model combined with a representation learning method. Experiments on the public data set show that using the identity association method proposed in this article, the ranking accuracy of user entity association similarity is about 30% and 25% higher than the existing two typical methods.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47701323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges 异构网络中的上行非正交多址:最新进展和开放研究挑战综述
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-01 DOI: 10.1177/15501329221132496
B. Rehman, M. I. Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, Gamil Abdel Azim
Fifth-generation wireless communications provide several benefits, including high throughput, lower latency, massive connectivity, considerable improvement in the number of users, higher base station capacity, and achieved quality of service. Non-orthogonal multiple access, an effective approach for sharing the same radio resources, has been highlighted as a viable technology in the fifth-generation wireless networks to achieve the demands of available bandwidth, user connectivity, and application latency. Non-orthogonal multiple access and heterogeneous networks have recently emerged as promising network infrastructures for enhancing the spectrum capacity and accommodating more users by sharing the same resources with high throughput. This potential capability has made the non-orthogonal multiple access–enabled heterogeneous networks a new research topic in the modern era. In this survey, the concept of non-orthogonal multiple access and its significance in different emerging technologies has been well explored. Furthermore, this survey covers a systematic overview of the state-of the-art techniques based on non-orthogonal multiple access–enabled heterogeneous networks and devising taxonomy for uplink non-orthogonal multiple access–enabled heterogeneous networks. In addition, this survey provides critical insights and identifies several open research challenges considering the uplink non-orthogonal multiple access–enabled heterogeneous networks.
第五代无线通信提供了几个优点,包括高吞吐量、低延迟、大量连接、用户数量的显著改进、更高的基站容量和实现的服务质量。非正交多址是一种共享相同无线资源的有效方法,已成为第五代无线网络中实现可用带宽、用户连接和应用延迟需求的可行技术。非正交多址网络和异构网络是近年来发展起来的一种很有前途的网络基础设施,可以通过高吞吐量共享相同的资源来提高频谱容量和容纳更多的用户。这种潜在的性能使得非正交多址异构网络成为当今时代新的研究课题。本文探讨了非正交多址的概念及其在不同新兴技术中的意义。此外,本调查还系统概述了基于非正交多址异构网络的最新技术,并为上行非正交多址异构网络设计分类。此外,本调查还提供了重要的见解,并确定了考虑上行链路非正交多址异构网络的几个开放研究挑战。
{"title":"Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges","authors":"B. Rehman, M. I. Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, Gamil Abdel Azim","doi":"10.1177/15501329221132496","DOIUrl":"https://doi.org/10.1177/15501329221132496","url":null,"abstract":"Fifth-generation wireless communications provide several benefits, including high throughput, lower latency, massive connectivity, considerable improvement in the number of users, higher base station capacity, and achieved quality of service. Non-orthogonal multiple access, an effective approach for sharing the same radio resources, has been highlighted as a viable technology in the fifth-generation wireless networks to achieve the demands of available bandwidth, user connectivity, and application latency. Non-orthogonal multiple access and heterogeneous networks have recently emerged as promising network infrastructures for enhancing the spectrum capacity and accommodating more users by sharing the same resources with high throughput. This potential capability has made the non-orthogonal multiple access–enabled heterogeneous networks a new research topic in the modern era. In this survey, the concept of non-orthogonal multiple access and its significance in different emerging technologies has been well explored. Furthermore, this survey covers a systematic overview of the state-of the-art techniques based on non-orthogonal multiple access–enabled heterogeneous networks and devising taxonomy for uplink non-orthogonal multiple access–enabled heterogeneous networks. In addition, this survey provides critical insights and identifies several open research challenges considering the uplink non-orthogonal multiple access–enabled heterogeneous networks.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":"18 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65535455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine learning for Internet of things anomaly detection under low-quality data 低质量数据下物联网异常检测的机器学习
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-01 DOI: 10.1177/15501329221133765
Shangbin Han, Qianhong Wu, Yang Yang
With the popularization of Internet of things, its network security has aroused widespread concern. Anomaly detection is one of the important technologies to protect network security. To meet the needs of automatic and intelligent detection, supervised machine learning is widely used in anomaly detection. However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. Therefore, practitioners may not know which algorithm to choose due to the lack of review and evaluation of anomaly detection methods under low-quality data. To address this problem, we give a detailed review and evaluation of six supervised anomaly detection methods, as well as release the core code of feature extractor for pcap format traffic traces and anomaly detection methods for reuse. We evaluate the methods on two public datasets (one is a simulated network dataset and the other is a real Internet of things dataset). We believe that our work and insights will help practitioners quickly understand and develop anomaly detection schemes for Internet of things and can provide reference for future research.
随着物联网的普及,其网络安全问题引起了广泛关注。异常检测是保障网络安全的重要技术之一。为了满足自动化和智能化检测的需要,监督式机器学习在异常检测中得到了广泛的应用。然而,现有的检测方案忽略了数据质量问题,导致实际检测效果不理想。因此,由于缺乏对低质量数据下异常检测方法的审查和评价,从业者可能不知道该选择哪种算法。为了解决这一问题,我们对六种监督异常检测方法进行了详细的回顾和评价,并发布了pcap格式流量轨迹特征提取器的核心代码和异常检测方法,以供重用。我们在两个公共数据集(一个是模拟的网络数据集,另一个是真实的物联网数据集)上对方法进行了评估。我们相信我们的工作和见解将帮助从业者快速理解和制定物联网异常检测方案,并为未来的研究提供参考。
{"title":"Machine learning for Internet of things anomaly detection under low-quality data","authors":"Shangbin Han, Qianhong Wu, Yang Yang","doi":"10.1177/15501329221133765","DOIUrl":"https://doi.org/10.1177/15501329221133765","url":null,"abstract":"With the popularization of Internet of things, its network security has aroused widespread concern. Anomaly detection is one of the important technologies to protect network security. To meet the needs of automatic and intelligent detection, supervised machine learning is widely used in anomaly detection. However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. Therefore, practitioners may not know which algorithm to choose due to the lack of review and evaluation of anomaly detection methods under low-quality data. To address this problem, we give a detailed review and evaluation of six supervised anomaly detection methods, as well as release the core code of feature extractor for pcap format traffic traces and anomaly detection methods for reuse. We evaluate the methods on two public datasets (one is a simulated network dataset and the other is a real Internet of things dataset). We believe that our work and insights will help practitioners quickly understand and develop anomaly detection schemes for Internet of things and can provide reference for future research.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41793024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey on authentication and security protocols and schemes over 5G networks 5G网络认证与安全协议与方案研究
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-01 DOI: 10.1177/15501329221126609
Yahya M. Tashtoush, Dirar A. Darweesh, Ola Karajeh, Omar M. Darwish, Majdi Maabreh, Safa Swedat, Rawan Koraysh, O. Almousa, Nasser Alsaedi
The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.
第五代网络的出现为物联网环境的广泛传播打开了大门。到2025年,连接到第五代网络的设备数量预计将增加到17亿用户以上。每年,数百万台现代设备在开学和假期后上线,你甚至可以注意到物联网设备的宣传随着季节的变化而变化。如今,这些设备被认为对我们的日常生活非常重要。这是因为他们为我们的家庭供电,组织我们的工作,让通信更合适。由于连接到第五代网络的设备数量不断增加,保护这些物联网设备免受不同类型网络攻击的必要性也随之增加。为此,许多研究人员提出了不同的协议和方案来实现物联网设备的安全。本文介绍了不同领域研究人员提出的一些协议的概况,并从它们的类别、认证过程、评估方法、优势、目标、发展年份以及在物联网环境中的应用等方面对它们进行了比较研究。这项调查的目的是为研究人员提供有关这些协议及其在物联网系统中的使用的丰富信息,无论它们是否可以用于云无线电接入网络、物联网通用、电信系统、电子医疗系统或无人机交付服务系统。它还可以帮助他们根据物联网系统的类型选择合适的协议。
{"title":"Survey on authentication and security protocols and schemes over 5G networks","authors":"Yahya M. Tashtoush, Dirar A. Darweesh, Ola Karajeh, Omar M. Darwish, Majdi Maabreh, Safa Swedat, Rawan Koraysh, O. Almousa, Nasser Alsaedi","doi":"10.1177/15501329221126609","DOIUrl":"https://doi.org/10.1177/15501329221126609","url":null,"abstract":"The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network 一种改进的双宿架构,具有改进的媒体访问控制协议、能量感知和服务质量保证的无线体域网络路由算法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-01 DOI: 10.1177/15501329221102372
A. Ibrahim
To reduce frequent sensor recharging and replacement due to resource constraint, it becomes imperative to increase the management of energy and network’s quality of service. To this end, this article provides a new wireless body sensor network architecture with two sink nodes and multiple energy management and quality-of-service algorithms. The first algorithm is the normal data avoidance algorithm that is responsible for decreasing the energy usage by avoiding the transmission of normal data. Duplicate data avoidance algorithm avoid transmitting duplicate data thus saving the bandwidth and battery life. Past knowledge-based weighted routing algorithm oversees taking the ideal direction to transmit information, hence improving quality of service. Furthermore, sleep scheduling is integrated to further improve the battery life. In addition, in our proposed model, linear programming which is based on mathematical models was used to model the network lifetime maximization and continuous data transmission minimization. Through simulation in Castalia-based OMNeT++ demonstrates that our proposed work outperforms the works of quasi-sleep-preempt-supported with regard to network lifetime and delay with 50% and 30% improvement, respectively, moreover, it improves the work of critical data with respect to packet drop and throughput with 30% and 75% improvement, respectively.
为了减少由于资源限制而导致的频繁传感器充电和更换,必须加强能源管理和网络服务质量。为此,本文提供了一种新的无线身体传感器网络架构,该架构具有两个汇聚节点和多种能量管理和服务质量算法。第一种算法是正常数据避免算法,其负责通过避免正常数据的传输来减少能量使用。重复数据避免算法避免传输重复数据,从而节省带宽和电池寿命。过去基于知识的加权路由算法监督信息传输的理想方向,从而提高服务质量。此外,还集成了睡眠调度,以进一步提高电池寿命。此外,在我们提出的模型中,基于数学模型的线性规划被用于对网络寿命最大化和连续数据传输最小化进行建模。通过在基于Castalia的OMNeT++中的仿真,表明我们提出的工作在网络寿命和延迟方面分别比支持的准睡眠抢占工作提高了50%和30%,并且在丢包和吞吐量方面分别提高了30%和75%。
{"title":"An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network","authors":"A. Ibrahim","doi":"10.1177/15501329221102372","DOIUrl":"https://doi.org/10.1177/15501329221102372","url":null,"abstract":"To reduce frequent sensor recharging and replacement due to resource constraint, it becomes imperative to increase the management of energy and network’s quality of service. To this end, this article provides a new wireless body sensor network architecture with two sink nodes and multiple energy management and quality-of-service algorithms. The first algorithm is the normal data avoidance algorithm that is responsible for decreasing the energy usage by avoiding the transmission of normal data. Duplicate data avoidance algorithm avoid transmitting duplicate data thus saving the bandwidth and battery life. Past knowledge-based weighted routing algorithm oversees taking the ideal direction to transmit information, hence improving quality of service. Furthermore, sleep scheduling is integrated to further improve the battery life. In addition, in our proposed model, linear programming which is based on mathematical models was used to model the network lifetime maximization and continuous data transmission minimization. Through simulation in Castalia-based OMNeT++ demonstrates that our proposed work outperforms the works of quasi-sleep-preempt-supported with regard to network lifetime and delay with 50% and 30% improvement, respectively, moreover, it improves the work of critical data with respect to packet drop and throughput with 30% and 75% improvement, respectively.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42986107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing 移动众测中基于任务属性的意愿感知用户招募策略
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221123531
Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang
With the powerful sensing, computing capabilities of mobile devices, large-scale users with smart devices throughout the city would be the perfect carrier for the people-centric scheme, namely, mobile crowdsensing. Mobile crowdsensing has become a versatile platform for many Internet of things applications in urban scenarios. So how to select the appropriate users to complete the tasks and ensure the quality of the tasks has been a huge challenge for mobile crowdsensing. In this article, we propose a willingness-aware user recruitment strategy based on the task attributes to solve this problem. First, we divide the whole sensing region based on task attributes by a weighted Voronoi diagram and conduct the assessment about the sub-regions according to several parameters, and then categorize sub-regions as hot regions and blank regions. Moreover, we analyze the influence of user willingness on user recruitment and the task completion rate and assess the coverage ability of the users. Finally, we use the greedy method to optimize the user recruitment for each task to select the most suitable users for the tasks. Simulation results show that the willingness-aware user recruitment approach can significantly improve the task completion rate and achieve higher task coverage quality compared with other algorithms.
凭借移动设备强大的传感和计算能力,在整个城市拥有智能设备的大规模用户将成为以人为本方案的完美载体,即移动众感。移动众筹已经成为城市场景中许多物联网应用的通用平台。因此,如何选择合适的用户来完成任务并确保任务的质量一直是移动众感面临的巨大挑战。在本文中,我们提出了一种基于任务属性的意愿感知用户招募策略来解决这个问题。首先,我们用加权Voronoi图根据任务属性划分整个感知区域,并根据几个参数对子区域进行评估,然后将子区域分为热点区域和空白区域。此外,我们分析了用户意愿对用户招募和任务完成率的影响,并评估了用户的覆盖能力。最后,我们使用贪婪方法对每个任务的用户招募进行优化,以选择最适合该任务的用户。仿真结果表明,与其他算法相比,基于意愿感知的用户招募方法可以显著提高任务完成率,实现更高的任务覆盖质量。
{"title":"A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing","authors":"Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang","doi":"10.1177/15501329221123531","DOIUrl":"https://doi.org/10.1177/15501329221123531","url":null,"abstract":"With the powerful sensing, computing capabilities of mobile devices, large-scale users with smart devices throughout the city would be the perfect carrier for the people-centric scheme, namely, mobile crowdsensing. Mobile crowdsensing has become a versatile platform for many Internet of things applications in urban scenarios. So how to select the appropriate users to complete the tasks and ensure the quality of the tasks has been a huge challenge for mobile crowdsensing. In this article, we propose a willingness-aware user recruitment strategy based on the task attributes to solve this problem. First, we divide the whole sensing region based on task attributes by a weighted Voronoi diagram and conduct the assessment about the sub-regions according to several parameters, and then categorize sub-regions as hot regions and blank regions. Moreover, we analyze the influence of user willingness on user recruitment and the task completion rate and assess the coverage ability of the users. Finally, we use the greedy method to optimize the user recruitment for each task to select the most suitable users for the tasks. Simulation results show that the willingness-aware user recruitment approach can significantly improve the task completion rate and achieve higher task coverage quality compared with other algorithms.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44512970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system 基于多传感器系统的越南桥梁结构健康监测中随机振动信号的PSD特性
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221125110
Thanh Q. Nguyen, Tuan-Anh Nguyen, Thuy T. Nguyen
This study proposes two parameters, including the appearance frequency of harmonics (AFH) and the change in shape of the power spectral density (PSD), which are examined to assess the decline in stiffness of a bridge span. PSDs are obtained from the real vibration signals of the randomized traffic load model based on accelerometer multi-sensors that indicate the change in mechanical behavior of the structure over time. In addition, AFHs evaluate the workability of the structure. With these parameters in mind, actual vibrations in real beam structures are studied with the aim of using structural health monitoring to assess the bearing capacity reduction on Saigon Bridge’s spans. The results show that AFHs and the high-frequency regions relate to the decreased stiffness of the bridge’s spans over a given period of time. In the future, this research can be used to monitor structural health for various types of structure materials and many different bridge spans.
本研究提出了两个参数,包括谐波出现频率(AFH)和功率谱密度(PSD)的形状变化,这两个参数被用来评估桥梁跨距刚度的下降。psd是基于加速度计多传感器随机交通荷载模型的真实振动信号,反映了结构的力学行为随时间的变化。此外,AFHs还评估了结构的可加工性。考虑到这些参数,研究了实际梁结构的实际振动,目的是利用结构健康监测来评估西贡大桥跨径的承载能力降低。结果表明,在一定时间内,afh和高频区域与桥梁的刚度下降有关。在未来,该研究可用于监测各种类型的结构材料和许多不同的桥梁跨度的结构健康。
{"title":"PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system","authors":"Thanh Q. Nguyen, Tuan-Anh Nguyen, Thuy T. Nguyen","doi":"10.1177/15501329221125110","DOIUrl":"https://doi.org/10.1177/15501329221125110","url":null,"abstract":"This study proposes two parameters, including the appearance frequency of harmonics (AFH) and the change in shape of the power spectral density (PSD), which are examined to assess the decline in stiffness of a bridge span. PSDs are obtained from the real vibration signals of the randomized traffic load model based on accelerometer multi-sensors that indicate the change in mechanical behavior of the structure over time. In addition, AFHs evaluate the workability of the structure. With these parameters in mind, actual vibrations in real beam structures are studied with the aim of using structural health monitoring to assess the bearing capacity reduction on Saigon Bridge’s spans. The results show that AFHs and the high-frequency regions relate to the decreased stiffness of the bridge’s spans over a given period of time. In the future, this research can be used to monitor structural health for various types of structure materials and many different bridge spans.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43298408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks 一种适用于水下无线传感器网络的深度控制节能路由协议
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221117118
U. Lilhore, O. Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, G. Abdulsahib, P. M., D. Kumar
Underwater wireless sensor network attracted massive attention from researchers. In underwater wireless sensor network, many sensor nodes are distributed at different depths in the sea. Due to its complex nature, updating their location or adding new devices is pretty challenging. Due to the constraints on energy storage of underwater wireless sensor network end devices and the complexity of repairing or recharging the device underwater, this is highly significant to strengthen the energy performance of underwater wireless sensor network. An imbalance in power consumption can cause poor performance and a limited network lifetime. To overcome these issues, we propose a depth controlled with energy-balanced routing protocol, which will be able to adjust the depth of lower energy nodes and be able to swap the lower energy nodes with higher energy nodes to ensure consistent energy utilization. The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. The proposed model also utilized an enhanced back propagation neural network for data fusion operation, which is based on multi-hop system and also operates a highly optimized momentum technique, which helps to choose only optimum energy nodes and avoid duplicate selections that help to improve the overall energy and further reduce the quantity of data transmission. In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. In the simulation, the proposed model achieves 86.7% packet delivery ratio, 12.6% energy consumption, and 10.5% packet drop ratio over existing depth-based routing and energy-efficient depth-based routing methods for underwater wireless sensor network.
水下无线传感器网络引起了研究者的广泛关注。在水下无线传感器网络中,许多传感器节点分布在海洋的不同深度。由于其复杂性,更新他们的位置或添加新设备非常具有挑战性。由于水下无线传感器网络终端设备的能量存储受到限制,并且水下设备维修或充电的复杂性,这对提高水下无线传感网络的能量性能具有重要意义。功耗的不平衡可能导致性能差和网络寿命有限。为了克服这些问题,我们提出了一种深度控制的能量平衡路由协议,该协议将能够调整较低能量节点的深度,并能够将较低能量的节点与较高能量的节点交换,以确保一致的能量利用。所提出的节能路由协议基于增强的遗传算法和数据融合技术。在所提出的节能路由协议中,通过添加编码策略、交叉过程和改进的变异操作来增强现有的遗传算法,以帮助确定节点。所提出的模型还利用了一种增强的反向传播神经网络进行数据融合操作,该网络基于多跳系统,还采用了高度优化的动量技术,这有助于只选择最佳能量节点,避免重复选择,从而有助于提高整体能量,进一步减少数据传输量。在所提出的节能路由协议中,使用增强型簇头节点来选择能够分析每个参与节点的剩余能量和方向的策略。在仿真中,与现有的基于深度的路由和基于深度的节能路由方法相比,该模型实现了86.7%的分组传递率、12.6%的能耗和10.5%的分组丢弃率。
{"title":"A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks","authors":"U. Lilhore, O. Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, G. Abdulsahib, P. M., D. Kumar","doi":"10.1177/15501329221117118","DOIUrl":"https://doi.org/10.1177/15501329221117118","url":null,"abstract":"Underwater wireless sensor network attracted massive attention from researchers. In underwater wireless sensor network, many sensor nodes are distributed at different depths in the sea. Due to its complex nature, updating their location or adding new devices is pretty challenging. Due to the constraints on energy storage of underwater wireless sensor network end devices and the complexity of repairing or recharging the device underwater, this is highly significant to strengthen the energy performance of underwater wireless sensor network. An imbalance in power consumption can cause poor performance and a limited network lifetime. To overcome these issues, we propose a depth controlled with energy-balanced routing protocol, which will be able to adjust the depth of lower energy nodes and be able to swap the lower energy nodes with higher energy nodes to ensure consistent energy utilization. The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. The proposed model also utilized an enhanced back propagation neural network for data fusion operation, which is based on multi-hop system and also operates a highly optimized momentum technique, which helps to choose only optimum energy nodes and avoid duplicate selections that help to improve the overall energy and further reduce the quantity of data transmission. In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. In the simulation, the proposed model achieves 86.7% packet delivery ratio, 12.6% energy consumption, and 10.5% packet drop ratio over existing depth-based routing and energy-efficient depth-based routing methods for underwater wireless sensor network.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44189373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Research on privacy protection of dummy location interference for Location-Based Service location 基于位置服务位置虚拟位置干扰的隐私保护研究
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221125111
Ai Zhang, Xiaohui Li
Location privacy refers to the individual private and sensitive location information involved in the user’s access to location services. Achieving location privacy protection has become a hot topic of research. However, existing location privacy protection schemes are susceptible to background knowledge attack, edge information attack, and homogeneity attack, on the one hand, and strict constraint on the number of neighbors, on the other hand. To address these deficiencies, a dummy location interference privacy protection algorithm for Location-Based Service location is proposed. To begin with, the dummy location candidate set is constructed based on using WordNet structure to guarantee semantic differentiation, randomly selecting offset location, and conforming to probability similarity; next, the dummy location set is filtered out by discretizing dummy locations based on the Heron formula; finally, the secure anonymity set is constructed according to the anonymity level. Experiments show that the algorithm enhances the privacy protection strength and improves the security of location privacy. Meanwhile, the communication volume and time overhead are reduced and the practicality is boosted by taking into account the sparse and dense environment of location points.
位置隐私是指用户在使用位置服务过程中所涉及的个人隐私和敏感的位置信息。实现位置隐私保护已成为研究的热点。然而,现有的位置隐私保护方案一方面容易受到背景知识攻击、边缘信息攻击和同质性攻击,另一方面对邻居数量有严格的约束。针对这些不足,提出了一种基于位置服务的虚拟位置干扰隐私保护算法。首先,利用WordNet结构构建虚拟位置候选集,保证语义区分,随机选择偏移位置,并符合概率相似性;然后,根据Heron公式对虚拟位置进行离散,过滤出虚拟位置集;最后,根据匿名级别构造安全匿名集。实验表明,该算法增强了隐私保护强度,提高了位置隐私的安全性。同时,考虑到定位点的稀疏和密集环境,减少了通信量和时间开销,提高了实用性。
{"title":"Research on privacy protection of dummy location interference for Location-Based Service location","authors":"Ai Zhang, Xiaohui Li","doi":"10.1177/15501329221125111","DOIUrl":"https://doi.org/10.1177/15501329221125111","url":null,"abstract":"Location privacy refers to the individual private and sensitive location information involved in the user’s access to location services. Achieving location privacy protection has become a hot topic of research. However, existing location privacy protection schemes are susceptible to background knowledge attack, edge information attack, and homogeneity attack, on the one hand, and strict constraint on the number of neighbors, on the other hand. To address these deficiencies, a dummy location interference privacy protection algorithm for Location-Based Service location is proposed. To begin with, the dummy location candidate set is constructed based on using WordNet structure to guarantee semantic differentiation, randomly selecting offset location, and conforming to probability similarity; next, the dummy location set is filtered out by discretizing dummy locations based on the Heron formula; finally, the secure anonymity set is constructed according to the anonymity level. Experiments show that the algorithm enhances the privacy protection strength and improves the security of location privacy. Meanwhile, the communication volume and time overhead are reduced and the practicality is boosted by taking into account the sparse and dense environment of location points.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":"18 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65535226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1