首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Delay-reliability-aware protocol adaption and quality of service guarantee for message queuing telemetry transport-empowered electric Internet of things 基于延迟可靠性感知的消息队列遥测传输协议适配和服务质量保证
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097815
H. Zhang, Hongshuo Zhang, Zhao Wang, Zhenyu Zhou, Qiang Wang, Guangyuan Xu, Junzhong Yang, Zhong Gan
Message queuing telemetry transport has emerged as a promising communication protocol for resource-constrained electric Internet of things due to high bandwidth utilization, simple implementation, and various quality of service levels. Enabled by message queuing telemetry transport, electric Internet of things gateways adopt dynamic protocol adaptation, conversion, and quality of service level selection to realize bidirectional communication with massive devices and platforms based on heterogeneous communication protocols. However, protocol adaptation and quality of service guarantee in message queuing telemetry transport-empowered electric Internet of things still faces several challenges, such as unified communication architecture, differentiated quality of service requirements, lack of quality of service metric models, and incomplete information. In this paper, we first establish a unified communication architecture for message queuing telemetry transport-empowered electric Internet of things for adaptation and conversion of heterogeneous protocols. Second, we formulate the quality of service level selection optimization problem to minimize the weighted sum of packet-loss ratio and delay. Then, a delay-reliability-aware message queuing telemetry transport quality of service level selection algorithm based on upper confidence bound is proposed to learn the optimal quality of service level through dynamically interacting with the environment. Compared with single and fixed quality of service level selection strategies, delay-reliability-aware message queuing telemetry transport quality of service level selection can effectively reduce the weighted sum of delay and packet-loss ratio and satisfy the differentiated quality of service requirements of electric Internet of things.
消息队列遥测传输具有带宽利用率高、实现简单、服务质量等级多样等优点,是资源受限的电力物联网中一种很有前途的通信协议。电子物联网网关通过消息队列遥测传输,采用动态协议适配、转换和服务质量等级选择,实现基于异构通信协议的海量设备和平台双向通信。然而,基于消息队列遥测传输的电动物联网协议适配和服务质量保障仍面临通信架构统一、服务质量需求差异化、服务质量度量模型缺失、信息不完整等挑战。在本文中,我们首先建立了一个统一的通信架构,用于消息队列遥测传输授权的电子物联网,用于异构协议的适应和转换。其次,提出了以丢包率和时延加权和最小为目标的服务质量水平选择优化问题。然后,提出了一种基于上置信度的延迟可靠性感知消息队列遥测服务水平质量选择算法,通过与环境的动态交互学习最优服务水平质量。与单一、固定的服务等级质量选择策略相比,延迟-可靠性感知消息队列遥测服务等级质量选择策略能有效降低时延和丢包率的加权和,满足电力物联网差异化的服务质量需求。
{"title":"Delay-reliability-aware protocol adaption and quality of service guarantee for message queuing telemetry transport-empowered electric Internet of things","authors":"H. Zhang, Hongshuo Zhang, Zhao Wang, Zhenyu Zhou, Qiang Wang, Guangyuan Xu, Junzhong Yang, Zhong Gan","doi":"10.1177/15501329221097815","DOIUrl":"https://doi.org/10.1177/15501329221097815","url":null,"abstract":"Message queuing telemetry transport has emerged as a promising communication protocol for resource-constrained electric Internet of things due to high bandwidth utilization, simple implementation, and various quality of service levels. Enabled by message queuing telemetry transport, electric Internet of things gateways adopt dynamic protocol adaptation, conversion, and quality of service level selection to realize bidirectional communication with massive devices and platforms based on heterogeneous communication protocols. However, protocol adaptation and quality of service guarantee in message queuing telemetry transport-empowered electric Internet of things still faces several challenges, such as unified communication architecture, differentiated quality of service requirements, lack of quality of service metric models, and incomplete information. In this paper, we first establish a unified communication architecture for message queuing telemetry transport-empowered electric Internet of things for adaptation and conversion of heterogeneous protocols. Second, we formulate the quality of service level selection optimization problem to minimize the weighted sum of packet-loss ratio and delay. Then, a delay-reliability-aware message queuing telemetry transport quality of service level selection algorithm based on upper confidence bound is proposed to learn the optimal quality of service level through dynamically interacting with the environment. Compared with single and fixed quality of service level selection strategies, delay-reliability-aware message queuing telemetry transport quality of service level selection can effectively reduce the weighted sum of delay and packet-loss ratio and satisfy the differentiated quality of service requirements of electric Internet of things.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48363010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A reduced dimension multiple signal classification–based direct location algorithm with dense arrays 一种基于降维多信号分类的密集阵列直接定位算法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097583
Jianfeng Li, Gaofeng Zhao, Baobao Li, Xianpeng Wang, Mengxing Huang
Aiming at the issue of parameter matching in conventional two-step location, a reduced dimension multiple signal classification direct position determination algorithm based on multi-array is proposed. Based on the idea of dimension reduction, the algorithm avoids multi-dimensional search in spatial domain and attenuation coefficient domain and reduces the search complexity. Simulation results show that the performance of the algorithm is better than the traditional angle of arrival two-step localization algorithm and subspace data fusion direct localization algorithm.
针对传统两步定位中的参数匹配问题,提出了一种基于多阵列的降维多信号分类直接定位算法。该算法基于降维思想,避免了空间域和衰减系数域的多维搜索,降低了搜索复杂度。仿真结果表明,该算法的性能优于传统的到达角两步定位算法和子空间数据融合直接定位算法。
{"title":"A reduced dimension multiple signal classification–based direct location algorithm with dense arrays","authors":"Jianfeng Li, Gaofeng Zhao, Baobao Li, Xianpeng Wang, Mengxing Huang","doi":"10.1177/15501329221097583","DOIUrl":"https://doi.org/10.1177/15501329221097583","url":null,"abstract":"Aiming at the issue of parameter matching in conventional two-step location, a reduced dimension multiple signal classification direct position determination algorithm based on multi-array is proposed. Based on the idea of dimension reduction, the algorithm avoids multi-dimensional search in spatial domain and attenuation coefficient domain and reduces the search complexity. Simulation results show that the performance of the algorithm is better than the traditional angle of arrival two-step localization algorithm and subspace data fusion direct localization algorithm.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47360799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability association evaluation of Internet of thing devices based on attack graph 基于攻击图的物联网设备漏洞关联评估
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097817
Yao Ma, Yuting Wu, Dan Yu, Lv Ding, Yongle Chen
Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices to damage or control the information system. Considering the correlation between device vulnerabilities, we proposed a method based on attack graph to evaluate vulnerability risk in order to ensure Internet of thing network security. First, according to the type, version, and other relevant information of device vulnerabilities in the Internet of thing environment, hidden Markov model can be used to model the association between device states. Second, analyze the possible attacks on the vulnerabilities on the device, and generate the attack graph according to the correlation between the device states and the relevant information of the vulnerabilities in the device. Finally, the vulnerabilities are objectively and accurately evaluated according to the attack graph. The experiments results show that the proposed method can map the relationship between devices more accurately and objectively and improve the efficiency and accuracy of the vulnerability evaluation.
在物联网环境中,设备漏洞层出不穷,攻击者通过多步攻击的方式,同时攻击多个底层设备上的漏洞,触发其他高层设备上的弱点,破坏或控制信息系统。考虑到设备漏洞之间的相关性,我们提出了一种基于攻击图的漏洞风险评估方法,以确保物联网网络的安全。首先,根据物联网环境中设备漏洞的类型、版本等相关信息,可以使用隐马尔可夫模型对设备状态之间的关联进行建模。其次,分析设备上的漏洞可能受到的攻击,并根据设备状态与设备中漏洞的相关信息之间的相关性生成攻击图。最后,根据攻击图对漏洞进行了客观、准确的评估。实验结果表明,该方法能够更准确、客观地映射设备之间的关系,提高了漏洞评估的效率和准确性。
{"title":"Vulnerability association evaluation of Internet of thing devices based on attack graph","authors":"Yao Ma, Yuting Wu, Dan Yu, Lv Ding, Yongle Chen","doi":"10.1177/15501329221097817","DOIUrl":"https://doi.org/10.1177/15501329221097817","url":null,"abstract":"Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices to damage or control the information system. Considering the correlation between device vulnerabilities, we proposed a method based on attack graph to evaluate vulnerability risk in order to ensure Internet of thing network security. First, according to the type, version, and other relevant information of device vulnerabilities in the Internet of thing environment, hidden Markov model can be used to model the association between device states. Second, analyze the possible attacks on the vulnerabilities on the device, and generate the attack graph according to the correlation between the device states and the relevant information of the vulnerabilities in the device. Finally, the vulnerabilities are objectively and accurately evaluated according to the attack graph. The experiments results show that the proposed method can map the relationship between devices more accurately and objectively and improve the efficiency and accuracy of the vulnerability evaluation.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41609645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Viability characterization of a proof-of-concept Bluetooth mesh smart building application 概念验证蓝牙网状智能建筑应用的可行性表征
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097819
Leonardo Eras, Federico Domínguez, Caril Martinez
Bluetooth low energy is an almost ubiquitous technology currently embedded in billions of power-constrained Internet of Things devices around the world. The Bluetooth mesh profile, released by the Bluetooth Special Interest Group in July 2017, allows Bluetooth low energy devices to form a mesh network, further enabling smart home and building applications where long-range connectivity is required. However, the current release of Bluetooth mesh profile still has power and deployment constraints that limit its applicability. To explore the viability of Bluetooth mesh profile in home/building automation applications, we built the Smart Doorbell: a proof-of-concept Bluetooth mesh profile–based visitor notification system for office spaces. The Smart Doorbell was implemented using a mesh network topology with nodes distributed across office building floors, serving as a real Internet of Things deployment and as a testbed for mesh network protocols. Similar Bluetooth mesh profile evaluations found in literature use mostly development kits and/or synthetic traffic in artificial settings; we contribute by using the Smart Doorbell, a system as close as possible to a minimum viable product, to evaluate power consumption and responsiveness as a proxy for product viability. This article presents the architecture of the Smart Doorbell, the viability evaluation results, and a direct comparison with FruityMesh, a competing Bluetooth low energy mesh network protocol. Overall, the fact that Bluetooth mesh profile devices can directly communicate with a user’s mobile phone (using Bluetooth low energy) considerably eases deployment and provisioning. However, the use of flooding to forward messages across the mesh network increases power consumption, precluding the use of battery-powered nodes on the network’s backbone and severely limiting the applicability of Bluetooth mesh profile in building automation.
低功耗蓝牙是一种几乎无处不在的技术,目前嵌入在全球数十亿个功耗受限的物联网设备中。蓝牙特殊兴趣小组于2017年7月发布了蓝牙mesh配置文件,允许蓝牙低功耗设备形成网状网络,进一步支持需要远程连接的智能家居和建筑应用。然而,目前发布的蓝牙mesh配置文件仍然有功率和部署限制,限制了它的适用性。为了探索蓝牙网状配置文件在家庭/楼宇自动化应用中的可行性,我们构建了智能门铃:一个基于蓝牙网状配置文件的概念验证型办公空间访客通知系统。智能门铃采用网状网络拓扑实现,节点分布在办公大楼的各个楼层,作为真正的物联网部署和网状网络协议的测试平台。在文献中发现的类似蓝牙网格配置文件评估主要使用开发工具包和/或人工环境中的合成流量;我们的贡献是使用智能门铃,一个尽可能接近最小可行产品的系统,来评估功耗和响应能力,作为产品可行性的代理。本文介绍了智能门铃的架构,可行性评估结果,并与FruityMesh(一种竞争的蓝牙低功耗网状网络协议)进行了直接比较。总的来说,蓝牙mesh配置设备可以直接与用户的移动电话通信(使用低功耗蓝牙),这一事实大大简化了部署和配置。然而,在网状网络中使用泛洪转发消息增加了功耗,阻碍了在网络骨干上使用电池供电的节点,并严重限制了蓝牙网状配置文件在楼宇自动化中的适用性。
{"title":"Viability characterization of a proof-of-concept Bluetooth mesh smart building application","authors":"Leonardo Eras, Federico Domínguez, Caril Martinez","doi":"10.1177/15501329221097819","DOIUrl":"https://doi.org/10.1177/15501329221097819","url":null,"abstract":"Bluetooth low energy is an almost ubiquitous technology currently embedded in billions of power-constrained Internet of Things devices around the world. The Bluetooth mesh profile, released by the Bluetooth Special Interest Group in July 2017, allows Bluetooth low energy devices to form a mesh network, further enabling smart home and building applications where long-range connectivity is required. However, the current release of Bluetooth mesh profile still has power and deployment constraints that limit its applicability. To explore the viability of Bluetooth mesh profile in home/building automation applications, we built the Smart Doorbell: a proof-of-concept Bluetooth mesh profile–based visitor notification system for office spaces. The Smart Doorbell was implemented using a mesh network topology with nodes distributed across office building floors, serving as a real Internet of Things deployment and as a testbed for mesh network protocols. Similar Bluetooth mesh profile evaluations found in literature use mostly development kits and/or synthetic traffic in artificial settings; we contribute by using the Smart Doorbell, a system as close as possible to a minimum viable product, to evaluate power consumption and responsiveness as a proxy for product viability. This article presents the architecture of the Smart Doorbell, the viability evaluation results, and a direct comparison with FruityMesh, a competing Bluetooth low energy mesh network protocol. Overall, the fact that Bluetooth mesh profile devices can directly communicate with a user’s mobile phone (using Bluetooth low energy) considerably eases deployment and provisioning. However, the use of flooding to forward messages across the mesh network increases power consumption, precluding the use of battery-powered nodes on the network’s backbone and severely limiting the applicability of Bluetooth mesh profile in building automation.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44748496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-Kinects fusion for full-body tracking in virtual reality-aided assembly simulation 虚拟现实辅助装配仿真中全身跟踪的多运动融合
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097591
Yu Wang, Fuxiang Chang, Yuanjie Wu, Ziran Hu, Lihui Li, Pengyu Li, Pu Lang, Shouwen Yao
Skeleton tracking based on multiple Kinects data fusion has been proved to have better accuracy and robustness than single Kinect. However, previous works did not consider the inconsistency of tracking accuracy in the tracking field of Kinect and the self-occlusion of human body in assembly operation, which are of vital importance to the fusion performance of the multiple Kinects data in assembly task simulation. In this work, we developed a multi-Kinect fusion algorithm to achieve robust full-body tracking in virtual reality (VR)-aided assembly simulation. Two reliability functions are first applied to evaluate the tracking confidences reflecting the impacts of the position-related error and the self-occlusion error on the tracked skeletons. Then, the tracking skeletons from multiple Kinects are fused based on weighted arithmetic average and generalized covariance intersection. To evaluate the tracking confidence, the ellipsoidal surface fitting was used to model the tracking accuracy distribution of Kinect, and the relations between the user-Kinect crossing angles and the influences of the self-occlusion on the tracking of different parts of body were studied. On the basis, the two reliability functions were developed. We implemented a prototype system leveraging six Kinects and applied the distributed computing in the system to improve the computing efficiency. Experiment results showed that the proposed algorithm has superior fusion performance compared to the peer works.
事实证明,基于多Kinect数据融合的骨骼跟踪比单一Kinect具有更好的准确性和鲁棒性。然而,以往的工作没有考虑到Kinect跟踪领域的跟踪精度不一致和装配操作中人体的自遮挡,而这对装配任务仿真中多个Kinect数据的融合性能至关重要。在这项工作中,我们开发了一种多kinect融合算法,以实现虚拟现实(VR)辅助装配仿真中的鲁棒全身跟踪。首先应用两个可靠度函数来评估反映位置相关误差和自遮挡误差对被跟踪骨架影响的跟踪置信度。然后,基于加权算术平均和广义协方差交点对多个节点的跟踪骨架进行融合;为了评估跟踪置信度,采用椭球面拟合对Kinect的跟踪精度分布进行建模,研究了用户-Kinect交叉角度与自遮挡对身体不同部位跟踪的影响之间的关系。在此基础上,建立了两种可靠性函数。我们实现了一个利用6个节点的原型系统,并在系统中应用分布式计算来提高计算效率。实验结果表明,该算法具有较好的融合性能。
{"title":"Multi-Kinects fusion for full-body tracking in virtual reality-aided assembly simulation","authors":"Yu Wang, Fuxiang Chang, Yuanjie Wu, Ziran Hu, Lihui Li, Pengyu Li, Pu Lang, Shouwen Yao","doi":"10.1177/15501329221097591","DOIUrl":"https://doi.org/10.1177/15501329221097591","url":null,"abstract":"Skeleton tracking based on multiple Kinects data fusion has been proved to have better accuracy and robustness than single Kinect. However, previous works did not consider the inconsistency of tracking accuracy in the tracking field of Kinect and the self-occlusion of human body in assembly operation, which are of vital importance to the fusion performance of the multiple Kinects data in assembly task simulation. In this work, we developed a multi-Kinect fusion algorithm to achieve robust full-body tracking in virtual reality (VR)-aided assembly simulation. Two reliability functions are first applied to evaluate the tracking confidences reflecting the impacts of the position-related error and the self-occlusion error on the tracked skeletons. Then, the tracking skeletons from multiple Kinects are fused based on weighted arithmetic average and generalized covariance intersection. To evaluate the tracking confidence, the ellipsoidal surface fitting was used to model the tracking accuracy distribution of Kinect, and the relations between the user-Kinect crossing angles and the influences of the self-occlusion on the tracking of different parts of body were studied. On the basis, the two reliability functions were developed. We implemented a prototype system leveraging six Kinects and applied the distributed computing in the system to improve the computing efficiency. Experiment results showed that the proposed algorithm has superior fusion performance compared to the peer works.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44241930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A certificateless aggregate signature scheme for security and privacy protection in VANET VANET中用于安全和隐私保护的无证书聚合签名方案
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221080658
E. F. Cahyadi, Tzu-Wei Su, Chou-Chen Yang, M. Hwang
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection. However, since many users transmit a substantial number of messages, it may cause reception delays and affect the entire system. A certificateless aggregate signature scheme can provide a signature compression that keeps the verification cost low. Therefore, it is beneficial for environments constrained by time, bandwidth, and storage, such as vehicular ad hoc network. In recent years, several certificateless aggregate signature schemes have been proposed. Unfortunately, some of them still have some security and privacy issues under specific existing attacks. This article offers an authentication scheme that can improve security, privacy, and efficiency. First, we apply the certificateless aggregate signature method to prevent the onboard unit devices from leaking sensitive information when sending messages. The scheme is proven to be secure against the Type-1 ( A 1 ) and Type-2 ( A 2 ) adversaries in the random oracle model under the computational Diffie–Hellman problem assumption. Then, the performance evaluation demonstrates that our proposed scheme is more suitable for deployment in vehicular ad hoc network environments.
在车辆自组织网络中,移动车辆可以通过随时进入或离开网络来保持相互通信,以建立新的连接。然而,由于许多用户发送大量消息,这可能会导致接收延迟并影响整个系统。无证书聚合签名方案可以提供一种签名压缩,使验证成本保持在较低水平。因此,它有利于受时间、带宽和存储限制的环境,如车载自组织网络。近年来,人们提出了几种无证书聚合签名方案。不幸的是,在特定的现有攻击下,其中一些仍然存在一些安全和隐私问题。本文提供了一种可以提高安全性、隐私性和效率的身份验证方案。首先,我们应用无证书聚合签名方法来防止车载单元设备在发送消息时泄露敏感信息。在计算Diffie-Hellman问题的假设下,该方案被证明对随机预言机模型中的1型(A1)和2型(A2)对手是安全的。然后,性能评估表明,我们提出的方案更适合部署在车载自组织网络环境中。
{"title":"A certificateless aggregate signature scheme for security and privacy protection in VANET","authors":"E. F. Cahyadi, Tzu-Wei Su, Chou-Chen Yang, M. Hwang","doi":"10.1177/15501329221080658","DOIUrl":"https://doi.org/10.1177/15501329221080658","url":null,"abstract":"In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection. However, since many users transmit a substantial number of messages, it may cause reception delays and affect the entire system. A certificateless aggregate signature scheme can provide a signature compression that keeps the verification cost low. Therefore, it is beneficial for environments constrained by time, bandwidth, and storage, such as vehicular ad hoc network. In recent years, several certificateless aggregate signature schemes have been proposed. Unfortunately, some of them still have some security and privacy issues under specific existing attacks. This article offers an authentication scheme that can improve security, privacy, and efficiency. First, we apply the certificateless aggregate signature method to prevent the onboard unit devices from leaking sensitive information when sending messages. The scheme is proven to be secure against the Type-1 ( A 1 ) and Type-2 ( A 2 ) adversaries in the random oracle model under the computational Diffie–Hellman problem assumption. Then, the performance evaluation demonstrates that our proposed scheme is more suitable for deployment in vehicular ad hoc network environments.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46437897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A distributed energy-efficient opportunistic routing accompanied by timeslot allocation in wireless sensor networks 无线传感器网络中具有时隙分配的分布式节能机会路由
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501477211049917
M. Ri, Yefei Han, Jinsuk Pak
Sensed data can be forwarded only in one direction to the base station in one-dimensional queue wireless sensor networks different from mesh structure, so the network lifetime will be shortened if some continuous neighboring nodes have run out of their energy. So designing routing protocols for balancing energy consumption is a challenging problem. However, traditional and existing opportunistic routing protocols for one-dimensional queue wireless sensor network proposed so far have not yet addressed this problem to prolong the network lifetime by introducing sleep mode. In this article, we propose a distributed energy-efficient opportunistic routing algorithm accompanied by timeslot allocation by using specific network topology of one-dimensional queue wireless sensor network. In our new algorithm, clustering and routing tree construction is performed while introducing the optimal relay transmission distance achieved by using opportunistic routing principle, and at the same time, interference-free wake up time is scheduled, which may optimize energy consumption and decrease the number of various control messages as possible to prolong the network lifetime. Furthermore, this improves energy efficiency by introducing the operation mode giving up cluster head role. Simulation results show that the proposed protocol can significantly improve the network performance such as energy consumption and network connectivity, when compared with other existing protocols.
不同于网状结构的一维队列无线传感器网络中,感知到的数据只能单向转发到基站,如果相邻连续节点的能量耗尽,会缩短网络的生存时间。因此,设计均衡能耗的路由协议是一个具有挑战性的问题。然而,目前提出的一维队列无线传感器网络的传统和现有机会路由协议都没有通过引入睡眠模式来解决这一问题,延长网络的生存时间。本文利用一维队列无线传感器网络的特定网络拓扑结构,提出了一种带有时隙分配的分布式节能机会路由算法。该算法在引入机会路由原理实现的最优中继传输距离的同时进行聚类和路由树构建,同时调度无干扰唤醒时间,从而优化能耗,尽可能减少各种控制消息的数量,延长网络寿命。此外,通过引入放弃簇头角色的运行模式,提高了能效。仿真结果表明,与现有协议相比,该协议能显著提高网络能耗和网络连通性等性能。
{"title":"A distributed energy-efficient opportunistic routing accompanied by timeslot allocation in wireless sensor networks","authors":"M. Ri, Yefei Han, Jinsuk Pak","doi":"10.1177/15501477211049917","DOIUrl":"https://doi.org/10.1177/15501477211049917","url":null,"abstract":"Sensed data can be forwarded only in one direction to the base station in one-dimensional queue wireless sensor networks different from mesh structure, so the network lifetime will be shortened if some continuous neighboring nodes have run out of their energy. So designing routing protocols for balancing energy consumption is a challenging problem. However, traditional and existing opportunistic routing protocols for one-dimensional queue wireless sensor network proposed so far have not yet addressed this problem to prolong the network lifetime by introducing sleep mode. In this article, we propose a distributed energy-efficient opportunistic routing algorithm accompanied by timeslot allocation by using specific network topology of one-dimensional queue wireless sensor network. In our new algorithm, clustering and routing tree construction is performed while introducing the optimal relay transmission distance achieved by using opportunistic routing principle, and at the same time, interference-free wake up time is scheduled, which may optimize energy consumption and decrease the number of various control messages as possible to prolong the network lifetime. Furthermore, this improves energy efficiency by introducing the operation mode giving up cluster head role. Simulation results show that the proposed protocol can significantly improve the network performance such as energy consumption and network connectivity, when compared with other existing protocols.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48290474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A graph-based sensor recommendation model in semantic sensor network 语义传感器网络中基于图的传感器推荐模型
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501477211049307
Yuanyi Chen, Yih-Yeong Lin, Pengfei Yu, Yanyun Tao, Zengwei Zheng
In the past few years, introducing ontology to describe the concepts and relationships between different entities in semantic sensor network enhances the interoperability between entities. Existing works mostly based on SPARQL retrieval ignore the user’s specific requirements of sensor attributes. Therefore, the recommendation results cannot satisfy the user’s needs. In this article, we propose a graph-based sensor recommendation model. The model mainly includes two parts: (1) Filtering nodes in data graph. In addition to using the traditional graph matching algorithm, we propose a threshold pruning algorithm to narrow the matching scope and improve the matching efficiency. (2) Recommending top-k sensors. We use the improved fast non-dominated sorting algorithm to obtain the local optimal solutions of sensor data set, and we apply the simple additive weight algorithm to characterize and sort local optional solutions. Finally, we recommend the top-k sensors to the user. By comparison, the graph-based sensor recommendation algorithm meets user’s needs more than other algorithms, and experiments show that our model outperforms several baselines in terms of both response time and precision.
在过去的几年里,引入本体来描述语义传感器网络中不同实体之间的概念和关系,增强了实体之间的互操作性。现有的工作大多基于SPARQL检索,忽略了用户对传感器属性的特定要求。因此,推荐结果不能满足用户的需求。在本文中,我们提出了一个基于图的传感器推荐模型。该模型主要包括两部分:(1)对数据图中的节点进行过滤。除了使用传统的图匹配算法外,我们还提出了一种阈值修剪算法来缩小匹配范围,提高匹配效率。(2) 推荐前k个传感器。我们使用改进的快速非支配排序算法来获得传感器数据集的局部最优解,并使用简单的加性权重算法来刻画和排序局部可选解。最后,我们向用户推荐前k个传感器。相比之下,基于图的传感器推荐算法比其他算法更能满足用户的需求,实验表明,我们的模型在响应时间和精度方面都优于几个基线。
{"title":"A graph-based sensor recommendation model in semantic sensor network","authors":"Yuanyi Chen, Yih-Yeong Lin, Pengfei Yu, Yanyun Tao, Zengwei Zheng","doi":"10.1177/15501477211049307","DOIUrl":"https://doi.org/10.1177/15501477211049307","url":null,"abstract":"In the past few years, introducing ontology to describe the concepts and relationships between different entities in semantic sensor network enhances the interoperability between entities. Existing works mostly based on SPARQL retrieval ignore the user’s specific requirements of sensor attributes. Therefore, the recommendation results cannot satisfy the user’s needs. In this article, we propose a graph-based sensor recommendation model. The model mainly includes two parts: (1) Filtering nodes in data graph. In addition to using the traditional graph matching algorithm, we propose a threshold pruning algorithm to narrow the matching scope and improve the matching efficiency. (2) Recommending top-k sensors. We use the improved fast non-dominated sorting algorithm to obtain the local optimal solutions of sensor data set, and we apply the simple additive weight algorithm to characterize and sort local optional solutions. Finally, we recommend the top-k sensors to the user. By comparison, the graph-based sensor recommendation algorithm meets user’s needs more than other algorithms, and experiments show that our model outperforms several baselines in terms of both response time and precision.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49525576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A hybrid trust model based on communication and social trust for vehicular social networks 基于通信和社会信任的汽车社交网络混合信任模型
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221097588
Na Fan, Shuai Shen, C. Wu, J. Yao
Vehicular social networks are emerging hybrid networks that combine traditional vehicular networks and social networks, with two key types of nodes, that is, vehicles and drivers. Since vehicle behaviors are controlled or influenced by drivers, the trustworthiness of a vehicle node is essentially determined by its own communication behaviors and its driver’s social characteristics. Therefore, human factors should be considered in securing the communication in vehicular social networks. In this article, we propose a hybrid trust model that considers both communication trust and social trust. Within the proposed scheme, we first construct a communication trust model to quantify the trust value based on the interactions between vehicle nodes, and then develop a social trust model to measure the social trust based on the social characteristics of vehicle drivers. Based on these two trust models, we compute the combined trust assessment of a vehicle node in vehicular social networks. Extensive simulations show that the proposed hybrid trust model improves the accuracy in evaluating the trustworthiness of vehicle nodes and the efficiency of communication in vehicular social networks.
车载社交网络是一种新兴的混合网络,它结合了传统的车载网络和社交网络,具有两种关键类型的节点,即车辆和驾驶员。由于车辆行为受到驾驶员的控制或影响,因此车辆节点的可信度本质上取决于其自身的通信行为和驾驶员的社会特征。因此,在确保车辆社交网络中的通信安全时,应考虑人为因素。在本文中,我们提出了一个混合信任模型,该模型同时考虑了沟通信任和社会信任。在所提出的方案中,我们首先构建了一个通信信任模型,根据车辆节点之间的互动来量化信任值,然后开发了一个社会信任模型,基于车辆驾驶员的社会特征来衡量社会信任。基于这两个信任模型,我们计算了车辆社交网络中车辆节点的组合信任评估。大量仿真表明,所提出的混合信任模型提高了评估车辆节点可信度的准确性和车辆社交网络中的通信效率。
{"title":"A hybrid trust model based on communication and social trust for vehicular social networks","authors":"Na Fan, Shuai Shen, C. Wu, J. Yao","doi":"10.1177/15501329221097588","DOIUrl":"https://doi.org/10.1177/15501329221097588","url":null,"abstract":"Vehicular social networks are emerging hybrid networks that combine traditional vehicular networks and social networks, with two key types of nodes, that is, vehicles and drivers. Since vehicle behaviors are controlled or influenced by drivers, the trustworthiness of a vehicle node is essentially determined by its own communication behaviors and its driver’s social characteristics. Therefore, human factors should be considered in securing the communication in vehicular social networks. In this article, we propose a hybrid trust model that considers both communication trust and social trust. Within the proposed scheme, we first construct a communication trust model to quantify the trust value based on the interactions between vehicle nodes, and then develop a social trust model to measure the social trust based on the social characteristics of vehicle drivers. Based on these two trust models, we compute the combined trust assessment of a vehicle node in vehicular social networks. Extensive simulations show that the proposed hybrid trust model improves the accuracy in evaluating the trustworthiness of vehicle nodes and the efficiency of communication in vehicular social networks.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47977585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A distributed scheme for energy-efficient event-based target recognition using Internet of Multimedia Things 基于多媒体物联网的分布式节能事件目标识别方案
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221100326
Manal Alsabhan, A. Soudani, Manan Almusallam
The availability of low-cost embedded devices for multimedia sensing has encouraged their integration with low-power wireless sensors to create systems that enable advanced services and applications referred to as the Internet of Multimedia Things. Image-based sensing applications are challenged by energy efficiency and resource availability. Mainly, image sensing and transmission in Internet of Multimedia Things severely deplete the sensor energy and overflow the network bandwidth with redundant data. Some solutions presented in the literature, such as image compression, do not efficiently solve this problem because of the algorithms’ computational complexities. Thus, detecting the event of interest locally before the communication using shape-based descriptors would avoid useless data transmission and would extend the network lifetime. In this article, we propose a new approach of distributed event-based sensing scheme over a set of nodes forming a processing cluster to balance the processing load. This approach is intended to reduce per-node energy consumption in one sensing cycle. The conducted experiments show that our novel method based on the general Fourier descriptor decreases the energy consumption in the camera node to only 2.4 mJ, which corresponds to 75.32% of energy-saving compared to the centralized approach, promising to prolong the network lifetime significantly. In addition, the scheme achieved more than 95% accuracy in target recognition.
用于多媒体传感的低成本嵌入式设备的可用性鼓励了它们与低功耗无线传感器的集成,以创建能够实现被称为多媒体物联网的高级服务和应用的系统。基于图像的传感应用受到能源效率和资源可用性的挑战。多媒体物联网中的图像传感和传输严重消耗了传感器的能量,冗余数据溢出了网络带宽。文献中提出的一些解决方案,如图像压缩,由于算法的计算复杂性,并不能有效地解决这个问题。因此,使用基于形状的描述符在通信之前本地检测感兴趣的事件将避免无用的数据传输,并将延长网络寿命。在本文中,我们提出了一种新的方法,即在一组节点上形成一个处理集群,以平衡处理负载的分布式基于事件的感知方案。这种方法旨在减少一个感测周期中每个节点的能量消耗。实验表明,我们基于通用傅立叶描述符的新方法将相机节点的能耗降低到仅2.4 mJ,与集中式方法相比,节能率为75.32%,有望显著延长网络寿命。此外,该方案在目标识别方面达到了95%以上的准确率。
{"title":"A distributed scheme for energy-efficient event-based target recognition using Internet of Multimedia Things","authors":"Manal Alsabhan, A. Soudani, Manan Almusallam","doi":"10.1177/15501329221100326","DOIUrl":"https://doi.org/10.1177/15501329221100326","url":null,"abstract":"The availability of low-cost embedded devices for multimedia sensing has encouraged their integration with low-power wireless sensors to create systems that enable advanced services and applications referred to as the Internet of Multimedia Things. Image-based sensing applications are challenged by energy efficiency and resource availability. Mainly, image sensing and transmission in Internet of Multimedia Things severely deplete the sensor energy and overflow the network bandwidth with redundant data. Some solutions presented in the literature, such as image compression, do not efficiently solve this problem because of the algorithms’ computational complexities. Thus, detecting the event of interest locally before the communication using shape-based descriptors would avoid useless data transmission and would extend the network lifetime. In this article, we propose a new approach of distributed event-based sensing scheme over a set of nodes forming a processing cluster to balance the processing load. This approach is intended to reduce per-node energy consumption in one sensing cycle. The conducted experiments show that our novel method based on the general Fourier descriptor decreases the energy consumption in the camera node to only 2.4 mJ, which corresponds to 75.32% of energy-saving compared to the centralized approach, promising to prolong the network lifetime significantly. In addition, the scheme achieved more than 95% accuracy in target recognition.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46192972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1