首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
A security-aware multi-criteria decision-making framework for ordering task mapping techniques in 3D-NoC based MPSoC architectures of IoT 基于3D-NoC的物联网MPSoC架构中排序任务映射技术的安全感知多标准决策框架
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-13 DOI: 10.1016/j.csi.2025.104075
Ahmed Abbas Jasim Al-Hchaimi , Yousif Raad Muhsen , Dragan Pamucar , Vladimir Simic
Efficient Task Mapping Techniques (TMTs) play a crucial role in enhancing the security of 3-Dimensional Network-on-Chip-based Multiprocessor Systems-on-Chip (3D-NoC-based MPSoCs) architectures deployed in IoT environments by optimizing resource allocation and minimizing vulnerabilities in communication. However, selecting the secure TMT is a fresh challenge due to the difference in importance of evaluation criteria, data variation among these criteria, trade-offs, and uncertainty. This study aims to determine the secure TMT utilizing the Multicriteria Decision-Making (MCDM) framework. Our methodology is separated into three phases. Firstly, this paper establishes a decision matrix for TMT, considering ten criteria and ten alternatives. Secondly, the Pythagorean Fuzzy Set with Weighted Fuzzy Judgment Matrix (PYS-FWJM) method is proposed to determine the weights of ten evaluation criteria. Moreover, the MULTIMOORA-Borda method is employed to construct the TMT selection model based on ten key alternatives. The criteria weighting results highlight that communication overhead (0.1038), thermal management (0.1021), and cost-effectiveness (0.1029) are the most critical factors influencing TMT selection, emphasizing the importance of efficient data transfer, thermal stability, and resource optimization. The MULTIMOORA-Borda ranking results indicate that Dynamic Voltage and Frequency Scaling (DVFS) ranks as the top TMT, while the Branch-and-Bound is the least effective TMT. The framework's effectiveness and robustness are verified through sensitivity analysis and the Spearman technique. This research offers a structured and scalable evaluation model that enables researchers and practitioners to enhance TMT efficiency while ensuring robust security protection in IoT-driven environments. The outputs of this study contribute to achieving SDG 12 by promoting sustainable IoT.
高效任务映射技术(TMTs)通过优化资源分配和最小化通信漏洞,在提高部署在物联网环境中基于三维片上网络的多处理器片上系统(3d - noc)架构的安全性方面发挥着至关重要的作用。然而,由于评估标准的重要性、这些标准之间的数据变化、权衡和不确定性的差异,选择安全的TMT是一个新的挑战。本研究旨在利用多标准决策(MCDM)框架确定安全的TMT。我们的方法分为三个阶段。首先,本文建立了考虑10个准则和10个备选方案的TMT决策矩阵。其次,提出了带有加权模糊判断矩阵的毕达哥拉斯模糊集(PYS-FWJM)方法来确定十个评价指标的权重。此外,采用MULTIMOORA-Borda方法构建了基于10个关键选项的TMT选择模型。标准加权结果表明,通信开销(0.1038)、热管理(0.1021)和成本效益(0.1029)是影响TMT选择的最关键因素,强调了高效数据传输、热稳定性和资源优化的重要性。MULTIMOORA-Borda排序结果表明,动态电压和频率缩放(DVFS)是最有效的TMT,而分支定界是最无效的TMT。通过灵敏度分析和Spearman技术验证了该框架的有效性和鲁棒性。本研究提供了一个结构化和可扩展的评估模型,使研究人员和从业者能够提高TMT效率,同时确保在物联网驱动的环境中提供强大的安全保护。本研究的成果有助于通过促进可持续物联网实现可持续发展目标12。
{"title":"A security-aware multi-criteria decision-making framework for ordering task mapping techniques in 3D-NoC based MPSoC architectures of IoT","authors":"Ahmed Abbas Jasim Al-Hchaimi ,&nbsp;Yousif Raad Muhsen ,&nbsp;Dragan Pamucar ,&nbsp;Vladimir Simic","doi":"10.1016/j.csi.2025.104075","DOIUrl":"10.1016/j.csi.2025.104075","url":null,"abstract":"<div><div>Efficient Task Mapping Techniques (TMTs) play a crucial role in enhancing the security of 3-Dimensional Network-on-Chip-based Multiprocessor Systems-on-Chip (3D-NoC-based MPSoCs) architectures deployed in IoT environments by optimizing resource allocation and minimizing vulnerabilities in communication. However, selecting the secure TMT is a fresh challenge due to the difference in importance of evaluation criteria, data variation among these criteria, trade-offs, and uncertainty. This study aims to determine the secure TMT utilizing the Multicriteria Decision-Making (MCDM) framework. Our methodology is separated into three phases. Firstly, this paper establishes a decision matrix for TMT, considering ten criteria and ten alternatives. Secondly, the Pythagorean Fuzzy Set with Weighted Fuzzy Judgment Matrix (PYS-FWJM) method is proposed to determine the weights of ten evaluation criteria. Moreover, the MULTIMOORA-Borda method is employed to construct the TMT selection model based on ten key alternatives. The criteria weighting results highlight that communication overhead (0.1038), thermal management (0.1021), and cost-effectiveness (0.1029) are the most critical factors influencing TMT selection, emphasizing the importance of efficient data transfer, thermal stability, and resource optimization. The MULTIMOORA-Borda ranking results indicate that Dynamic Voltage and Frequency Scaling (DVFS) ranks as the top TMT, while the Branch-and-Bound is the least effective TMT. The framework's effectiveness and robustness are verified through sensitivity analysis and the Spearman technique. This research offers a structured and scalable evaluation model that enables researchers and practitioners to enhance TMT efficiency while ensuring robust security protection in IoT-driven environments. The outputs of this study contribute to achieving SDG 12 by promoting sustainable IoT.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104075"},"PeriodicalIF":3.1,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEArgmax: Secure homomorphic encryption-based protocols for Argmax function HEArgmax:基于安全同态加密的Argmax函数协议
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-12 DOI: 10.1016/j.csi.2025.104071
Duy Tung Khanh Nguyen , Dung Hoang Duong , Willy Susilo , Yang-Wai Chow , The Anh Ta
In the current era of big data, cloud-based Machine Learning as a Service (MLaaS) – where clients send encrypted queries to the cloud and receive prediction results – has gained significant attention. However, privacy concerns arise as cloud servers typically require access to clients’ raw data, potentially exposing sensitive information. Homomorphic encryption (HE), an advanced cryptographic technique that allows computation on encrypted data without decryption, offers a promising foundation for privacy-preserving MLaaS. A critical challenge in this context is the efficient and secure evaluation of the argmax function—a key operation in classification tasks used to select the class with the highest predicted probability. Existing HE-based methods, such as Phoenix (Jovanovic et al., 2022), rely on non-interactive protocols using high-degree polynomial approximations of the sign function, which lead to significant computational overhead. This paper introduces HEArgmax, an interactive protocol designed for efficient and secure argmax evaluation under encryption. Unlike prior approaches, HEArgmax leverages the algebraic properties of the sign function in combination with a lightweight interactive mechanism under the standard semi-honest model, without requiring trusted setup or multi-party computation. We present two protocol variants: HEArgmax-HT, optimized for high-throughput scenarios using batch processing, and HEArgmax-LC, which minimizes communication by processing a single encrypted vector. Experiments show that HEArgmax reduces inference latency from 157 s to 8 s on the MNIST dataset, and performs well even on CIFAR-100 with 100 output classes, completing in under 4 min using 128-bit HE security parameters. Despite being interactive, our protocol achieves comparable communication costs to Phoenix. These results demonstrate that HEArgmax is both practical and scalable for real-world privacy-preserving MLaaS deployments.
在当前的大数据时代,基于云的机器学习即服务(MLaaS)——客户端向云发送加密查询并接收预测结果——已经获得了极大的关注。然而,由于云服务器通常需要访问客户的原始数据,因此可能会暴露敏感信息,因此会出现隐私问题。同态加密(HE)是一种先进的加密技术,允许在不解密的情况下对加密数据进行计算,为保护隐私的MLaaS提供了良好的基础。在这种情况下,一个关键的挑战是对argmax函数的高效和安全的求值,这是分类任务中的一个关键操作,用于选择具有最高预测概率的类。现有的基于he的方法,如Phoenix (Jovanovic et al., 2022),依赖于使用符号函数的高次多项式近似的非交互式协议,这导致了显著的计算开销。本文介绍了一种用于加密下高效、安全的argmax求值的交互协议——HEArgmax。与之前的方法不同,HEArgmax利用符号函数的代数特性,结合标准半诚实模型下的轻量级交互机制,不需要可信设置或多方计算。我们提出了两种协议变体:针对使用批处理的高吞吐量场景进行优化的HEArgmax-HT和通过处理单个加密向量来最大限度地减少通信的HEArgmax-LC。实验表明,在MNIST数据集上,HEArgmax将推理延迟从157秒减少到8秒,并且即使在具有100个输出类的CIFAR-100上也表现良好,使用128位HE安全参数在4分钟内完成。尽管是交互式的,但我们的协议实现了与Phoenix相当的通信成本。这些结果表明,对于现实世界中保护隐私的MLaaS部署,HEArgmax既实用又可扩展。
{"title":"HEArgmax: Secure homomorphic encryption-based protocols for Argmax function","authors":"Duy Tung Khanh Nguyen ,&nbsp;Dung Hoang Duong ,&nbsp;Willy Susilo ,&nbsp;Yang-Wai Chow ,&nbsp;The Anh Ta","doi":"10.1016/j.csi.2025.104071","DOIUrl":"10.1016/j.csi.2025.104071","url":null,"abstract":"<div><div>In the current era of big data, cloud-based Machine Learning as a Service (MLaaS) – where clients send encrypted queries to the cloud and receive prediction results – has gained significant attention. However, privacy concerns arise as cloud servers typically require access to clients’ raw data, potentially exposing sensitive information. Homomorphic encryption (HE), an advanced cryptographic technique that allows computation on encrypted data without decryption, offers a promising foundation for privacy-preserving MLaaS. A critical challenge in this context is the efficient and secure evaluation of the <em>argmax</em> function—a key operation in classification tasks used to select the class with the highest predicted probability. Existing HE-based methods, such as Phoenix (Jovanovic et al., 2022), rely on non-interactive protocols using high-degree polynomial approximations of the sign function, which lead to significant computational overhead. This paper introduces <span><math><mi>HEArgmax</mi></math></span>, an interactive protocol designed for efficient and secure <span><math><mrow><mi>a</mi><mi>r</mi><mi>g</mi><mi>m</mi><mi>a</mi><mi>x</mi></mrow></math></span> evaluation under encryption. Unlike prior approaches, <span><math><mi>HEArgmax</mi></math></span> leverages the algebraic properties of the sign function in combination with a lightweight interactive mechanism under the standard semi-honest model, without requiring trusted setup or multi-party computation. We present two protocol variants: <span><math><mi>HEArgmax</mi></math></span>-HT, optimized for high-throughput scenarios using batch processing, and <span><math><mi>HEArgmax</mi></math></span>-LC, which minimizes communication by processing a single encrypted vector. Experiments show that <span><math><mi>HEArgmax</mi></math></span> reduces inference latency from 157 s to 8 s on the MNIST dataset, and performs well even on CIFAR-100 with 100 output classes, completing in under 4 min using 128-bit HE security parameters. Despite being interactive, our protocol achieves comparable communication costs to Phoenix. These results demonstrate that <span><math><mi>HEArgmax</mi></math></span> is both practical and scalable for real-world privacy-preserving MLaaS deployments.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104071"},"PeriodicalIF":3.1,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From manual to automated systematic review: Key attributes influencing the duration of systematic reviews in software engineering 从手动到自动的系统评审:影响软件工程中系统评审持续时间的关键属性
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-12 DOI: 10.1016/j.csi.2025.104073
Diana Kalibatiene , Jolanta Miliauskaitė

Context

It is widely accepted that a systematic literature review (SLR) is an effective, comprehensive, repeatable, less biased, and transparent method for gathering and condensing knowledge from existing scientific publications. The SLR method facilitates the identification of gaps for new research opportunities, fostering decision-making based on evidence. At the same time, SLR is a time and effort-consuming task that is threatened by the increasing volume of publications. However, there is a lack of comprehension about which factors directly impact manually conducted SLR performance, limiting researchers to better plan and optimize their processes.

Objective

To enhance the understanding of the attributes that directly influence the SLR process in terms of time consumption.

Methods

We performed a tertiary study that (i) identified 138 secondary studies, (ii) mapped the possible influential attributes for SLR performance, (iii) extracted data from SLR reports and metadata, synthesized and analysed their influence, providing an overview of core trends related to those attributes over time.

Results

Our SLR mapped four main attributes influencing the performance time of the SLR process – number of authors, number of initially retrieved papers from databases, number of included papers for data synthesis, and usage of the snowballing techniques. We noticed a trend for smaller research groups (2–5 persons) using 4–6 different databases and processing to process a large number of studies, and an increasing adoption of the snowballing technique.

Conclusion

This paper reveals a bottleneck in manually conducted SLR, reinforcing the need for evolving automation. Mapping the attributes is only the first step to making the SLR process more measurable regarding its resource consumption. We contribute by providing recommendations to assist scientists and practitioners in planning their future SLRs and IT projects, including SLRs, particularly in the evolving landscape of digital transformation and innovations.
人们普遍认为,系统文献综述(SLR)是一种有效、全面、可重复、较少偏见和透明的方法,可以从现有的科学出版物中收集和浓缩知识。SLR方法有助于识别新的研究机会的差距,促进基于证据的决策。与此同时,单反是一项耗时费力的任务,受到越来越多的出版物的威胁。然而,对于哪些因素会直接影响手动单反相机的性能,人们缺乏理解,这限制了研究人员更好地规划和优化他们的过程。目的提高对直接影响单反过程的时间消耗属性的认识。方法我们进行了一项三级研究,其中(i)确定了138项二级研究,(ii)绘制了可能影响SLR性能的属性图,(iii)从SLR报告和元数据中提取数据,综合并分析了它们的影响,概述了与这些属性相关的核心趋势。结果我们的SLR映射了影响SLR过程性能时间的四个主要属性:作者数量、数据库初始检索论文数量、数据综合纳入论文数量和滚雪球技术的使用。我们注意到一个趋势,小型研究小组(2-5人)使用4-6个不同的数据库和处理方法来处理大量的研究,并且越来越多地采用滚雪球技术。本文揭示了人工单反的瓶颈,加强了自动化发展的必要性。映射属性只是使SLR过程在其资源消耗方面更加可测量的第一步。我们的贡献是为科学家和从业者提供建议,帮助他们规划未来的单反和IT项目,包括单反,特别是在不断发展的数字化转型和创新环境中。
{"title":"From manual to automated systematic review: Key attributes influencing the duration of systematic reviews in software engineering","authors":"Diana Kalibatiene ,&nbsp;Jolanta Miliauskaitė","doi":"10.1016/j.csi.2025.104073","DOIUrl":"10.1016/j.csi.2025.104073","url":null,"abstract":"<div><h3>Context</h3><div>It is widely accepted that a systematic literature review (SLR) is an effective, comprehensive, repeatable, less biased, and transparent method for gathering and condensing knowledge from existing scientific publications. The SLR method facilitates the identification of gaps for new research opportunities, fostering decision-making based on evidence. At the same time, SLR is a time and effort-consuming task that is threatened by the increasing volume of publications. However, there is a lack of comprehension about which factors directly impact manually conducted SLR performance, limiting researchers to better plan and optimize their processes.</div></div><div><h3>Objective</h3><div>To enhance the understanding of the attributes that directly influence the SLR process in terms of time consumption.</div></div><div><h3>Methods</h3><div>We performed a tertiary study that (i) identified 138 secondary studies, (ii) mapped the possible influential attributes for SLR performance, (iii) extracted data from SLR reports and metadata, synthesized and analysed their influence, providing an overview of core trends related to those attributes over time.</div></div><div><h3>Results</h3><div>Our SLR mapped four main attributes influencing the performance time of the SLR process – number of authors, number of initially retrieved papers from databases, number of included papers for data synthesis, and usage of the snowballing techniques. We noticed a trend for smaller research groups (2–5 persons) using 4–6 different databases and processing to process a large number of studies, and an increasing adoption of the snowballing technique.</div></div><div><h3>Conclusion</h3><div>This paper reveals a bottleneck in manually conducted SLR, reinforcing the need for evolving automation. Mapping the attributes is only the first step to making the SLR process more measurable regarding its resource consumption. We contribute by providing recommendations to assist scientists and practitioners in planning their future SLRs and IT projects, including SLRs, particularly in the evolving landscape of digital transformation and innovations.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104073"},"PeriodicalIF":3.1,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SM9-based device-friendly distributed decryption scheme for IoHT 基于sm9的设备友好的IoHT分布式解密方案
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-03 DOI: 10.1016/j.csi.2025.104069
Longjiao Li , Jianchang Lai , Liquan Chen , Zhen Zhao , Ge Wu , Xinyan Yang
IoHT is a specific application of IoT technology in the healthcare field, which enhances medical efficiency and quality. Ensuring secure data sharing among multiple parties is crucial in the IoHT, particularly for resource-constrained devices. As a Chinese national standard and an ISO/IEC standard, SM9 algorithm has been widely applied in IoT, finance, e-government and so on. Although existing SM9-based schemes can ensure data security during multi-party sharing, their high computational overhead makes them unsuitable for lightweight devices. To address this issue, this paper proposes an efficient distributed decryption scheme based on SM9. The proposed scheme achieves secure and efficient multi-party data sharing. And the proposed scheme is very friendly to lightweight devices, as it avoids computationally expensive operations such as bilinear pairing. Based on the q-BDHI assumption, the proposed scheme is proven to be CCA-secure. Finally, we implement our scheme through experiments and the results show that when the number of users reaches 100, the decryption time on resource-constrained devices is about 6 ms, demonstrating that the proposed scheme is suitable for deployment in IoHT.
物联网是物联网技术在医疗保健领域的具体应用,可以提高医疗效率和医疗质量。确保多方之间的安全数据共享在IoHT中至关重要,特别是对于资源受限的设备。SM9算法作为中国国家标准和ISO/IEC标准,已广泛应用于物联网、金融、电子政务等领域。尽管现有的基于sm9的方案可以确保多方共享期间的数据安全,但它们的高计算开销使它们不适合轻量级设备。为了解决这一问题,本文提出了一种基于SM9的高效分布式解密方案。该方案实现了安全高效的多方数据共享。该方案避免了双线性配对等计算成本高的操作,对轻量级设备非常友好。基于q-BDHI假设,证明了该方案是cca安全的。最后,我们通过实验实现了我们的方案,结果表明,当用户数量达到100时,在资源受限的设备上的解密时间约为6 ms,表明所提出的方案适合部署在IoHT中。
{"title":"SM9-based device-friendly distributed decryption scheme for IoHT","authors":"Longjiao Li ,&nbsp;Jianchang Lai ,&nbsp;Liquan Chen ,&nbsp;Zhen Zhao ,&nbsp;Ge Wu ,&nbsp;Xinyan Yang","doi":"10.1016/j.csi.2025.104069","DOIUrl":"10.1016/j.csi.2025.104069","url":null,"abstract":"<div><div>IoHT is a specific application of IoT technology in the healthcare field, which enhances medical efficiency and quality. Ensuring secure data sharing among multiple parties is crucial in the IoHT, particularly for resource-constrained devices. As a Chinese national standard and an ISO/IEC standard, SM9 algorithm has been widely applied in IoT, finance, e-government and so on. Although existing SM9-based schemes can ensure data security during multi-party sharing, their high computational overhead makes them unsuitable for lightweight devices. To address this issue, this paper proposes an efficient distributed decryption scheme based on SM9. The proposed scheme achieves secure and efficient multi-party data sharing. And the proposed scheme is very friendly to lightweight devices, as it avoids computationally expensive operations such as bilinear pairing. Based on the <span><math><mi>q</mi></math></span>-BDHI assumption, the proposed scheme is proven to be CCA-secure. Finally, we implement our scheme through experiments and the results show that when the number of users reaches 100, the decryption time on resource-constrained devices is about 6 ms, demonstrating that the proposed scheme is suitable for deployment in IoHT.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104069"},"PeriodicalIF":3.1,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ScaFedCrowd: A secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing ScaFedCrowd:一个安全的跨系统匿名认证和隐私保护任务推荐方案,用于联合众包
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-03 DOI: 10.1016/j.csi.2025.104057
Pei Ren , Bo Yang , Yanwei Zhou , Tao Wang , Feng Zhu , Ru Meng
As a prominent area of research in the AI 2.0 era, crowdsourcing has garnered significant attention. Traditional crowdsourcing systems suffer from several drawbacks, including single points of failure, privacy breaches, and isolated resources. The development of decentralized, privacy-preserving federated crowdsourcing systems has consequently emerged as an inevitable trend. However, this shift also introduces new security challenges, such as ensuring participant privacy, enabling rational task recommendations, and establishing inter-system trust. To address these challenges, we propose ScaFedCrowd, a secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing. Our scheme utilizes blockchain with smart contracts as the underlying platform to manage the crowdsourcing process, facilitating secure inter-system collaboration. We propose an intra-system registration and authentication method that uses a trapdoor function and non-interactive zero-knowledge (NIZK) proofs to provide optional anonymity for users. Based on similarity measurement and ElGamal cryptography, our scheme achieves secure cross-system authentication and authorization between servers and workers. Furthermore, task recommendations based on simple hashing intersection technique provide a foundation for cross-system authentication, ensuring privacy while recommending the most suitable tasks for workers. Finally, a secure revocation and tracking mechanism ensures the protection of legitimate rights. Security analysis and simulation results demonstrate that ScaFedCrowd enhances effectiveness, security, and versatility.
众包作为人工智能2.0时代的一个突出研究领域,受到了广泛关注。传统的众包系统有几个缺点,包括单点故障、隐私泄露和孤立的资源。因此,分散的、保护隐私的联合众包系统的发展已成为一种不可避免的趋势。然而,这种转变也带来了新的安全挑战,例如确保参与者隐私、启用合理的任务建议以及建立系统间信任。为了解决这些挑战,我们提出了ScaFedCrowd,一个安全的跨系统匿名认证和隐私保护任务推荐方案,用于联合众包。我们的方案利用区块链和智能合约作为底层平台来管理众包过程,促进安全的系统间协作。我们提出了一种系统内注册和认证方法,该方法使用陷阱门函数和非交互式零知识(NIZK)证明为用户提供可选的匿名性。该方案基于相似度度量和ElGamal加密技术,实现了服务器和工作人员之间的安全跨系统认证和授权。此外,基于简单散列交叉技术的任务推荐为跨系统身份验证提供了基础,在确保隐私的同时为工作人员推荐最适合的任务。最后,安全的撤销和跟踪机制确保了合法权利的保护。安全性分析和仿真结果表明,ScaFedCrowd增强了有效性、安全性和通用性。
{"title":"ScaFedCrowd: A secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing","authors":"Pei Ren ,&nbsp;Bo Yang ,&nbsp;Yanwei Zhou ,&nbsp;Tao Wang ,&nbsp;Feng Zhu ,&nbsp;Ru Meng","doi":"10.1016/j.csi.2025.104057","DOIUrl":"10.1016/j.csi.2025.104057","url":null,"abstract":"<div><div>As a prominent area of research in the AI 2.0 era, crowdsourcing has garnered significant attention. Traditional crowdsourcing systems suffer from several drawbacks, including single points of failure, privacy breaches, and isolated resources. The development of decentralized, privacy-preserving federated crowdsourcing systems has consequently emerged as an inevitable trend. However, this shift also introduces new security challenges, such as ensuring participant privacy, enabling rational task recommendations, and establishing inter-system trust. To address these challenges, we propose ScaFedCrowd, a secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing. Our scheme utilizes blockchain with smart contracts as the underlying platform to manage the crowdsourcing process, facilitating secure inter-system collaboration. We propose an intra-system registration and authentication method that uses a trapdoor function and non-interactive zero-knowledge (NIZK) proofs to provide optional anonymity for users. Based on similarity measurement and ElGamal cryptography, our scheme achieves secure cross-system authentication and authorization between servers and workers. Furthermore, task recommendations based on simple hashing intersection technique provide a foundation for cross-system authentication, ensuring privacy while recommending the most suitable tasks for workers. Finally, a secure revocation and tracking mechanism ensures the protection of legitimate rights. Security analysis and simulation results demonstrate that ScaFedCrowd enhances effectiveness, security, and versatility.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104057"},"PeriodicalIF":3.1,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability techniques and architectures for blockchain-enabled internet of things: Current applications, systematic review, and future trends 支持区块链的物联网的可靠性技术和架构:当前应用,系统审查和未来趋势
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-02 DOI: 10.1016/j.csi.2025.104068
Xin Sun , Xinglong Yu , Qinlu Huang , Zhigang Wang , Jiahu Guo , Zhihao Huang , Fei Xie
The rapid proliferation of Internet of Things (IoT) devices across diverse sectors has amplified concerns regarding security, scalability, and trust, particularly due to the reliance on centralized architectures. Blockchain, with its decentralized structure and cryptographic foundations, has emerged as a potential enabler of secure, scalable, and accountable IoT ecosystems. Despite increasing interest, limited attention has been paid to the reliability and dependability mechanisms in blockchain-enabled IoT networks, especially in resource-constrained or developing regions. This study presents a systematic review of key publications, categorizing them into five principal groups: consensus mechanisms, fault-tolerant designs, data integrity techniques, multi-tier-based mechanisms, and lightweight blockchain-based mechanisms. By employing this taxonomy, the review investigates how different technical approaches ranging from advanced cryptography methods to symmetry-based architectural designs contribute to trust management, operational resilience, and data protection in IoT ecosystems. The findings suggest that although blockchain integration holds substantial potential for overcoming existing limitations in IoT infrastructures, it also presents new engineering and architectural challenges. Nevertheless, the diverse techniques identified in the literature demonstrate tangible progress in improving efficiency, reducing latency, and enhancing the overall reliability and security of decentralized IoT networks.
物联网(IoT)设备在不同领域的快速扩散加剧了对安全性、可扩展性和信任的担忧,特别是由于对集中式架构的依赖。区块链凭借其分散的结构和加密基础,已成为安全、可扩展和负责任的物联网生态系统的潜在推动者。尽管人们越来越感兴趣,但对支持区块链的物联网网络的可靠性和可靠性机制的关注有限,特别是在资源受限或发展中地区。本研究对关键出版物进行了系统回顾,将其分为五个主要类别:共识机制、容错设计、数据完整性技术、基于多层的机制和基于轻量级区块链的机制。通过采用这种分类法,本文研究了从先进的加密方法到基于对称的架构设计等不同的技术方法如何有助于物联网生态系统中的信任管理、操作弹性和数据保护。研究结果表明,尽管区块链集成具有克服物联网基础设施现有限制的巨大潜力,但它也提出了新的工程和架构挑战。然而,文献中确定的各种技术在提高效率、减少延迟和增强分散物联网网络的整体可靠性和安全性方面取得了切实进展。
{"title":"Reliability techniques and architectures for blockchain-enabled internet of things: Current applications, systematic review, and future trends","authors":"Xin Sun ,&nbsp;Xinglong Yu ,&nbsp;Qinlu Huang ,&nbsp;Zhigang Wang ,&nbsp;Jiahu Guo ,&nbsp;Zhihao Huang ,&nbsp;Fei Xie","doi":"10.1016/j.csi.2025.104068","DOIUrl":"10.1016/j.csi.2025.104068","url":null,"abstract":"<div><div>The rapid proliferation of Internet of Things (IoT) devices across diverse sectors has amplified concerns regarding security, scalability, and trust, particularly due to the reliance on centralized architectures. Blockchain, with its decentralized structure and cryptographic foundations, has emerged as a potential enabler of secure, scalable, and accountable IoT ecosystems. Despite increasing interest, limited attention has been paid to the reliability and dependability mechanisms in blockchain-enabled IoT networks, especially in resource-constrained or developing regions. This study presents a systematic review of key publications, categorizing them into five principal groups: consensus mechanisms, fault-tolerant designs, data integrity techniques, multi-tier-based mechanisms, and lightweight blockchain-based mechanisms. By employing this taxonomy, the review investigates how different technical approaches ranging from advanced cryptography methods to symmetry-based architectural designs contribute to trust management, operational resilience, and data protection in IoT ecosystems. The findings suggest that although blockchain integration holds substantial potential for overcoming existing limitations in IoT infrastructures, it also presents new engineering and architectural challenges. Nevertheless, the diverse techniques identified in the literature demonstrate tangible progress in improving efficiency, reducing latency, and enhancing the overall reliability and security of decentralized IoT networks.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104068"},"PeriodicalIF":3.1,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on secure multi-party computation techniques based on private set intersection 基于私有集交集的安全多方计算技术综述
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-01 DOI: 10.1016/j.csi.2025.104067
Guoming Meng , Leyou Zhang
With the increasing emphasis on data circulation and value realization, privacy-preserving computation has become a critical enabler for cross-organizational data collaboration. This survey focuses on Private Set Intersection (PSI) techniques within the framework of Secure Multi-Party Computation (SMPC), systematically reviewing the theoretical foundations and technological evolution of PSI as a fundamental privacy-preserving protocol. We first construct a technical stack of PSI protocols, elucidating the cryptographic principles that enable efficient set operations while preserving data confidentiality. Furthermore, we explore the synergistic integration of PSI with blockchain and federated learning, highlighting innovative paradigms for addressing privacy challenges in decentralized environments. Notably, in response to emerging threats posed by quantum computing, this work analyzes the design of post-quantum PSI protocols based on pseudorandom quantum states. Through empirical studies in representative application scenarios – such as collaborative medical analytics, financial risk modeling, and government data sharing – this survey not only demonstrates the practical value of PSI but also underscores its pivotal role in building a trustworthy data collaboration ecosystem. As computational paradigms continue to evolve, PSI is poised to achieve breakthroughs in the multi-objective optimization of privacy, efficiency, and security, thereby offering robust privacy-preserving solutions across various industries.
随着对数据流通和价值实现的日益重视,隐私保护计算已成为跨组织数据协作的关键实现因素。本文重点研究了安全多方计算(SMPC)框架下的私有集交叉(PSI)技术,系统地回顾了PSI作为一种基本的隐私保护协议的理论基础和技术发展。我们首先构建了PSI协议的技术堆栈,阐明了在保持数据机密性的同时实现有效集合操作的加密原理。此外,我们探讨了PSI与区块链和联邦学习的协同集成,强调了解决分散环境中隐私挑战的创新范例。值得注意的是,为了应对量子计算带来的新威胁,本工作分析了基于伪随机量子态的后量子PSI协议的设计。通过对典型应用场景(如协同医疗分析、金融风险建模和政府数据共享)的实证研究,本调查不仅展示了PSI的实用价值,而且强调了其在构建可信赖的数据协作生态系统中的关键作用。随着计算范式的不断发展,PSI有望在隐私、效率和安全的多目标优化方面取得突破,从而为各行各业提供强大的隐私保护解决方案。
{"title":"A survey on secure multi-party computation techniques based on private set intersection","authors":"Guoming Meng ,&nbsp;Leyou Zhang","doi":"10.1016/j.csi.2025.104067","DOIUrl":"10.1016/j.csi.2025.104067","url":null,"abstract":"<div><div>With the increasing emphasis on data circulation and value realization, privacy-preserving computation has become a critical enabler for cross-organizational data collaboration. This survey focuses on Private Set Intersection (PSI) techniques within the framework of Secure Multi-Party Computation (SMPC), systematically reviewing the theoretical foundations and technological evolution of PSI as a fundamental privacy-preserving protocol. We first construct a technical stack of PSI protocols, elucidating the cryptographic principles that enable efficient set operations while preserving data confidentiality. Furthermore, we explore the synergistic integration of PSI with blockchain and federated learning, highlighting innovative paradigms for addressing privacy challenges in decentralized environments. Notably, in response to emerging threats posed by quantum computing, this work analyzes the design of post-quantum PSI protocols based on pseudorandom quantum states. Through empirical studies in representative application scenarios – such as collaborative medical analytics, financial risk modeling, and government data sharing – this survey not only demonstrates the practical value of PSI but also underscores its pivotal role in building a trustworthy data collaboration ecosystem. As computational paradigms continue to evolve, PSI is poised to achieve breakthroughs in the multi-objective optimization of privacy, efficiency, and security, thereby offering robust privacy-preserving solutions across various industries.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104067"},"PeriodicalIF":3.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144933214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of methods to improve execution time in image steganography and watermarking 改进图像隐写和水印执行时间的方法概述
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-30 DOI: 10.1016/j.csi.2025.104066
Anna Melman, Kristina Dzhanashia, Oleg Evsutin
The cybersecurity problems remain extremely relevant in the modern world. Every year image steganography and watermarking schemes are proposed that solve the problems of hidden confidential data transfer and image authentication, respectively. The authors attempt to maximize the main embedding indicators, such as capacity, invisibility, and robustness. However, in practice, the time effectiveness of embedding schemes also becomes paramount. Some schemes can provide outstanding embedding quality according to the main embedding indicators but have unsuitable time complexity for real-world applications. Others, on the contrary, aim to satisfy the requirements of real applications, sacrificing the main indicators in the process. Some authors manage to achieve the trade-off between embedding efficiency and algorithm complexity using special measures. Yet, in many works, these solutions are not covered in detail. In this paper, an overview of relevant studies in image steganography and watermarking, the authors of which apply various techniques for speed improvement, is presented. Algorithmic, software, and hardware approaches to improving computation time are analyzed separately, and the most widespread solutions are highlighted. The overview ends with promising research directions for improving the performance of additional information embedding into digital images in the context of execution time.
网络安全问题在现代世界仍然非常重要。每年都会提出图像隐写和水印方案,分别解决隐藏机密数据传输和图像认证问题。作者试图最大化主要嵌入指标,如容量、不可见性和鲁棒性。然而,在实际应用中,嵌入方案的时效性也变得至关重要。根据主要嵌入指标,有些方案可以提供出色的嵌入质量,但对于实际应用来说,时间复杂度不合适。另一些则相反,为了满足实际应用的要求,牺牲了过程中的主要指标。一些作者设法在嵌入效率和算法复杂度之间实现折衷。然而,在许多作品中,这些解决方案并没有详细介绍。本文概述了图像隐写和水印的相关研究,作者们应用了各种技术来提高速度。分别分析了改进计算时间的算法、软件和硬件方法,并强调了最广泛的解决方案。最后概述了在执行时间的背景下提高嵌入到数字图像中的附加信息的性能的有前途的研究方向。
{"title":"Overview of methods to improve execution time in image steganography and watermarking","authors":"Anna Melman,&nbsp;Kristina Dzhanashia,&nbsp;Oleg Evsutin","doi":"10.1016/j.csi.2025.104066","DOIUrl":"10.1016/j.csi.2025.104066","url":null,"abstract":"<div><div>The cybersecurity problems remain extremely relevant in the modern world. Every year image steganography and watermarking schemes are proposed that solve the problems of hidden confidential data transfer and image authentication, respectively. The authors attempt to maximize the main embedding indicators, such as capacity, invisibility, and robustness. However, in practice, the time effectiveness of embedding schemes also becomes paramount. Some schemes can provide outstanding embedding quality according to the main embedding indicators but have unsuitable time complexity for real-world applications. Others, on the contrary, aim to satisfy the requirements of real applications, sacrificing the main indicators in the process. Some authors manage to achieve the trade-off between embedding efficiency and algorithm complexity using special measures. Yet, in many works, these solutions are not covered in detail. In this paper, an overview of relevant studies in image steganography and watermarking, the authors of which apply various techniques for speed improvement, is presented. Algorithmic, software, and hardware approaches to improving computation time are analyzed separately, and the most widespread solutions are highlighted. The overview ends with promising research directions for improving the performance of additional information embedding into digital images in the context of execution time.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104066"},"PeriodicalIF":3.1,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144933213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence in web accessibility: A systematic mapping study web可访问性中的人工智能:一个系统的映射研究
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-29 DOI: 10.1016/j.csi.2025.104055
Milton Campoverde-Molina , Sergio Luján-Mora
The popularization and new renaissance of artificial intelligence (AI) have inspired the creation of new applications that help developers improve website accessibility that benefits users with and without disabilities. Therefore, this research presents a systematic mapping study (SMS) because AI in web accessibility has been gaining more interest nowadays with the exposure of works that require an SMS to systematize and consolidate the literature. Through a literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), 53 studies from ACM Digital Library, IEEE Xplore, Scopus, and Web of Science were identified for inclusion in this review. The main results of this SMS are APIs with AI, web applications and plugins with AI, image and voice recognition with AI, limitations and challenges of AI in web accessibility, correction and testing of web accessibility with AI, automatic correction of web accessibility with AI, web navigation with conversational agents with AI, web and mobile application accessibility with AI, good practices in web accessibility for AI, accessibility of web forms and elements with AI. According to the results, in the studies, alternative texts were created for the images of the websites, AI helped generate accessible HTML code using well-defined prompts, AI tools must comply with Web Content Accessibility Guidelines (WCAG), machine learning was the most used approach, the most used language models were large language models (LLM) and accessibility barrier correction using ChatGPT. The primary contribution of this SMS lies in its analysis of the current state of AI research related to web accessibility and the identification of trends and gaps in this research area. This SMS is intended for researchers, programmers, and software development companies that may use language models, AI tools, or emerging technologies in web accessibility to mitigate website accessibility barriers.
人工智能(AI)的普及和新复兴激发了新的应用程序的创建,这些应用程序帮助开发人员提高网站的可访问性,使残疾和非残疾用户受益。因此,本研究提出了一个系统的地图研究(SMS),因为人工智能在网页可访问性方面已经获得了越来越多的兴趣,现在需要一个SMS来系统化和巩固文献。通过使用系统评价和荟萃分析首选报告项目(PRISMA)进行文献综述,从ACM数字图书馆、IEEE Xplore、Scopus和Web of Science中确定了53项研究纳入本综述。该SMS的主要成果是带有AI的api、带有AI的web应用程序和插件、带有AI的图像和语音识别、AI在web可访问性方面的限制和挑战、带有AI的web可访问性的校正和测试、带有AI的web可访问性的自动校正、带有AI的会话代理的web导航、带有AI的web和移动应用程序可访问性、用于AI的web可访问性的良好实践、带有AI的web表单和元素的可访问性。根据研究结果,在研究中,为网站的图像创建了替代文本,人工智能使用定义良好的提示帮助生成可访问的HTML代码,人工智能工具必须遵守Web内容可访问性指南(WCAG),机器学习是最常用的方法,最常用的语言模型是大型语言模型(LLM)和使用ChatGPT的可访问性障碍校正。本SMS的主要贡献在于分析了与网络可访问性相关的人工智能研究的现状,并确定了该研究领域的趋势和差距。本短信适用于研究人员、程序员和软件开发公司,他们可能会使用语言模型、人工智能工具或网络可访问性中的新兴技术来减轻网站可访问性障碍。
{"title":"Artificial intelligence in web accessibility: A systematic mapping study","authors":"Milton Campoverde-Molina ,&nbsp;Sergio Luján-Mora","doi":"10.1016/j.csi.2025.104055","DOIUrl":"10.1016/j.csi.2025.104055","url":null,"abstract":"<div><div>The popularization and new renaissance of artificial intelligence (AI) have inspired the creation of new applications that help developers improve website accessibility that benefits users with and without disabilities. Therefore, this research presents a systematic mapping study (SMS) because AI in web accessibility has been gaining more interest nowadays with the exposure of works that require an SMS to systematize and consolidate the literature. Through a literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), 53 studies from ACM Digital Library, IEEE Xplore, Scopus, and Web of Science were identified for inclusion in this review. The main results of this SMS are APIs with AI, web applications and plugins with AI, image and voice recognition with AI, limitations and challenges of AI in web accessibility, correction and testing of web accessibility with AI, automatic correction of web accessibility with AI, web navigation with conversational agents with AI, web and mobile application accessibility with AI, good practices in web accessibility for AI, accessibility of web forms and elements with AI. According to the results, in the studies, alternative texts were created for the images of the websites, AI helped generate accessible HTML code using well-defined prompts, AI tools must comply with Web Content Accessibility Guidelines (WCAG), machine learning was the most used approach, the most used language models were large language models (LLM) and accessibility barrier correction using ChatGPT. The primary contribution of this SMS lies in its analysis of the current state of AI research related to web accessibility and the identification of trends and gaps in this research area. This SMS is intended for researchers, programmers, and software development companies that may use language models, AI tools, or emerging technologies in web accessibility to mitigate website accessibility barriers.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104055"},"PeriodicalIF":3.1,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144933212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive geometrical clustering routing protocol (AGCRP) for energy-efficient mobile wireless sensor networks in smart cities 面向智慧城市节能移动无线传感器网络的自适应几何聚类路由协议
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-16 DOI: 10.1016/j.csi.2025.104056
Mohamed Abdou , Hanan M. Amer , Abeer T. Khalil , Mohamed M. Abdelsalam
The use of wireless sensor networks (WSNs) has increased rapidly in recent years as almost everything around us is becoming smart. Many challenges are facing WSNs, and one of them is energy utilization. In most scenarios, sensor nodes (SNs) are battery-powered. Once the battery is exhausted, the SN is treated as a dead node and its coverage area is considered a blind region. Another problem is the mobility of SNs. In many applications, SNs are movable that creates a frequent change in the system’s topology, which may lead to a great reduction in the system’s performance. Building an appropriate routing protocol to handle these problems can significantly increase the system’s performance. An adaptive geometrical clustering routing protocol for mobile WSNs (AGCRP) is introduced. The protocol divides the network into grid cells, each cell has a forwarder cluster head (FCH), a collector cluster head (CCH), and a set of cluster members (CMs). The CCH collects the data from CMs in its cluster and sends it to the FCH. The FCH then sends the data to the main station (MS). The selection of FCHs and CCHs has been done considering parameters such as energy level, distance to the grid center, and average distance relative to CMs. The simulation results show that the suggested method increases the stabilization, lifetime, and throughput of the static environment by about 31%, 34%, and 41% respectively compared with EECRAIFA, and increases the stabilization, and lifetime for the dynamic environment by about 74% and 32% respectively compared with DTC-BR.
近年来,无线传感器网络(WSNs)的使用迅速增加,因为我们周围的几乎所有东西都变得智能。无线传感器网络面临着许多挑战,其中之一就是能量利用问题。在大多数场景下,传感器节点(SNs)由电池供电。一旦电池电量耗尽,SN被视为死节点,其覆盖区域被视为盲区。另一个问题是社交网站的移动性。在许多应用中,SNs是可移动的,这会导致系统拓扑结构的频繁变化,这可能会导致系统性能的大幅降低。构建适当的路由协议来处理这些问题可以显著提高系统的性能。介绍了一种用于移动wsn的自适应几何聚类路由协议(AGCRP)。该协议将网络划分为网格单元,每个网格单元有一个转发集群头(FCH)、一个收集器集群头(CCH)和一组集群成员(CMs)。CCH将集群内CMs的数据收集后发送给FCH。然后FCH将数据发送到主站(MS)。考虑了能量水平、到电网中心的距离以及相对于CMs的平均距离等参数,对FCHs和CCHs进行了选择。仿真结果表明,与EECRAIFA相比,该方法在静态环境下的稳定性、寿命和吞吐量分别提高了31%、34%和41%,在动态环境下的稳定性和寿命分别比DTC-BR提高了74%和32%。
{"title":"An adaptive geometrical clustering routing protocol (AGCRP) for energy-efficient mobile wireless sensor networks in smart cities","authors":"Mohamed Abdou ,&nbsp;Hanan M. Amer ,&nbsp;Abeer T. Khalil ,&nbsp;Mohamed M. Abdelsalam","doi":"10.1016/j.csi.2025.104056","DOIUrl":"10.1016/j.csi.2025.104056","url":null,"abstract":"<div><div>The use of wireless sensor networks (WSNs) has increased rapidly in recent years as almost everything around us is becoming smart. Many challenges are facing WSNs, and one of them is energy utilization. In most scenarios, sensor nodes (SNs) are battery-powered. Once the battery is exhausted, the SN is treated as a dead node and its coverage area is considered a blind region. Another problem is the mobility of SNs. In many applications, SNs are movable that creates a frequent change in the system’s topology, which may lead to a great reduction in the system’s performance. Building an appropriate routing protocol to handle these problems can significantly increase the system’s performance. An adaptive geometrical clustering routing protocol for mobile WSNs (AGCRP) is introduced. The protocol divides the network into grid cells, each cell has a forwarder cluster head (FCH), a collector cluster head (CCH), and a set of cluster members (CMs). The CCH collects the data from CMs in its cluster and sends it to the FCH. The FCH then sends the data to the main station (MS). The selection of FCHs and CCHs has been done considering parameters such as energy level, distance to the grid center, and average distance relative to CMs. The simulation results show that the suggested method increases the stabilization, lifetime, and throughput of the static environment by about 31%, 34%, and 41% respectively compared with EECRAIFA, and increases the stabilization, and lifetime for the dynamic environment by about 74% and 32% respectively compared with DTC-BR.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104056"},"PeriodicalIF":3.1,"publicationDate":"2025-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144866521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1