首页 > 最新文献

Computer Networks最新文献

英文 中文
On the aggregation of FIBs at ICN routers using routing strategy 关于使用路由策略在 ICN 路由器上聚合 FIB
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-19 DOI: 10.1016/j.comnet.2024.110794

Utilizing in-network caching is essential for the current communication network. In the last decade, ICN (Information-Centric Networking) has been under the spotlight as a network that mainly focuses on transmitted and received data rather than on hosts that transmit and receive data. In ICNs, to appropriately forward request packets, a router maintains a routing table called FIB (Forwarding Information Base). However, it is unsuitable for us to assume that FIB can store entries of all contents within a network. This is mainly because the FIB memory is not large enough to store the prefix of all contents. Thus, for realizing global-scale ICNs, it is crucial to develop an effective technique to reduce the size of FIB. In this paper, to tackle the reduction in the FIB size with the aggregation, we propose a routing strategy called constrained shortest-path tree (CSPT) routing. The fundamental idea of our CSPT routing is to combine shortest-paths on the network and that on a shortest-path tree of the network, which is intended to enhance the effect of FIB aggregation. Furthermore, we extensively investigate the relationship, i.e., trade-off, between the FIB aggregation and the communication performance of ICN using CSPT routing. Consequently, we reveal that our CSPT routing can dramatically reduce the number of FIB entries while suppressing the increase in the number of hops required to deliver request packets.

利用网络内缓存对当前的通信网络至关重要。近十年来,ICN(以信息为中心的网络)作为一种主要关注传输和接收数据而非传输和接收数据的主机的网络受到了关注。在 ICN 中,为了适当地转发请求数据包,路由器会维护一个名为 FIB(转发信息库)的路由表。但是,我们不能假定 FIB 可以存储网络内所有内容的条目。这主要是因为 FIB 内存不够大,无法存储所有内容的前缀。因此,要实现全球规模的 ICN,关键是要开发一种有效的技术来缩小 FIB 的大小。在本文中,为了解决通过聚合来缩小 FIB 大小的问题,我们提出了一种称为受限最短路径树(CSPT)路由的路由策略。CSPT 路由的基本思想是将网络上的最短路径和网络最短路径树上的最短路径结合起来,以增强 FIB 聚合的效果。此外,我们还利用 CSPT 路由广泛研究了 FIB 聚合与 ICN 通信性能之间的关系(即权衡)。结果表明,我们的 CSPT 路由可以显著减少 FIB 条目的数量,同时抑制请求数据包传递所需跳数之增。
{"title":"On the aggregation of FIBs at ICN routers using routing strategy","authors":"","doi":"10.1016/j.comnet.2024.110794","DOIUrl":"10.1016/j.comnet.2024.110794","url":null,"abstract":"<div><p>Utilizing in-network caching is essential for the current communication network. In the last decade, ICN (Information-Centric Networking) has been under the spotlight as a network that mainly focuses on transmitted and received data rather than on hosts that transmit and receive data. In ICNs, to appropriately forward request packets, a router maintains a routing table called FIB (Forwarding Information Base). However, it is unsuitable for us to assume that FIB can store entries of all contents within a network. This is mainly because the FIB memory is not large enough to store the prefix of all contents. Thus, for realizing global-scale ICNs, it is crucial to develop an effective technique to reduce the size of FIB. In this paper, to tackle the reduction in the FIB size with the aggregation, we propose a routing strategy called <em>constrained shortest-path tree (CSPT) routing</em>. The fundamental idea of our CSPT routing is to combine shortest-paths on the network and that on a shortest-path tree of the network, which is intended to enhance the effect of FIB aggregation. Furthermore, we extensively investigate the relationship, i.e., trade-off, between the FIB aggregation and the communication performance of ICN using CSPT routing. Consequently, we reveal that our CSPT routing can dramatically reduce the number of FIB entries while suppressing the increase in the number of hops required to deliver request packets.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing SD-MDN-TM:针对 IP 欺骗的 DDoS 攻击的回溯和缓解集成机制
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-19 DOI: 10.1016/j.comnet.2024.110793

Traceback has been very attractive against DDoS attacks with IP spoofing instead of traditional mitigation methods because attacks require removal near attackers, resulting in affecting legitimate traffic as little as possible. There have been some approaches dedicated to achieving effective traceback. However, existing approaches often modify protocols to apply to multi-domain scenarios, and the implemented mitigation usually lags behind traceback. Therefore, this paper proposes the Software-Defined Multi-Domain Network Tracer and Mitigator (SD-MDN-TM) to traceback and mitigate DDoS attacks with IP spoofing in multi-domain SDN scenarios. We apply systematic sampling and flow feature extraction based on the Count-Min Sketch data structure for the lightweight statistics collection of massive DDoS attack traffic. We also design the TracebackTree data structure to construct the traceback paths of attackers of distributed attack sources. The Border Switch Trigger Mechanism is proposed to overcome the drawbacks of the commonly-used packet marking in cross-domain traceback information transfer, achieving no modification of existing network protocols and independent traceback among multiple domains. Mitigation is integrated with traceback for faster removal of attacks from the network. The proposed scheme can traceback DDoS attack sources both inside and outside domains accurately and effectively by constructing traceback path. It can be implemented without modifying the existing protocols, therefore achieving direct application to the existing network architecture. Furthermore, the traceback of attack sources outside domains can maintain independence in multi-domain scenarios. Mitigation integrated with traceback can achieve less impact on legitimate traffic and faster removal of attacks from the network.

与传统的缓解方法相比,回溯法在对付使用 IP 欺骗的 DDoS 攻击时非常有吸引力,因为攻击需要在攻击者附近清除,从而尽可能减少对合法流量的影响。已有一些方法专门用于实现有效的回溯。但是,现有方法通常会修改协议以适用于多域场景,而且实施的缓解措施通常落后于回溯。因此,本文提出了软件定义的多域网络跟踪和缓解器(SD-MDN-TM),用于在多域 SDN 场景中跟踪和缓解带有 IP 欺骗的 DDoS 攻击。我们采用基于 Count-Min Sketch 数据结构的系统采样和流量特征提取技术,对大规模 DDoS 攻击流量进行轻量级统计收集。我们还设计了 TracebackTree 数据结构,用于构建分布式攻击源的攻击者回溯路径。提出了边界交换触发机制,克服了跨域回溯信息传递中常用的数据包标记的弊端,实现了对现有网络协议的不修改和多域间的独立回溯。缓解措施与回溯相结合,可更快地清除网络中的攻击。所提方案通过构建回溯路径,可准确有效地回溯域内外的 DDoS 攻击源。该方案无需修改现有协议即可实现,因此可直接应用于现有网络架构。此外,域外攻击源的回溯可在多域场景中保持独立性。与回溯相结合的缓解措施可以减少对合法流量的影响,并更快地将攻击从网络中清除。
{"title":"SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing","authors":"","doi":"10.1016/j.comnet.2024.110793","DOIUrl":"10.1016/j.comnet.2024.110793","url":null,"abstract":"<div><p>Traceback has been very attractive against DDoS attacks with IP spoofing instead of traditional mitigation methods because attacks require removal near attackers, resulting in affecting legitimate traffic as little as possible. There have been some approaches dedicated to achieving effective traceback. However, existing approaches often modify protocols to apply to multi-domain scenarios, and the implemented mitigation usually lags behind traceback. Therefore, this paper proposes the Software-Defined Multi-Domain Network Tracer and Mitigator (SD-MDN-TM) to traceback and mitigate DDoS attacks with IP spoofing in multi-domain SDN scenarios. We apply systematic sampling and flow feature extraction based on the Count-Min Sketch data structure for the lightweight statistics collection of massive DDoS attack traffic. We also design the TracebackTree data structure to construct the traceback paths of attackers of distributed attack sources. The Border Switch Trigger Mechanism is proposed to overcome the drawbacks of the commonly-used packet marking in cross-domain traceback information transfer, achieving no modification of existing network protocols and independent traceback among multiple domains. Mitigation is integrated with traceback for faster removal of attacks from the network. The proposed scheme can traceback DDoS attack sources both inside and outside domains accurately and effectively by constructing traceback path. It can be implemented without modifying the existing protocols, therefore achieving direct application to the existing network architecture. Furthermore, the traceback of attack sources outside domains can maintain independence in multi-domain scenarios. Mitigation integrated with traceback can achieve less impact on legitimate traffic and faster removal of attacks from the network.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-step linear programming approach for repeater placement in large-scale quantum networks 大规模量子网络中中继器安置的两步线性规划方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-18 DOI: 10.1016/j.comnet.2024.110795

Thanks to the applications such as Quantum Key Distribution and Distributed Quantum Computing, the deployment of quantum networks is gaining great momentum. A major component in quantum networks is repeaters, which are essential for reducing the error rate of qubit transmission for long-distance links. However, repeaters are expensive devices, so minimizing the number of repeaters placed in a quantum network while satisfying performance requirements becomes an important problem. Existing solutions typically solve this problem optimally by formulating an Integer Linear Program (ILP). However, the number of variables in their ILPs is O(n2), where n is the number of nodes in a network. This incurs infeasible running time when the network scale is large. To overcome this drawback, this paper proposes to solve the repeater placement problem by two steps, with each step using a linear program of a much smaller scale with O(n) variables. Although this solution is not optimal, it dramatically reduces the time complexity, making it practical for large-scale networks. Moreover, it constructs networks that have higher node connectivity than those by existing solutions, since it deploys slightly more number of repeaters into networks. Our extensive experiments on both synthetic and real-world network topologies verified our claims.

得益于量子密钥分发和分布式量子计算等应用,量子网络的部署正获得巨大发展。量子网络的一个重要组成部分是中继器,它对于降低长距离链路中量子比特传输的错误率至关重要。然而,中继器是昂贵的设备,因此,在满足性能要求的同时尽量减少量子网络中的中继器数量成为一个重要问题。现有的解决方案通常通过制定整数线性规划(ILP)来优化解决这一问题。然而,其 ILP 中的变量数为 O(n2),其中 n 是网络中的节点数。当网络规模较大时,这就会产生不可行的运行时间。为了克服这一缺点,本文建议分两步解决中继器放置问题,每一步都使用规模小得多的线性程序,变量为 O(n) 个。虽然这一方案并非最优,但它大大降低了时间复杂度,因此适用于大规模网络。此外,由于它在网络中部署的中继器数量略多,因此它构建的网络比现有解决方案具有更高的节点连通性。我们在合成网络拓扑和真实世界网络拓扑上进行的大量实验验证了我们的说法。
{"title":"A two-step linear programming approach for repeater placement in large-scale quantum networks","authors":"","doi":"10.1016/j.comnet.2024.110795","DOIUrl":"10.1016/j.comnet.2024.110795","url":null,"abstract":"<div><p>Thanks to the applications such as Quantum Key Distribution and Distributed Quantum Computing, the deployment of quantum networks is gaining great momentum. A major component in quantum networks is repeaters, which are essential for reducing the error rate of qubit transmission for long-distance links. However, repeaters are expensive devices, so minimizing the number of repeaters placed in a quantum network while satisfying performance requirements becomes an important problem. Existing solutions typically solve this problem optimally by formulating an Integer Linear Program (ILP). However, the number of variables in their ILPs is <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></mrow></math></span>, where <span><math><mi>n</mi></math></span> is the number of nodes in a network. This incurs infeasible running time when the network scale is large. To overcome this drawback, this paper proposes to solve the repeater placement problem by two steps, with each step using a linear program of a much smaller scale with <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>n</mi><mo>)</mo></mrow></mrow></math></span> variables. Although this solution is not optimal, it dramatically reduces the time complexity, making it practical for large-scale networks. Moreover, it constructs networks that have higher node connectivity than those by existing solutions, since it deploys slightly more number of repeaters into networks. Our extensive experiments on both synthetic and real-world network topologies verified our claims.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006273/pdfft?md5=514277d17e6855a7161cf9235a13a0a6&pid=1-s2.0-S1389128624006273-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network traffic prediction based on PSO-LightGBM-TM 基于 PSO-LightGBM-TM 的网络流量预测
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-17 DOI: 10.1016/j.comnet.2024.110810

Network traffic prediction is critical in wireless network management by allowing a good estimate of the traffic trend, which is also an important approach for detecting traffic anomalies in order to enhance network security. Deep-learning-based method has been widely adopted to predict network traffic matrix (TM) though with the main drawbacks in high complexity and low efficiency. In this paper, we propose a traffic prediction model based on Particle Swarm Optimization (PSO) and LightGBM (PSO-LightGBM-TM), which optimizes the LightGBM parameters for each network flow by PSO so that LightGBM can adapt to each of the network traffic flow. Compared with existing commonly used deep learning models, our model has a more straightforward structure and yet outperforms existing deep learning models. Sufficient comparison tests on three real network traffic datasets, Abilene, GÉANT, and CERNET have been conducted, and the results show that our model provides more accurate results and higher prediction efficiency.

网络流量预测是无线网络管理的关键,它可以很好地估计流量趋势,也是检测流量异常以加强网络安全的重要方法。基于深度学习的方法已被广泛用于预测网络流量矩阵(TM),但其主要缺点是复杂度高、效率低。本文提出了一种基于粒子群优化(PSO)和LightGBM的流量预测模型(PSO-LightGBM-TM),通过PSO优化每个网络流量的LightGBM参数,使LightGBM能够适应每个网络流量。与现有的常用深度学习模型相比,我们的模型结构更简单,但性能却优于现有的深度学习模型。我们在 Abilene、GÉANT 和 CERNET 三个真实网络流量数据集上进行了充分的对比测试,结果表明我们的模型能提供更准确的结果和更高的预测效率。
{"title":"Network traffic prediction based on PSO-LightGBM-TM","authors":"","doi":"10.1016/j.comnet.2024.110810","DOIUrl":"10.1016/j.comnet.2024.110810","url":null,"abstract":"<div><p>Network traffic prediction is critical in wireless network management by allowing a good estimate of the traffic trend, which is also an important approach for detecting traffic anomalies in order to enhance network security. Deep-learning-based method has been widely adopted to predict network traffic matrix (TM) though with the main drawbacks in high complexity and low efficiency. In this paper, we propose a traffic prediction model based on Particle Swarm Optimization (PSO) and LightGBM (PSO-LightGBM-TM), which optimizes the LightGBM parameters for each network flow by PSO so that LightGBM can adapt to each of the network traffic flow. Compared with existing commonly used deep learning models, our model has a more straightforward structure and yet outperforms existing deep learning models. Sufficient comparison tests on three real network traffic datasets, Abilene, GÉANT, and CERNET have been conducted, and the results show that our model provides more accurate results and higher prediction efficiency.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GCP: A multi-strategy improved wireless sensor network model for environmental monitoring GCP:用于环境监测的多策略改进型无线传感器网络模型
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-16 DOI: 10.1016/j.comnet.2024.110807

Nowadays, smart environmental monitoring devices are widely used in various fields, and one of the most representative tools is the wireless sensor network (WSN). WSNs are easy to deploy and provide real-time information feedback, which is very suitable for environmental monitoring. As we all know, the environmental monitoring network because of the special nature of its work requirements, the need for uninterrupted and real-time transmission of monitoring data, which leads to energy consumption is extremely large, and this cannot meet the needs of its long-term work. Existing traditional routing has problems such as unscientific cluster head election and high redundancy in data transmission, which usually lead to a large amount of energy consumption, which is not conducive to the long-term stable operation of sensor networks. In this paper, we improve the traditional routing protocol and design a cluster head election method based on the genetic algorithm, which proposes a new fitness function in terms of energy, distance, and the number of nodes in the cluster, and performs the selection of cluster head nodes based on this method. In addition, we propose a new grey prediction model, which can realize the real-time update of data queues, and optimize the data transmission process of traditional WSNs based on this prediction model to reduce the amount of intra-cluster data transmission. Combining these improvements, a grey cluster prediction (GCP) model is proposed, and the performance of the model is tested based on real mine and soil data sets. The simulation results show that the model significantly reduces energy loss and extends the network life cycle while ensuring the integrity of data transmission. It can also meet the requirements of long-term stable operation of environmental monitoring equipment.

如今,智能环境监测设备被广泛应用于各个领域,其中最具代表性的工具之一就是无线传感器网络(WSN)。WSN 部署简便,信息反馈实时,非常适合环境监测。众所周知,环境监测网络由于其工作要求的特殊性,需要不间断、实时地传输监测数据,从而导致能耗极大,这无法满足其长期工作的需要。现有的传统路由存在簇头选举不科学、数据传输冗余度高等问题,通常会导致大量的能量消耗,不利于传感器网络的长期稳定运行。本文改进了传统的路由协议,设计了一种基于遗传算法的簇头选举方法,从能量、距离、簇内节点数等方面提出了一种新的适配函数,并基于该方法进行簇头节点的选择。此外,我们还提出了一种新的灰色预测模型,可以实现数据队列的实时更新,并基于该预测模型优化传统 WSN 的数据传输过程,减少簇内数据传输量。结合上述改进,提出了灰色簇预测(GCP)模型,并基于真实的矿山和土壤数据集测试了该模型的性能。仿真结果表明,该模型在确保数据传输完整性的同时,显著降低了能量损耗,延长了网络生命周期。它还能满足环境监测设备长期稳定运行的要求。
{"title":"GCP: A multi-strategy improved wireless sensor network model for environmental monitoring","authors":"","doi":"10.1016/j.comnet.2024.110807","DOIUrl":"10.1016/j.comnet.2024.110807","url":null,"abstract":"<div><p>Nowadays, smart environmental monitoring devices are widely used in various fields, and one of the most representative tools is the wireless sensor network (WSN). WSNs are easy to deploy and provide real-time information feedback, which is very suitable for environmental monitoring. As we all know, the environmental monitoring network because of the special nature of its work requirements, the need for uninterrupted and real-time transmission of monitoring data, which leads to energy consumption is extremely large, and this cannot meet the needs of its long-term work. Existing traditional routing has problems such as unscientific cluster head election and high redundancy in data transmission, which usually lead to a large amount of energy consumption, which is not conducive to the long-term stable operation of sensor networks. In this paper, we improve the traditional routing protocol and design a cluster head election method based on the genetic algorithm, which proposes a new fitness function in terms of energy, distance, and the number of nodes in the cluster, and performs the selection of cluster head nodes based on this method. In addition, we propose a new grey prediction model, which can realize the real-time update of data queues, and optimize the data transmission process of traditional WSNs based on this prediction model to reduce the amount of intra-cluster data transmission. Combining these improvements, a grey cluster prediction (GCP) model is proposed, and the performance of the model is tested based on real mine and soil data sets. The simulation results show that the model significantly reduces energy loss and extends the network life cycle while ensuring the integrity of data transmission. It can also meet the requirements of long-term stable operation of environmental monitoring equipment.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A truthful double auction mechanism for resource provisioning and elastic service in vehicle computing 用于车辆计算资源供应和弹性服务的真实双重拍卖机制
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-16 DOI: 10.1016/j.comnet.2024.110806

Intelligent vehicles, equipped with powerful computing and sensing resources, serve as versatile mobile computing platforms, offering many resources to users. This study focuses on resource provisioning and elastic service to address the paramount issue of resource provisioning for in-vehicle computing. It introduces an elastic sensing service, enabling users to declare multiple requested areas to obtain sensing data. It allows various vehicles to collaborate in providing services to a single user when individual vehicles cannot complete the task alone. The approach formulated as a double auction-based setting involves a market with multiple self-interested users and vehicles. The main objective is to design a mechanism that maximizes social welfare. First, a greedy mechanism provides different task allocation strategies while ensuring truthfulness. The proposed mechanism is truthful and equilibrium-driven, achieving individual rationality, consumer sovereignty, and budget balance. It demonstrates the approximation ratio. Simulation results indicate that the proposed mechanism can increase social welfare and the number of served users by at least 29% and 9%, respectively, compared with baseline methods. This research paves the way for more efficient resource provisioning in intelligent vehicles, ultimately enhancing these mobile computing platforms’ overall user experience and capabilities.

智能汽车配备了强大的计算和传感资源,可作为多功能移动计算平台,为用户提供多种资源。本研究侧重于资源调配和弹性服务,以解决车载计算资源调配的首要问题。它引入了弹性传感服务,使用户能够声明多个请求区域以获取传感数据。当单个车辆无法单独完成任务时,它允许各种车辆协作为单个用户提供服务。这种基于双重拍卖的方法涉及一个有多个自利用户和车辆的市场。主要目标是设计一种社会福利最大化的机制。首先,贪婪机制提供了不同的任务分配策略,同时确保真实性。所提出的机制具有真实性和均衡性,实现了个人理性、消费者主权和预算平衡。它证明了近似率。仿真结果表明,与基线方法相比,所提出的机制能将社会福利和服务用户数量分别提高至少 29% 和 9%。这项研究为在智能汽车中更有效地提供资源铺平了道路,最终提升了这些移动计算平台的整体用户体验和能力。
{"title":"A truthful double auction mechanism for resource provisioning and elastic service in vehicle computing","authors":"","doi":"10.1016/j.comnet.2024.110806","DOIUrl":"10.1016/j.comnet.2024.110806","url":null,"abstract":"<div><p>Intelligent vehicles, equipped with powerful computing and sensing resources, serve as versatile mobile computing platforms, offering many resources to users. This study focuses on resource provisioning and elastic service to address the paramount issue of resource provisioning for in-vehicle computing. It introduces an elastic sensing service, enabling users to declare multiple requested areas to obtain sensing data. It allows various vehicles to collaborate in providing services to a single user when individual vehicles cannot complete the task alone. The approach formulated as a double auction-based setting involves a market with multiple self-interested users and vehicles. The main objective is to design a mechanism that maximizes social welfare. First, a greedy mechanism provides different task allocation strategies while ensuring truthfulness. The proposed mechanism is truthful and equilibrium-driven, achieving individual rationality, consumer sovereignty, and budget balance. It demonstrates the approximation ratio. Simulation results indicate that the proposed mechanism can increase social welfare and the number of served users by at least 29% and 9%, respectively, compared with baseline methods. This research paves the way for more efficient resource provisioning in intelligent vehicles, ultimately enhancing these mobile computing platforms’ overall user experience and capabilities.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security offloading performance in NOMA heterogeneous MEC networks using access point selection and meta-heuristic algorithm 利用接入点选择和元启发式算法提高 NOMA 异构 MEC 网络的安全卸载性能
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-13 DOI: 10.1016/j.comnet.2024.110802

The research delves into the intricate domain of security offloading within the context of non-orthogonal multiple access (NOMA) heterogeneous mobile edge computing (het-MEC) networks operating over Rayleigh fading channels. The investigation centers on a system model comprising a single antenna-equipped edge user, denoted as U, which strategically offloads computational tasks to two distinct heterogeneous wireless access points (APs): the far AP (AP1) and the near one (AP2), employing NOMA techniques. Notably, the research accounts for a passive eavesdropper (E) intending to intercept the UAP2 transmission. A four-phase protocol is proposed to ensure the security offloading process, namely SAPS, which leverages wireless access point selection (APS) and physical layer security (PLS) techniques. The focus extends to derive a closed-form expression for a novel critical system performance metric: the secrecy successful computation probability (SSCP). Furthermore, an algorithm based on Ant Colony Optimization (ACO) within the continuous domain is introduced, which aims to enhance the SSCP by intelligently determining system parameters. The impact of critical factors such as transmit power, power allocation coefficient, bandwidth, CPU frequency, and task division ratio under the SAPS scheme is explored and compared to the conventional approach using pure NOMA. Remarkably, the algorithm in the proposed scheme demonstrates up to a 3% performance improvement. The validity and accuracy of the study findings are verified through Monte-Carlo simulations. The work contributes significantly to advancing secure offloading strategies in NOMA-based MEC networks, offering valuable insights for practical deployment and optimization.

该研究深入探讨了在瑞利衰减信道上运行的非正交多址(NOMA)异构移动边缘计算(het-MEC)网络中安全卸载这一错综复杂的领域。研究以一个系统模型为中心,该模型包括一个配备天线的边缘用户(以 U 表示),该用户采用 NOMA 技术,有策略地将计算任务卸载到两个不同的异构无线接入点(AP):远端接入点(AP1)和近端接入点(AP2)。值得注意的是,这项研究考虑到了打算拦截 U-AP2 传输的被动窃听者 (E)。为确保安全卸载过程,提出了一个四阶段协议,即利用无线接入点选择(APS)和物理层安全(PLS)技术的 SAPS。研究重点扩展到推导出一种新型关键系统性能指标的闭式表达式:保密成功计算概率(SSCP)。此外,还介绍了一种基于连续域内蚁群优化(ACO)的算法,旨在通过智能确定系统参数来提高 SSCP。在 SAPS 方案下,探讨了发射功率、功率分配系数、带宽、CPU 频率和任务分工比等关键因素的影响,并与使用纯 NOMA 的传统方法进行了比较。值得注意的是,所提方案中的算法最多可提高 3% 的性能。研究结果的有效性和准确性通过蒙特卡洛模拟得到了验证。该研究成果为推进基于 NOMA 的 MEC 网络中的安全卸载策略做出了重大贡献,为实际部署和优化提供了宝贵的见解。
{"title":"Enhancing security offloading performance in NOMA heterogeneous MEC networks using access point selection and meta-heuristic algorithm","authors":"","doi":"10.1016/j.comnet.2024.110802","DOIUrl":"10.1016/j.comnet.2024.110802","url":null,"abstract":"<div><p>The research delves into the intricate domain of security offloading within the context of non-orthogonal multiple access (NOMA) heterogeneous mobile edge computing (het-MEC) networks operating over Rayleigh fading channels. The investigation centers on a system model comprising a single antenna-equipped edge user, denoted as <span><math><mi>U</mi></math></span>, which strategically offloads computational tasks to two distinct heterogeneous wireless access points (APs): the far AP (<span><math><mrow><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>1</mn></mrow></msub></mrow></math></span>) and the near one (<span><math><mrow><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></math></span>), employing NOMA techniques. Notably, the research accounts for a passive eavesdropper (<span><math><mi>E</mi></math></span>) intending to intercept the <span><math><mrow><mi>U</mi><mo>−</mo><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></math></span> transmission. A four-phase protocol is proposed to ensure the security offloading process, namely SAPS, which leverages wireless access point selection (APS) and physical layer security (PLS) techniques. The focus extends to derive a closed-form expression for a novel critical system performance metric: the secrecy successful computation probability (SSCP). Furthermore, an algorithm based on Ant Colony Optimization (ACO) within the continuous domain is introduced, which aims to enhance the SSCP by intelligently determining system parameters. The impact of critical factors such as transmit power, power allocation coefficient, bandwidth, CPU frequency, and task division ratio under the SAPS scheme is explored and compared to the conventional approach using pure NOMA. Remarkably, the algorithm in the proposed scheme demonstrates up to a 3% performance improvement. The validity and accuracy of the study findings are verified through Monte-Carlo simulations. The work contributes significantly to advancing secure offloading strategies in NOMA-based MEC networks, offering valuable insights for practical deployment and optimization.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient load distribution in heterogeneous vehicular networks using hierarchical controllers 使用分层控制器在异构车载网络中高效分配负载
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-13 DOI: 10.1016/j.comnet.2024.110805

Vehicle movement poses significant challenges in vehicular networks, often resulting in uneven traffic distribution. Fog computing (FC) addresses this by operating at the network edge, handling specific tasks locally instead of relying solely on cloud computing (CC) facilities. There are instances where FC may need additional resources and must delegate tasks to CC, leading to increased delay and response time. This work conducts a thorough examination of previous load balancing (LB) strategies, with a specific focus on software-defined networking (SDN) and machine learning (ML) based LB within the internet of vehicles (IoV). The insights derived from this research expedite the development of SDN controller-based LB solutions in the IoV network. The authors proposes the integration of a local SDN controller (LSDNC) within the FC tier to enable localized LB, addressing delay concerns. However, the information will be available to the main SDN controller (MSDNC) too. The authors explore the concept mathematically and simulates the formulated model and subjecting it to a comprehensive performance analysis. The simulation results demonstrate a significant reduction in delay, with a 125 ms difference when 200 onboard units (OBUs) are used, compared to conventional software-defined vehicular networks (SDVN). This improvement continues to increase as the number of OBUs grows. Our model achieves the same maximum throughput as the previous model but delivers faster response times, as decisions are made locally without the need to wait for the main controller.

车辆移动给车载网络带来了巨大挑战,常常导致流量分布不均。为解决这一问题,雾计算(FC)在网络边缘运行,在本地处理特定任务,而不是完全依赖云计算(CC)设施。在某些情况下,FC 可能需要额外资源,必须将任务委托给 CC,从而导致延迟和响应时间增加。本研究对以往的负载平衡(LB)策略进行了深入研究,重点关注车联网(IoV)中基于软件定义网络(SDN)和机器学习(ML)的负载平衡。这项研究得出的见解加快了 IoV 网络中基于 SDN 控制器的 LB 解决方案的发展。作者建议在 FC 层中集成本地 SDN 控制器 (LSDNC),以实现本地化 LB,解决延迟问题。不过,主 SDN 控制器(MSDNC)也可以获得相关信息。作者从数学角度探讨了这一概念,并模拟了所制定的模型,对其进行了全面的性能分析。仿真结果表明,与传统的软件定义车载网络(SDVN)相比,在使用 200 个车载单元(OBU)时,延迟明显减少,相差 125 毫秒。随着 OBU 数量的增加,这种改进还会继续加大。我们的模型实现了与前一模型相同的最大吞吐量,但响应时间更快,因为决策是在本地做出的,无需等待主控制器。
{"title":"Efficient load distribution in heterogeneous vehicular networks using hierarchical controllers","authors":"","doi":"10.1016/j.comnet.2024.110805","DOIUrl":"10.1016/j.comnet.2024.110805","url":null,"abstract":"<div><p>Vehicle movement poses significant challenges in vehicular networks, often resulting in uneven traffic distribution. Fog computing (FC) addresses this by operating at the network edge, handling specific tasks locally instead of relying solely on cloud computing (CC) facilities. There are instances where FC may need additional resources and must delegate tasks to CC, leading to increased delay and response time. This work conducts a thorough examination of previous load balancing (LB) strategies, with a specific focus on software-defined networking (SDN) and machine learning (ML) based LB within the internet of vehicles (IoV). The insights derived from this research expedite the development of SDN controller-based LB solutions in the IoV network. The authors proposes the integration of a local SDN controller (LSDNC) within the FC tier to enable localized LB, addressing delay concerns. However, the information will be available to the main SDN controller (MSDNC) too. The authors explore the concept mathematically and simulates the formulated model and subjecting it to a comprehensive performance analysis. The simulation results demonstrate a significant reduction in delay, with a 125 ms difference when 200 onboard units (OBUs) are used, compared to conventional software-defined vehicular networks (SDVN). This improvement continues to increase as the number of OBUs grows. Our model achieves the same maximum throughput as the previous model but delivers faster response times, as decisions are made locally without the need to wait for the main controller.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of fault management techniques for edge-enabled distributed metaverse applications 边缘分布式元数据应用的故障管理技术概览
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-13 DOI: 10.1016/j.comnet.2024.110803

The metaverse, envisioned as a vast, distributed virtual world, relies on edge computing for low-latency data processing. However, ensuring fault tolerance – the system’s ability to handle failures – is critical for a seamless user experience. This paper analyzes existing research on fault tolerance in edge computing over the past six years, specifically focusing on its applicability to the metaverse. We identify common fault types like node failures, communication disruptions, and security issues. The analysis then explores various fault management techniques including proactive monitoring, resource optimization, task scheduling, workload migration, redundancy for service continuity, machine learning for predictive maintenance, and consensus algorithms to guarantee data integrity. While these techniques hold promise, adaptations are necessary to address the metaverse’s real-time interaction requirements and low-latency constraints. This paper analyzes existing research and identifies key areas for improvement, providing valuable research guidelines and insights to pave the way for the development of fault management techniques specifically tailored to the metaverse, ultimately contributing to a robust and secure virtual world.

元宇宙被设想为一个巨大的分布式虚拟世界,它依赖边缘计算来实现低延迟数据处理。然而,确保容错(系统处理故障的能力)对于无缝用户体验至关重要。本文分析了过去六年中有关边缘计算容错的现有研究,特别关注其在元宇宙中的适用性。我们确定了节点故障、通信中断和安全问题等常见故障类型。然后,分析探讨了各种故障管理技术,包括主动监控、资源优化、任务调度、工作负载迁移、服务连续性冗余、预测性维护的机器学习以及保证数据完整性的共识算法。尽管这些技术前景广阔,但仍有必要进行调整,以满足元宇宙的实时交互要求和低延迟限制。本文分析了现有的研究,确定了需要改进的关键领域,提供了有价值的研究指南和见解,为开发专门针对元宇宙的故障管理技术铺平了道路,最终有助于建立一个强大而安全的虚拟世界。
{"title":"Survey of fault management techniques for edge-enabled distributed metaverse applications","authors":"","doi":"10.1016/j.comnet.2024.110803","DOIUrl":"10.1016/j.comnet.2024.110803","url":null,"abstract":"<div><p>The metaverse, envisioned as a vast, distributed virtual world, relies on edge computing for low-latency data processing. However, ensuring fault tolerance – the system’s ability to handle failures – is critical for a seamless user experience. This paper analyzes existing research on fault tolerance in edge computing over the past six years, specifically focusing on its applicability to the metaverse. We identify common fault types like node failures, communication disruptions, and security issues. The analysis then explores various fault management techniques including proactive monitoring, resource optimization, task scheduling, workload migration, redundancy for service continuity, machine learning for predictive maintenance, and consensus algorithms to guarantee data integrity. While these techniques hold promise, adaptations are necessary to address the metaverse’s real-time interaction requirements and low-latency constraints. This paper analyzes existing research and identifies key areas for improvement, providing valuable research guidelines and insights to pave the way for the development of fault management techniques specifically tailored to the metaverse, ultimately contributing to a robust and secure virtual world.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the internet’s backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense 确保互联网骨干网的安全:基于区块链的 DNS 缓存中毒防御激励驱动架构
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110777

Domain Name System (DNS) is the backbone of the Internet infrastructure, converting human-friendly domain names into machine-processable IP addresses. However, DNS remains vulnerable to various security threats, such as cache poisoning attacks, where malicious attackers inject false information into DNS resolvers’ caches. Although efforts have been made to enhance DNS against such vulnerabilities, existing countermeasures often fall short in one or more areas: they may offer limited resistance to the collusion attack, introduce significant overhead, or require complex implementation that hinders widespread adoption. To address these challenges, this paper introduces TI-DNS+, a trusted and incentivized blockchain-based DNS resolution architecture for cache poisoning defense. TI-DNS+ introduces a Verification Cache exploiting blockchain ledger’s immutable nature to detect and correct forged DNS responses. The architecture also incorporates a multi-resolver Query Vote mechanism, enhancing the ledger’s credibility by validating each record modification through a stake-weighted algorithm. This algorithm selects resolvers as validators based on their stake proportion. To promote well-behaved participation, TI-DNS+ also implements a novel stake-based incentive mechanism that optimizes the generation and distribution of stake rewards. This ensures that incentives align with participants’ contributions, achieving incentive compatibility, fairness, and efficiency. Moreover, TI-DNS+ possesses high practicability as it requires only resolver-side modifications to current DNS. Finally, through comprehensive prototyping and experimental evaluations, the results demonstrate that our solution effectively mitigates DNS cache poisoning. Compared to competitors, our solution improves attack resistance by 1-3 orders of magnitude, while also reducing resolution latency by 5% to 68%.

域名系统(DNS)是互联网基础设施的支柱,它将人类友好的域名转换为机器可处理的 IP 地址。然而,DNS 仍然容易受到各种安全威胁的影响,例如缓存中毒攻击,恶意攻击者会在 DNS 解析器的缓存中注入虚假信息。尽管人们一直在努力增强 DNS 的能力,以抵御此类漏洞,但现有的应对措施往往在一个或多个方面存在不足:它们对串通攻击的抵御能力有限,引入了大量开销,或者需要复杂的实施,从而阻碍了广泛应用。为了应对这些挑战,本文介绍了 TI-DNS+,一种基于区块链的可信和激励的 DNS 解析架构,用于缓存中毒防御。TI-DNS+ 引入了验证缓存,利用区块链账本的不可变性来检测和纠正伪造的 DNS 响应。该架构还采用了多解析器查询投票机制,通过利害关系加权算法验证每条记录的修改,从而提高分类账的可信度。该算法根据解析器的股权比例选择解析器作为验证者。为促进行为规范的参与,TI-DNS+ 还实施了一种新颖的基于股权的激励机制,优化了股权奖励的生成和分配。这确保了激励与参与者的贡献相一致,实现了激励的兼容性、公平性和高效性。此外,TI-DNS+ 还具有很高的实用性,因为它只需要对当前的 DNS 进行解析器方面的修改。最后,通过全面的原型设计和实验评估,结果表明我们的解决方案能有效缓解 DNS 缓存中毒问题。与竞争对手相比,我们的解决方案将抗攻击能力提高了 1-3 个数量级,同时还将解析延迟降低了 5%-68%。
{"title":"Securing the internet’s backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense","authors":"","doi":"10.1016/j.comnet.2024.110777","DOIUrl":"10.1016/j.comnet.2024.110777","url":null,"abstract":"<div><p>Domain Name System (DNS) is the backbone of the Internet infrastructure, converting human-friendly domain names into machine-processable IP addresses. However, DNS remains vulnerable to various security threats, such as cache poisoning attacks, where malicious attackers inject false information into DNS resolvers’ caches. Although efforts have been made to enhance DNS against such vulnerabilities, existing countermeasures often fall short in one or more areas: they may offer limited resistance to the collusion attack, introduce significant overhead, or require complex implementation that hinders widespread adoption. To address these challenges, this paper introduces TI-DNS+, a trusted and incentivized blockchain-based DNS resolution architecture for cache poisoning defense. TI-DNS+ introduces a <em>Verification Cache</em> exploiting blockchain ledger’s immutable nature to detect and correct forged DNS responses. The architecture also incorporates a multi-resolver <em>Query Vote</em> mechanism, enhancing the ledger’s credibility by validating each record modification through a stake-weighted algorithm. This algorithm selects resolvers as validators based on their stake proportion. To promote well-behaved participation, TI-DNS+ also implements a novel stake-based incentive mechanism that optimizes the generation and distribution of stake rewards. This ensures that incentives align with participants’ contributions, achieving incentive compatibility, fairness, and efficiency. Moreover, TI-DNS+ possesses high practicability as it requires only resolver-side modifications to current DNS. Finally, through comprehensive prototyping and experimental evaluations, the results demonstrate that our solution effectively mitigates DNS cache poisoning. Compared to competitors, our solution improves attack resistance by 1-3 orders of magnitude, while also reducing resolution latency by 5% to 68%.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1