首页 > 最新文献

Computer Networks最新文献

英文 中文
Advancing TSN flow scheduling: An efficient framework without flow isolation constraint 推进 TSN 流量调度:无流量隔离约束的高效框架
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-03 DOI: 10.1016/j.comnet.2024.110688

In the domain of Time-Sensitive Networking (TSN), the quest for ultra-reliable low-latency communication is paramount. Current scheduling strategies, which hinge on strict isolation to ensure low latency and jitter, confront the challenges of high overhead in worst-case latency evaluation and consequent limitations in network flow capacity. This paper introduces an innovative framework that transcends traditional isolation constraints, thereby expanding the solution space and augmenting network schedulability. At the heart of this framework lies a novel latency jitter analysis method that assesses the viability of non-isolation scenarios with constant time complexity. This method underpins a heuristic scheduling algorithm that not only boasts the smallest time complexity among existing heuristics but also significantly increases the number of scheduled flows. Complementing this, we integrate a discrete time reference approach to hasten time-intensive scheduling operations, achieving an optimal balance between schedulability and runtime efficiency. The framework further incorporates a workload-shifting technique to enhance online scheduling responsiveness. It adeptly manages the variability in scheduling times caused by disharmonious flow periods, further bolstering the framework’s robustness. Experimental validations demonstrate that our framework can increase the scheduled flows up to 269%. It reduces scheduling runtime by up to 98.44% for medium-scale networks while maintaining a flat runtime growth curve, ensuring predictable performance in online scheduling scenarios.

在时间敏感网络(TSN)领域,追求超可靠的低延迟通信至关重要。当前的调度策略依赖于严格的隔离以确保低延迟和低抖动,但面临着最坏情况延迟评估的高开销挑战以及随之而来的网络流量容量限制。本文介绍了一种超越传统隔离限制的创新框架,从而拓展了解决方案空间,提高了网络调度能力。该框架的核心是一种新颖的延迟抖动分析方法,它能以恒定的时间复杂度评估非隔离方案的可行性。这种方法是启发式调度算法的基础,它不仅是现有启发式算法中时间复杂度最小的,而且还能显著增加调度流量的数量。作为补充,我们整合了一种离散时间参考方法,以加速时间密集型调度操作,在可调度性和运行效率之间实现最佳平衡。该框架还采用了工作量转移技术,以提高在线调度的响应速度。它能巧妙地管理不和谐流量期造成的调度时间的变化,进一步增强了框架的鲁棒性。实验验证表明,我们的框架可将调度流量提高 269%。对于中等规模的网络,它可将调度运行时间减少 98.44%,同时保持平缓的运行时间增长曲线,确保在线调度场景中的可预测性能。
{"title":"Advancing TSN flow scheduling: An efficient framework without flow isolation constraint","authors":"","doi":"10.1016/j.comnet.2024.110688","DOIUrl":"10.1016/j.comnet.2024.110688","url":null,"abstract":"<div><p>In the domain of Time-Sensitive Networking (TSN), the quest for ultra-reliable low-latency communication is paramount. Current scheduling strategies, which hinge on strict isolation to ensure low latency and jitter, confront the challenges of high overhead in worst-case latency evaluation and consequent limitations in network flow capacity. This paper introduces an innovative framework that transcends traditional isolation constraints, thereby expanding the solution space and augmenting network schedulability. At the heart of this framework lies a novel latency jitter analysis method that assesses the viability of non-isolation scenarios with constant time complexity. This method underpins a heuristic scheduling algorithm that not only boasts the smallest time complexity among existing heuristics but also significantly increases the number of scheduled flows. Complementing this, we integrate a discrete time reference approach to hasten time-intensive scheduling operations, achieving an optimal balance between schedulability and runtime efficiency. The framework further incorporates a workload-shifting technique to enhance online scheduling responsiveness. It adeptly manages the variability in scheduling times caused by disharmonious flow periods, further bolstering the framework’s robustness. Experimental validations demonstrate that our framework can increase the scheduled flows up to 269%. It reduces scheduling runtime by up to 98.44% for medium-scale networks while maintaining a flat runtime growth curve, ensuring predictable performance in online scheduling scenarios.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005206/pdfft?md5=8a864eff61b93d517e72680e57828270&pid=1-s2.0-S1389128624005206-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LEO-based network-centric localization in 6G: Challenges and future perspectives 6G 中基于低地轨道的网络中心定位:挑战与未来展望
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-03 DOI: 10.1016/j.comnet.2024.110689

The future releases of 3rd Generation Partnership Project (3GPP) specifications, that is, beyond release 18, will consider the possibility to localize the User Equipment (UE) at network-side, eventually using satellite constellations of the integrated Terrestrial-Non-Terrestrial networks (T-NTN). Satellite network-centric localization schemes can be categorized into single- and multi-satellite localization using spatio-temporal measurements or instantaneous spatial diversity, respectively Direct channel measurements such as Doppler, Received Signal Strength (RSS), Round Trip Time (RTT) and Angle-of-Arrival (AoA) or differential measurements such as Time-Difference-of-Arrival (TDoA) and Frequency-Difference-of-Arrival (FDoA) have been considered in the literature to aid the localization operation. This paper focuses on the applicability of an RTT approach, which has some advantages with respect to the other approaches in case of satellite network-centric localization in the integrated T-NTN. The paper shows some preliminary results of the proposed RTT approach. Finally, challenges and research trends of this novel research field have been highlighted.

第三代合作伙伴计划(3GPP)规范的未来版本,即第 18 版以后的版本,将考虑在网络侧定位用户设备(UE)的可能性,最终使用地面-非地面集成网络(T-NTN)的卫星星座。以卫星网络为中心的定位方案可分为单卫星定位和多卫星定位,分别使用时空测量或瞬时空间分集 直接信道测量,如多普勒、接收信号强度(RSS)、往返时间(RTT)和到达角(AoA),或差分测量,如到达时间差(TDoA)和到达频率差(FDoA),在文献中已被考虑用于辅助定位操作。本文重点讨论 RTT 方法的适用性,该方法与其他方法相比,在集成 T-NTN 中以卫星网络为中心的定位中具有一些优势。本文展示了所提议的 RTT 方法的一些初步结果。最后,还强调了这一新型研究领域所面临的挑战和研究趋势。
{"title":"LEO-based network-centric localization in 6G: Challenges and future perspectives","authors":"","doi":"10.1016/j.comnet.2024.110689","DOIUrl":"10.1016/j.comnet.2024.110689","url":null,"abstract":"<div><p>The future releases of 3rd Generation Partnership Project (3GPP) specifications, that is, beyond release 18, will consider the possibility to localize the User Equipment (UE) at network-side, eventually using satellite constellations of the integrated Terrestrial-Non-Terrestrial networks (T-NTN). Satellite network-centric localization schemes can be categorized into single- and multi-satellite localization using spatio-temporal measurements or instantaneous spatial diversity, respectively Direct channel measurements such as Doppler, Received Signal Strength (RSS), Round Trip Time (RTT) and Angle-of-Arrival (AoA) or differential measurements such as Time-Difference-of-Arrival (TDoA) and Frequency-Difference-of-Arrival (FDoA) have been considered in the literature to aid the localization operation. This paper focuses on the applicability of an RTT approach, which has some advantages with respect to the other approaches in case of satellite network-centric localization in the integrated T-NTN. The paper shows some preliminary results of the proposed RTT approach. Finally, challenges and research trends of this novel research field have been highlighted.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking the mobile edge for vehicular services 重新思考车辆服务的移动边缘
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-02 DOI: 10.1016/j.comnet.2024.110687

The growing connected car market requires mobile network operators (MNOs) to rethink their network architecture to deliver ultra-reliable low-latency communications. In response, Multi-Access Edge Computing (MEC) has emerged as a solution, enabling the deployment of computing resources at the network edge. For MNOs to tap into the potential benefits of MEC, they need to transform their networks accordingly. Consequently, the primary objective of this study is to design a realistic MEC architecture and corresponding optimal deployment strategy – deciding on the placement and configuration of computing resources – as opposed to prior studies focusing on MEC run-time management and orchestration (e.g., service placement, computation offloading, and user allocation). To cater to the heterogeneous demands of vehicular services, we propose a multi-tier MEC architecture aligned with 5G and Beyond-5G radio access network deployments. Therefore, we frame MEC deployment as an optimization problem within this architecture, assuming 3 MEC tiers. Our data-driven evaluation, grounded in realistic assumptions about network architecture, usage, latency, and cost models, relies on datasets from a major MNO in the UK. We show the benefits of adopting a 3-tier MEC architecture over single-tier (centralized or distributed) architectures for heterogeneous vehicular services, in terms of deployment cost, energy consumption, and robustness.

日益增长的联网汽车市场要求移动网络运营商(MNO)重新考虑其网络架构,以提供超可靠的低延迟通信。为此,多接入边缘计算(MEC)作为一种解决方案应运而生,可在网络边缘部署计算资源。移动网络运营商要想利用多接入边缘计算的潜在优势,就必须对其网络进行相应的改造。因此,本研究的主要目标是设计一个现实的 MEC 架构和相应的最佳部署策略--决定计算资源的部署和配置--而不是之前侧重于 MEC 运行时管理和协调(如服务部署、计算卸载和用户分配)的研究。为了满足车辆服务的异构需求,我们提出了与 5G 和 Beyond-5G 无线接入网络部署相一致的多层 MEC 架构。因此,我们将 MEC 部署作为该架构中的一个优化问题,假设有 3 层 MEC。我们的数据驱动评估基于对网络架构、使用、延迟和成本模型的现实假设,并依赖于英国一家主要移动网络运营商的数据集。我们从部署成本、能耗和稳健性等方面展示了采用 3 层 MEC 架构比单层(集中式或分布式)架构更有利于异构车辆服务。
{"title":"Rethinking the mobile edge for vehicular services","authors":"","doi":"10.1016/j.comnet.2024.110687","DOIUrl":"10.1016/j.comnet.2024.110687","url":null,"abstract":"<div><p>The growing connected car market requires mobile network operators (MNOs) to rethink their network architecture to deliver ultra-reliable low-latency communications. In response, Multi-Access Edge Computing (MEC) has emerged as a solution, enabling the deployment of computing resources at the network edge. For MNOs to tap into the potential benefits of MEC, they need to transform their networks accordingly. Consequently, the primary objective of this study is to design a realistic MEC architecture and corresponding optimal <em>deployment</em> strategy – deciding on the <em>placement</em> and <em>configuration</em> of computing resources – as opposed to prior studies focusing on MEC run-time management and orchestration (e.g., service placement, computation offloading, and user allocation). To cater to the heterogeneous demands of vehicular services, we propose a multi-tier MEC architecture aligned with 5G and Beyond-5G radio access network deployments. Therefore, we frame MEC deployment as an optimization problem within this architecture, assuming 3 MEC tiers. Our data-driven evaluation, grounded in realistic assumptions about network architecture, usage, latency, and cost models, relies on datasets from a major MNO in the UK. We show the benefits of adopting a 3-tier MEC architecture over single-tier (centralized or distributed) architectures for heterogeneous vehicular services, in terms of deployment cost, energy consumption, and robustness.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S138912862400519X/pdfft?md5=0009a470794f51bd23f900931eb13c8f&pid=1-s2.0-S138912862400519X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain Priv-Share:利用区块链实现网络威胁情报差异化和无信任委托的隐私保护框架
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-02 DOI: 10.1016/j.comnet.2024.110686

The emergence of the Internet of Things (IoT), Industry 5.0 applications and associated services have caused a powerful transition in the cyber threat landscape. As a result, organisations require new ways to proactively manage the risks associated with their infrastructure. In response, a significant amount of research has focused on developing efficient Cyber Threat Intelligence (CTI) sharing. However, in many cases, CTI contains sensitive information that has the potential to leak valuable information or cause reputational damage to the sharing organisation. While a number of existing CTI sharing approaches have utilised blockchain to facilitate privacy, it can be highlighted that a comprehensive approach that enables dynamic trust-based decision-making, facilitates decentralised trust evaluation and provides CTI producers with highly granular sharing of CTI is lacking. Subsequently, in this paper, we propose a blockchain-based CTI sharing framework, called Priv-Share, as a promising solution towards this challenge. In particular, we highlight that the integration of differential sharing, trustless delegation, democratic group managers and incentives as part of Priv-Share ensures that it can satisfy these criteria. The results of an analytical evaluation of the proposed framework using both queuing and game theory demonstrate its ability to provide scalable CTI sharing in a trustless manner. Moreover, a quantitative evaluation of an Ethereum proof-of-concept prototype demonstrates that applying the proposed framework within real-world contexts is feasible.

物联网 (IoT)、工业 5.0 应用程序和相关服务的出现,使网络威胁形势发生了巨大变化。因此,企业需要新的方法来主动管理与其基础设施相关的风险。为此,大量研究集中于开发高效的(CTI)共享。然而,在许多情况下,CTI 包含敏感信息,有可能泄露有价值的信息或对共享组织的声誉造成损害。虽然许多现有的 CTI 共享方法都利用区块链来促进隐私保护,但可以强调的是,目前还缺乏一种能够实现基于信任的动态决策、促进去中心化信任评估并为 CTI 生产者提供高度细粒度的 CTI 共享的综合方法。因此,在本文中,我们提出了一个基于区块链的 CTI 共享框架,称为 ,作为应对这一挑战的一个有前途的解决方案。我们特别强调,作为区块链的一部分,"区块链"、"区块链 "和 "区块链 "的整合可确保其满足这些标准。利用排队和博弈论对所提框架进行分析评估的结果表明,该框架能够以无信任方式提供可扩展的 CTI 共享。此外,对以太坊概念验证原型的定量评估表明,在现实世界中应用所提出的框架是可行的。
{"title":"Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain","authors":"","doi":"10.1016/j.comnet.2024.110686","DOIUrl":"10.1016/j.comnet.2024.110686","url":null,"abstract":"<div><p>The emergence of the Internet of Things (IoT), Industry 5.0 applications and associated services have caused a powerful transition in the cyber threat landscape. As a result, organisations require new ways to proactively manage the risks associated with their infrastructure. In response, a significant amount of research has focused on developing efficient <em>Cyber Threat Intelligence</em> (CTI) sharing. However, in many cases, CTI contains sensitive information that has the potential to leak valuable information or cause reputational damage to the sharing organisation. While a number of existing CTI sharing approaches have utilised blockchain to facilitate privacy, it can be highlighted that a comprehensive approach that enables dynamic trust-based decision-making, facilitates decentralised trust evaluation and provides CTI producers with highly granular sharing of CTI is lacking. Subsequently, in this paper, we propose a blockchain-based CTI sharing framework, called <em>Priv-Share</em>, as a promising solution towards this challenge. In particular, we highlight that the integration of <em>differential sharing</em>, <em>trustless delegation</em>, <em>democratic group managers</em> and <em>incentives</em> as part of <em>Priv-Share</em> ensures that it can satisfy these criteria. The results of an analytical evaluation of the proposed framework using both queuing and game theory demonstrate its ability to provide scalable CTI sharing in a trustless manner. Moreover, a quantitative evaluation of an Ethereum proof-of-concept prototype demonstrates that applying the proposed framework within real-world contexts is feasible.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005188/pdfft?md5=f66aca799d724e317c329989ebfd22dc&pid=1-s2.0-S1389128624005188-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSDQ: Multi-Scheduling Dual-Queues coflow scheduling without prior knowledge MSDQ:无先验知识的多调度双队列共流调度
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-02 DOI: 10.1016/j.comnet.2024.110685

Coflow scheduling is crucial for enhancing application-level communication performance in data-parallel clusters. While schemes like Varys can potentially achieve optimal performance, their dependence on a prior information about coflows poses practical challenges. Existing non-clairvoyant solutions, such as Aalo, approximate the classical online Shortest-Job-First (SJF) scheduling but fail to identify bottleneck flows in coflows. Consequently, they often allocate excessive bandwidth to non-bottleneck flows, leading to bandwidth wastage and reduced overall performance. In this paper, we introduce MSDQ, a coflow scheduling mechanism that operates without prior knowledge, utilizing multi-scheduling dual-priority queues, and using width estimates. This method adjusts coflow queue priorities and scheduling sequences based on the coflow’s width and the volume of data transmitted. By reallocating unused network bandwidth at multiple points during the scheduling process, MSDQ maximizes the bandwidth usage and significantly reduces the average coflow completion time. Our evaluation, using a publicly available production cluster trace from Facebook, demonstrates that MSDQ reduces the average coflow completion time by 1.42× compared to Aalo.

同流调度对于提高数据并行集群中的应用级通信性能至关重要。虽然 Varys 等方案有可能实现最佳性能,但它们对同流先验信息的依赖性带来了实际挑战。现有的非千里眼解决方案(如 Aalo)近似于经典的在线最短任务优先(SJF)调度,但无法识别协同流中的瓶颈流。因此,它们经常为非瓶颈流分配过多带宽,导致带宽浪费和整体性能下降。在本文中,我们介绍了 MSDQ,这是一种无需事先了解情况、利用多调度双优先队列和宽度估算的共流调度机制。这种方法根据共同流的宽度和传输数据量调整共同流队列优先级和调度顺序。通过在调度过程中的多个点重新分配未使用的网络带宽,MSDQ 最大限度地提高了带宽使用率,并显著缩短了共同流的平均完成时间。我们使用 Facebook 公开的生产集群跟踪进行了评估,结果表明,与 Aalo 相比,MSDQ 将平均 coflow 完成时间缩短了 1.42 倍。
{"title":"MSDQ: Multi-Scheduling Dual-Queues coflow scheduling without prior knowledge","authors":"","doi":"10.1016/j.comnet.2024.110685","DOIUrl":"10.1016/j.comnet.2024.110685","url":null,"abstract":"<div><p>Coflow scheduling is crucial for enhancing application-level communication performance in data-parallel clusters. While schemes like Varys can potentially achieve optimal performance, their dependence on a prior information about coflows poses practical challenges. Existing non-clairvoyant solutions, such as Aalo, approximate the classical online Shortest-Job-First (SJF) scheduling but fail to identify bottleneck flows in coflows. Consequently, they often allocate excessive bandwidth to non-bottleneck flows, leading to bandwidth wastage and reduced overall performance. In this paper, we introduce MSDQ, a coflow scheduling mechanism that operates without prior knowledge, utilizing multi-scheduling dual-priority queues, and using width estimates. This method adjusts coflow queue priorities and scheduling sequences based on the coflow’s width and the volume of data transmitted. By reallocating unused network bandwidth at multiple points during the scheduling process, MSDQ maximizes the bandwidth usage and significantly reduces the average coflow completion time. Our evaluation, using a publicly available production cluster trace from Facebook, demonstrates that MSDQ reduces the average coflow completion time by <span><math><mrow><mn>1</mn><mo>.</mo><mn>42</mn><mo>×</mo></mrow></math></span> compared to Aalo.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disruptive 6G architecture: Software-centric, AI-driven, and digital market-based mobile networks 颠覆性的 6G 架构:以软件为中心、人工智能驱动、基于数字市场的移动网络
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-31 DOI: 10.1016/j.comnet.2024.110682

Mobile communications have followed a progression model detailed by the Gartner hype cycle, from a proof-of-concept to widespread productivity. As fifth-generation (5G) mobile networks are being deployed, their potential and constraints are becoming more evident. Although 5G boasts a flexible architecture, enhanced bandwidth, and data throughput, it still grapples with infrastructure challenges, security vulnerabilities, coverage issues, and limitations in fully enabling the Internet of Everything (IoE). As the world experiences exponential growth in Internet users and digitized devices, relying solely on evolutionary technologies seems inadequate. Recognizing this, global entities such as the 3rd Generation Partnership Project (3GPP) are laying the groundwork for 5G Advanced, a precursor to 6G. This article argues against a mere evolutionary leap from 5G to 6G. We propose a radical shift towards a disruptive 6G architecture (D6G) that harnesses the power of smart contracts, decentralized Artificial Intelligence (AI), and digital twins. This novel design offers a software-centric, AI-driven, and digital market-based redefinition of mobile technologies. As a result of an integrated collaboration among researchers from the Brazil 6G Project, this work identifies and synthesizes fifty-one key emerging enablers for 6G, devising a unique and holistic integration framework. Emphasizing flexibility, D6G promotes a digital market environment, allowing seamless resource sharing and solving several of 5G’s current challenges. This article comprehensively explores these enablers, presenting a groundbreaking approach to 6G’s design and implementation and setting the foundation for a more adaptable, autonomous, digitally monitored, and AI-driven mobile communication landscape. Finally, we developed a queuing theory model to evaluate the D6G architecture. Results show that the worst-case delay for deploying a smart contract in a 6G domain was 23 s. Furthermore, under high transaction rates of ten transactions per minute, the delay for contracting a 6G slice was estimated at 53.7 s, demonstrating the architecture’s capability to handle high transaction volumes efficiently.

移动通信遵循 Gartner 炒作周期所详述的发展模式,从概念验证到普及生产力。随着第五代(5G)移动网络的部署,其潜力和制约因素正变得越来越明显。尽管 5G 拥有灵活的架构、更高的带宽和数据吞吐量,但它仍然面临着基础设施挑战、安全漏洞、覆盖范围问题以及在全面实现万物互联 (IoE) 方面的局限性。随着全球互联网用户和数字化设备呈指数级增长,仅仅依靠不断演进的技术似乎是不够的。认识到这一点,第三代合作伙伴计划(3GPP)等全球实体正在为 6G 的前身 5G Advanced 奠定基础。本文反对仅仅从 5G 向 6G 演进。我们建议彻底转向颠覆性的 6G 架构(D6G),利用智能合约、去中心化人工智能(AI)和数字双胞胎的力量。这种新颖的设计提供了一种以软件为中心、人工智能驱动、基于数字市场的移动技术重新定义。作为巴西 6G 项目研究人员综合合作的成果,这项工作为 6G 确定并综合了 51 个关键的新兴使能因素,设计了一个独特的整体集成框架。D6G 强调灵活性,促进数字市场环境,允许无缝资源共享,并解决了 5G 当前面临的若干挑战。本文全面探讨了这些推动因素,为 6G 的设计和实施提出了一种开创性的方法,并为一个更具适应性、自主性、数字监控和人工智能驱动的移动通信环境奠定了基础。最后,我们开发了一个队列理论模型来评估 D6G 架构。结果表明,在6G领域部署智能合约的最坏情况延迟为23秒。此外,在每分钟10笔交易的高交易率下,签订6G片段合约的延迟估计为53.7秒,这证明了该架构高效处理高交易量的能力。
{"title":"Disruptive 6G architecture: Software-centric, AI-driven, and digital market-based mobile networks","authors":"","doi":"10.1016/j.comnet.2024.110682","DOIUrl":"10.1016/j.comnet.2024.110682","url":null,"abstract":"<div><p>Mobile communications have followed a progression model detailed by the Gartner hype cycle, from a proof-of-concept to widespread productivity. As fifth-generation (5G) mobile networks are being deployed, their potential and constraints are becoming more evident. Although 5G boasts a flexible architecture, enhanced bandwidth, and data throughput, it still grapples with infrastructure challenges, security vulnerabilities, coverage issues, and limitations in fully enabling the Internet of Everything (IoE). As the world experiences exponential growth in Internet users and digitized devices, relying solely on evolutionary technologies seems inadequate. Recognizing this, global entities such as the 3rd Generation Partnership Project (3GPP) are laying the groundwork for 5G Advanced, a precursor to 6G. This article argues against a mere evolutionary leap from 5G to 6G. We propose a radical shift towards a disruptive 6G architecture (D6G) that harnesses the power of smart contracts, decentralized Artificial Intelligence (AI), and digital twins. This novel design offers a software-centric, AI-driven, and digital market-based redefinition of mobile technologies. As a result of an integrated collaboration among researchers from the Brazil 6G Project, this work identifies and synthesizes fifty-one key emerging enablers for 6G, devising a unique and holistic integration framework. Emphasizing flexibility, D6G promotes a digital market environment, allowing seamless resource sharing and solving several of 5G’s current challenges. This article comprehensively explores these enablers, presenting a groundbreaking approach to 6G’s design and implementation and setting the foundation for a more adaptable, autonomous, digitally monitored, and AI-driven mobile communication landscape. Finally, we developed a queuing theory model to evaluate the D6G architecture. Results show that the worst-case delay for deploying a smart contract in a 6G domain was 23 s. Furthermore, under high transaction rates of ten transactions per minute, the delay for contracting a 6G slice was estimated at 53.7 s, demonstrating the architecture’s capability to handle high transaction volumes efficiently.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-temporal graph learning: Traffic flow prediction of mobile edge computing in 5G/6G vehicular networks 时空图学习:5G/6G 车辆网络中移动边缘计算的流量预测
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-31 DOI: 10.1016/j.comnet.2024.110676

Mobile Edge Computing (MEC) is a key technology that emerged to address the increasing computational demands and communication requirements of vehicular networks. It is a form of edge computing that brings cloud computing capabilities closer to end-users, specifically within the context of vehicular networks, which are part of the broader Internet of Vehicles (IoV) ecosystem. However, the dynamic nature of traffic flows in MEC in 5G/6G vehicular networks poses challenges for accurate prediction and resource allocation when aiming to provide edge service for mobile vehicles. In this paper, we present a novel approach to predict the traffic flow of MEC in 5G/6G vehicular networks using graph-based learning. In our framework, MEC servers in vehicular networks are construed as nodes to construct a dynamic similarity graph and a dynamic transition graph over a duration of multiple days. We utilize Graph Attention Networks (GAT) to learn and fuse the node embeddings of these dynamic graphs. A transformer model is subsequently employed to predict the vehicle frequency accessing the edge computing services for the next day. Our experimental results have shown that the model achieves high accuracy in predicting edge service access volumes with low error metrics.

移动边缘计算(MEC)是为满足车辆网络日益增长的计算需求和通信要求而出现的一项关键技术。它是边缘计算的一种形式,使云计算功能更接近终端用户,特别是在车载网络中,而车载网络是更广泛的车联网(IoV)生态系统的一部分。然而,5G/6G 车辆网络中的 MEC 流量的动态性质给旨在为移动车辆提供边缘服务的准确预测和资源分配带来了挑战。在本文中,我们提出了一种利用基于图的学习预测 5G/6G 车辆网络中 MEC 流量的新方法。在我们的框架中,车辆网络中的 MEC 服务器被视为节点,用于构建动态相似性图和持续多天的动态过渡图。我们利用图注意网络(GAT)来学习和融合这些动态图的节点嵌入。随后采用转换器模型来预测第二天访问边缘计算服务的车辆频率。我们的实验结果表明,该模型在预测边缘服务访问量方面实现了较高的准确性和较低的误差指标。
{"title":"Spatio-temporal graph learning: Traffic flow prediction of mobile edge computing in 5G/6G vehicular networks","authors":"","doi":"10.1016/j.comnet.2024.110676","DOIUrl":"10.1016/j.comnet.2024.110676","url":null,"abstract":"<div><p>Mobile Edge Computing (MEC) is a key technology that emerged to address the increasing computational demands and communication requirements of vehicular networks. It is a form of edge computing that brings cloud computing capabilities closer to end-users, specifically within the context of vehicular networks, which are part of the broader Internet of Vehicles (IoV) ecosystem. However, the dynamic nature of traffic flows in MEC in 5G/6G vehicular networks poses challenges for accurate prediction and resource allocation when aiming to provide edge service for mobile vehicles. In this paper, we present a novel approach to predict the traffic flow of MEC in 5G/6G vehicular networks using graph-based learning. In our framework, MEC servers in vehicular networks are construed as nodes to construct a dynamic similarity graph and a dynamic transition graph over a duration of multiple days. We utilize Graph Attention Networks (GAT) to learn and fuse the node embeddings of these dynamic graphs. A transformer model is subsequently employed to predict the vehicle frequency accessing the edge computing services for the next day. Our experimental results have shown that the model achieves high accuracy in predicting edge service access volumes with low error metrics.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles 基于多分支目标提取的车联网数据篡改检测和恢复方案
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-31 DOI: 10.1016/j.comnet.2024.110677

With the rapid development of new networks such as 5 G/6 G, the Internet of Vehicles has been given features such as hyper-connectivity and hyper-intelligence, promoting the implementation of new scenarios for autonomous vehicles. However, on the Internet of vehicles, vehicles use many cameras, radars and other sensors to sense the environment and execute instructions, facing security issues such as road data tampering and hijacking. Consequently, this paper presents a data tampering detection and recovery scheme based on multi-branch target extraction. Specifically, for road images collected by sensors, this paper presents a target extraction method based on multi-branch spatial feature pyramid blocks to obtain road salient targets. Then, a tamper detection and recovery algorithm based on interval mapping is presented. Once the image road target is tampered with, this method can quickly detect the tampering traces and restore them to achieve the authenticity and integrity of the road image on the Internet of Vehicles. The availability of the proposed scheme is verified through comparative experiments, and the performance is improved satisfactorily compared with other works.

随着 5 G/6 G 等新型网络的快速发展,车联网被赋予了超连接、超智能等特征,推动了自动驾驶汽车新场景的实现。然而,在车联网上,车辆使用许多摄像头、雷达和其他传感器来感知环境和执行指令,面临着道路数据被篡改和劫持等安全问题。因此,本文提出了一种基于多分支目标提取的数据篡改检测与恢复方案。具体来说,针对传感器采集的道路图像,本文提出了一种基于多分支空间特征金字塔块的目标提取方法,以获取道路突出目标。然后,提出了一种基于区间映射的篡改检测和恢复算法。一旦图像道路目标被篡改,该方法可以快速检测出篡改痕迹并进行恢复,从而实现车联网道路图像的真实性和完整性。通过对比实验验证了所提方案的可用性,与其他作品相比,性能得到了令人满意的提升。
{"title":"Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles","authors":"","doi":"10.1016/j.comnet.2024.110677","DOIUrl":"10.1016/j.comnet.2024.110677","url":null,"abstract":"<div><p>With the rapid development of new networks such as 5 G/6 G, the Internet of Vehicles has been given features such as hyper-connectivity and hyper-intelligence, promoting the implementation of new scenarios for autonomous vehicles. However, on the Internet of vehicles, vehicles use many cameras, radars and other sensors to sense the environment and execute instructions, facing security issues such as road data tampering and hijacking. Consequently, this paper presents a data tampering detection and recovery scheme based on multi-branch target extraction. Specifically, for road images collected by sensors, this paper presents a target extraction method based on multi-branch spatial feature pyramid blocks to obtain road salient targets. Then, a tamper detection and recovery algorithm based on interval mapping is presented. Once the image road target is tampered with, this method can quickly detect the tampering traces and restore them to achieve the authenticity and integrity of the road image on the Internet of Vehicles. The availability of the proposed scheme is verified through comparative experiments, and the performance is improved satisfactorily compared with other works.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141964008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and efficient log storage and query framework based on blockchain 基于区块链的安全高效日志存储和查询框架
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-30 DOI: 10.1016/j.comnet.2024.110683

Log data is crucial for security threat detection and audit analysis. However, traditional log systems are susceptible to tampering, posing a significant security risk to information systems. Although blockchain technology has been introduced to enhance tamper resistance, existing blockchain-based log systems still suffer from storage and query efficiency issues. In this paper, we propose a novel secure and efficient log storage and query framework that combines on-chain and off-chain collaboration. An inverted index table is constructed by extracting keywords from logs, which are stored on the blockchain as on-chain data, while the logs themselves are maintained as off-chain data. this approach facilitates the rapid retrieval of specific keywords and ensures the immutability of the logs. furthermore, we propose a secure and efficient log query method featuring a smart contract designed to automatically handle requests from legitimate log queriers. we also design a data structure based on merkle adaptive radix tree (MART) and merkle B+ tree (MBT) to store index entries, thereby achieving efficient log retrieval. we provide formal security proofs and comprehensively evaluate the proposed framework’s performance experimentally. results demonstrate that MBT and MART reduce average query times by 20.09% and 51% respectively, compared to the state-of-the-art schemes.

日志数据对于安全威胁检测和审计分析至关重要。然而,传统的日志系统容易被篡改,给信息系统带来巨大的安全风险。虽然区块链技术的引入增强了防篡改能力,但现有的基于区块链的日志系统仍然存在存储和查询效率问题。本文提出了一种结合链上和链下协作的新型安全高效日志存储和查询框架。通过提取日志中的关键字来构建一个倒排索引表,并将其作为链上数据存储在区块链上,而日志本身则作为链下数据进行维护。这种方法有助于快速检索特定关键词,并确保日志的不变性。此外,我们还提出了一种安全高效的日志查询方法,该方法采用智能合约设计,可自动处理合法日志查询者的请求。我们还设计了一种基于merkle adaptive radix tree(MART)和merkle B+ tree(MBT)的数据结构来存储索引条目,从而实现高效的日志检索。我们提供了正式的安全性证明,并通过实验全面评估了拟议框架的性能。结果表明,与最先进的方案相比,MBT 和 MART 的平均查询时间分别缩短了 20.09% 和 51%。
{"title":"A secure and efficient log storage and query framework based on blockchain","authors":"","doi":"10.1016/j.comnet.2024.110683","DOIUrl":"10.1016/j.comnet.2024.110683","url":null,"abstract":"<div><p>Log data is crucial for security threat detection and audit analysis. However, traditional log systems are susceptible to tampering, posing a significant security risk to information systems. Although blockchain technology has been introduced to enhance tamper resistance, existing blockchain-based log systems still suffer from storage and query efficiency issues. In this paper, we propose a novel secure and efficient log storage and query framework that combines on-chain and off-chain collaboration. An inverted index table is constructed by extracting keywords from logs, which are stored on the blockchain as on-chain data, while the logs themselves are maintained as off-chain data. this approach facilitates the rapid retrieval of specific keywords and ensures the immutability of the logs. furthermore, we propose a secure and efficient log query method featuring a smart contract designed to automatically handle requests from legitimate log queriers. we also design a data structure based on merkle adaptive radix tree (MART) and merkle B+ tree (MBT) to store index entries, thereby achieving efficient log retrieval. we provide formal security proofs and comprehensively evaluate the proposed framework’s performance experimentally. results demonstrate that MBT and MART reduce average query times by 20.09% and 51% respectively, compared to the state-of-the-art schemes.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social user role value analysis and trusted user autonomous diffusion for participatory crowdsensing 社会用户角色价值分析和可信用户自主扩散,促进参与式众点传感
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-29 DOI: 10.1016/j.comnet.2024.110680

Social participatory-sensing, as an emerging research field, is extremely challenging to recruit trustworthy and active high-value users in a sparse user context. And the richness and closeness of users' social relationships provide new research ideas. Therefore, a participatory sensing user recruitment method based on dynamic social network role detection (DSRD) is proposed, in which firstly, multiple identity information of users is mined based on the decomposition of their overlapping social relationships to filter out high-quality sensing users. Secondly, based on role-oriented network representation learning, it models users' role information and establishes a role hierarchy model to evaluate users' social functions and role values. Finally, the concept of temporal social centrality is proposed for the first time for integrating users' social and network structural features to assess the overall value of users and ensure the coverage of task assignments under a sparse user pool. Experimental results on the open datasets Gowalla and Brightkite show that under the constraints of cost budget and number of users, the proposed user recruitment framework DSRD effectively improves task coverage with less time overhead compared to the baseline algorithm.

社会参与式传感作为一个新兴的研究领域,要在用户稀少的情况下招募到值得信赖和活跃的高价值用户是极具挑战性的。而用户社交关系的丰富性和紧密性为研究提供了新思路。因此,本文提出了一种基于动态社交网络角色检测(DSRD)的参与式感知用户招募方法,首先,基于用户重叠社交关系的分解,挖掘用户的多重身份信息,筛选出高质量的感知用户。其次,基于面向角色的网络表征学习,对用户的角色信息进行建模,并建立角色分层模型来评估用户的社会功能和角色价值。最后,首次提出了时间社会中心性的概念,用于整合用户的社会和网络结构特征,评估用户的整体价值,确保稀疏用户池下任务分配的覆盖率。在开放数据集 Gowalla 和 Brightkite 上的实验结果表明,在成本预算和用户数量的限制下,与基线算法相比,拟议的用户招募框架 DSRD 能有效提高任务覆盖率,并减少时间开销。
{"title":"Social user role value analysis and trusted user autonomous diffusion for participatory crowdsensing","authors":"","doi":"10.1016/j.comnet.2024.110680","DOIUrl":"10.1016/j.comnet.2024.110680","url":null,"abstract":"<div><p>Social participatory-sensing, as an emerging research field, is extremely challenging to recruit trustworthy and active high-value users in a sparse user context. And the richness and closeness of users' social relationships provide new research ideas. Therefore, a participatory sensing user recruitment method based on dynamic social network role detection (DSRD) is proposed, in which firstly, multiple identity information of users is mined based on the decomposition of their overlapping social relationships to filter out high-quality sensing users. Secondly, based on role-oriented network representation learning, it models users' role information and establishes a role hierarchy model to evaluate users' social functions and role values. Finally, the concept of temporal social centrality is proposed for the first time for integrating users' social and network structural features to assess the overall value of users and ensure the coverage of task assignments under a sparse user pool. Experimental results on the open datasets Gowalla and Brightkite show that under the constraints of cost budget and number of users, the proposed user recruitment framework DSRD effectively improves task coverage with less time overhead compared to the baseline algorithm.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1