首页 > 最新文献

Future Internet最新文献

英文 中文
Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing 利用混合模拟退火法进行连续空间无线通信塔选址
Pub Date : 2024-03-29 DOI: 10.3390/fi16040117
Maolin Tang, Wei Li
Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wireless communication tower placement problems, which are discrete computational problems, this new wireless communication tower placement problem is a continuous space computational problem. In this paper, we formulate the new wireless communication tower placement problem and propose a hybrid simulated annealing algorithm that can take advantage of the powerful exploration capacity of simulated annealing and the strong exploitation capacity of a local optimization procedure. We also demonstrate through experiments the effectiveness of this hybridization technique and the good performance and scalability of the hybrid simulated annulling in this paper.
在现实世界的许多应用中都会出现无线通信塔安置问题。本文研究了一个新出现的无线通信塔安置问题,即连续空间无线通信塔安置问题。现有的无线通信塔安置问题是离散计算问题,而这种新的无线通信塔安置问题是连续空间计算问题。在本文中,我们提出了新的无线通信塔安置问题,并提出了一种混合模拟退火算法,该算法可以利用模拟退火的强大探索能力和局部优化程序的强大利用能力。我们还通过实验证明了这种混合技术的有效性,以及本文中混合模拟退火的良好性能和可扩展性。
{"title":"Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing","authors":"Maolin Tang, Wei Li","doi":"10.3390/fi16040117","DOIUrl":"https://doi.org/10.3390/fi16040117","url":null,"abstract":"Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wireless communication tower placement problems, which are discrete computational problems, this new wireless communication tower placement problem is a continuous space computational problem. In this paper, we formulate the new wireless communication tower placement problem and propose a hybrid simulated annealing algorithm that can take advantage of the powerful exploration capacity of simulated annealing and the strong exploitation capacity of a local optimization procedure. We also demonstrate through experiments the effectiveness of this hybridization technique and the good performance and scalability of the hybrid simulated annulling in this paper.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140367975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking NeXtFusion:基于注意力的摄像头-雷达融合网络,用于改进三维物体检测和跟踪
Pub Date : 2024-03-28 DOI: 10.3390/fi16040114
Priyank Kalgaonkar, Mohamed El-Sharkawy
Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targets. Deep Camera-Radar fusion neural networks offer a promising solution for reliable AV perception under any weather and lighting conditions. Cameras provide rich semantic information, while radars act like an X-ray vision, piercing through fog and darkness. This work proposes a novel, efficient Camera-Radar fusion network called NeXtFusion for robust AV perception with an improvement in object detection accuracy and tracking. Our proposed approach of utilizing an attention module enhances crucial feature representation for object detection while minimizing information loss from multi-modal data. Extensive experiments on the challenging nuScenes dataset demonstrate NeXtFusion’s superior performance in detecting small and distant objects compared to other methods. Notably, NeXtFusion achieves the highest mAP score (0.473) on the nuScenes validation set, outperforming competitors like OFT (35.1% improvement) and MonoDIS (9.5% improvement). Additionally, NeXtFusion demonstrates strong performance in other metrics like mATE (0.449) and mAOE (0.534), highlighting its overall effectiveness in 3D object detection. Furthermore, visualizations of nuScenes data processed by NeXtFusion further demonstrate its capability to handle diverse real-world scenarios. These results suggest that NeXtFusion is a promising deep fusion network for improving AV perception and safety for autonomous driving.
准确的感知对于自动驾驶汽车(AV)的安全导航至关重要,尤其是在恶劣天气和光照条件下,单传感器网络(如摄像头或雷达)会因机动性降低和目标无法识别而陷入困境。深度摄像头-雷达融合神经网络为在任何天气和照明条件下实现可靠的自动驾驶汽车感知提供了一种前景广阔的解决方案。摄像头能提供丰富的语义信息,而雷达则能像 X 射线一样穿透浓雾和黑暗。这项研究提出了一种名为 NeXtFusion 的新颖、高效的摄像头-雷达融合网络,用于实现稳健的视听感知,提高物体检测和跟踪的准确性。我们提出的利用注意力模块的方法增强了物体检测的关键特征表示,同时最大限度地减少了多模态数据的信息损失。在极具挑战性的 nuScenes 数据集上进行的大量实验证明,与其他方法相比,NeXtFusion 在检测小物体和远距离物体方面表现出色。值得注意的是,NeXtFusion 在 nuScenes 验证集上获得了最高的 mAP 分数(0.473),超过了 OFT(提高了 35.1%)和 MonoDIS(提高了 9.5%)等竞争对手。此外,NeXtFusion 在 mATE(0.449)和 mAOE(0.534)等其他指标上也表现出色,凸显了其在 3D 物体检测方面的整体效能。此外,由 NeXtFusion 处理的 nuScenes 数据的可视化效果进一步证明了它处理各种真实世界场景的能力。这些结果表明,NeXtFusion 是一种很有前途的深度融合网络,可用于提高自动驾驶的视听感知和安全性。
{"title":"NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking","authors":"Priyank Kalgaonkar, Mohamed El-Sharkawy","doi":"10.3390/fi16040114","DOIUrl":"https://doi.org/10.3390/fi16040114","url":null,"abstract":"Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targets. Deep Camera-Radar fusion neural networks offer a promising solution for reliable AV perception under any weather and lighting conditions. Cameras provide rich semantic information, while radars act like an X-ray vision, piercing through fog and darkness. This work proposes a novel, efficient Camera-Radar fusion network called NeXtFusion for robust AV perception with an improvement in object detection accuracy and tracking. Our proposed approach of utilizing an attention module enhances crucial feature representation for object detection while minimizing information loss from multi-modal data. Extensive experiments on the challenging nuScenes dataset demonstrate NeXtFusion’s superior performance in detecting small and distant objects compared to other methods. Notably, NeXtFusion achieves the highest mAP score (0.473) on the nuScenes validation set, outperforming competitors like OFT (35.1% improvement) and MonoDIS (9.5% improvement). Additionally, NeXtFusion demonstrates strong performance in other metrics like mATE (0.449) and mAOE (0.534), highlighting its overall effectiveness in 3D object detection. Furthermore, visualizations of nuScenes data processed by NeXtFusion further demonstrate its capability to handle diverse real-world scenarios. These results suggest that NeXtFusion is a promising deep fusion network for improving AV perception and safety for autonomous driving.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140372148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning 基于深度学习的区块链交易隐私保护方法研究
Pub Date : 2024-03-28 DOI: 10.3390/fi16040113
Jun Li, Chenyang Zhang, Jianyi Zhang, Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction information, but also achieves regulatory capabilities at both macro and micro levels, ensuring the verification of the legality of transactions. By adopting an identity-based encryption system, regulatory bodies can conduct personalized supervision of blockchain transactions without storing users’ actual identities and key data, significantly reducing storage computation and key management burdens. Our scheme is independent of any particular consensus mechanism and can be applied to current blockchain technologies. Simulation experiments and complexity analysis demonstrate the practicality of the scheme.
为了应对在区块链交易中平衡隐私保护与监管的挑战,我们提出了一种可监管的区块链交易隐私保护方案。我们的方案利用概率公钥加密来掩盖区块链交易参与者的真实身份。通过将承诺方案和零知识证明技术与深度学习图神经网络技术相结合,它可以对区块链交易数据进行隐私保护和监管分析。这种方法不仅能防止敏感交易信息泄露,还能实现宏观和微观层面的监管能力,确保交易的合法性验证。通过采用基于身份的加密系统,监管机构可以对区块链交易进行个性化监管,而无需存储用户的实际身份和密钥数据,大大减轻了存储计算和密钥管理的负担。我们的方案独立于任何特定的共识机制,可应用于当前的区块链技术。仿真实验和复杂性分析证明了该方案的实用性。
{"title":"Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning","authors":"Jun Li, Chenyang Zhang, Jianyi Zhang, Yanhua Shao","doi":"10.3390/fi16040113","DOIUrl":"https://doi.org/10.3390/fi16040113","url":null,"abstract":"To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction information, but also achieves regulatory capabilities at both macro and micro levels, ensuring the verification of the legality of transactions. By adopting an identity-based encryption system, regulatory bodies can conduct personalized supervision of blockchain transactions without storing users’ actual identities and key data, significantly reducing storage computation and key management burdens. Our scheme is independent of any particular consensus mechanism and can be applied to current blockchain technologies. Simulation experiments and complexity analysis demonstrate the practicality of the scheme.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140369467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning 探索用于 6G 最后一米连接的通用滤波多载波波形:一种以路灯为驱动力的方法,带有用于物联网应用尺寸确定的增强型模拟器
Pub Date : 2024-03-26 DOI: 10.3390/fi16040112
Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert
In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for innovative solutions, positioning VLC as a complementary technology within the electromagnetic spectrum. This paper focuses on the relevance of VLC in the 6G paradigm, shedding light on its applicability across smart cities and industries. The paper highlights the growing efficiency of lighting LEDs in infrastructure, facilitating the seamless integration of VLC. The study then emphasizes VLC’s robustness in outdoor settings, demonstrating effective communication up to 10 m. This resilience positions VLC as a key player in addressing the very last meter of wireless communication, offering a seamless solution for IoT connectivity. By introducing a freely available open-source simulator combined with an alternative waveform, UFMC, the study empowers researchers to dimension applications effectively, showcasing VLC’s potential to improve wireless communication in the evolving landscape of 6G and smart cities.
在 6G 和智慧城市的动态环境中,可见光通信 (VLC) 对于横跨不同领域的物联网 (IoT) 应用具有至关重要的意义。对带宽和数据不断增长的需求凸显了对创新解决方案的需求,并将可见光通信定位为电磁频谱内的一项补充技术。本文重点探讨了 VLC 在 6G 范式中的相关性,阐明了它在智慧城市和各行业中的适用性。本文强调了 LED 照明在基础设施中日益提高的效率,这有利于 VLC 的无缝集成。这项研究随后强调了 VLC 在室外环境中的稳定性,展示了长达 10 米的有效通信。这种弹性使 VLC 成为解决无线通信最后一米问题的关键角色,为物联网连接提供了无缝解决方案。通过引入免费开源模拟器和替代波形 UFMC,该研究使研究人员能够有效地维度应用,展示了 VLC 在不断发展的 6G 和智能城市中改善无线通信的潜力。
{"title":"Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning","authors":"Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert","doi":"10.3390/fi16040112","DOIUrl":"https://doi.org/10.3390/fi16040112","url":null,"abstract":"In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for innovative solutions, positioning VLC as a complementary technology within the electromagnetic spectrum. This paper focuses on the relevance of VLC in the 6G paradigm, shedding light on its applicability across smart cities and industries. The paper highlights the growing efficiency of lighting LEDs in infrastructure, facilitating the seamless integration of VLC. The study then emphasizes VLC’s robustness in outdoor settings, demonstrating effective communication up to 10 m. This resilience positions VLC as a key player in addressing the very last meter of wireless communication, offering a seamless solution for IoT connectivity. By introducing a freely available open-source simulator combined with an alternative waveform, UFMC, the study empowers researchers to dimension applications effectively, showcasing VLC’s potential to improve wireless communication in the evolving landscape of 6G and smart cities.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140378712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions 将 V2X 通信要求映射到高度自动化和自主车辆功能的方法
Pub Date : 2024-03-25 DOI: 10.3390/fi16040108
Árpád Takács, T. Haidegger
The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a safety-redundant component in automated driving systems. This article aims to systematically assess the requirements towards V2X input data to highly automated and autonomous systems that can individually, or in combination with other sensors, enable certain levels of autonomy. It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments, and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity. The findings provide valuable insights for the development, deployment and regulation of V2X-enabled automated systems, ultimately contributing to enhanced road safety and efficient mobility.
在高度自动化和自动驾驶汽车方面,V2X(车对物)技术的重要性怎么估计都不过分。虽然 V2X 并不被视为实现高度自动化的独立技术,但它被认为是自动驾驶系统中一个必不可少的安全组件。本文旨在系统地评估 V2X 输入数据对高度自动化和自动驾驶系统的要求,这些系统可单独或与其他传感器结合实现一定程度的自动驾驶。文章探讨了 SAE 国际组织定义的不同自动驾驶级别对 V2X 输入数据要求的评估、监管挑战、混合环境中的可扩展性问题,以及基于物联网 (IoT) 的信息在非汽车技术领域的潜在影响。根据系统复杂性,提出了一种方法来评估 V2X 在不同自动化水平下的适用性。研究结果为开发、部署和监管支持 V2X 的自动化系统提供了有价值的见解,最终有助于加强道路安全和高效移动性。
{"title":"A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions","authors":"Árpád Takács, T. Haidegger","doi":"10.3390/fi16040108","DOIUrl":"https://doi.org/10.3390/fi16040108","url":null,"abstract":"The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a safety-redundant component in automated driving systems. This article aims to systematically assess the requirements towards V2X input data to highly automated and autonomous systems that can individually, or in combination with other sensors, enable certain levels of autonomy. It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments, and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity. The findings provide valuable insights for the development, deployment and regulation of V2X-enabled automated systems, ultimately contributing to enhanced road safety and efficient mobility.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud 新颖的边缘平台可简化现代边缘设备与云之间的连接
Pub Date : 2024-03-25 DOI: 10.3390/fi16040111
A. Carvalho, Daniel Riordan, Joseph Walsh
This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm locations in various countries, the focus lies on maintaining data integrity and consistency for effective farm management. The incorporation of a new edge device into existing setups has significantly improved computational capabilities for tasks like data synchronization and machine learning. This research highlights the critical role of cloud computing in managing large data volumes, with Amazon Web Services hosting the databases. This paper showcases an integrated architecture combining edge devices, networks, and cloud computing, forming a seamless continuum of services from cloud to edge. This approach proves effective in managing the significant data volumes generated in remote agricultural areas. This paper also introduces the PAIR Mechanism, which is a solution developed in response to the unique challenges of agricultural data management, emphasizing resilience and simplicity in data synchronization between cloud and edge databases. The PAIR Mechanism’s potential for robust data management in IoT and cloud environments is explored, offering a novel perspective on synchronization challenges in edge computing.
本研究介绍了一个新开发的边缘计算平台,旨在加强农业领域边缘设备与云之间的连接。为了应对在不同国家的 850 个远程农场同步中央数据库的挑战,重点在于保持数据的完整性和一致性,以实现有效的农场管理。将新的边缘设备纳入现有设置,大大提高了数据同步和机器学习等任务的计算能力。这项研究强调了云计算在管理海量数据方面的关键作用,亚马逊网络服务托管了数据库。本文展示了一种将边缘设备、网络和云计算相结合的集成架构,形成了从云到边缘的无缝连续服务。事实证明,这种方法能有效管理偏远农业地区产生的大量数据。本文还介绍了 PAIR 机制,这是为应对农业数据管理的独特挑战而开发的解决方案,强调云数据库和边缘数据库之间数据同步的弹性和简便性。本文探讨了 PAIR 机制在物联网和云环境中进行稳健数据管理的潜力,为应对边缘计算中的同步挑战提供了新的视角。
{"title":"A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud","authors":"A. Carvalho, Daniel Riordan, Joseph Walsh","doi":"10.3390/fi16040111","DOIUrl":"https://doi.org/10.3390/fi16040111","url":null,"abstract":"This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm locations in various countries, the focus lies on maintaining data integrity and consistency for effective farm management. The incorporation of a new edge device into existing setups has significantly improved computational capabilities for tasks like data synchronization and machine learning. This research highlights the critical role of cloud computing in managing large data volumes, with Amazon Web Services hosting the databases. This paper showcases an integrated architecture combining edge devices, networks, and cloud computing, forming a seamless continuum of services from cloud to edge. This approach proves effective in managing the significant data volumes generated in remote agricultural areas. This paper also introduces the PAIR Mechanism, which is a solution developed in response to the unique challenges of agricultural data management, emphasizing resilience and simplicity in data synchronization between cloud and edge databases. The PAIR Mechanism’s potential for robust data management in IoT and cloud environments is explored, offering a novel perspective on synchronization challenges in edge computing.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Security Using Fine-Grained Efficient Information Flow Tracking 利用细粒度高效信息流跟踪实现云安全
Pub Date : 2024-03-25 DOI: 10.3390/fi16040110
Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data t
本研究对现有的信息流跟踪(IFT)工具进行了全面回顾和比较分析,强调了在复杂的云系统中减少数据泄漏的必要性。传统方法给云服务提供商(CSP)和管理活动带来了巨大的开销,促使人们探索 IFT 等替代方法。通过用安全标签增强消费者数据子集并部署监控器网络,IFT 可帮助检测和防止云租户之间的数据泄漏。这里的研究重点是防止滥用,例如云中敏感数据的外泄和/或挤出,以及匿名化的作用。CloudMonitor 框架旨在研究和设计透明、高效的 IFT(eIFT)机制。通过该框架,可以对创新方法进行实验、分析和验证,从而为云服务消费者(CSC)提供更大的数据控制权。此外,eIFT 还能增强可视性,以评估第三方服务的数据传输,从而避免安全风险(如数据外泄)。我们对该框架的实施和验证采用了集中式和动态 IFT 方法来实现这些目标。我们衡量了被跟踪数据的动态性和粒度与效率之间的平衡。为了建立一个安全和性能基线,以实现更好的纵深防御,这项工作主要侧重于使用基础设施即服务(IaaS)等独特的动态 IFT 跟踪功能。消费者和服务提供商可以使用我们的框架协商特定的安全执行标准。因此,本研究通过一系列真实世界的实验来协调和评估不同的监控功能如何结合起来提供相对更高的安全级别。通过多项实验对输入/输出性能的执行时间和资源利用率进行了评估。结果表明,性能不受跟踪的输入/输出数据量的影响。换句话说,随着数据量的增加,我们注意到执行时间呈线性增长。不过,这种增长速度明显慢于严格的比例关系。在所有验证测试运行中,系统平均 CPU 和内存消耗开销分别为 8%和 37%,而完成时间却不到一秒。这些结果为更好地衡量和理解云消费者和提供商(C&P)保护机密性、完整性和可用性(CIA)的成本建立了性能效率基准。消费者可以仔细检查各种优势(即安全性)和权衡(内存使用率、带宽、CPU 使用率和吞吐量),以及确保建立、监测和控制 CIA 的成本。这项工作提供了主要用例、执行数据隔离规则的公式、数据跟踪策略框架,以及使用 CloudMonitor 框架管理机密数据流和防止数据泄漏的基础。
{"title":"Cloud Security Using Fine-Grained Efficient Information Flow Tracking","authors":"Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon","doi":"10.3390/fi16040110","DOIUrl":"https://doi.org/10.3390/fi16040110","url":null,"abstract":"This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data t","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140384761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks MOLM:在低地轨道卫星网络中通过基于多目标模拟退火的负载平衡路由缓解拥塞问题
Pub Date : 2024-03-25 DOI: 10.3390/fi16040109
Yihu Zhou, Haiming Chen, Zhibin Dou
In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach, named MOLM, which introduces a continuous neighbor set during path updates. This set includes nodes capable of establishing sustainable connections with the predecessors and successors of congested nodes. Combined with a multi-objective simulated annealing framework, MOLM iteratively derives an optimal selection from this set to replace congested nodes. Additionally, we employ a Fast Reroute mechanism based on backup paths (FRR-BP) to address node failures. The simulation results indicate that the optimal node endows the new path with optimal path stability and path latency.
在卫星网络中,现有的拥塞解决方法没有考虑路径的可预测性和稳定性,从而导致频繁的路径切换和高昂的维护成本。为此,我们提出了一种名为 MOLM 的新型拥塞解决方法,它在路径更新过程中引入了一个连续的邻居集。该集合包括能够与拥塞节点的前节点和后节点建立可持续连接的节点。MOLM 与多目标模拟退火框架相结合,从这一集合中反复推导出最优选择,以替换拥塞节点。此外,我们还采用了基于备份路径的快速重路由机制(FRR-BP)来处理节点故障。仿真结果表明,最优节点赋予了新路径最优的路径稳定性和路径延迟。
{"title":"MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks","authors":"Yihu Zhou, Haiming Chen, Zhibin Dou","doi":"10.3390/fi16040109","DOIUrl":"https://doi.org/10.3390/fi16040109","url":null,"abstract":"In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach, named MOLM, which introduces a continuous neighbor set during path updates. This set includes nodes capable of establishing sustainable connections with the predecessors and successors of congested nodes. Combined with a multi-objective simulated annealing framework, MOLM iteratively derives an optimal selection from this set to replace congested nodes. Additionally, we employ a Fast Reroute mechanism based on backup paths (FRR-BP) to address node failures. The simulation results indicate that the optimal node endows the new path with optimal path stability and path latency.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140381498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC 优化混合 V2X 通信:使用 5G、C-V2X PC5 和 DSRC 的智能技术选择算法
Pub Date : 2024-03-23 DOI: 10.3390/fi16040107
Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman
Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communication (DSRC) and Cellular-V2X) or a long-range communication mode (Uu). Conventional vehicular networks employ static wireless vehicular communication technology without considering the traffic load on any individual V2X communication technology and the traffic dynamics in the vicinity of the V2X node, and are hence inefficient. In this study, we investigate hybrid V2X communication and propose an autonomous and intelligent technology selection algorithm using a decision tree. The algorithm uses the information from the received Cooperative Intelligent Transport Systems (C-ITS) Cooperative Awareness Messages (CAMs) to collect statistics such as inter vehicular distance, one-way end-to-end latency and CAM density. These statistics are then used as input for the decision tree for selecting the appropriate technology (DSRC, C-V2X PC5 or 5G) for the subsequent scheduled C-ITS message transmission. The assessment of the intelligent hybrid V2X algorithm’s performance in our V2X test setup demonstrates enhancements in one-way end-to-end latency, reliability, and packet delivery rate when contrasted with the conventional utilization of static technology.
车对物(V2X)合作通信的进步正在推动自动驾驶模式的发展。V2X 节点通过通信技术连接,如短程通信模式(专用短程通信 (DSRC) 和蜂窝-V2X)或远程通信模式(Uu)。传统的车载网络采用静态无线车载通信技术,没有考虑任何单个 V2X 通信技术的交通负荷以及 V2X 节点附近的交通动态,因此效率低下。在本研究中,我们对混合 V2X 通信进行了研究,并提出了一种使用决策树的自主智能技术选择算法。该算法利用从接收到的合作智能交通系统(C-ITS)合作认知信息(CAM)中获得的信息,收集车辆间距离、单向端到端延迟和 CAM 密度等统计数据。然后将这些统计数据作为决策树的输入,为随后的 C-ITS 信息预定传输选择合适的技术(DSRC、C-V2X PC5 或 5G)。我们在 V2X 测试设置中对智能混合 V2X 算法的性能进行了评估,结果表明,与传统的静态技术相比,智能混合 V2X 算法在单向端到端延迟、可靠性和数据包传输速率方面都有所提高。
{"title":"Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC","authors":"Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman","doi":"10.3390/fi16040107","DOIUrl":"https://doi.org/10.3390/fi16040107","url":null,"abstract":"Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communication (DSRC) and Cellular-V2X) or a long-range communication mode (Uu). Conventional vehicular networks employ static wireless vehicular communication technology without considering the traffic load on any individual V2X communication technology and the traffic dynamics in the vicinity of the V2X node, and are hence inefficient. In this study, we investigate hybrid V2X communication and propose an autonomous and intelligent technology selection algorithm using a decision tree. The algorithm uses the information from the received Cooperative Intelligent Transport Systems (C-ITS) Cooperative Awareness Messages (CAMs) to collect statistics such as inter vehicular distance, one-way end-to-end latency and CAM density. These statistics are then used as input for the decision tree for selecting the appropriate technology (DSRC, C-V2X PC5 or 5G) for the subsequent scheduled C-ITS message transmission. The assessment of the intelligent hybrid V2X algorithm’s performance in our V2X test setup demonstrates enhancements in one-way end-to-end latency, reliability, and packet delivery rate when contrasted with the conventional utilization of static technology.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140386451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications 人工智能与物联网交汇带来的安全威胁和有前途的解决方案:IoMT 和 IoET 应用研究
Pub Date : 2024-02-29 DOI: 10.3390/fi16030085
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, A. Abdelmoniem, Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.
物联网是智能应用的推动力,有望提高可访问性、效率和服务质量,但同时也存在安全和数据隐私方面的问题。因此,在研究这些由人工智能赋能的物联网系统时,需要认识到安全威胁,并根据其具体限制和要求制定缓解方案。在这项工作中,我们全面回顾了物联网中的安全威胁和新出现的应对措施,尤其关注恶意软件和中间人攻击。接下来,我们将阐述两个使用案例:能源物联网和医疗物联网。首先详细介绍了用于自动检测能源盗窃和压力水平的创新人工智能方法,然后探讨了上下文安全威胁和隐私泄露问题。采用人工免疫系统来降低恶意软件攻击的风险,提出了数据保护的差异隐私,并利用联合学习来减少数据暴露。
{"title":"Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications","authors":"Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, A. Abdelmoniem, Mona Jaber","doi":"10.3390/fi16030085","DOIUrl":"https://doi.org/10.3390/fi16030085","url":null,"abstract":"The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1