首页 > 最新文献

IET Wireless Sensor Systems最新文献

英文 中文
FDPA internet of things system for forest fire detection, prediction and behaviour analysis 用于林火探测、预测和行为分析的 FDPA 物联网系统
IF 1.9 Q1 Engineering Pub Date : 2024-03-22 DOI: 10.1049/wss2.12076
Ahmad A. A. Alkhatib, Khalid Mohammad Jaber

The escalating issue of forest fires poses severe risks to ecosystems and human habitats, primarily due to the greenhouse effect and sudden climate changes. These fires, mostly occurring naturally, necessitate prompt detection and control. Addressing this, the authors introduce the Forest Fire Detection, Prediction, and Behaviour Analysis (FDPA) system, an innovative Internet of Things (IoT) solution. The FDPA system leverages a wireless sensor network to efficiently detect and analyse fire behaviour, providing real-time data on fire spread, speed, and direction. Uniquely, it can anticipate natural fires hours before they occur by monitoring ecological parameters such as humidity, temperature, and using the Chandler Burning Index (CBI) for quantifying fire danger. Designed for the challenging forest environment, the FDPA system prioritises minimal power usage and simple components, crucial in areas with limited power resources. Its resilient design ensures the wireless sensor network and sensor nodes withstand harsh weather and fire conditions, maintaining functionality and reliability. Field tests of the FDPA system in various Jordanian forest locations, including Burgish–Ajloun, have demonstrated its effectiveness. The trials revealed the system's capability in early fire detection, low latency response, predicting fire behaviour, and determining fire spread direction. Continuous monitoring of the forest ecosystem and rapid detection allow authorities to act swiftly, preventing potential fires from escalating. Furthermore, the system tracks ecological changes within the forest, offering insights into imminent natural fires. This feature enables proactive measures to mitigate fire spread, safeguarding the environment and nearby communities. The strategic placement of sensor nodes and the use of durable yet straightforward components reduce the risk of system damage due to environmental extremities. Overall, the FDPA system emerges as a promising tool for forest fire management. Its ability to detect, predict, and analyse forest fires in real-time positions it as a vital asset in minimising the detrimental impacts of forest fires on the environment and human settlements.

不断升级的森林火灾问题对生态系统和人类栖息地构成严重威胁,其主要原因是温室效应和气候突变。这些火灾大多是自然发生的,需要及时发现和控制。为此,作者推出了森林火灾探测、预测和行为分析(FDPA)系统,这是一种创新的物联网(IoT)解决方案。FDPA 系统利用无线传感器网络有效地检测和分析火灾行为,提供有关火灾蔓延、速度和方向的实时数据。与众不同的是,它可以通过监测湿度、温度等生态参数,并利用钱德勒燃烧指数(CBI)量化火灾危险性,在自然火灾发生前数小时预测火灾。FDPA 系统专为极具挑战性的森林环境而设计,优先考虑使用最少的电力和简单的组件,这在电力资源有限的地区至关重要。其弹性设计可确保无线传感器网络和传感器节点经受住恶劣天气和火灾条件的考验,保持功能性和可靠性。FDPA 系统在包括 Burgish-Ajloun 在内的约旦多个森林地点进行的实地测试证明了其有效性。试验表明,该系统具有早期火灾探测、低延迟响应、预测火灾行为和确定火灾蔓延方向的能力。通过对森林生态系统的持续监测和快速检测,有关部门可以迅速采取行动,防止潜在火灾升级。此外,该系统还能跟踪森林内的生态变化,洞察即将发生的自然火灾。通过这一功能,可以采取积极措施,减缓火灾蔓延,保护环境和附近社区。传感器节点的战略性布置以及耐用而简单组件的使用降低了系统因极端环境而损坏的风险。总之,FDPA 系统是一种很有前途的森林火灾管理工具。该系统能够实时检测、预测和分析森林火灾,是最大限度减少森林火灾对环境和人类住区的不利影响的重要资产。
{"title":"FDPA internet of things system for forest fire detection, prediction and behaviour analysis","authors":"Ahmad A. A. Alkhatib,&nbsp;Khalid Mohammad Jaber","doi":"10.1049/wss2.12076","DOIUrl":"10.1049/wss2.12076","url":null,"abstract":"<p>The escalating issue of forest fires poses severe risks to ecosystems and human habitats, primarily due to the greenhouse effect and sudden climate changes. These fires, mostly occurring naturally, necessitate prompt detection and control. Addressing this, the authors introduce the Forest Fire Detection, Prediction, and Behaviour Analysis (FDPA) system, an innovative Internet of Things (IoT) solution. The FDPA system leverages a wireless sensor network to efficiently detect and analyse fire behaviour, providing real-time data on fire spread, speed, and direction. Uniquely, it can anticipate natural fires hours before they occur by monitoring ecological parameters such as humidity, temperature, and using the Chandler Burning Index (CBI) for quantifying fire danger. Designed for the challenging forest environment, the FDPA system prioritises minimal power usage and simple components, crucial in areas with limited power resources. Its resilient design ensures the wireless sensor network and sensor nodes withstand harsh weather and fire conditions, maintaining functionality and reliability. Field tests of the FDPA system in various Jordanian forest locations, including Burgish–Ajloun, have demonstrated its effectiveness. The trials revealed the system's capability in early fire detection, low latency response, predicting fire behaviour, and determining fire spread direction. Continuous monitoring of the forest ecosystem and rapid detection allow authorities to act swiftly, preventing potential fires from escalating. Furthermore, the system tracks ecological changes within the forest, offering insights into imminent natural fires. This feature enables proactive measures to mitigate fire spread, safeguarding the environment and nearby communities. The strategic placement of sensor nodes and the use of durable yet straightforward components reduce the risk of system damage due to environmental extremities. Overall, the FDPA system emerges as a promising tool for forest fire management. Its ability to detect, predict, and analyse forest fires in real-time positions it as a vital asset in minimising the detrimental impacts of forest fires on the environment and human settlements.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140220377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A channel state information and geomagnetic fused fingerprint localisation algorithm based on multi-input convolutional neural network 基于多输入卷积神经网络的信道状态信息和地磁融合指纹定位算法
IF 1.9 Q1 Engineering Pub Date : 2024-02-20 DOI: 10.1049/wss2.12075
Zhenhao Cheng, Dongqing Zhao, Wenzhuo Guo, Linyang Li

Numerous applications require indoor localisation, and one of the current research areas is how to leverage low-cost ubiquitous signals for indoor localisation. This research designs a multi-input convolutional neural network (Multi-CNN) localisation approach to combine natural geomagnetic signals and universal 5G communication signals. To create the location fingerprint data, the geomagnetic three-component data and channel state information (CSI) must first undergo independent preprocessing. Subsequently, the rebuilt CSI amplitude and geomagnetic intensity are employed for separate offline training to efficiently extract the corresponding data features. Lastly, Multi-CNN is used to estimate the user's location online. The localisation outcomes for the conference room and hall demonstrate that the Multi-CNN algorithm can achieve average localisation accuracies of 1.41 and 2.66 m, respectively. These are higher than the single-input CNN algorithms by 21% and 15%, and higher than backpropagation network (BPNN) algorithm by 24% and 17%, and higher than the weighted K-nearest neighbour algorithm by 34% and 28%. The Multi-CNN-based localisation approach successfully fuses the diverse data, potentially satisfying most indoor localisation applications.

许多应用都需要进行室内定位,而如何利用低成本的泛在信号进行室内定位是当前的研究领域之一。本研究设计了一种多输入卷积神经网络(Multi-CNN)定位方法,将自然地磁信号和通用 5G 通信信号结合起来。要创建位置指纹数据,首先必须对地磁三分量数据和信道状态信息(CSI)进行独立预处理。然后,利用重建的 CSI 振幅和地磁强度分别进行离线训练,以有效提取相应的数据特征。最后,使用多重 CNN 在线估算用户位置。会议室和大厅的定位结果表明,Multi-CNN 算法的平均定位精度分别为 1.41 米和 2.66 米。这比单输入 CNN 算法分别高出 21% 和 15%,比反向传播网络 (BPNN) 算法分别高出 24% 和 17%,比加权 K 近邻算法分别高出 34% 和 28%。基于多神经网络的定位方法成功地融合了各种数据,有可能满足大多数室内定位应用的需要。
{"title":"A channel state information and geomagnetic fused fingerprint localisation algorithm based on multi-input convolutional neural network","authors":"Zhenhao Cheng,&nbsp;Dongqing Zhao,&nbsp;Wenzhuo Guo,&nbsp;Linyang Li","doi":"10.1049/wss2.12075","DOIUrl":"https://doi.org/10.1049/wss2.12075","url":null,"abstract":"<p>Numerous applications require indoor localisation, and one of the current research areas is how to leverage low-cost ubiquitous signals for indoor localisation. This research designs a multi-input convolutional neural network (Multi-CNN) localisation approach to combine natural geomagnetic signals and universal 5G communication signals. To create the location fingerprint data, the geomagnetic three-component data and channel state information (CSI) must first undergo independent preprocessing. Subsequently, the rebuilt CSI amplitude and geomagnetic intensity are employed for separate offline training to efficiently extract the corresponding data features. Lastly, Multi-CNN is used to estimate the user's location online. The localisation outcomes for the conference room and hall demonstrate that the Multi-CNN algorithm can achieve average localisation accuracies of 1.41 and 2.66 m, respectively. These are higher than the single-input CNN algorithms by 21% and 15%, and higher than backpropagation network (BPNN) algorithm by 24% and 17%, and higher than the weighted K-nearest neighbour algorithm by 34% and 28%. The Multi-CNN-based localisation approach successfully fuses the diverse data, potentially satisfying most indoor localisation applications.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140348843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting sparsity for localisation of large-scale wireless sensor networks 利用稀疏性实现大规模无线传感器网络的定位
IF 1.9 Q1 Engineering Pub Date : 2024-02-12 DOI: 10.1049/wss2.12074
Shiraz Khan, Inseok Hwang, James Goppert

Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing-based localisation, the measurement model is a non-linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large-scale WSN localisation. In the proposed method, which the authors call the L-Banded Extended Kalman Filter (LB-EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB-EKF approach.

无线传感器网络(WSN)定位是指利用噪声测量信息确定 WSN 中每个代理位置的问题。在许多情况下,例如在基于距离和方位的定位中,测量模型是代理位置的非线性函数,从而导致代理之间的成对互连。众所周知,在这些情况下,WSN 定位问题的最优解计算成本很高,因此需要一种高效的近似解。作者指出,可以利用该问题的固有稀疏性,大大减少使用扩展卡尔曼滤波器(EKF)进行大规模 WSN 定位的计算量。作者提出的方法被称为 L 带扩展卡尔曼滤波器 (LB-EKF),在这种方法中,测量信息矩阵通过对图顶点进行重新标注(改变顶点顺序)转换成带状矩阵。理论分析和数值模拟相结合的方法表明,典型的 WSN 配置(可模拟为随机几何图形)可以使用所提出的 LB-EKF 方法以可扩展的方式进行定位。
{"title":"Exploiting sparsity for localisation of large-scale wireless sensor networks","authors":"Shiraz Khan,&nbsp;Inseok Hwang,&nbsp;James Goppert","doi":"10.1049/wss2.12074","DOIUrl":"10.1049/wss2.12074","url":null,"abstract":"<p>Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing-based localisation, the measurement model is a non-linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large-scale WSN localisation. In the proposed method, which the authors call the L-Banded Extended Kalman Filter (LB-EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB-EKF approach.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139843461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting sparsity for localisation of large‐scale wireless sensor networks 利用稀疏性实现大规模无线传感器网络的定位
IF 1.9 Q1 Engineering Pub Date : 2024-02-12 DOI: 10.1049/wss2.12074
Shiraz Khan, Inseok Hwang, James M. Goppert
Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing‐based localisation, the measurement model is a non‐linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large‐scale WSN localisation. In the proposed method, which the authors call the L‐Banded Extended Kalman Filter (LB‐EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB‐EKF approach.
无线传感器网络(WSN)定位是指利用噪声测量信息确定 WSN 中每个代理位置的问题。在许多情况下,例如在基于距离和方位的定位中,测量模型是代理位置的非线性函数,从而导致代理之间的成对互连。众所周知,在这些情况下,WSN 定位问题的最优解计算成本很高,因此需要一种高效的近似解。作者指出,可以利用该问题的固有稀疏性,大大减少使用扩展卡尔曼滤波器(EKF)进行大规模 WSN 定位的计算量。作者提出的方法被称为 L 带扩展卡尔曼滤波器 (LB-EKF),在这种方法中,测量信息矩阵通过对图顶点进行重新标注(改变顶点顺序)转换成带状矩阵。理论分析和数值模拟相结合的方法表明,典型的 WSN 配置(可模拟为随机几何图形)可以使用所提出的 LB-EKF 方法以可扩展的方式进行定位。
{"title":"Exploiting sparsity for localisation of large‐scale wireless sensor networks","authors":"Shiraz Khan, Inseok Hwang, James M. Goppert","doi":"10.1049/wss2.12074","DOIUrl":"https://doi.org/10.1049/wss2.12074","url":null,"abstract":"Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing‐based localisation, the measurement model is a non‐linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large‐scale WSN localisation. In the proposed method, which the authors call the L‐Banded Extended Kalman Filter (LB‐EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB‐EKF approach.","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139783710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalised covariance intersection-Gamma Gaussian Inverse Wishart-Poisson multi-Bernoulli Mixture: An intelligent multiple extended target tracking scheme for mobile aquaculture sensor networks 广义协方差交集-伽马高斯逆 Wishart-Poisson 多重伯努利混合物:移动水产养殖传感器网络的智能多扩展目标跟踪方案
IF 1.9 Q1 Engineering Pub Date : 2024-01-27 DOI: 10.1049/wss2.12073
Chunfeng Lv, Jianping Zhu, Zhiguang Peng

Poisson multi-Bernoulli Mixture (PMBM) filter has been known as an available or practical point and multiple extended target tracking (METT) method. The authors present an improved PMBM filter with adaptive detection probability and adaptive newborn distributions, accompanying with an associated distributed fusion strategy for the tracking extended multiple targets. First, the augmented state of unknown and changing target detection probability is assumed as Gamma (GAM) distribution. Second, extended states are described by Inverse Wishart (IW) distribution based on this augmented state, accompanying with dynamic states presented by Gaussian distribution. And then, an adaptive newborn distribution is adopted to describe the newborn targets appearing arbitrarily. Consequently, the closed-form solutions of the proposed filter can be derived by approximating the intensity of newborn and potential targets to the Gamma Gaussian Inverse Wishart (GGIW) form. Moreover, the fused means that Generalised Covariance Intersection (GCI) is performed in such a large-scale aquaculture sensor network. Experiments are presented to verify the availability of the GCI-GGIW-PMBM method, and comparisons with other METT filters also demonstrate that tracking behaviours are improved largely.

泊松多重伯努利混合物(PMBM)滤波器一直被认为是一种可用或实用的点和多扩展目标跟踪(METT)方法。作者提出了一种具有自适应检测概率和自适应新生儿分布的改进型 PMBM 滤波器,以及相关的分布式融合策略,用于跟踪扩展的多个目标。首先,未知和不断变化的目标检测概率的增强状态被假定为伽马(GAM)分布。其次,在此增强状态的基础上,用逆 Wishart(IW)分布描述扩展状态,同时用高斯分布描述动态状态。然后,采用自适应新生分布来描述任意出现的新生目标。因此,通过将新生目标和潜在目标的强度近似为伽马高斯反 Wishart(GGIW)形式,可以得出所提滤波器的闭式解。此外,在这种大规模的水产养殖传感器网络中,还采用了广义协方差交集(GCI)的融合手段。实验验证了 GCI-GGIW-PMBM 方法的可用性,与其他 METT 过滤器的比较也表明,跟踪行为得到了很大改善。
{"title":"Generalised covariance intersection-Gamma Gaussian Inverse Wishart-Poisson multi-Bernoulli Mixture: An intelligent multiple extended target tracking scheme for mobile aquaculture sensor networks","authors":"Chunfeng Lv,&nbsp;Jianping Zhu,&nbsp;Zhiguang Peng","doi":"10.1049/wss2.12073","DOIUrl":"https://doi.org/10.1049/wss2.12073","url":null,"abstract":"<p>Poisson multi-Bernoulli Mixture (PMBM) filter has been known as an available or practical point and multiple extended target tracking (METT) method. The authors present an improved PMBM filter with adaptive detection probability and adaptive newborn distributions, accompanying with an associated distributed fusion strategy for the tracking extended multiple targets. First, the augmented state of unknown and changing target detection probability is assumed as Gamma (GAM) distribution. Second, extended states are described by Inverse Wishart (IW) distribution based on this augmented state, accompanying with dynamic states presented by Gaussian distribution. And then, an adaptive newborn distribution is adopted to describe the newborn targets appearing arbitrarily. Consequently, the closed-form solutions of the proposed filter can be derived by approximating the intensity of newborn and potential targets to the Gamma Gaussian Inverse Wishart (GGIW) form. Moreover, the fused means that Generalised Covariance Intersection (GCI) is performed in such a large-scale aquaculture sensor network. Experiments are presented to verify the availability of the GCI-GGIW-PMBM method, and comparisons with other METT filters also demonstrate that tracking behaviours are improved largely.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140348858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion control in constrained Internet of Things networks 受限物联网网络中的拥塞控制
IF 1.9 Q1 Engineering Pub Date : 2023-12-12 DOI: 10.1049/wss2.12072
Lotfi Mhamdi, Hussam Abdul Khalek

The Internet of Things (IoT) is a growing technology that remotely connects multiple devices (ranging across many fields and applications) over the Internet. The scalability of an IoT network mandates a reliable transport infrastructure. Traditional transport control protocol (TCP) control protocol is unsuitable for such domain, mainly due to energy and power consumption reasons. A lighter version of TCP, light weight IP (lwIP) provides a promising solution for current and projected future scalable IoT infrastructures. However, the original lwIP is just a simple mapping of the protocol, without insight into the IoT specific requirements. This paper examines the lwIP congestion control mechanism and addresses its shortcomings. In particular, a detailed examination is devoted to the various metrics such as retransmission time-outs and its back-off epochs, the congestion window behaviour and progress in the absence (and presence) of congestion. In particular, we propose a set of novel algorithms to address both the IoT constraints nature (light-weight) as well as keeping up with scalability in IoT network size and performance. A detailed simulation study has been conducted to endorse the viability of our proposed set of algorithms for next-generation IoT networks.

物联网(IoT)是一项正在发展的技术,它通过互联网远程连接多个设备(涵盖许多领域和应用)。物联网网络的可扩展性要求可靠的传输基础设施。传统的传输控制协议(TCP)控制协议主要是由于能量和功耗的原因而不适用于此类领域。轻量级IP (lwIP)是TCP的轻量级版本,为当前和预计的未来可扩展的物联网基础设施提供了一个有前途的解决方案。然而,最初的lwIP只是协议的简单映射,没有深入了解物联网的特定需求。本文研究了lwIP拥塞控制机制,并指出了其不足之处。特别是,详细的检查致力于各种指标,如重传超时和它的回退时间,拥塞窗口的行为和进展在没有(和存在)拥塞。特别是,我们提出了一套新颖的算法来解决物联网的约束性质(轻量级)以及跟上物联网网络规模和性能的可扩展性。已经进行了详细的模拟研究,以支持我们提出的下一代物联网网络算法集的可行性。
{"title":"Congestion control in constrained Internet of Things networks","authors":"Lotfi Mhamdi,&nbsp;Hussam Abdul Khalek","doi":"10.1049/wss2.12072","DOIUrl":"https://doi.org/10.1049/wss2.12072","url":null,"abstract":"<p>The Internet of Things (IoT) is a growing technology that remotely connects multiple devices (ranging across many fields and applications) over the Internet. The scalability of an IoT network mandates a reliable transport infrastructure. Traditional transport control protocol (TCP) control protocol is unsuitable for such domain, mainly due to energy and power consumption reasons. A lighter version of TCP, light weight IP (lwIP) provides a promising solution for current and projected future scalable IoT infrastructures. However, the original lwIP is just a simple mapping of the protocol, without insight into the IoT specific requirements. This paper examines the lwIP congestion control mechanism and addresses its shortcomings. In particular, a detailed examination is devoted to the various metrics such as retransmission time-outs and its back-off epochs, the congestion window behaviour and progress in the absence (and presence) of congestion. In particular, we propose a set of novel algorithms to address both the IoT constraints nature (light-weight) as well as keeping up with scalability in IoT network size and performance. A detailed simulation study has been conducted to endorse the viability of our proposed set of algorithms for next-generation IoT networks.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138634076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks ETXRE:适用于 RPL 协议和无线传感器网络的高能效、高延迟路由指标
IF 1.9 Q1 Engineering Pub Date : 2023-12-06 DOI: 10.1049/wss2.12070
Aiman Nait Abbou, Jukka Manner

Internet of Things is an emerging paradigm based on interconnecting physical and virtual objects with each other and to the Internet. Most connected things fall into the category of constrained devices, with restricted resources (processing power, memory, and energy). These low-power and lossy networks (LLNs) are known for their instability, high loss rates and low data rates, which makes routing one of the most challenging problems in low-cost communications. A routing protocol for low-power and lossy networks (RPL) is a proactive dynamic routing protocol based on IPv6. This protocol defines an objective function (OF) that utilises a set of metrics to select the best possible path to the destination. Minimum rank hysteresis objective function (MRHOF) and objective function zero (OF0) are the most basic OFs, where the first one selects the path to the sink based on the expected transmission count (ETX) metric, and OF0 is based on the hop count (HC). These two metrics prioritise either brute performance (i.e. ETX) or simplicity (i.e. HC). Therefore, using a single metric with an OF can either limit the performance or have an inefficient impact on load management and energy consumption. To overcome these challenges, a routing metric based on MRHOF OF which takes into consideration the link-based routing metric (i.e. ETX) and node-based metric (i.e. remaining energy) for route selection is provided. Expected transmission count remaining energy (ETXRE) is evaluated through 36 scenarios with different parameters. Preliminary results show that ETXRE outperforms ETX and RE in terms of end-to-end delay by an average of at least 17%, packet delay by 13% and consumes 10% less energy.

物联网是一种基于物理和虚拟对象相互连接以及与互联网连接的新兴范式。大多数连接的设备都属于受限设备,具有受限的资源(处理能力、内存和能源)。这些低功耗和有损网络(lln)以其不稳定性、高损耗率和低数据速率而闻名,这使得路由成为低成本通信中最具挑战性的问题之一。低功耗损耗网络路由协议是一种基于IPv6的主动动态路由协议。该协议定义了一个目标函数(OF),它利用一组指标来选择到达目的地的最佳可能路径。最小秩滞后目标函数(MRHOF)和目标函数零(OF0)是最基本的OFs,其中第一个目标函数基于期望传输计数(ETX)度量选择到达sink的路径,OF0基于跳数(HC)。这两个指标要么优先考虑野蛮性能(即ETX),要么优先考虑简单性(即HC)。因此,使用带有OF的单一指标可能会限制性能,或者对负载管理和能源消耗产生低效影响。为了克服这些挑战,提供了一种基于MRHOF的路由度量,该度量考虑了基于链路的路由度量(即ETX)和基于节点的度量(即剩余能量)进行路由选择。期望传输计数剩余能量(ETXRE)通过36个不同参数的场景进行评估。初步结果表明,ETXRE在端到端延迟方面平均优于ETX和RE至少17%,数据包延迟减少13%,能耗减少10%。
{"title":"ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks","authors":"Aiman Nait Abbou,&nbsp;Jukka Manner","doi":"10.1049/wss2.12070","DOIUrl":"10.1049/wss2.12070","url":null,"abstract":"<p>Internet of Things is an emerging paradigm based on interconnecting physical and virtual objects with each other and to the Internet. Most connected things fall into the category of constrained devices, with restricted resources (processing power, memory, and energy). These low-power and lossy networks (LLNs) are known for their instability, high loss rates and low data rates, which makes routing one of the most challenging problems in low-cost communications. A routing protocol for low-power and lossy networks (RPL) is a proactive dynamic routing protocol based on IPv6. This protocol defines an objective function (OF) that utilises a set of metrics to select the best possible path to the destination. Minimum rank hysteresis objective function (MRHOF) and objective function zero (OF0) are the most basic OFs, where the first one selects the path to the sink based on the expected transmission count (ETX) metric, and OF0 is based on the hop count (HC). These two metrics prioritise either brute performance (i.e. ETX) or simplicity (i.e. HC). Therefore, using a single metric with an OF can either limit the performance or have an inefficient impact on load management and energy consumption. To overcome these challenges, a routing metric based on MRHOF OF which takes into consideration the link-based routing metric (i.e. ETX) and node-based metric (i.e. remaining energy) for route selection is provided. Expected transmission count remaining energy (ETXRE) is evaluated through 36 scenarios with different parameters. Preliminary results show that ETXRE outperforms ETX and RE in terms of end-to-end delay by an average of at least 17%, packet delay by 13% and consumes 10% less energy.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138596665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing smart home against sinkhole attack using weight-based IDS placement strategy 利用基于权重的 IDS 布置策略确保智能家居免受天坑攻击
IF 1.9 Q1 Engineering Pub Date : 2023-11-28 DOI: 10.1049/wss2.12069
Md. Shafiqul Islam, Muntaha Tasnim, Upama Kabir, Mosarrat Jahan

Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource-constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy-exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state-of-the-art.

物联网(IoT)在智能家居中的广泛应用,让用户的生活变得轻松舒适。然而,这些资源受限的设备容易受到多种安全攻击。天坑攻击是破坏智能家居运行、引起用户不满的最具破坏性的攻击之一。现有的入侵检测系统(IDS)不能很好地处理天坑攻击,因为它们(i)没有考虑节点作为IDS代理的能力,导致攻击检测率低;(ii)在减轻攻击时没有检查天坑节点的作用,导致与根节点的剩余网络断开;(iii)没有考虑替换耗尽能量的IDS节点,导致部分网络与根节点失去连接。本文解决了这些缺点,并充分提出了一种处理天坑攻击的机制。本文提出了一种基于网络节点资源分配权重的公式。引入了一种IDS放置策略,将IDS代理放置在特定的资源丰富的节点上,从而延长网络生命周期并增强攻击检测能力。我们提出了一种通过确保网络连通性的新型攻击检测和缓解策略。该机制实现了95%的攻击检测准确率,并将假阴性率降低了25%,与目前的技术相比,能耗合理。
{"title":"Securing smart home against sinkhole attack using weight-based IDS placement strategy","authors":"Md. Shafiqul Islam,&nbsp;Muntaha Tasnim,&nbsp;Upama Kabir,&nbsp;Mosarrat Jahan","doi":"10.1049/wss2.12069","DOIUrl":"https://doi.org/10.1049/wss2.12069","url":null,"abstract":"<p>Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource-constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy-exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state-of-the-art.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138634358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm 使用基于蜂群智能的安全按需特设距离矢量算法在移动特设网络中进行节点验证和加密数据传输
IF 1.9 Q1 Engineering Pub Date : 2023-10-14 DOI: 10.1049/wss2.12068
Anita R. Patil, Gautam M. Borkar

In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.

在移动自组织网络(MANET)中,所有节点通过无线网络相互通信,以创建一个临时网络,而无需集中管理的支持。由于MANET的拓扑结构是动态的,因此安全路由是一个关键问题。本文分析了现有的安全路由协议及其存在的安全问题。建议的基于群智能的安全Ad-hoc按需距离矢量(SIS-AODV)算法通过应用密钥和哈希机制来防止恶意节点参与路由操作,从而提供安全性。一个安全的路由系统可以防止内部和外部网络的攻击。本文提出的SIS-AODV算法由两部分组成:采用椭圆曲线加密算法生成的密钥值和采用PRESENT算法对数据包进行加密。此外,采用H-PRESENT 128算法进行认证和不可否认。PRESENT算法和H-PRESENT 128哈希函数需要较少的计算能力。在此方案中,集中式管理是可选的,因此减少了开销。SIS-AODV的第二部分包括基于AODV算法的蚁群灰狼优化,以提高网络性能,同时在MANET上实现安全算法。分析结果表明,最大性能为98%的数据包传输率和85%的吞吐量。此外,端到端延迟减少了25%,路由开销减少了20%。关键词:AODV,椭圆曲线,PRESENT, H-PRESENT,欧几里得算法,蚁群算法,GWO,黑洞攻击
{"title":"Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm","authors":"Anita R. Patil,&nbsp;Gautam M. Borkar","doi":"10.1049/wss2.12068","DOIUrl":"10.1049/wss2.12068","url":null,"abstract":"<p>In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135766159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Closed-form solution for scaling a wireless acoustic sensor network 用于扩展无线声学传感器网络的闭环解决方案
IF 1.9 Q1 Engineering Pub Date : 2023-09-18 DOI: 10.1049/wss2.12067
Kashyap Patel, Anton Kovalyov, Issa Panahi

A closed-form solution for localising and synchronising an acoustic sensor node with respect to a Wireless Acoustic Sensor Network (WASN) is presented. The aim is to allow efficient scaling of a WASN by individually calibrating newly joined sensor nodes instead of recalibrating the entire array. A key contribution is that the sensor to be calibrated does not need to include a built-in emitter. The proposed method uses signals emitted from spatially distributed sources to compute time difference of arrival (TDOA) measurements between the existing WASN and a new sensor. The problem is then modelled as a set of multivariate non-linear TDOA equations. Through a simple transformation, the non-linear TDOA equations are converted into a system of linear equations. Then, weighted least squares is applied to find an accurate estimate of the calibration parameters. Signal sources can either be known emitters within the existing WASN or arbitrary sources in the environment, thus allowing for flexible applicability in both active and passive calibration scenarios. Simulation results under various conditions show high joint localisation and synchronisation performance, often compared to the Cramér-Rao lower bound.

提出了一种用于相对于无线声学传感器网络(WASN)定位和同步声学传感器节点的闭环解决方案。其目的是通过单独校准新加入的传感器节点而不是重新校准整个阵列来实现WASN的有效缩放。一个关键贡献是要校准的传感器不需要包括内置发射器。所提出的方法使用从空间分布源发射的信号来计算现有WASN和新传感器之间的到达时间差(TDOA)测量。然后将该问题建模为一组多元非线性时差方程。通过简单的变换,将非线性时差方程转化为线性方程组。然后,应用加权最小二乘法来找到校准参数的精确估计。信号源可以是现有WASN内的已知发射器,也可以是环境中的任意源,从而允许在主动和被动校准场景中灵活应用。在各种条件下的仿真结果显示了高的联合定位和同步性能,通常与Cramér-Rao下界相比。
{"title":"Closed-form solution for scaling a wireless acoustic sensor network","authors":"Kashyap Patel,&nbsp;Anton Kovalyov,&nbsp;Issa Panahi","doi":"10.1049/wss2.12067","DOIUrl":"https://doi.org/10.1049/wss2.12067","url":null,"abstract":"<p>A closed-form solution for localising and synchronising an acoustic sensor node with respect to a Wireless Acoustic Sensor Network (WASN) is presented. The aim is to allow efficient scaling of a WASN by individually calibrating newly joined sensor nodes instead of recalibrating the entire array. A key contribution is that the sensor to be calibrated does not need to include a built-in emitter. The proposed method uses signals emitted from spatially distributed sources to compute time difference of arrival (TDOA) measurements between the existing WASN and a new sensor. The problem is then modelled as a set of multivariate non-linear TDOA equations. Through a simple transformation, the non-linear TDOA equations are converted into a system of linear equations. Then, weighted least squares is applied to find an accurate estimate of the calibration parameters. Signal sources can either be known emitters within the existing WASN or arbitrary sources in the environment, thus allowing for flexible applicability in both active and passive calibration scenarios. Simulation results under various conditions show high joint localisation and synchronisation performance, often compared to the Cramér-Rao lower bound.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Wireless Sensor Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1