首页 > 最新文献

IET Wireless Sensor Systems最新文献

英文 中文
A channel state information and geomagnetic fused fingerprint localisation algorithm based on multi-input convolutional neural network 基于多输入卷积神经网络的信道状态信息和地磁融合指纹定位算法
IF 2.4 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-20 DOI: 10.1049/wss2.12075
Zhenhao Cheng, Dongqing Zhao, Wenzhuo Guo, Linyang Li

Numerous applications require indoor localisation, and one of the current research areas is how to leverage low-cost ubiquitous signals for indoor localisation. This research designs a multi-input convolutional neural network (Multi-CNN) localisation approach to combine natural geomagnetic signals and universal 5G communication signals. To create the location fingerprint data, the geomagnetic three-component data and channel state information (CSI) must first undergo independent preprocessing. Subsequently, the rebuilt CSI amplitude and geomagnetic intensity are employed for separate offline training to efficiently extract the corresponding data features. Lastly, Multi-CNN is used to estimate the user's location online. The localisation outcomes for the conference room and hall demonstrate that the Multi-CNN algorithm can achieve average localisation accuracies of 1.41 and 2.66 m, respectively. These are higher than the single-input CNN algorithms by 21% and 15%, and higher than backpropagation network (BPNN) algorithm by 24% and 17%, and higher than the weighted K-nearest neighbour algorithm by 34% and 28%. The Multi-CNN-based localisation approach successfully fuses the diverse data, potentially satisfying most indoor localisation applications.

许多应用都需要进行室内定位,而如何利用低成本的泛在信号进行室内定位是当前的研究领域之一。本研究设计了一种多输入卷积神经网络(Multi-CNN)定位方法,将自然地磁信号和通用 5G 通信信号结合起来。要创建位置指纹数据,首先必须对地磁三分量数据和信道状态信息(CSI)进行独立预处理。然后,利用重建的 CSI 振幅和地磁强度分别进行离线训练,以有效提取相应的数据特征。最后,使用多重 CNN 在线估算用户位置。会议室和大厅的定位结果表明,Multi-CNN 算法的平均定位精度分别为 1.41 米和 2.66 米。这比单输入 CNN 算法分别高出 21% 和 15%,比反向传播网络 (BPNN) 算法分别高出 24% 和 17%,比加权 K 近邻算法分别高出 34% 和 28%。基于多神经网络的定位方法成功地融合了各种数据,有可能满足大多数室内定位应用的需要。
{"title":"A channel state information and geomagnetic fused fingerprint localisation algorithm based on multi-input convolutional neural network","authors":"Zhenhao Cheng,&nbsp;Dongqing Zhao,&nbsp;Wenzhuo Guo,&nbsp;Linyang Li","doi":"10.1049/wss2.12075","DOIUrl":"10.1049/wss2.12075","url":null,"abstract":"<p>Numerous applications require indoor localisation, and one of the current research areas is how to leverage low-cost ubiquitous signals for indoor localisation. This research designs a multi-input convolutional neural network (Multi-CNN) localisation approach to combine natural geomagnetic signals and universal 5G communication signals. To create the location fingerprint data, the geomagnetic three-component data and channel state information (CSI) must first undergo independent preprocessing. Subsequently, the rebuilt CSI amplitude and geomagnetic intensity are employed for separate offline training to efficiently extract the corresponding data features. Lastly, Multi-CNN is used to estimate the user's location online. The localisation outcomes for the conference room and hall demonstrate that the Multi-CNN algorithm can achieve average localisation accuracies of 1.41 and 2.66 m, respectively. These are higher than the single-input CNN algorithms by 21% and 15%, and higher than backpropagation network (BPNN) algorithm by 24% and 17%, and higher than the weighted K-nearest neighbour algorithm by 34% and 28%. The Multi-CNN-based localisation approach successfully fuses the diverse data, potentially satisfying most indoor localisation applications.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"14 1-2","pages":"33-46"},"PeriodicalIF":2.4,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140348843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting sparsity for localisation of large-scale wireless sensor networks 利用稀疏性实现大规模无线传感器网络的定位
IF 2.4 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-12 DOI: 10.1049/wss2.12074
Shiraz Khan, Inseok Hwang, James Goppert

Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing-based localisation, the measurement model is a non-linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large-scale WSN localisation. In the proposed method, which the authors call the L-Banded Extended Kalman Filter (LB-EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB-EKF approach.

无线传感器网络(WSN)定位是指利用噪声测量信息确定 WSN 中每个代理位置的问题。在许多情况下,例如在基于距离和方位的定位中,测量模型是代理位置的非线性函数,从而导致代理之间的成对互连。众所周知,在这些情况下,WSN 定位问题的最优解计算成本很高,因此需要一种高效的近似解。作者指出,可以利用该问题的固有稀疏性,大大减少使用扩展卡尔曼滤波器(EKF)进行大规模 WSN 定位的计算量。作者提出的方法被称为 L 带扩展卡尔曼滤波器 (LB-EKF),在这种方法中,测量信息矩阵通过对图顶点进行重新标注(改变顶点顺序)转换成带状矩阵。理论分析和数值模拟相结合的方法表明,典型的 WSN 配置(可模拟为随机几何图形)可以使用所提出的 LB-EKF 方法以可扩展的方式进行定位。
{"title":"Exploiting sparsity for localisation of large-scale wireless sensor networks","authors":"Shiraz Khan,&nbsp;Inseok Hwang,&nbsp;James Goppert","doi":"10.1049/wss2.12074","DOIUrl":"10.1049/wss2.12074","url":null,"abstract":"<p>Wireless Sensor Network (WSN) localisation refers to the problem of determining the position of each of the agents in a WSN using noisy measurement information. In many cases, such as in distance and bearing-based localisation, the measurement model is a non-linear function of the agents' positions, leading to pairwise interconnections between the agents. As the optimal solution for the WSN localisation problem is known to be computationally expensive in these cases, an efficient approximation is desired. The authors show that the inherent sparsity in this problem can be exploited to greatly reduce the computational effort of using an Extended Kalman Filter (EKF) for large-scale WSN localisation. In the proposed method, which the authors call the L-Banded Extended Kalman Filter (LB-EKF), the measurement information matrix is converted into a banded matrix by relabelling (permuting the order of) the vertices of the graph. Using a combination of theoretical analysis and numerical simulations, it is shown that typical WSN configurations (which can be modelled as random geometric graphs) can be localised in a scalable manner using the proposed LB-EKF approach.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"14 1-2","pages":"20-32"},"PeriodicalIF":2.4,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139843461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalised covariance intersection-Gamma Gaussian Inverse Wishart-Poisson multi-Bernoulli Mixture: An intelligent multiple extended target tracking scheme for mobile aquaculture sensor networks 广义协方差交集-伽马高斯逆 Wishart-Poisson 多重伯努利混合物:移动水产养殖传感器网络的智能多扩展目标跟踪方案
IF 2.4 Q3 TELECOMMUNICATIONS Pub Date : 2024-01-27 DOI: 10.1049/wss2.12073
Chunfeng Lv, Jianping Zhu, Zhiguang Peng

Poisson multi-Bernoulli Mixture (PMBM) filter has been known as an available or practical point and multiple extended target tracking (METT) method. The authors present an improved PMBM filter with adaptive detection probability and adaptive newborn distributions, accompanying with an associated distributed fusion strategy for the tracking extended multiple targets. First, the augmented state of unknown and changing target detection probability is assumed as Gamma (GAM) distribution. Second, extended states are described by Inverse Wishart (IW) distribution based on this augmented state, accompanying with dynamic states presented by Gaussian distribution. And then, an adaptive newborn distribution is adopted to describe the newborn targets appearing arbitrarily. Consequently, the closed-form solutions of the proposed filter can be derived by approximating the intensity of newborn and potential targets to the Gamma Gaussian Inverse Wishart (GGIW) form. Moreover, the fused means that Generalised Covariance Intersection (GCI) is performed in such a large-scale aquaculture sensor network. Experiments are presented to verify the availability of the GCI-GGIW-PMBM method, and comparisons with other METT filters also demonstrate that tracking behaviours are improved largely.

泊松多重伯努利混合物(PMBM)滤波器一直被认为是一种可用或实用的点和多扩展目标跟踪(METT)方法。作者提出了一种具有自适应检测概率和自适应新生儿分布的改进型 PMBM 滤波器,以及相关的分布式融合策略,用于跟踪扩展的多个目标。首先,未知和不断变化的目标检测概率的增强状态被假定为伽马(GAM)分布。其次,在此增强状态的基础上,用逆 Wishart(IW)分布描述扩展状态,同时用高斯分布描述动态状态。然后,采用自适应新生分布来描述任意出现的新生目标。因此,通过将新生目标和潜在目标的强度近似为伽马高斯反 Wishart(GGIW)形式,可以得出所提滤波器的闭式解。此外,在这种大规模的水产养殖传感器网络中,还采用了广义协方差交集(GCI)的融合手段。实验验证了 GCI-GGIW-PMBM 方法的可用性,与其他 METT 过滤器的比较也表明,跟踪行为得到了很大改善。
{"title":"Generalised covariance intersection-Gamma Gaussian Inverse Wishart-Poisson multi-Bernoulli Mixture: An intelligent multiple extended target tracking scheme for mobile aquaculture sensor networks","authors":"Chunfeng Lv,&nbsp;Jianping Zhu,&nbsp;Zhiguang Peng","doi":"10.1049/wss2.12073","DOIUrl":"10.1049/wss2.12073","url":null,"abstract":"<p>Poisson multi-Bernoulli Mixture (PMBM) filter has been known as an available or practical point and multiple extended target tracking (METT) method. The authors present an improved PMBM filter with adaptive detection probability and adaptive newborn distributions, accompanying with an associated distributed fusion strategy for the tracking extended multiple targets. First, the augmented state of unknown and changing target detection probability is assumed as Gamma (GAM) distribution. Second, extended states are described by Inverse Wishart (IW) distribution based on this augmented state, accompanying with dynamic states presented by Gaussian distribution. And then, an adaptive newborn distribution is adopted to describe the newborn targets appearing arbitrarily. Consequently, the closed-form solutions of the proposed filter can be derived by approximating the intensity of newborn and potential targets to the Gamma Gaussian Inverse Wishart (GGIW) form. Moreover, the fused means that Generalised Covariance Intersection (GCI) is performed in such a large-scale aquaculture sensor network. Experiments are presented to verify the availability of the GCI-GGIW-PMBM method, and comparisons with other METT filters also demonstrate that tracking behaviours are improved largely.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"14 1-2","pages":"1-19"},"PeriodicalIF":2.4,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140348858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion control in constrained Internet of Things networks 受限物联网网络中的拥塞控制
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-12-12 DOI: 10.1049/wss2.12072
Lotfi Mhamdi, Hussam Abdul Khalek

The Internet of Things (IoT) is a growing technology that remotely connects multiple devices (ranging across many fields and applications) over the Internet. The scalability of an IoT network mandates a reliable transport infrastructure. Traditional transport control protocol (TCP) control protocol is unsuitable for such domain, mainly due to energy and power consumption reasons. A lighter version of TCP, light weight IP (lwIP) provides a promising solution for current and projected future scalable IoT infrastructures. However, the original lwIP is just a simple mapping of the protocol, without insight into the IoT specific requirements. This paper examines the lwIP congestion control mechanism and addresses its shortcomings. In particular, a detailed examination is devoted to the various metrics such as retransmission time-outs and its back-off epochs, the congestion window behaviour and progress in the absence (and presence) of congestion. In particular, we propose a set of novel algorithms to address both the IoT constraints nature (light-weight) as well as keeping up with scalability in IoT network size and performance. A detailed simulation study has been conducted to endorse the viability of our proposed set of algorithms for next-generation IoT networks.

物联网(IoT)是一项正在发展的技术,它通过互联网远程连接多个设备(涵盖许多领域和应用)。物联网网络的可扩展性要求可靠的传输基础设施。传统的传输控制协议(TCP)控制协议主要是由于能量和功耗的原因而不适用于此类领域。轻量级IP (lwIP)是TCP的轻量级版本,为当前和预计的未来可扩展的物联网基础设施提供了一个有前途的解决方案。然而,最初的lwIP只是协议的简单映射,没有深入了解物联网的特定需求。本文研究了lwIP拥塞控制机制,并指出了其不足之处。特别是,详细的检查致力于各种指标,如重传超时和它的回退时间,拥塞窗口的行为和进展在没有(和存在)拥塞。特别是,我们提出了一套新颖的算法来解决物联网的约束性质(轻量级)以及跟上物联网网络规模和性能的可扩展性。已经进行了详细的模拟研究,以支持我们提出的下一代物联网网络算法集的可行性。
{"title":"Congestion control in constrained Internet of Things networks","authors":"Lotfi Mhamdi,&nbsp;Hussam Abdul Khalek","doi":"10.1049/wss2.12072","DOIUrl":"https://doi.org/10.1049/wss2.12072","url":null,"abstract":"<p>The Internet of Things (IoT) is a growing technology that remotely connects multiple devices (ranging across many fields and applications) over the Internet. The scalability of an IoT network mandates a reliable transport infrastructure. Traditional transport control protocol (TCP) control protocol is unsuitable for such domain, mainly due to energy and power consumption reasons. A lighter version of TCP, light weight IP (lwIP) provides a promising solution for current and projected future scalable IoT infrastructures. However, the original lwIP is just a simple mapping of the protocol, without insight into the IoT specific requirements. This paper examines the lwIP congestion control mechanism and addresses its shortcomings. In particular, a detailed examination is devoted to the various metrics such as retransmission time-outs and its back-off epochs, the congestion window behaviour and progress in the absence (and presence) of congestion. In particular, we propose a set of novel algorithms to address both the IoT constraints nature (light-weight) as well as keeping up with scalability in IoT network size and performance. A detailed simulation study has been conducted to endorse the viability of our proposed set of algorithms for next-generation IoT networks.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"247-255"},"PeriodicalIF":1.9,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138634076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks ETXRE:适用于 RPL 协议和无线传感器网络的高能效、高延迟路由指标
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-12-06 DOI: 10.1049/wss2.12070
Aiman Nait Abbou, Jukka Manner

Internet of Things is an emerging paradigm based on interconnecting physical and virtual objects with each other and to the Internet. Most connected things fall into the category of constrained devices, with restricted resources (processing power, memory, and energy). These low-power and lossy networks (LLNs) are known for their instability, high loss rates and low data rates, which makes routing one of the most challenging problems in low-cost communications. A routing protocol for low-power and lossy networks (RPL) is a proactive dynamic routing protocol based on IPv6. This protocol defines an objective function (OF) that utilises a set of metrics to select the best possible path to the destination. Minimum rank hysteresis objective function (MRHOF) and objective function zero (OF0) are the most basic OFs, where the first one selects the path to the sink based on the expected transmission count (ETX) metric, and OF0 is based on the hop count (HC). These two metrics prioritise either brute performance (i.e. ETX) or simplicity (i.e. HC). Therefore, using a single metric with an OF can either limit the performance or have an inefficient impact on load management and energy consumption. To overcome these challenges, a routing metric based on MRHOF OF which takes into consideration the link-based routing metric (i.e. ETX) and node-based metric (i.e. remaining energy) for route selection is provided. Expected transmission count remaining energy (ETXRE) is evaluated through 36 scenarios with different parameters. Preliminary results show that ETXRE outperforms ETX and RE in terms of end-to-end delay by an average of at least 17%, packet delay by 13% and consumes 10% less energy.

物联网是一种基于物理和虚拟对象相互连接以及与互联网连接的新兴范式。大多数连接的设备都属于受限设备,具有受限的资源(处理能力、内存和能源)。这些低功耗和有损网络(lln)以其不稳定性、高损耗率和低数据速率而闻名,这使得路由成为低成本通信中最具挑战性的问题之一。低功耗损耗网络路由协议是一种基于IPv6的主动动态路由协议。该协议定义了一个目标函数(OF),它利用一组指标来选择到达目的地的最佳可能路径。最小秩滞后目标函数(MRHOF)和目标函数零(OF0)是最基本的OFs,其中第一个目标函数基于期望传输计数(ETX)度量选择到达sink的路径,OF0基于跳数(HC)。这两个指标要么优先考虑野蛮性能(即ETX),要么优先考虑简单性(即HC)。因此,使用带有OF的单一指标可能会限制性能,或者对负载管理和能源消耗产生低效影响。为了克服这些挑战,提供了一种基于MRHOF的路由度量,该度量考虑了基于链路的路由度量(即ETX)和基于节点的度量(即剩余能量)进行路由选择。期望传输计数剩余能量(ETXRE)通过36个不同参数的场景进行评估。初步结果表明,ETXRE在端到端延迟方面平均优于ETX和RE至少17%,数据包延迟减少13%,能耗减少10%。
{"title":"ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks","authors":"Aiman Nait Abbou,&nbsp;Jukka Manner","doi":"10.1049/wss2.12070","DOIUrl":"10.1049/wss2.12070","url":null,"abstract":"<p>Internet of Things is an emerging paradigm based on interconnecting physical and virtual objects with each other and to the Internet. Most connected things fall into the category of constrained devices, with restricted resources (processing power, memory, and energy). These low-power and lossy networks (LLNs) are known for their instability, high loss rates and low data rates, which makes routing one of the most challenging problems in low-cost communications. A routing protocol for low-power and lossy networks (RPL) is a proactive dynamic routing protocol based on IPv6. This protocol defines an objective function (OF) that utilises a set of metrics to select the best possible path to the destination. Minimum rank hysteresis objective function (MRHOF) and objective function zero (OF0) are the most basic OFs, where the first one selects the path to the sink based on the expected transmission count (ETX) metric, and OF0 is based on the hop count (HC). These two metrics prioritise either brute performance (i.e. ETX) or simplicity (i.e. HC). Therefore, using a single metric with an OF can either limit the performance or have an inefficient impact on load management and energy consumption. To overcome these challenges, a routing metric based on MRHOF OF which takes into consideration the link-based routing metric (i.e. ETX) and node-based metric (i.e. remaining energy) for route selection is provided. Expected transmission count remaining energy (ETXRE) is evaluated through 36 scenarios with different parameters. Preliminary results show that ETXRE outperforms ETX and RE in terms of end-to-end delay by an average of at least 17%, packet delay by 13% and consumes 10% less energy.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"235-246"},"PeriodicalIF":1.9,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138596665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing smart home against sinkhole attack using weight-based IDS placement strategy 利用基于权重的 IDS 布置策略确保智能家居免受天坑攻击
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-28 DOI: 10.1049/wss2.12069
Md. Shafiqul Islam, Muntaha Tasnim, Upama Kabir, Mosarrat Jahan

Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource-constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy-exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state-of-the-art.

物联网(IoT)在智能家居中的广泛应用,让用户的生活变得轻松舒适。然而,这些资源受限的设备容易受到多种安全攻击。天坑攻击是破坏智能家居运行、引起用户不满的最具破坏性的攻击之一。现有的入侵检测系统(IDS)不能很好地处理天坑攻击,因为它们(i)没有考虑节点作为IDS代理的能力,导致攻击检测率低;(ii)在减轻攻击时没有检查天坑节点的作用,导致与根节点的剩余网络断开;(iii)没有考虑替换耗尽能量的IDS节点,导致部分网络与根节点失去连接。本文解决了这些缺点,并充分提出了一种处理天坑攻击的机制。本文提出了一种基于网络节点资源分配权重的公式。引入了一种IDS放置策略,将IDS代理放置在特定的资源丰富的节点上,从而延长网络生命周期并增强攻击检测能力。我们提出了一种通过确保网络连通性的新型攻击检测和缓解策略。该机制实现了95%的攻击检测准确率,并将假阴性率降低了25%,与目前的技术相比,能耗合理。
{"title":"Securing smart home against sinkhole attack using weight-based IDS placement strategy","authors":"Md. Shafiqul Islam,&nbsp;Muntaha Tasnim,&nbsp;Upama Kabir,&nbsp;Mosarrat Jahan","doi":"10.1049/wss2.12069","DOIUrl":"https://doi.org/10.1049/wss2.12069","url":null,"abstract":"<p>Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource-constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy-exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state-of-the-art.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"216-234"},"PeriodicalIF":1.9,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138634358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm 使用基于蜂群智能的安全按需特设距离矢量算法在移动特设网络中进行节点验证和加密数据传输
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-14 DOI: 10.1049/wss2.12068
Anita R. Patil, Gautam M. Borkar

In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.

在移动自组织网络(MANET)中,所有节点通过无线网络相互通信,以创建一个临时网络,而无需集中管理的支持。由于MANET的拓扑结构是动态的,因此安全路由是一个关键问题。本文分析了现有的安全路由协议及其存在的安全问题。建议的基于群智能的安全Ad-hoc按需距离矢量(SIS-AODV)算法通过应用密钥和哈希机制来防止恶意节点参与路由操作,从而提供安全性。一个安全的路由系统可以防止内部和外部网络的攻击。本文提出的SIS-AODV算法由两部分组成:采用椭圆曲线加密算法生成的密钥值和采用PRESENT算法对数据包进行加密。此外,采用H-PRESENT 128算法进行认证和不可否认。PRESENT算法和H-PRESENT 128哈希函数需要较少的计算能力。在此方案中,集中式管理是可选的,因此减少了开销。SIS-AODV的第二部分包括基于AODV算法的蚁群灰狼优化,以提高网络性能,同时在MANET上实现安全算法。分析结果表明,最大性能为98%的数据包传输率和85%的吞吐量。此外,端到端延迟减少了25%,路由开销减少了20%。关键词:AODV,椭圆曲线,PRESENT, H-PRESENT,欧几里得算法,蚁群算法,GWO,黑洞攻击
{"title":"Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm","authors":"Anita R. Patil,&nbsp;Gautam M. Borkar","doi":"10.1049/wss2.12068","DOIUrl":"10.1049/wss2.12068","url":null,"abstract":"<p>In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"201-215"},"PeriodicalIF":1.9,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135766159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Closed-form solution for scaling a wireless acoustic sensor network 用于扩展无线声学传感器网络的闭环解决方案
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-18 DOI: 10.1049/wss2.12067
Kashyap Patel, Anton Kovalyov, Issa Panahi

A closed-form solution for localising and synchronising an acoustic sensor node with respect to a Wireless Acoustic Sensor Network (WASN) is presented. The aim is to allow efficient scaling of a WASN by individually calibrating newly joined sensor nodes instead of recalibrating the entire array. A key contribution is that the sensor to be calibrated does not need to include a built-in emitter. The proposed method uses signals emitted from spatially distributed sources to compute time difference of arrival (TDOA) measurements between the existing WASN and a new sensor. The problem is then modelled as a set of multivariate non-linear TDOA equations. Through a simple transformation, the non-linear TDOA equations are converted into a system of linear equations. Then, weighted least squares is applied to find an accurate estimate of the calibration parameters. Signal sources can either be known emitters within the existing WASN or arbitrary sources in the environment, thus allowing for flexible applicability in both active and passive calibration scenarios. Simulation results under various conditions show high joint localisation and synchronisation performance, often compared to the Cramér-Rao lower bound.

提出了一种用于相对于无线声学传感器网络(WASN)定位和同步声学传感器节点的闭环解决方案。其目的是通过单独校准新加入的传感器节点而不是重新校准整个阵列来实现WASN的有效缩放。一个关键贡献是要校准的传感器不需要包括内置发射器。所提出的方法使用从空间分布源发射的信号来计算现有WASN和新传感器之间的到达时间差(TDOA)测量。然后将该问题建模为一组多元非线性时差方程。通过简单的变换,将非线性时差方程转化为线性方程组。然后,应用加权最小二乘法来找到校准参数的精确估计。信号源可以是现有WASN内的已知发射器,也可以是环境中的任意源,从而允许在主动和被动校准场景中灵活应用。在各种条件下的仿真结果显示了高的联合定位和同步性能,通常与Cramér-Rao下界相比。
{"title":"Closed-form solution for scaling a wireless acoustic sensor network","authors":"Kashyap Patel,&nbsp;Anton Kovalyov,&nbsp;Issa Panahi","doi":"10.1049/wss2.12067","DOIUrl":"https://doi.org/10.1049/wss2.12067","url":null,"abstract":"<p>A closed-form solution for localising and synchronising an acoustic sensor node with respect to a Wireless Acoustic Sensor Network (WASN) is presented. The aim is to allow efficient scaling of a WASN by individually calibrating newly joined sensor nodes instead of recalibrating the entire array. A key contribution is that the sensor to be calibrated does not need to include a built-in emitter. The proposed method uses signals emitted from spatially distributed sources to compute time difference of arrival (TDOA) measurements between the existing WASN and a new sensor. The problem is then modelled as a set of multivariate non-linear TDOA equations. Through a simple transformation, the non-linear TDOA equations are converted into a system of linear equations. Then, weighted least squares is applied to find an accurate estimate of the calibration parameters. Signal sources can either be known emitters within the existing WASN or arbitrary sources in the environment, thus allowing for flexible applicability in both active and passive calibration scenarios. Simulation results under various conditions show high joint localisation and synchronisation performance, often compared to the Cramér-Rao lower bound.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"190-200"},"PeriodicalIF":1.9,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel system to control and forecast QoX performance in IoT-based monitoring platforms 一种新的基于物联网的监控平台QoX性能控制和预测系统
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-14 DOI: 10.1049/wss2.12066
Jose-Manuel Martinez-Caro, Igor Tasic, Maria-Dolores Cano

Communication architectures based on the Internet of Things (IoT) are increasingly frequent. Commonly, these solutions are used to carry out control and monitoring activities. It is easy to find cases for manufacturing, prediction maintenance, Smart Cities, etc., where sensors are deployed to capture data that is sent to the cloud through edge devices or gateways. Then that data is processed to provide useful information and perform additional actions if required. As crucial as deploying these monitoring solutions is to verify their operation. In this article, we propose a novel warning method to monitor the performance of IoT-based systems. The proposal is based on a holistic quality model called Quality of X (QoX). QoX refers to the use of a variety of metrics to measure system performance at different quality dimensions. These quality dimensions are data (Quality of Data, QoD), information (Quality of Information, QoI), users' experience (Quality of user Experience, QoE), and cost (Quality Cost, QC). In addition to showing the IoT system performance in terms of QoX in real-time, our proposal includes (i) a forecasting model for independent estimation of QoX applying Deep Learning (DL), specifically using a Long Short-Term Memory (LSTM) and time series, and (ii) the warning system. In light of our results, our proposal shows a better capacity to forecast quality drops in the IoT-based monitoring system than other solutions from the related literature.

基于物联网(IoT)的通信架构越来越频繁。通常,这些解决方案用于执行控制和监测活动。在制造、预测维护、智能城市等领域,很容易找到部署传感器以捕获通过边缘设备或网关发送到云端的数据的案例。然后处理该数据以提供有用的信息,并在需要时执行附加操作。与部署这些监控解决方案一样重要的是验证它们的操作。在本文中,我们提出了一种新的警告方法来监测基于物联网的系统的性能。该提案基于一个称为X质量(QoX)的整体质量模型。QoX是指使用各种度量来衡量不同质量维度的系统性能。这些质量维度是数据(数据质量,QoD)、信息(信息质量,QoI)、用户体验(用户体验质量,QoE)和成本(质量成本,QC)。除了实时显示物联网系统在QoX方面的性能外,我们的提案还包括(i)应用深度学习(DL),特别是使用长短期记忆(LSTM)和时间序列,独立估计QoX的预测模型,以及(ii)警报系统。根据我们的结果,与相关文献中的其他解决方案相比,我们的提案显示出更好的能力来预测基于物联网的监测系统的质量下降。
{"title":"A novel system to control and forecast QoX performance in IoT-based monitoring platforms","authors":"Jose-Manuel Martinez-Caro,&nbsp;Igor Tasic,&nbsp;Maria-Dolores Cano","doi":"10.1049/wss2.12066","DOIUrl":"https://doi.org/10.1049/wss2.12066","url":null,"abstract":"<p>Communication architectures based on the Internet of Things (IoT) are increasingly frequent. Commonly, these solutions are used to carry out control and monitoring activities. It is easy to find cases for manufacturing, prediction maintenance, Smart Cities, etc., where sensors are deployed to capture data that is sent to the cloud through edge devices or gateways. Then that data is processed to provide useful information and perform additional actions if required. As crucial as deploying these monitoring solutions is to verify their operation. In this article, we propose a novel warning method to monitor the performance of IoT-based systems. The proposal is based on a holistic quality model called Quality of X (QoX). QoX refers to the use of a variety of metrics to measure system performance at different quality dimensions. These quality dimensions are data (Quality of Data, QoD), information (Quality of Information, QoI), users' experience (Quality of user Experience, QoE), and cost (Quality Cost, QC). In addition to showing the IoT system performance in terms of QoX in real-time, our proposal includes (i) a forecasting model for independent estimation of QoX applying Deep Learning (DL), specifically using a Long Short-Term Memory (LSTM) and time series, and (ii) the warning system. In light of our results, our proposal shows a better capacity to forecast quality drops in the IoT-based monitoring system than other solutions from the related literature.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"178-189"},"PeriodicalIF":1.9,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Free device location independent WiFi-based localisation using received signal strength indicator and channel state information 使用接收信号强度指示器和信道状态信息进行免费的设备位置独立WiFi定位
IF 1.9 Q3 TELECOMMUNICATIONS Pub Date : 2023-08-18 DOI: 10.1049/wss2.12065
Fahd Abuhoureyah, Wong Yan Chiew, Ahmad Sadhiqin Bin Mohd Isira, Mohammed Al-Andoli

The trajectory localisation of human activities using signal analytics has become a reality due to the widespread use of advanced signal processing systems. Device-free localisation using WiFi devices is prevalent, and the received signal strength indicator (RSSI) and channel state information (CSI) signals offer additional benefits. However, radio frequency (RF) localisation is highly dependent on the environment, so updating fingerprint data is necessary by changing the environment. This work presents Fine-grained Indoor Detection and Angular Radar for recognising and locating humans using a multipath trajectory reflections system that does not require training. It estimates location using a probabilistic approach that considers changes in CSI and RSSI across multiple nodes, generating an informative dataset that reflects the current trajectory and status of the location. The presented method extracts data from clustered Raspberry Pi 4B and Nexmon. The method exhibits a versatile real-time location-tracking solution by utilising the distinctive properties of RF signals. This technology has significant implications for various applications, including human medical monitoring, gaming, smart cities, and optimising building layouts to improve efficiency. The model demonstrates location-independent localisation with up to 80% accuracy in mapping trajectories at any location. The findings indicate that the proposed model is effective and reliable for indoor localisation and activity tracking, making it a promising solution for implementation in real-world environments.

由于先进信号处理系统的广泛使用,使用信号分析的人类活动轨迹定位已成为现实。使用WiFi设备的无设备定位非常普遍,接收信号强度指示器(RSSI)和信道状态信息(CSI)信号提供了额外的好处。然而,射频(RF)定位高度依赖于环境,因此有必要通过改变环境来更新指纹数据。这项工作提出了细粒度室内检测和角雷达,用于使用不需要训练的多路径轨迹反射系统识别和定位人类。它使用概率方法来估计位置,该方法考虑了多个节点上CSI和RSSI的变化,生成了反映位置当前轨迹和状态的信息数据集。该方法从Raspberry Pi 4B和Nexmon集群中提取数据。该方法利用射频信号的独特特性,提供了一种通用的实时位置跟踪解决方案。这项技术对各种应用具有重要意义,包括人类医疗监测、游戏、智能城市,以及优化建筑布局以提高效率。该模型展示了位置独立定位,在任何位置绘制轨迹的准确率高达80%。研究结果表明,所提出的模型在室内定位和活动跟踪方面是有效和可靠的,使其成为在现实环境中实施的一个有前途的解决方案。
{"title":"Free device location independent WiFi-based localisation using received signal strength indicator and channel state information","authors":"Fahd Abuhoureyah,&nbsp;Wong Yan Chiew,&nbsp;Ahmad Sadhiqin Bin Mohd Isira,&nbsp;Mohammed Al-Andoli","doi":"10.1049/wss2.12065","DOIUrl":"10.1049/wss2.12065","url":null,"abstract":"<p>The trajectory localisation of human activities using signal analytics has become a reality due to the widespread use of advanced signal processing systems. Device-free localisation using WiFi devices is prevalent, and the received signal strength indicator (RSSI) and channel state information (CSI) signals offer additional benefits. However, radio frequency (RF) localisation is highly dependent on the environment, so updating fingerprint data is necessary by changing the environment. This work presents Fine-grained Indoor Detection and Angular Radar for recognising and locating humans using a multipath trajectory reflections system that does not require training. It estimates location using a probabilistic approach that considers changes in CSI and RSSI across multiple nodes, generating an informative dataset that reflects the current trajectory and status of the location. The presented method extracts data from clustered Raspberry Pi 4B and Nexmon. The method exhibits a versatile real-time location-tracking solution by utilising the distinctive properties of RF signals. This technology has significant implications for various applications, including human medical monitoring, gaming, smart cities, and optimising building layouts to improve efficiency. The model demonstrates location-independent localisation with up to 80% accuracy in mapping trajectories at any location. The findings indicate that the proposed model is effective and reliable for indoor localisation and activity tracking, making it a promising solution for implementation in real-world environments.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"163-177"},"PeriodicalIF":1.9,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46987491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Wireless Sensor Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1