首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments 缓存与否:云环境中地理分布式数据分析的在线成本优化算法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.jnca.2024.103942
Weitao Yang, Li Pan, Shijun Liu

With the wide application of big data technology, a large number of data geographically stored in data centers across various regions are generated everyday, waiting to be analyzed by big data tasks. Examples of such data analysis tasks include weather prediction and intelligent healthcare applications. Clouds are being used by more and more enterprises due to their nearly infinite resources, ease of scaling, and other characteristics. Organizations often rent StaaS (Storage-as-a-Service) storage products offered by cloud providers, such as OSS (Object Storage Service), for massive data storage, while building a big data cluster in cloud environments to analyze the collected data from various regions. However, when the data to be analyzed are not located in the rented cluster, how to efficiently and economically process the distributed input data stored in clouds becomes an urgent problem to be solved. A simple approach is to only cache frequently accessed data rather than all data from other regions into the cluster to reduce total traffic costs. However, it is generally very hard to predict future data access curves. Thus, a rash caching decision may incur more costs. To address this problem, in this paper we propose an online algorithm for guiding cloud users to make cost-effective caching decisions properly, while not requiring any future information. We prove theoretically that the competitive ratio of our online algorithm is less than 2. Finally we verify the effectiveness of our proposed algorithm through extensive experiments based on the real price of Alibaba’s public IaaS cloud products using both real-world Yahoo S2 data and synthesized datasets.

随着大数据技术的广泛应用,每天都会产生大量存储在各地数据中心的数据,等待大数据任务进行分析。这类数据分析任务包括天气预测和智能医疗应用等。云计算因其近乎无限的资源、易于扩展等特点,正被越来越多的企业所使用。企业通常会租用云提供商提供的 StaaS(存储即服务)存储产品(如 OSS(对象存储服务))进行海量数据存储,同时在云环境中构建大数据集群,对从不同地区收集到的数据进行分析。然而,当需要分析的数据不在租用的集群中时,如何高效、经济地处理存储在云中的分布式输入数据就成了亟待解决的问题。一种简单的方法是只缓存频繁访问的数据,而不是将其他区域的所有数据都缓存到集群中,以降低总流量成本。然而,通常很难预测未来的数据访问曲线。因此,贸然做出缓存决定可能会产生更多成本。为了解决这个问题,我们在本文中提出了一种在线算法,用于指导云用户正确做出经济高效的缓存决策,同时不需要任何未来信息。我们从理论上证明了我们的在线算法的竞争比小于 2。最后,我们基于阿里巴巴公共 IaaS 云产品的真实价格,使用雅虎 S2 真实数据和合成数据集进行了大量实验,验证了我们提出的算法的有效性。
{"title":"Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments","authors":"Weitao Yang,&nbsp;Li Pan,&nbsp;Shijun Liu","doi":"10.1016/j.jnca.2024.103942","DOIUrl":"10.1016/j.jnca.2024.103942","url":null,"abstract":"<div><p>With the wide application of big data technology, a large number of data geographically stored in data centers across various regions are generated everyday, waiting to be analyzed by big data tasks. Examples of such data analysis tasks include weather prediction and intelligent healthcare applications. Clouds are being used by more and more enterprises due to their nearly infinite resources, ease of scaling, and other characteristics. Organizations often rent StaaS (Storage-as-a-Service) storage products offered by cloud providers, such as OSS (Object Storage Service), for massive data storage, while building a big data cluster in cloud environments to analyze the collected data from various regions. However, when the data to be analyzed are not located in the rented cluster, how to efficiently and economically process the distributed input data stored in clouds becomes an urgent problem to be solved. A simple approach is to only cache frequently accessed data rather than all data from other regions into the cluster to reduce total traffic costs. However, it is generally very hard to predict future data access curves. Thus, a rash caching decision may incur more costs. To address this problem, in this paper we propose an online algorithm for guiding cloud users to make cost-effective caching decisions properly, while not requiring any future information. We prove theoretically that the competitive ratio of our online algorithm is less than 2. Finally we verify the effectiveness of our proposed algorithm through extensive experiments based on the real price of Alibaba’s public IaaS cloud products using both real-world Yahoo S2 data and synthesized datasets.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103942"},"PeriodicalIF":7.7,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141452864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An agnostic and secure interoperability protocol for seamless asset movement 不可知的安全互操作性协议,实现资产的无缝移动
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.jnca.2024.103930
El-hacen Diallo , Mohameden Dieye , Omar Dib , Pierre Valiorgue

As blockchain technology continues to evolve, it has fostered an extensive ecosystem of applications and platforms. This dynamic landscape is characterized by a myriad of innovative solutions, ranging from decentralized finance and supply chain management to digital identity and voting systems, each contributing to the ongoing advancement and adoption of blockchain technology across various sectors. Achieving interoperability among these applications and platforms poses a significant challenge due to their use of distinct protocols, and remains a bottleneck hindering the widespread adoption of blockchain technologies. Addressing this challenge requires designing a universal interoperability protocol while ensuring compliance with the security and privacy constraints specific to each blockchain, thus adding complexity. We propose an agnostic interoperability protocol designed for seamless asset movement across independent private blockchain networks, regardless of their individual protocols. This protocol leverages incentive-driven smart contract and Zero-Knowledge Proofs to establish a decentralized, secure, and privacy-focused framework for interoperability. We conduct a security analysis using game theory and provide both theoretical and empirical evaluations of the protocol end-to-end delay. Through a comprehensive use case, we demonstrate the secure deployment of the proposed protocol for asset movement between two private blockchains. We also discuss the trade-offs between cost and delay in cross-blockchain transactions. Furthermore, a comparative analysis with existing interoperability schemes showcases the proposed interoperability scheme superiority in terms of robustness, privacy preservation, and verifiability.

随着区块链技术的不断发展,它已培育出一个广泛的应用和平台生态系统。从分散式金融和供应链管理到数字身份和投票系统,无数的创新解决方案是这一动态景观的特点,每一种解决方案都促进了区块链技术在各行各业的不断进步和应用。由于这些应用和平台使用不同的协议,因此实现它们之间的互操作性是一项重大挑战,也是阻碍区块链技术广泛应用的瓶颈。要应对这一挑战,需要设计一个通用的互操作性协议,同时确保符合每个区块链特有的安全和隐私限制,从而增加复杂性。我们提出了一种不可知的互操作性协议,旨在实现独立私有区块链网络之间的无缝资产流动,而无需考虑其各自的协议。该协议利用激励驱动的智能合约和零知识证明(Zero-Knowledge Proofs)建立了一个去中心化、安全和注重隐私的互操作性框架。我们利用博弈论进行了安全分析,并对协议端到端延迟进行了理论和实证评估。通过一个综合用例,我们展示了在两个私有区块链之间安全部署资产移动协议的建议。我们还讨论了跨区块链交易中成本和延迟之间的权衡。此外,通过与现有互操作性方案的比较分析,我们展示了所提出的互操作性方案在稳健性、隐私保护和可验证性方面的优越性。
{"title":"An agnostic and secure interoperability protocol for seamless asset movement","authors":"El-hacen Diallo ,&nbsp;Mohameden Dieye ,&nbsp;Omar Dib ,&nbsp;Pierre Valiorgue","doi":"10.1016/j.jnca.2024.103930","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103930","url":null,"abstract":"<div><p>As blockchain technology continues to evolve, it has fostered an extensive ecosystem of applications and platforms. This dynamic landscape is characterized by a myriad of innovative solutions, ranging from decentralized finance and supply chain management to digital identity and voting systems, each contributing to the ongoing advancement and adoption of blockchain technology across various sectors. Achieving interoperability among these applications and platforms poses a significant challenge due to their use of distinct protocols, and remains a bottleneck hindering the widespread adoption of blockchain technologies. Addressing this challenge requires designing a universal interoperability protocol while ensuring compliance with the security and privacy constraints specific to each blockchain, thus adding complexity. We propose an agnostic interoperability protocol designed for seamless asset movement across independent private blockchain networks, regardless of their individual protocols. This protocol leverages incentive-driven smart contract and Zero-Knowledge Proofs to establish a decentralized, secure, and privacy-focused framework for interoperability. We conduct a security analysis using game theory and provide both theoretical and empirical evaluations of the protocol end-to-end delay. Through a comprehensive use case, we demonstrate the secure deployment of the proposed protocol for asset movement between two private blockchains. We also discuss the trade-offs between cost and delay in cross-blockchain transactions. Furthermore, a comparative analysis with existing interoperability schemes showcases the proposed interoperability scheme superiority in terms of robustness, privacy preservation, and verifiability.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103930"},"PeriodicalIF":7.7,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001073/pdfft?md5=c6712499a5697502f767dc22dc95c7f8&pid=1-s2.0-S1084804524001073-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141543347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The universal federator: A third-party authentication solution to federated cloud, edge, and fog 通用联盟器:联合云、边缘和雾的第三方认证解决方案
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.jnca.2024.103922
Asad Ali , Ying-Dar Lin , Jian Liu , Chin-Tser Huang

Cloud, Edge, and Fog computing provide computational services to different end users. A federation among these computing paradigms is beneficial, as it enhances the capability, capacity, coverage, and services of cloud, edge, and fog. An authentication method is needed to realize such a federation among cloud, edge, and fog so that a user belonging to one of these computing paradigms can use the services offered by other computing paradigms in the federation without creating a new account. This paper proposes a standard-compliant universal federator that transparently provides third-party authentication among different protocols, used by cloud, edge, and fog, such as 3GPP EPS-AKA, OpenID Connect (OIDC), and 802.1x. The federator provides transparency by using a controller and modules that act as virtual counterparts of the authentication entities in EPS-AKA, OIDC, and 802.1x. These virtual counterparts play multiple roles, depending upon the involved protocols. We deployed a testbed, published our implementation on GitHub, and tested third-party authentication for 16 scenarios across EPS-AKA, OIDC, and 802.1x. The results show that our federator successfully provides third-party authentication while taking 4.07–51.8% of the total authentication time, which ranges between 1.193–3.825 s for 16 scenarios. Some scenarios involving 802.1x take considerably longer due to the bottleneck caused by the 802.1x switch. We also conducted a security analysis to show that our proposed federator fulfills multiple security requirements.

云计算、边缘计算和雾计算为不同的终端用户提供计算服务。这些计算模式之间的联合是有益的,因为它可以增强云、边缘和雾的能力、容量、覆盖范围和服务。需要一种认证方法来实现云、边缘和雾之间的联盟,以便属于其中一种计算模式的用户无需创建新账户即可使用联盟中其他计算模式提供的服务。本文提出了一种符合标准的通用联盟器,可在云、边缘和雾所使用的不同协议(如 3GPP EPS-AKA、OpenID Connect (OIDC) 和 802.1x)之间透明地提供第三方身份验证。联盟器通过使用控制器和模块提供透明度,这些控制器和模块充当 EPS-AKA、OIDC 和 802.1x 中认证实体的虚拟对应物。这些虚拟对应体根据所涉及的协议扮演多种角色。我们部署了一个测试平台,在 GitHub 上发布了我们的实施方案,并在 EPS-AKA、OIDC 和 802.1x 的 16 个场景中测试了第三方身份验证。结果表明,我们的联盟器成功地提供了第三方身份验证,耗时占总认证时间的 4.07-51.8%,16 个场景的耗时在 1.193-3.825 秒之间。由于 802.1x 交换机造成的瓶颈,一些涉及 802.1x 的场景耗时更长。我们还进行了安全分析,结果表明我们提出的联盟器满足多种安全要求。
{"title":"The universal federator: A third-party authentication solution to federated cloud, edge, and fog","authors":"Asad Ali ,&nbsp;Ying-Dar Lin ,&nbsp;Jian Liu ,&nbsp;Chin-Tser Huang","doi":"10.1016/j.jnca.2024.103922","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103922","url":null,"abstract":"<div><p>Cloud, Edge, and Fog computing provide computational services to different end users. A federation among these computing paradigms is beneficial, as it enhances the capability, capacity, coverage, and services of cloud, edge, and fog. An authentication method is needed to realize such a federation among cloud, edge, and fog so that a user belonging to one of these computing paradigms can use the services offered by other computing paradigms in the federation without creating a new account. This paper proposes a standard-compliant universal federator that transparently provides third-party authentication among different protocols, used by cloud, edge, and fog, such as 3GPP EPS-AKA, OpenID Connect (OIDC), and 802.1x. The federator provides transparency by using a controller and modules that act as virtual counterparts of the authentication entities in EPS-AKA, OIDC, and 802.1x. These virtual counterparts play multiple roles, depending upon the involved protocols. We deployed a testbed, published our implementation on GitHub, and tested third-party authentication for 16 scenarios across EPS-AKA, OIDC, and 802.1x. The results show that our federator successfully provides third-party authentication while taking 4.07–51.8% of the total authentication time, which ranges between 1.193–3.825 s for 16 scenarios. Some scenarios involving 802.1x take considerably longer due to the bottleneck caused by the 802.1x switch. We also conducted a security analysis to show that our proposed federator fulfills multiple security requirements.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103922"},"PeriodicalIF":7.7,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks 多 MC 按需无线充电传感器网络的动态充电调度和路径规划方案
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.jnca.2024.103943
Riya Goyal, Abhinav Tomar

With the advancement of wireless energy transfer, Wireless Rechargeable Sensor Networks (WRSNs) have become increasingly popular for efficiently charging sensor nodes. In WRSNs, determining the charging schedule for Mobile Chargers (MCs) is critical for reducing maintenance costs and improving charging efficiency. This is termed the Charging Scheduling Problem (CSP), which is proven to be NP-hard in nature. The existing schemes lack a comprehensive approach to determine the optimal number of MCs and often set a fixed charging threshold for the sensor nodes, degrading charging efficiency in dynamic networks. Additionally, relying on a single MC is unrealistic and impractical for large-scale networks, necessitating a more advanced charging strategy. Thus, this study proposes a dynamic and multi-node charging scheduling scheme named Partitioning-based Charging Schedule for Multiple Mobile Chargers (PCSMMC). The PCSMMC utilizes the traffic load of sensor nodes and energy load of MCs to estimate the optimal number of MCs and computes the progressive threshold for sensor nodes to improve the charging efficiency. Moreover, potential sojourn locations are determined and multiple network factors are integrated into a multi-attribute decision-making process to achieve an efficient charging scheduling and path planning scheme for multiple MCs. The objective of PCSMMC is to enhance the survivability rate of sensor nodes and decrease the traveling path followed by MCs to charge the sensor nodes within the network. Empirical simulation results confirm the superiority of PCSMMC in terms of charging response time, survivability rate, energy utilization efficiency, and network lifetime by a significant margin when compared to alternative approaches.

随着无线能量传输技术的发展,无线充电传感器网络(WRSN)在为传感器节点高效充电方面越来越受欢迎。在 WRSN 中,确定移动充电器(MC)的充电计划对于降低维护成本和提高充电效率至关重要。这被称为充电调度问题(CSP),该问题已被证明具有 NP 难度。现有方案缺乏确定最佳 MC 数量的综合方法,通常为传感器节点设置一个固定的充电阈值,从而降低了动态网络中的充电效率。此外,依赖单个 MC 对于大规模网络来说既不现实也不实用,因此需要更先进的充电策略。因此,本研究提出了一种动态的多节点充电调度方案,命名为基于分区的多移动充电机充电调度(PCSMMC)。PCSMMC 利用传感器节点的流量负载和 MC 的能量负载来估计 MC 的最佳数量,并计算传感器节点的渐进阈值,以提高充电效率。此外,还确定了潜在的驻留位置,并将多种网络因素纳入多属性决策过程,以实现多个 MC 的高效充电调度和路径规划方案。PCSMMC 的目标是提高传感器节点的存活率,减少 MC 在网络内为传感器节点充电时的移动路径。实证仿真结果证实,与其他方法相比,PCSMMC 在充电响应时间、存活率、能量利用效率和网络寿命方面都有明显优势。
{"title":"Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks","authors":"Riya Goyal,&nbsp;Abhinav Tomar","doi":"10.1016/j.jnca.2024.103943","DOIUrl":"10.1016/j.jnca.2024.103943","url":null,"abstract":"<div><p>With the advancement of wireless energy transfer, Wireless Rechargeable Sensor Networks (WRSNs) have become increasingly popular for efficiently charging sensor nodes. In WRSNs, determining the charging schedule for Mobile Chargers (MCs) is critical for reducing maintenance costs and improving charging efficiency. This is termed the Charging Scheduling Problem (CSP), which is proven to be NP-hard in nature. The existing schemes lack a comprehensive approach to determine the optimal number of MCs and often set a fixed charging threshold for the sensor nodes, degrading charging efficiency in dynamic networks. Additionally, relying on a single MC is unrealistic and impractical for large-scale networks, necessitating a more advanced charging strategy. Thus, this study proposes a dynamic and multi-node charging scheduling scheme named <strong>P</strong>artitioning-based <strong>C</strong>harging <strong>S</strong>chedule for <strong>M</strong>ultiple <strong>M</strong>obile <strong>C</strong>hargers (PCSMMC). The PCSMMC utilizes the traffic load of sensor nodes and energy load of MCs to estimate the optimal number of MCs and computes the progressive threshold for sensor nodes to improve the charging efficiency. Moreover, potential sojourn locations are determined and multiple network factors are integrated into a multi-attribute decision-making process to achieve an efficient charging scheduling and path planning scheme for multiple MCs. The objective of PCSMMC is to enhance the survivability rate of sensor nodes and decrease the traveling path followed by MCs to charge the sensor nodes within the network. Empirical simulation results confirm the superiority of PCSMMC in terms of charging response time, survivability rate, energy utilization efficiency, and network lifetime by a significant margin when compared to alternative approaches.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103943"},"PeriodicalIF":7.7,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141496021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCTE-RPL: A multi-context trust-based efficient RPL for IoT MCTE-RPL:面向物联网的基于信任的多语境高效 RPL
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-21 DOI: 10.1016/j.jnca.2024.103937
Javad Mohajerani , Mokhtar Mohammadi Ghanatghestani , Malihe Hashemipour

The Internet of things (IoT) is highly exposed to various attacks due to its sensitive applications, but it is very vulnerable in dealing with these attacks. So, various studies have been introduced to improve IoT security. Most of methods have focused on improving the security of the RPL protocol (Low-Power and Lossy Networks routing protocol) based on the development of trust models. However, most of these researches have considered good and bad behaviors to calculate the value of trust. This way of evaluating trust alone is not enough and it is vulnerable in dealing with some attacks, especially smart attacks (such as on-off attack, selective sending). To improve this issue, in this paper, a method called multi-context trust-based efficient RPL for IoT (MCTE-RPL) is proposed based on RPL development utilizing trust models with intrusion detection system. MCTE-RPL focuses on three important principles, including establishing secure and reliable routing topology, evaluating trust, and detecting malicious nodes. In the first step, the network routing topology is formed based on the trust and conditions of the nodes. In the second step, in accordance with the data exchanges, the trust of the nodes is evaluated and malicious factors are identified. The simulation results using cooja indicated the superiority of MCTE-RPL in improving routing reliability and data exchange compared to previous studies.

物联网(IoT)因其敏感的应用而极易受到各种攻击,但在应对这些攻击时却非常脆弱。因此,人们开展了各种研究来提高物联网的安全性。大多数方法都侧重于在开发信任模型的基础上提高 RPL 协议(低功耗和有损网络路由协议)的安全性。然而,这些研究大多考虑好的和坏的行为来计算信任值。仅用这种方法来评估信任度是不够的,而且在应对某些攻击,尤其是智能攻击(如开关攻击、选择性发送)时容易受到影响。为了改善这一问题,本文在利用信任模型与入侵检测系统进行 RPL 开发的基础上,提出了一种名为 "基于多上下文信任的高效物联网 RPL(Multi-context trust-based efficient RPL for IoT,MCTE-RPL)"的方法。MCTE-RPL 重点关注三个重要原则,包括建立安全可靠的路由拓扑、评估信任和检测恶意节点。第一步,根据节点的信任度和条件形成网络路由拓扑。第二步,根据数据交换情况,评估节点的信任度并识别恶意因素。使用 cooja 的仿真结果表明,与之前的研究相比,MCTE-RPL 在提高路由可靠性和数据交换方面更具优势。
{"title":"MCTE-RPL: A multi-context trust-based efficient RPL for IoT","authors":"Javad Mohajerani ,&nbsp;Mokhtar Mohammadi Ghanatghestani ,&nbsp;Malihe Hashemipour","doi":"10.1016/j.jnca.2024.103937","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103937","url":null,"abstract":"<div><p>The Internet of things (IoT) is highly exposed to various attacks due to its sensitive applications, but it is very vulnerable in dealing with these attacks. So, various studies have been introduced to improve IoT security. Most of methods have focused on improving the security of the RPL protocol (Low-Power and Lossy Networks routing protocol) based on the development of trust models. However, most of these researches have considered good and bad behaviors to calculate the value of trust. This way of evaluating trust alone is not enough and it is vulnerable in dealing with some attacks, especially smart attacks (such as on-off attack, selective sending). To improve this issue, in this paper, a method called multi-context trust-based efficient RPL for IoT (MCTE-RPL) is proposed based on RPL development utilizing trust models with intrusion detection system. MCTE-RPL focuses on three important principles, including establishing secure and reliable routing topology, evaluating trust, and detecting malicious nodes. In the first step, the network routing topology is formed based on the trust and conditions of the nodes. In the second step, in accordance with the data exchanges, the trust of the nodes is evaluated and malicious factors are identified. The simulation results using cooja indicated the superiority of MCTE-RPL in improving routing reliability and data exchange compared to previous studies.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103937"},"PeriodicalIF":7.7,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141444489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seraph: Towards secure and efficient multi-controller authentication with (t,n)-threshold signature in multi-domain SDWAN Seraph:在多域 SDWAN 中使用[公式省略]阈值签名实现安全高效的多控制器身份验证
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-21 DOI: 10.1016/j.jnca.2024.103920
Wendi Feng , Ke Liu , Shuo Sun , Bo Cheng , Wei Zhang

The multi-controller scheme is widely adopted in Software-Defined Wide Area Networks (SDWANs), where a WAN is segmented into multiple domains, each controlled by one controller. These controllers communicate with each other in-band, necessitating authentication before exchanging control messages. However, relying solely on identification of a single node for authentication exposes the network to spoofing attacks, jeopardizing its security. To address this issue, we present Seraph, an innovative (t,n)-threshold signature-based authentication scheme that verifies not only the node itself but also its “endorsement” nodes to establish its identity. We have investigated the best practice for defining the “endorsement” relationships concerning security and overheads, formulating the problem as an integer programming problem. We have demonstrated the polynomial-time hardness (NP-hardness) of the problem and proposed an efficient Seraph algorithm. Through our rigorous simulation analysis, we show that Seraph can provide comparative performance with Optimal and reduce time usage by over 90%.

多控制器方案在软件定义广域网(SDWAN)中被广泛采用,在这种广域网中,广域网被分割成多个域,每个域由一个控制器控制。这些控制器之间进行带内通信,在交换控制信息之前必须进行身份验证。然而,仅仅依靠识别单个节点进行身份验证会使网络遭受欺骗攻击,从而危及网络的安全性。为了解决这个问题,我们提出了一种创新的基于阈值签名的验证方案,不仅验证节点本身,还验证其 "背书 "节点,以确定其身份。我们研究了定义 "背书 "关系的安全性和开销的最佳做法,并将该问题表述为一个整数编程问题。我们证明了该问题的多项式时间难度(NP-hardness),并提出了一种高效算法。通过严格的仿真分析,我们发现该算法的性能可与 Optimal 算法相媲美,并能减少 90% 以上的时间。
{"title":"Seraph: Towards secure and efficient multi-controller authentication with (t,n)-threshold signature in multi-domain SDWAN","authors":"Wendi Feng ,&nbsp;Ke Liu ,&nbsp;Shuo Sun ,&nbsp;Bo Cheng ,&nbsp;Wei Zhang","doi":"10.1016/j.jnca.2024.103920","DOIUrl":"10.1016/j.jnca.2024.103920","url":null,"abstract":"<div><p>The multi-controller scheme is widely adopted in Software-Defined Wide Area Networks (SDWANs), where a WAN is segmented into multiple domains, each controlled by one controller. These controllers communicate with each other in-band, necessitating authentication before exchanging control messages. However, relying solely on identification of a single node for authentication exposes the network to spoofing attacks, jeopardizing its security. To address this issue, we present <span>Seraph</span>, an innovative <span><math><mrow><mo>(</mo><mi>t</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span>-threshold signature-based authentication scheme that verifies not only the node itself but also its “endorsement” nodes to establish its identity. We have investigated the best practice for defining the “endorsement” relationships concerning security and overheads, formulating the problem as an integer programming problem. We have demonstrated the polynomial-time hardness (NP-hardness) of the problem and proposed an efficient <span>Seraph</span> algorithm. Through our rigorous simulation analysis, we show that <span>Seraph</span> can provide comparative performance with Optimal and reduce time usage by over 90%.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103920"},"PeriodicalIF":7.7,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141452886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Troubleshooting solution for traffic congestion control 交通拥堵控制的故障诊断解决方案
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-21 DOI: 10.1016/j.jnca.2024.103923
Van Tong , Sami Souihi , Hai Anh Tran , Abdelhamid Mellouk

The Internet has existed since the 1970s as a means of data exchange between network devices in small networks. In the early stage, there was a small number of devices, but today there is an ever-increasing number of devices, leading to congestion in the network. Therefore, congestion control has attracted so much attention in the academic community and the industry for the past 30 years. Recently, Google has developed BBR (Bottleneck Bandwidth and Round-Trip Time), a rate-based congestion control algorithm. BBR controls transmission rates based on delivery rate and round-trip time (RTT). However, such a static congestion control algorithm (e.g., BBR, etc.) cannot achieve high performance in various network conditions (e.g., low bandwidth, etc.). Concretely, these static algorithms cannot adapt to the dynamic changes of the network environment. Therefore, in this paper, we propose an adaptive algorithm (called ABBR) for congestion control in next-generation networks. ABBR takes into account the reinforcement learning algorithm to learn relevant policies to change the transmission rate corresponding to each congestion control algorithm to optimize long-term performance. The experimental results show that our proposal can achieve good performance in terms of throughput, RTT, and fairness compared to the benchmarks.

互联网作为小型网络设备之间的数据交换手段,自 20 世纪 70 年代起就已经存在。早期设备数量较少,但如今设备数量越来越多,导致网络拥塞。因此,拥塞控制在过去 30 年里备受学术界和业界的关注。最近,谷歌开发了基于速率的拥塞控制算法 BBR(瓶颈带宽和往返时间)。BBR 根据传输速率和往返时间 (RTT) 控制传输速率。然而,这种静态拥塞控制算法(如 BBR 等)无法在各种网络条件(如低带宽等)下实现高性能。具体来说,这些静态算法无法适应网络环境的动态变化。因此,我们在本文中提出了一种用于下一代网络拥塞控制的自适应算法(称为 ABBR)。ABBR 考虑了强化学习算法,通过学习相关策略来改变每种拥塞控制算法对应的传输速率,从而优化长期性能。实验结果表明,与基准相比,我们的建议能在吞吐量、RTT 和公平性方面取得良好的性能。
{"title":"Troubleshooting solution for traffic congestion control","authors":"Van Tong ,&nbsp;Sami Souihi ,&nbsp;Hai Anh Tran ,&nbsp;Abdelhamid Mellouk","doi":"10.1016/j.jnca.2024.103923","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103923","url":null,"abstract":"<div><p>The Internet has existed since the 1970s as a means of data exchange between network devices in small networks. In the early stage, there was a small number of devices, but today there is an ever-increasing number of devices, leading to congestion in the network. Therefore, congestion control has attracted so much attention in the academic community and the industry for the past 30 years. Recently, Google has developed BBR (Bottleneck Bandwidth and Round-Trip Time), a rate-based congestion control algorithm. BBR controls transmission rates based on delivery rate and round-trip time (RTT). However, such a static congestion control algorithm (e.g., BBR, etc.) cannot achieve high performance in various network conditions (e.g., low bandwidth, etc.). Concretely, these static algorithms cannot adapt to the dynamic changes of the network environment. Therefore, in this paper, we propose an adaptive algorithm (called ABBR) for congestion control in next-generation networks. ABBR takes into account the reinforcement learning algorithm to learn relevant policies to change the transmission rate corresponding to each congestion control algorithm to optimize long-term performance. The experimental results show that our proposal can achieve good performance in terms of throughput, RTT, and fairness compared to the benchmarks.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103923"},"PeriodicalIF":7.7,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid kitchen safety guarding with stove fire recognition based on the Internet of Things 基于物联网的炉火识别混合厨房安全防护系统
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-20 DOI: 10.1016/j.jnca.2024.103921
Lien-Wu Chen , Hsing-Fu Tseng , Chun-Yu Cho , Ming-Fong Tsai

In this paper, we design a hybrid kitchen safety guarding framework using embedded devices and onboard sensors to detect abnormal events and block gas sources in time through the Internet of Things (IoT). According to the relevant literature we studied, this is the first framework for kitchen safety guarding that provides the following features: (1) the deep learning based model integrating densely connected convolutional networks with neural architecture search networks is developed to accurately recognize abnormal stove fire, (2) the acceleration correction method is designed to correct the sensed accelerometer values for estimating the actual earthquake level, and (3) the proper gas leakage threshold is defined to precisely detect the gas leakage for automatic gas blocking, and remote surveillance and control are provided to monitor the kitchen environment and control the gas source anytime and anywhere. In particular, an Android-based prototype consisting of the IoT device, diverse sensors, dedicated server, and smartphones is implemented to verify the feasibility and superiority of our framework. Experimental results show that our framework outperforms existing methods and can precisely recognize stove fire intensity and detect earthquake levels for kitchen safety guarding.

在本文中,我们设计了一种混合型厨房安全防护框架,利用嵌入式设备和板载传感器,通过物联网(IoT)及时检测异常事件并阻断气源。根据我们研究的相关文献,这是首个具有以下特点的厨房安全防护框架:(1)开发了基于深度学习的模型,将密集连接的卷积网络与神经架构搜索网络相结合,准确识别异常灶火;(2)设计了加速度校正方法,校正加速度计传感值,估算实际地震级别;(3)定义了适当的燃气泄漏阈值,精确检测燃气泄漏情况,自动封堵燃气,并提供远程监控,随时随地监测厨房环境,控制燃气源。为了验证我们框架的可行性和优越性,我们特别实施了一个基于安卓系统的原型,该原型由物联网设备、各种传感器、专用服务器和智能手机组成。实验结果表明,我们的框架优于现有方法,能够精确识别炉灶火势强度并检测地震级别,从而实现厨房安全防护。
{"title":"Hybrid kitchen safety guarding with stove fire recognition based on the Internet of Things","authors":"Lien-Wu Chen ,&nbsp;Hsing-Fu Tseng ,&nbsp;Chun-Yu Cho ,&nbsp;Ming-Fong Tsai","doi":"10.1016/j.jnca.2024.103921","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103921","url":null,"abstract":"<div><p>In this paper, we design a hybrid kitchen safety guarding framework using embedded devices and onboard sensors to detect abnormal events and block gas sources in time through the Internet of Things (IoT). According to the relevant literature we studied, this is the first framework for kitchen safety guarding that provides the following features: (1) the deep learning based model integrating densely connected convolutional networks with neural architecture search networks is developed to accurately recognize abnormal stove fire, (2) the acceleration correction method is designed to correct the sensed accelerometer values for estimating the actual earthquake level, and (3) the proper gas leakage threshold is defined to precisely detect the gas leakage for automatic gas blocking, and remote surveillance and control are provided to monitor the kitchen environment and control the gas source anytime and anywhere. In particular, an Android-based prototype consisting of the IoT device, diverse sensors, dedicated server, and smartphones is implemented to verify the feasibility and superiority of our framework. Experimental results show that our framework outperforms existing methods and can precisely recognize stove fire intensity and detect earthquake levels for kitchen safety guarding.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103921"},"PeriodicalIF":7.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things 物联网机器学习驱动入侵检测系统的最新研究成果
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-20 DOI: 10.1016/j.jnca.2024.103925
D. Manivannan

The significant advancements in sensors and other resource-constrained devices, capable of collecting data and communicating wirelessly, are poised to revolutionize numerous industries through the Internet of Things (IoT). Sectors such as healthcare, energy, education, transportation, manufacturing, military, and agriculture stand to benefit. IoT is expected to play a crucial role in implementing both Industry 4.0 and its successor, Industry 5.0. IoT relies on data collected by sensors from various points, shared over wireless or wired networks, making it more vulnerable to attacks. Consequently, addressing privacy and security concerns is of paramount importance for the widespread adoption of IoT across industries. Recognizing the pivotal role of IoT security, recent years have witnessed a marked upswing in publications dedicated to leveraging Machine Learning techniques for intrusion detection within the IoT framework. This paper embarks on a comprehensive endeavor to classify and characterize the myriad of intrusion detection methodologies that have emerged through the fusion of Machine Learning and IoT security. Serving as a timely and insightful review, this survey is not only of immense value to seasoned researchers immersed in this dynamic field but also serves as an invaluable resource for newcomers eager to contribute to the enhancement of IoT security. This paper sets itself apart from existing surveys by placing particular emphasis on recent advancements in machine learning-based intrusion detection across various IoT domains. Unlike previous surveys, it comprehensively explores papers published within the past five years, encompassing a wide range of dimensions within this field. These dimensions include, but are not limited to, medical IoT, agricultural IoT, industrial IoT, Fog/Edge IoT, Intelligent Transportation Systems, Smart Home Networks, and more.

By meticulously outlining the diverse machine learning-based intrusion detection methods found in the literature, this survey not only captures the current landscape but also provides a roadmap for future research endeavors. This roadmap aims to strengthen the security framework of the rapidly expanding IoT ecosystem.

传感器和其他资源受限设备能够收集数据并进行无线通信,它们的巨大进步有望通过物联网(IoT)给众多行业带来革命性的变化。医疗保健、能源、教育、交通、制造、军事和农业等行业将从中受益。预计物联网将在实施工业 4.0 及其后继工业 5.0 方面发挥关键作用。物联网依靠传感器从不同地点收集数据,并通过无线或有线网络共享,因此更容易受到攻击。因此,解决隐私和安全问题对于物联网在各行业的广泛应用至关重要。认识到物联网安全的关键作用,近年来,致力于在物联网框架内利用机器学习技术进行入侵检测的出版物明显增加。本文对机器学习与物联网安全融合后出现的大量入侵检测方法进行了全面的分类和描述。作为一篇及时而富有洞察力的综述,本调查报告不仅对沉浸在这一动态领域的资深研究人员具有巨大价值,而且对渴望为提高物联网安全性做出贡献的新人来说也是宝贵的资源。本文有别于现有的调查报告,特别强调了基于机器学习的入侵检测在各个物联网领域的最新进展。与以往的调查不同,本文全面探讨了过去五年内发表的论文,涵盖了该领域的多个方面。这些领域包括但不限于医疗物联网、农业物联网、工业物联网、雾/边缘物联网、智能交通系统、智能家居网络等。
{"title":"Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things","authors":"D. Manivannan","doi":"10.1016/j.jnca.2024.103925","DOIUrl":"10.1016/j.jnca.2024.103925","url":null,"abstract":"<div><p>The significant advancements in sensors and other resource-constrained devices, capable of collecting data and communicating wirelessly, are poised to revolutionize numerous industries through the Internet of Things (IoT). Sectors such as healthcare, energy, education, transportation, manufacturing, military, and agriculture stand to benefit. IoT is expected to play a crucial role in implementing both Industry 4.0 and its successor, Industry 5.0. IoT relies on data collected by sensors from various points, shared over wireless or wired networks, making it more vulnerable to attacks. Consequently, addressing privacy and security concerns is of paramount importance for the widespread adoption of IoT across industries. Recognizing the pivotal role of IoT security, recent years have witnessed a marked upswing in publications dedicated to leveraging Machine Learning techniques for intrusion detection within the IoT framework. This paper embarks on a comprehensive endeavor to classify and characterize the myriad of intrusion detection methodologies that have emerged through the fusion of Machine Learning and IoT security. Serving as a timely and insightful review, this survey is not only of immense value to seasoned researchers immersed in this dynamic field but also serves as an invaluable resource for newcomers eager to contribute to the enhancement of IoT security. This paper sets itself apart from existing surveys by placing particular emphasis on recent advancements in machine learning-based intrusion detection across various IoT domains. Unlike previous surveys, it comprehensively explores papers published within the past five years, encompassing a wide range of dimensions within this field. These dimensions include, but are not limited to, medical IoT, agricultural IoT, industrial IoT, Fog/Edge IoT, Intelligent Transportation Systems, Smart Home Networks, and more.</p><p>By meticulously outlining the diverse machine learning-based intrusion detection methods found in the literature, this survey not only captures the current landscape but also provides a roadmap for future research endeavors. This roadmap aims to strengthen the security framework of the rapidly expanding IoT ecosystem.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103925"},"PeriodicalIF":7.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141452768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning 通过多代理深度强化学习实现移动边缘计算的多无人机辅助任务卸载和路径优化
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-20 DOI: 10.1016/j.jnca.2024.103919
Tao Ju , Linjuan Li , Shuai Liu , Yu Zhang

To tackle task offloading and path planning challenges in multi-UAV-assisted mobile edge computing, this paper proposes a task offloading and path optimization approach via multi-agent deep reinforcement learning. The primary goal is to minimize the overall energy consumption of the system and improve computational performance. Initially, we established a model for a multi-UAV-assisted mobile edge computing system that centrally manages the UAV network through software-defined networking technology. Subsequently, considering UAV load and fairness in user equipment-related services, we employ the multi-agent deep deterministic policy gradient algorithm to optimize task offloading and UAV path management, aiming at load balancing and reducing overall system energy consumption. Simulation results demonstrate our method’s effectiveness in reducing energy consumption and computation latency compared to benchmark algorithms. It ensures system efficiency, stability, and reliability, meeting mobile edge users’ service requests while utilizing computing resources efficiently.

为解决多无人机辅助移动边缘计算中的任务卸载和路径规划难题,本文提出了一种通过多代理深度强化学习进行任务卸载和路径优化的方法。其主要目标是最大限度地降低系统的总体能耗并提高计算性能。首先,我们建立了一个多无人机辅助移动边缘计算系统模型,通过软件定义网络技术集中管理无人机网络。随后,考虑到无人机负载和用户设备相关服务的公平性,我们采用多代理深度确定性策略梯度算法来优化任务卸载和无人机路径管理,以达到负载均衡和降低系统整体能耗的目的。仿真结果表明,与基准算法相比,我们的方法能有效降低能耗和计算延迟。它确保了系统的效率、稳定性和可靠性,在有效利用计算资源的同时满足了移动边缘用户的服务请求。
{"title":"A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning","authors":"Tao Ju ,&nbsp;Linjuan Li ,&nbsp;Shuai Liu ,&nbsp;Yu Zhang","doi":"10.1016/j.jnca.2024.103919","DOIUrl":"10.1016/j.jnca.2024.103919","url":null,"abstract":"<div><p>To tackle task offloading and path planning challenges in multi-UAV-assisted mobile edge computing, this paper proposes a task offloading and path optimization approach via multi-agent deep reinforcement learning. The primary goal is to minimize the overall energy consumption of the system and improve computational performance. Initially, we established a model for a multi-UAV-assisted mobile edge computing system that centrally manages the UAV network through software-defined networking technology. Subsequently, considering UAV load and fairness in user equipment-related services, we employ the multi-agent deep deterministic policy gradient algorithm to optimize task offloading and UAV path management, aiming at load balancing and reducing overall system energy consumption. Simulation results demonstrate our method’s effectiveness in reducing energy consumption and computation latency compared to benchmark algorithms. It ensures system efficiency, stability, and reliability, meeting mobile edge users’ service requests while utilizing computing resources efficiently.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"229 ","pages":"Article 103919"},"PeriodicalIF":7.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141452893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1