首页 > 最新文献

Computer Communications最新文献

英文 中文
Towards proactive rumor control: When a budget constraint meets impression counts 主动控制谣言:当预算受限时,印象很重要
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-28 DOI: 10.1016/j.comcom.2024.108010
Pengfei Xu, Zhiyong Peng, Liwei Wang
The proliferation of rumors in online networks poses significant public safety risks and economic repercussions. Addressing this, we investigate the understudied aspect of rumor control: the interplay between influence block effect and user impression counts under budget constraints. We introduce two problem variants, RCIC and RCICB, tailored for diverse application contexts. Our study confronts two inherent challenges: the NP-hard nature of the problems and the non-submodularity of the influence block, which precludes direct greedy approaches. We develop a novel branch-and-bound framework for RCIC, achieving a (11/eϵ) approximation ratio, and enhance its efficacy with a progressive upper bound estimation, refining the ratio to (11/eϵρ). Extending these techniques to RCICB, we attain approximation ratios of (12(11/e)ϵ) and (12(11/eρ)ϵ). We conduct experiments on real-world datasets to verify the efficiency, effectiveness, and scalability of our methods.
网络谣言的泛滥带来了重大的公共安全风险和经济影响。为了解决这个问题,我们研究了谣言控制中尚未得到充分研究的方面:在预算限制下,影响阻塞效应和用户印象数之间的相互作用。我们介绍了两个问题变体,RCIC和RCICB,它们是为不同的应用程序上下文量身定制的。我们的研究面临着两个固有的挑战:问题的NP-hard性质和影响块的非子模块性,这排除了直接贪婪方法。我们为RCIC开发了一种新的分支定界框架,实现了(1−1/e−ε)近似比,并通过渐进式上界估计增强了其有效性,将该比率改进为(1−1/e−ε−ρ)。将这些技术扩展到RCICB,我们得到近似比值为(12(1−1/e)−御柱)和(12(1−1/e−ρ)−御柱)。我们在真实世界的数据集上进行实验,以验证我们方法的效率、有效性和可扩展性。
{"title":"Towards proactive rumor control: When a budget constraint meets impression counts","authors":"Pengfei Xu,&nbsp;Zhiyong Peng,&nbsp;Liwei Wang","doi":"10.1016/j.comcom.2024.108010","DOIUrl":"10.1016/j.comcom.2024.108010","url":null,"abstract":"<div><div>The proliferation of rumors in online networks poses significant public safety risks and economic repercussions. Addressing this, we investigate the understudied aspect of rumor control: the interplay between influence block effect and user impression counts under budget constraints. We introduce two problem variants, RCIC and RCICB, tailored for diverse application contexts. Our study confronts two inherent challenges: the NP-hard nature of the problems and the non-submodularity of the influence block, which precludes direct greedy approaches. We develop a novel branch-and-bound framework for RCIC, achieving a (<span><math><mrow><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>e</mi><mo>−</mo><mi>ϵ</mi></mrow></math></span>) approximation ratio, and enhance its efficacy with a progressive upper bound estimation, refining the ratio to (<span><math><mrow><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>e</mi><mo>−</mo><mi>ϵ</mi><mo>−</mo><mi>ρ</mi></mrow></math></span>). Extending these techniques to RCICB, we attain approximation ratios of (<span><math><mrow><mfrac><mrow><mn>1</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>e</mi><mo>)</mo></mrow><mo>−</mo><mi>ϵ</mi></mrow></math></span>) and (<span><math><mrow><mfrac><mrow><mn>1</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>e</mi><mo>−</mo><mi>ρ</mi><mo>)</mo></mrow><mo>−</mo><mi>ϵ</mi></mrow></math></span>). We conduct experiments on real-world datasets to verify the efficiency, effectiveness, and scalability of our methods.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"230 ","pages":"Article 108010"},"PeriodicalIF":4.5,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142745161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustless privacy-preserving data aggregation on Ethereum with hypercube network topology 使用超立方网络拓扑在以太坊上进行无信任的隐私保护数据聚合
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-25 DOI: 10.1016/j.comcom.2024.108009
Goshgar C. Ismayilov, Can Özturan
The privacy-preserving data aggregation is a critical problem for many applications where multiple parties need to collaborate with each other privately to arrive at certain results. Blockchain, as a database shared across the network, provides an underlying platform on which such aggregations can be carried out with a decentralized manner. Therefore, in this paper, we have proposed a scalable privacy-preserving data aggregation protocol for summation on the Ethereum blockchain by integrating several cryptographic primitives including commitment scheme, asymmetric encryption and zero-knowledge proof along with the hypercube network topology. The protocol consists of four stages as contract deployment, user registration, private submission and proof verification. The analysis of the protocol is made with respect to two main perspectives as security and scalability including computational, communicational and storage overheads. In the paper, the zero-knowledge proof, smart contract and web user interface models for the protocol are provided. We have performed an experimental study in order to identify the required gas costs per individual and per system. The general formulation is provided to characterize the changes in gas costs for the increasing number of users. The zero-knowledge proof generation and verification times are also measured.
对于许多应用来说,保护隐私的数据聚合是一个关键问题,在这些应用中,多方需要私下相互协作以得出特定结果。区块链作为全网共享的数据库,提供了一个底层平台,可以在此平台上以去中心化的方式进行此类聚合。因此,在本文中,我们提出了一种可扩展的隐私保护数据聚合协议,该协议通过将承诺方案、非对称加密和零知识证明等多个加密原语与超立方网络拓扑相结合,在以太坊区块链上进行求和。该协议包括合约部署、用户注册、私人提交和证明验证四个阶段。该协议主要从安全性和可扩展性(包括计算、通信和存储开销)两个角度进行分析。本文提供了该协议的零知识证明、智能合约和网络用户界面模型。我们进行了一项实验研究,以确定每个人和每个系统所需的气体成本。我们还提供了一般公式,以描述用户数量增加时燃气成本的变化。我们还测量了零知识证明的生成和验证时间。
{"title":"Trustless privacy-preserving data aggregation on Ethereum with hypercube network topology","authors":"Goshgar C. Ismayilov,&nbsp;Can Özturan","doi":"10.1016/j.comcom.2024.108009","DOIUrl":"10.1016/j.comcom.2024.108009","url":null,"abstract":"<div><div>The privacy-preserving data aggregation is a critical problem for many applications where multiple parties need to collaborate with each other privately to arrive at certain results. Blockchain, as a database shared across the network, provides an underlying platform on which such aggregations can be carried out with a decentralized manner. Therefore, in this paper, we have proposed a scalable privacy-preserving data aggregation protocol for summation on the Ethereum blockchain by integrating several cryptographic primitives including commitment scheme, asymmetric encryption and zero-knowledge proof along with the hypercube network topology. The protocol consists of four stages as <em>contract deployment</em>, <em>user registration</em>, <em>private submission</em> and <em>proof verification</em>. The analysis of the protocol is made with respect to two main perspectives as security and scalability including computational, communicational and storage overheads. In the paper, the zero-knowledge proof, smart contract and web user interface models for the protocol are provided. We have performed an experimental study in order to identify the required gas costs per individual and per system. The general formulation is provided to characterize the changes in gas costs for the increasing number of users. The zero-knowledge proof generation and verification times are also measured.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"230 ","pages":"Article 108009"},"PeriodicalIF":4.5,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on authentication protocols of dynamic wireless EV charging 电动汽车动态无线充电认证协议研究进展
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-20 DOI: 10.1016/j.comcom.2024.108008
Nethmi Hettiarachchi, Saqib Hakak, Kalikinkar Mandal
Electric Vehicles (EVs) are considered the predominant method of decreasing fossil fuels as well as greenhouse gas emissions. With the drastic growth of EVs, the future smart grid is expected to extensively incorporate dynamic wireless charging (DWC) systems, a significant advancement over traditional charging methods. DWC, offering the unique ability to charge vehicles in motion, introduces new infrastructures, complex network models and consequently, a massive attack surface. To accomplish the goal of such an enormous smart grid accompanying DWCs, the security of EV charging infrastructures has become a deciding factor. EV charging is vulnerable to cyberattacks as it has many attack vectors and many challenges to combat. Unlike the traditional charging services provided in a typical static charging station, the DWC has a complex network architecture which makes it vulnerable to many forms of cyberattacks. Authentication plays a crucial role in safeguarding the frontline security of this ecosystem. However, within the domain of DWC, the current academic landscape has seen limited attention dedicated to authentication protocols. This background signifies the necessity of a comprehensive survey to cover the authentication protocols of dynamic wireless EV charging environments. This review paper examines the security requirements and the network model of the DWC, providing comprehensive insights into existing authentication protocols by scrutinizing a proper classification. Furthermore, the paper addresses existing challenges in authentication schemes within DWC and explores potential future research tendencies aiming to strengthen the security framework of this emerging technology.
电动汽车(ev)被认为是减少化石燃料和温室气体排放的主要方法。随着电动汽车的迅猛发展,未来的智能电网有望广泛采用动态无线充电(DWC)系统,这是传统充电方式的一大进步。DWC提供了对行驶中的车辆收费的独特能力,引入了新的基础设施、复杂的网络模型,从而形成了大规模的攻击面。为了实现伴随DWCs而来的庞大智能电网的目标,电动汽车充电基础设施的安全性已成为决定因素。由于电动汽车充电存在许多攻击载体和挑战,因此容易受到网络攻击。与典型的静态充电站提供的传统充电服务不同,DWC具有复杂的网络架构,这使得它容易受到多种形式的网络攻击。身份验证在维护这个生态系统的一线安全方面起着至关重要的作用。然而,在DWC领域内,目前学术界对身份验证协议的关注有限。这表明有必要对动态无线充电环境下的认证协议进行全面的研究。这篇综述文章研究了DWC的安全需求和网络模型,通过仔细检查适当的分类,提供了对现有身份验证协议的全面见解。此外,本文还讨论了DWC认证方案中存在的挑战,并探讨了旨在加强这一新兴技术的安全框架的潜在未来研究趋势。
{"title":"A survey on authentication protocols of dynamic wireless EV charging","authors":"Nethmi Hettiarachchi,&nbsp;Saqib Hakak,&nbsp;Kalikinkar Mandal","doi":"10.1016/j.comcom.2024.108008","DOIUrl":"10.1016/j.comcom.2024.108008","url":null,"abstract":"<div><div>Electric Vehicles (EVs) are considered the predominant method of decreasing fossil fuels as well as greenhouse gas emissions. With the drastic growth of EVs, the future smart grid is expected to extensively incorporate dynamic wireless charging (DWC) systems, a significant advancement over traditional charging methods. DWC, offering the unique ability to charge vehicles in motion, introduces new infrastructures, complex network models and consequently, a massive attack surface. To accomplish the goal of such an enormous smart grid accompanying DWCs, the security of EV charging infrastructures has become a deciding factor. EV charging is vulnerable to cyberattacks as it has many attack vectors and many challenges to combat. Unlike the traditional charging services provided in a typical static charging station, the DWC has a complex network architecture which makes it vulnerable to many forms of cyberattacks. Authentication plays a crucial role in safeguarding the frontline security of this ecosystem. However, within the domain of DWC, the current academic landscape has seen limited attention dedicated to authentication protocols. This background signifies the necessity of a comprehensive survey to cover the authentication protocols of dynamic wireless EV charging environments. This review paper examines the security requirements and the network model of the DWC, providing comprehensive insights into existing authentication protocols by scrutinizing a proper classification. Furthermore, the paper addresses existing challenges in authentication schemes within DWC and explores potential future research tendencies aiming to strengthen the security framework of this emerging technology.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"230 ","pages":"Article 108008"},"PeriodicalIF":4.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142745209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory design of UAV-aided energy-harvesting relay networks in the terahertz band 太赫兹波段无人机辅助能量收集中继网络的轨迹设计
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-16 DOI: 10.1016/j.comcom.2024.108007
Saifur Rahman Sabuj , Yeongi Cho , Mahmoud Elsharief , Han-Shin Jo
Unmanned aerial vehicle (UAV)-aided relaying benefits from easy deployment, strong communication channels, and mobility compared with traditional ground relaying, thereby enhancing the wireless connectivity of future industrial Internet of Things networks. In this paper, a UAV-assisted relay network capable of harvesting energy from a source is designed by exploiting the radio frequency band and transmitting information between the transmitter and corresponding receiver utilizing the terahertz (THz) band. Subsequently, the channel capacity is analytically derived using the finite blocklength theorem for THz communication. In addition, we formulate an optimization problem to determine the optimal location of the UAV to maintain the minimum channel capacity between the transmitter and receiver pair. To determine the optimal location, we employ the augmented Lagrange multiplier approach. Regarding the optimal location, we propose an algorithm for two UAV trajectories, namely forward and backward trajectories, that employs modified minimal jerk trajectories. The numerical results indicate that the backward trajectory provides better system performance in terms of channel capacity. Moreover, the simulation findings show that in urban, dense urban, and high-rise areas, the backward trajectory improves upon the forward trajectory by approximately 41.07%, 59.02%, and 76.47%, respectively, while using a blocklength of 400 bytes.
与传统的地面中继相比,无人机(UAV)辅助中继具有部署简便、通信信道强大和移动性强等优点,从而增强了未来工业物联网网络的无线连接能力。本文设计了一种无人机辅助中继网络,该网络能够利用无线电频段从信号源采集能量,并利用太赫兹(THz)频段在发射器和相应接收器之间传输信息。随后,利用太赫兹通信的有限块长定理分析得出了信道容量。此外,我们还提出了一个优化问题,以确定无人机的最佳位置,从而保持发射器和接收器之间的最小信道容量。为了确定最佳位置,我们采用了增强拉格朗日乘法器方法。关于最佳位置,我们针对两种无人飞行器轨迹(即前向和后向轨迹)提出了一种算法,该算法采用修正的最小颠簸轨迹。数值结果表明,后向轨迹在信道容量方面提供了更好的系统性能。此外,模拟结果表明,在城市、密集城区和高层建筑区,后向轨迹比前向轨迹分别提高了约 41.07%、59.02% 和 76.47%,而使用的块长度为 400 字节。
{"title":"Trajectory design of UAV-aided energy-harvesting relay networks in the terahertz band","authors":"Saifur Rahman Sabuj ,&nbsp;Yeongi Cho ,&nbsp;Mahmoud Elsharief ,&nbsp;Han-Shin Jo","doi":"10.1016/j.comcom.2024.108007","DOIUrl":"10.1016/j.comcom.2024.108007","url":null,"abstract":"<div><div>Unmanned aerial vehicle (UAV)-aided relaying benefits from easy deployment, strong communication channels, and mobility compared with traditional ground relaying, thereby enhancing the wireless connectivity of future industrial Internet of Things networks. In this paper, a UAV-assisted relay network capable of harvesting energy from a source is designed by exploiting the radio frequency band and transmitting information between the transmitter and corresponding receiver utilizing the terahertz (THz) band. Subsequently, the channel capacity is analytically derived using the finite blocklength theorem for THz communication. In addition, we formulate an optimization problem to determine the optimal location of the UAV to maintain the minimum channel capacity between the transmitter and receiver pair. To determine the optimal location, we employ the augmented Lagrange multiplier approach. Regarding the optimal location, we propose an algorithm for two UAV trajectories, namely forward and backward trajectories, that employs modified minimal jerk trajectories. The numerical results indicate that the backward trajectory provides better system performance in terms of channel capacity. Moreover, the simulation findings show that in urban, dense urban, and high-rise areas, the backward trajectory improves upon the forward trajectory by approximately 41.07%, 59.02%, and 76.47%, respectively, while using a blocklength of 400 bytes.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"230 ","pages":"Article 108007"},"PeriodicalIF":4.5,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual-tier adaptive one-class classification IDS for emerging cyberthreats 针对新兴网络威胁的双层自适应单级分类 IDS
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-14 DOI: 10.1016/j.comcom.2024.108006
Md. Ashraf Uddin , Sunil Aryal , Mohamed Reda Bouadjenek , Muna Al-Hawawreh , Md. Alamin Talukder
In today’s digital age, our dependence on IoT (Internet of Things) and IIoT (Industrial IoT) systems has grown immensely, which facilitates sensitive activities such as banking transactions and personal, enterprise data, and legal document exchanges. Cyberattackers consistently exploit weak security measures and tools. The Network Intrusion Detection System (IDS) acts as a primary tool against such cyber threats. However, machine learning-based IDSs, when trained on specific attack patterns, often misclassify new emerging cyberattacks. Further, the limited availability of attack instances for training a supervised learner and the ever-evolving nature of cyber threats further complicate the matter. This emphasizes the need for an adaptable IDS framework capable of recognizing and learning from unfamiliar/unseen attacks over time. In this research, we propose a one-class classification-driven IDS system structured on two tiers. The first tier distinguishes between normal activities and attacks/threats, while the second tier determines if the detected attack is known or unknown. Within this second tier, we also embed a multi-classification mechanism coupled with a clustering algorithm. This model not only identifies unseen attacks but also uses them for retraining them by clustering unseen attacks. This enables our model to be future-proofed, capable of evolving with emerging threat patterns. Leveraging one-class classifiers (OCC) at the first level, our approach bypasses the need for attack samples, addressing data imbalance and zero-day attack concerns and OCC at the second level can effectively separate unknown attacks from the known attacks. Our methodology and evaluations indicate that the presented framework exhibits promising potential for real-world deployments.
在当今的数字化时代,我们对物联网(IoT)和 IIoT(工业物联网)系统的依赖性大大增强,这为银行交易、个人、企业数据和法律文件交换等敏感活动提供了便利。网络攻击者不断利用薄弱的安全措施和工具。网络入侵检测系统(IDS)是应对此类网络威胁的主要工具。然而,基于机器学习的 IDS 在根据特定攻击模式进行训练时,往往会对新出现的网络攻击进行错误分类。此外,用于训练监督学习器的攻击实例有限,而且网络威胁的性质也在不断变化,这些都使问题变得更加复杂。这就强调了需要一个适应性强的 IDS 框架,能够识别和学习不熟悉/未见过的攻击。在这项研究中,我们提出了一种单级分类驱动的 IDS 系统,其结构分为两层。第一层区分正常活动和攻击/威胁,第二层确定检测到的攻击是已知的还是未知的。在第二层中,我们还嵌入了一个多分类机制和一个聚类算法。该模型不仅能识别未知攻击,还能通过对未知攻击进行聚类来对其进行再训练。这使我们的模型能够面向未来,随着新威胁模式的出现而不断发展。利用第一层的单类分类器(OCC),我们的方法绕过了对攻击样本的需求,解决了数据不平衡和零日攻击的问题,而第二层的单类分类器可以有效地将未知攻击与已知攻击区分开来。我们的方法和评估表明,所提出的框架在现实世界的部署中展现出了巨大的潜力。
{"title":"A dual-tier adaptive one-class classification IDS for emerging cyberthreats","authors":"Md. Ashraf Uddin ,&nbsp;Sunil Aryal ,&nbsp;Mohamed Reda Bouadjenek ,&nbsp;Muna Al-Hawawreh ,&nbsp;Md. Alamin Talukder","doi":"10.1016/j.comcom.2024.108006","DOIUrl":"10.1016/j.comcom.2024.108006","url":null,"abstract":"<div><div>In today’s digital age, our dependence on IoT (Internet of Things) and IIoT (Industrial IoT) systems has grown immensely, which facilitates sensitive activities such as banking transactions and personal, enterprise data, and legal document exchanges. Cyberattackers consistently exploit weak security measures and tools. The Network Intrusion Detection System (IDS) acts as a primary tool against such cyber threats. However, machine learning-based IDSs, when trained on specific attack patterns, often misclassify new emerging cyberattacks. Further, the limited availability of attack instances for training a supervised learner and the ever-evolving nature of cyber threats further complicate the matter. This emphasizes the need for an adaptable IDS framework capable of recognizing and learning from unfamiliar/unseen attacks over time. In this research, we propose a one-class classification-driven IDS system structured on two tiers. The first tier distinguishes between normal activities and attacks/threats, while the second tier determines if the detected attack is known or unknown. Within this second tier, we also embed a multi-classification mechanism coupled with a clustering algorithm. This model not only identifies unseen attacks but also uses them for retraining them by clustering unseen attacks. This enables our model to be future-proofed, capable of evolving with emerging threat patterns. Leveraging one-class classifiers (OCC) at the first level, our approach bypasses the need for attack samples, addressing data imbalance and zero-day attack concerns and OCC at the second level can effectively separate unknown attacks from the known attacks. Our methodology and evaluations indicate that the presented framework exhibits promising potential for real-world deployments.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 108006"},"PeriodicalIF":4.5,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142699321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks 深入探讨先进通信网络中人工智能驱动的物联网智能城市的网络安全解决方案
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-12 DOI: 10.1016/j.comcom.2024.108000
Jehad Ali , Sushil Kumar Singh , Weiwei Jiang , Abdulmajeed M. Alenezi , Muhammad Islam , Yousef Ibrahim Daradkeh , Asif Mehmood
The integration of the Internet of Things (IoT) and artificial intelligence (AI) in urban infrastructure, powered by advanced information communication technologies (ICT), has paved the way for smart cities. While these technologies promise enhanced quality of life, economic growth, and improved public services, they also introduce significant cybersecurity challenges. This article comprehensively examines the complex factors in securing AI-driven IoT-enabled smart cities within the framework of future communication networks. Our research addresses critical questions about the evolving threat, multi-layered security approaches, the role of AI in enhancing cybersecurity, and necessary policy frameworks. We conduct an in-depth analysis of cybersecurity solutions across service, application, network, and physical layers, evaluating their effectiveness and integration potential with existing systems. The study offers a detailed examination of AI-driven security approaches, particularly ML and DL techniques, assessing their applicability and limitations in smart city environments. We incorporate real-world case studies to illustrate successful strategies and show areas requiring further research, especially considering emerging communication technologies. Our findings contribute to the field by providing a multi-layered classification of cybersecurity solutions, assessing AI-driven security approaches, and exploring future research directions. Additionally, we investigate the essential role played by policy and regulatory frameworks in safeguarding smart city security. Based on our analysis, we offer recommendations for technical implementations and policy development, aiming to create a holistic approach that balances technological advancements with robust security measures. This study also provides valuable insights for scholars, professionals, and policymakers, offering a comprehensive perspective on the cybersecurity challenges and solutions for AI-driven IoT-enabled smart cities in advanced communication networks.
在先进信息通信技术(ICT)的推动下,物联网(IoT)和人工智能(AI)在城市基础设施中的融合为智慧城市铺平了道路。虽然这些技术有望提高生活质量、促进经济增长和改善公共服务,但它们也带来了重大的网络安全挑战。本文全面探讨了在未来通信网络框架内确保人工智能驱动的物联网智能城市安全的复杂因素。我们的研究涉及不断演变的威胁、多层次安全方法、人工智能在加强网络安全方面的作用以及必要的政策框架等关键问题。我们对服务、应用、网络和物理层的网络安全解决方案进行了深入分析,评估了它们的有效性以及与现有系统集成的潜力。本研究详细考察了人工智能驱动的安全方法,特别是 ML 和 DL 技术,评估了它们在智慧城市环境中的适用性和局限性。我们结合现实世界的案例研究来说明成功的策略,并指出需要进一步研究的领域,特别是考虑到新兴的通信技术。我们的研究结果提供了网络安全解决方案的多层分类,评估了人工智能驱动的安全方法,并探索了未来的研究方向,从而为该领域做出了贡献。此外,我们还研究了政策和监管框架在保障智慧城市安全方面发挥的重要作用。基于我们的分析,我们为技术实施和政策制定提出了建议,旨在创建一种平衡技术进步和健全安全措施的整体方法。本研究还为学者、专业人士和政策制定者提供了宝贵的见解,为先进通信网络中人工智能驱动的物联网智能城市的网络安全挑战和解决方案提供了全面的视角。
{"title":"A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks","authors":"Jehad Ali ,&nbsp;Sushil Kumar Singh ,&nbsp;Weiwei Jiang ,&nbsp;Abdulmajeed M. Alenezi ,&nbsp;Muhammad Islam ,&nbsp;Yousef Ibrahim Daradkeh ,&nbsp;Asif Mehmood","doi":"10.1016/j.comcom.2024.108000","DOIUrl":"10.1016/j.comcom.2024.108000","url":null,"abstract":"<div><div>The integration of the Internet of Things (IoT) and artificial intelligence (AI) in urban infrastructure, powered by advanced information communication technologies (ICT), has paved the way for smart cities. While these technologies promise enhanced quality of life, economic growth, and improved public services, they also introduce significant cybersecurity challenges. This article comprehensively examines the complex factors in securing AI-driven IoT-enabled smart cities within the framework of future communication networks. Our research addresses critical questions about the evolving threat, multi-layered security approaches, the role of AI in enhancing cybersecurity, and necessary policy frameworks. We conduct an in-depth analysis of cybersecurity solutions across service, application, network, and physical layers, evaluating their effectiveness and integration potential with existing systems. The study offers a detailed examination of AI-driven security approaches, particularly ML and DL techniques, assessing their applicability and limitations in smart city environments. We incorporate real-world case studies to illustrate successful strategies and show areas requiring further research, especially considering emerging communication technologies. Our findings contribute to the field by providing a multi-layered classification of cybersecurity solutions, assessing AI-driven security approaches, and exploring future research directions. Additionally, we investigate the essential role played by policy and regulatory frameworks in safeguarding smart city security. Based on our analysis, we offer recommendations for technical implementations and policy development, aiming to create a holistic approach that balances technological advancements with robust security measures. This study also provides valuable insights for scholars, professionals, and policymakers, offering a comprehensive perspective on the cybersecurity challenges and solutions for AI-driven IoT-enabled smart cities in advanced communication networks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 108000"},"PeriodicalIF":4.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum 徒弟胜过师傅针对跳频扩频的不完美演示辅助信任区域干扰策略优化
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-10 DOI: 10.1016/j.comcom.2024.107993
Ning Rao, Hua Xu, Zisen Qi, Dan Wang, Yue Zhang, Xiang Peng, Lei Jiang
Jamming decision-making is a pivotal component of modern electromagnetic warfare, wherein recent years have witnessed the extensive application of deep reinforcement learning techniques to enhance the autonomy and intelligence of wireless communication jamming decisions. However, existing researches heavily rely on manually designed customized jamming reward functions, leading to significant consumption of human and computational resources. To this end, under the premise of obviating designing task-customized reward functions, we propose a jamming policy optimization method that learns from imperfect demonstrations to effectively address the complex and high-dimensional jamming resource allocation problem against frequency hopping spread spectrum (FHSS) communication systems. To achieve this, a policy network is meticulously architected to consecutively ascertain jamming schemes for each jamming node, facilitating the construction of the dynamic transition within the Markov decision process. Subsequently, anchored in the dual-trust region concept, we design policy improvement and policy adversarial imitation phases. During the policy improvement phase, the trust region policy optimization method is utilized to refine the policy, while the policy adversarial imitation phase employs adversarial training to guide policy exploration using information embedded in demonstrations. Extensive simulation results indicate that our proposed method can approximate the optimal jamming performance trained under customized reward functions, even with rough binary reward settings, and also significantly surpass demonstration performance.
干扰决策是现代电磁战的关键组成部分,近年来,人们广泛应用深度强化学习技术来增强无线通信干扰决策的自主性和智能性。然而,现有研究严重依赖人工设计的定制干扰奖励函数,导致大量人力和计算资源的消耗。为此,在避免设计任务定制奖励函数的前提下,我们提出了一种干扰策略优化方法,该方法可从不完善的演示中学习,从而有效解决针对跳频扩频(FHSS)通信系统的复杂、高维干扰资源分配问题。为此,我们精心构建了一个策略网络,以连续确定每个干扰节点的干扰方案,从而促进马尔可夫决策过程中动态转换的构建。随后,我们以双信任区域概念为基础,设计了策略改进和策略对抗模仿阶段。在策略改进阶段,我们利用信任区域策略优化方法来完善策略;而在策略对抗模仿阶段,我们利用对抗训练来引导策略探索,并将信息嵌入到演示中。广泛的仿真结果表明,我们提出的方法即使在粗略的二进制奖励设置下,也能逼近在定制奖励函数下训练出的最佳干扰性能,而且还能显著超越演示性能。
{"title":"The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum","authors":"Ning Rao,&nbsp;Hua Xu,&nbsp;Zisen Qi,&nbsp;Dan Wang,&nbsp;Yue Zhang,&nbsp;Xiang Peng,&nbsp;Lei Jiang","doi":"10.1016/j.comcom.2024.107993","DOIUrl":"10.1016/j.comcom.2024.107993","url":null,"abstract":"<div><div>Jamming decision-making is a pivotal component of modern electromagnetic warfare, wherein recent years have witnessed the extensive application of deep reinforcement learning techniques to enhance the autonomy and intelligence of wireless communication jamming decisions. However, existing researches heavily rely on manually designed customized jamming reward functions, leading to significant consumption of human and computational resources. To this end, under the premise of obviating designing task-customized reward functions, we propose a jamming policy optimization method that learns from imperfect demonstrations to effectively address the complex and high-dimensional jamming resource allocation problem against frequency hopping spread spectrum (FHSS) communication systems. To achieve this, a policy network is meticulously architected to consecutively ascertain jamming schemes for each jamming node, facilitating the construction of the dynamic transition within the Markov decision process. Subsequently, anchored in the dual-trust region concept, we design policy improvement and policy adversarial imitation phases. During the policy improvement phase, the trust region policy optimization method is utilized to refine the policy, while the policy adversarial imitation phase employs adversarial training to guide policy exploration using information embedded in demonstrations. Extensive simulation results indicate that our proposed method can approximate the optimal jamming performance trained under customized reward functions, even with rough binary reward settings, and also significantly surpass demonstration performance.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 107993"},"PeriodicalIF":4.5,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbol-level scheme for combating eavesdropping: Symbol conversion and constellation adjustment 打击窃听的符号级方案:符号转换和星座调整
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-08 DOI: 10.1016/j.comcom.2024.107992
Datong Xu , Chaosheng Qiu , Wenshan Yin , Pan Zhao , Mingyang Cui
In the non-orthogonal multiple access scenario, users may suffer inter-multiuser eavesdropping due to the feature of successive interference cancellation, and the conditions of eavesdropping suppression methods in the traditional schemes may not be satisfied. To combat this eavesdropping, we consider physical layer security and propose a novel scheme by specially designing symbol conversion and constellation adjustment methods. Based on these methods, the amplitudes and phases of symbols are properly changed. When each user intercepts information as an eavesdropper, he/she has to accept high error probability, or he/she has to undergo exorbitant overhead. Analytical and numerical results demonstrate that the proposed scheme can protect the privacy of information, and this protection does not destruct the execution of successive interference cancellation and symbol transmission.
在非正交多址接入场景中,由于连续干扰消除的特点,用户可能会遭受多用户间的窃听,而传统方案中的窃听抑制方法可能无法满足窃听的条件。为了对付这种窃听,我们考虑到物理层的安全性,通过专门设计符号转换和星座调整方法,提出了一种新型方案。基于这些方法,符号的振幅和相位会发生适当的变化。当每个用户以窃听者的身份截获信息时,他/她必须接受高错误概率,或者承受高昂的开销。分析和数值结果表明,所提出的方案可以保护信息隐私,而且这种保护不会破坏连续干扰消除和符号传输的执行。
{"title":"Symbol-level scheme for combating eavesdropping: Symbol conversion and constellation adjustment","authors":"Datong Xu ,&nbsp;Chaosheng Qiu ,&nbsp;Wenshan Yin ,&nbsp;Pan Zhao ,&nbsp;Mingyang Cui","doi":"10.1016/j.comcom.2024.107992","DOIUrl":"10.1016/j.comcom.2024.107992","url":null,"abstract":"<div><div>In the non-orthogonal multiple access scenario, users may suffer inter-multiuser eavesdropping due to the feature of successive interference cancellation, and the conditions of eavesdropping suppression methods in the traditional schemes may not be satisfied. To combat this eavesdropping, we consider physical layer security and propose a novel scheme by specially designing symbol conversion and constellation adjustment methods. Based on these methods, the amplitudes and phases of symbols are properly changed. When each user intercepts information as an eavesdropper, he/she has to accept high error probability, or he/she has to undergo exorbitant overhead. Analytical and numerical results demonstrate that the proposed scheme can protect the privacy of information, and this protection does not destruct the execution of successive interference cancellation and symbol transmission.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 107992"},"PeriodicalIF":4.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142699320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-performance BFT consensus for Metaverse through block linking and shortcut loop 通过区块链接和快捷循环实现高性能元宇宙 BFT 共识
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-06 DOI: 10.1016/j.comcom.2024.107990
Rui Hao , Chaozheng Ding , Xiaohai Dai , Hao Fan , Jianwen Xiang
In recent years, the Metaverse has captured increasing attention. As the foundational technologies for these digital realms, blockchain systems and their critical component – the Byzantine Fault Tolerance (BFT) consensus protocol – significantly influence the performance of Metaverse. Due to vulnerabilities to network attacks, synchronous and partially synchronous consensus protocols often face compromises in their liveness or security. Consequently, recent efforts in BFT consensus have shifted towards asynchronous consensus protocols, notably the Multi-valued Validated Binary Agreement (MVBA) protocols, with sMVBA being particularly prominent. Despite its advances, sMVBA struggles to meet the high-performance demands of Metaverse applications. Each sMVBA instance commits only one block, discarding all others, which severely restricts throughput. Moreover, if a leader in a given view crashes, nodes must rebroadcast blocks in the subsequent view, resulting in increased latency.
To overcome these challenges, this paper introduces Mercury, a protocol designed to enhance throughput under various conditions and reduce latency in less favorable scenarios where leaders are crashed. Mercury incorporates a mechanism whereby each block contains hashes from blocks of a previous instance, linking blocks across instances. This structure ensures that once a block is committed, all its linked blocks are also committed, thereby boosting throughput. Additionally, Mercury integrates a ‘shortcut loop’ mechanism, allowing nodes to bypass the last phase of the current view and the block broadcasting in the next view, significantly decreasing latency. Our experimental evaluations of Mercury confirm its superior performance. Compared to the cutting-edge protocols, sMVBA, CKPS, and AMS, Mercury boosts throughput by 1.03X, 1.65X, and 2.51X, respectively.
近年来,"元宇宙"(Metaverse)受到越来越多的关注。作为这些数字领域的基础技术,区块链系统及其关键组件--拜占庭容错(BFT)共识协议--极大地影响着元宇宙的性能。由于容易受到网络攻击,同步和部分同步共识协议的有效性或安全性经常受到影响。因此,最近在 BFT 共识方面的努力转向了异步共识协议,特别是多值验证二进制协议(MVBA),其中 sMVBA 尤为突出。尽管 sMVBA 取得了进步,但它仍难以满足 Metaverse 应用程序的高性能要求。每个 sMVBA 实例只提交一个区块,丢弃所有其他区块,这严重限制了吞吐量。为了克服这些挑战,本文介绍了 Mercury 协议,该协议旨在提高各种条件下的吞吐量,并在领导者崩溃的不利情况下减少延迟。Mercury 采用了一种机制,即每个数据块都包含前一个实例数据块的哈希值,从而在不同实例间链接数据块。这种结构可确保一旦某个区块提交,其所有链接区块也会提交,从而提高吞吐量。此外,Mercury 还集成了 "捷径循环 "机制,允许节点绕过当前视图的最后阶段和下一个视图中的区块广播,从而大大减少了延迟。我们对 Mercury 的实验评估证实了它的卓越性能。与最先进的 sMVBA、CKPS 和 AMS 协议相比,Mercury 的吞吐量分别提高了 1.03 倍、1.65 倍和 2.51 倍。
{"title":"High-performance BFT consensus for Metaverse through block linking and shortcut loop","authors":"Rui Hao ,&nbsp;Chaozheng Ding ,&nbsp;Xiaohai Dai ,&nbsp;Hao Fan ,&nbsp;Jianwen Xiang","doi":"10.1016/j.comcom.2024.107990","DOIUrl":"10.1016/j.comcom.2024.107990","url":null,"abstract":"<div><div>In recent years, the Metaverse has captured increasing attention. As the foundational technologies for these digital realms, blockchain systems and their critical component – <em>the Byzantine Fault Tolerance</em> (BFT) consensus protocol – significantly influence the performance of Metaverse. Due to vulnerabilities to network attacks, synchronous and partially synchronous consensus protocols often face compromises in their liveness or security. Consequently, recent efforts in BFT consensus have shifted towards asynchronous consensus protocols, notably the <em>Multi-valued Validated Binary Agreement</em> (MVBA) protocols, with sMVBA being particularly prominent. Despite its advances, sMVBA struggles to meet the high-performance demands of Metaverse applications. Each sMVBA instance commits only one block, discarding all others, which severely restricts throughput. Moreover, if a leader in a given view crashes, nodes must rebroadcast blocks in the subsequent view, resulting in increased latency.</div><div>To overcome these challenges, this paper introduces <span>Mercury</span>, a protocol designed to enhance throughput under various conditions and reduce latency in less favorable scenarios where leaders are crashed. <span>Mercury</span> incorporates a mechanism whereby each block contains hashes from blocks of a previous instance, linking blocks across instances. This structure ensures that once a block is committed, all its linked blocks are also committed, thereby boosting throughput. Additionally, <span>Mercury</span> integrates a ‘shortcut loop’ mechanism, allowing nodes to bypass the last phase of the current view and the block broadcasting in the next view, significantly decreasing latency. Our experimental evaluations of <span>Mercury</span> confirm its superior performance. Compared to the cutting-edge protocols, sMVBA, CKPS, and AMS, <span>Mercury</span> boosts throughput by 1.03X, 1.65X, and 2.51X, respectively.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 107990"},"PeriodicalIF":4.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automating 5G network slice management for industrial applications 实现面向工业应用的 5G 网络切片管理自动化
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-04 DOI: 10.1016/j.comcom.2024.107991
André Perdigão, José Quevedo, Rui L. Aguiar
The transition to Industry 4.0 introduces new use cases with unique communication requirements, demanding wireless technologies capable of dynamically adjusting their performance to meet various demands. Leveraging network slicing, 5G technology offers the flexibility to support such use cases. However, the usage and deployment of network slices in networks are complex tasks. To increase the adoption of 5G, there is a need for mechanisms that automate the deployment and management of network slices. This paper introduces a design for a network slice manager capable of such mechanisms in 5G networks. This design adheres to related standards, facilitating interoperability with other software, while also considering the capabilities and limitations of the technology. The proposed design can provision custom slices tailored to meet the unique requirements of verticals, offering communication performance across the spectrum of the three primary 5G services (eMBB, URLLC, and mMTC/mIoT). To access the proposed design, a Proof-of-Concept (PoC) prototype was developed and evaluated. The evaluation results demonstrate the flexibility of the proposed solution for deploying slices adjusted to the vertical use cases. Additionally, the slices generated by the PoC maintain a high TRL (Technology Readiness Level) equivalent to that of the commercial-graded network used.
向工业 4.0 的过渡引入了具有独特通信要求的新用例,要求无线技术能够动态调整性能以满足各种需求。借助网络切片,5G 技术可灵活支持此类用例。然而,在网络中使用和部署网络切片是一项复杂的任务。为了提高 5G 的采用率,需要建立能自动部署和管理网络切片的机制。本文介绍了能够在 5G 网络中实现此类机制的网络片管理器的设计。该设计符合相关标准,便于与其他软件互操作,同时也考虑了技术的能力和局限性。所提出的设计可以提供定制切片,以满足垂直行业的独特要求,并提供三种主要 5G 服务(eMBB、URLLC 和 mMTC/MIoT)的通信性能。为实现拟议的设计,开发并评估了一个概念验证(PoC)原型。评估结果表明,所提出的解决方案可灵活部署根据垂直用例调整的切片。此外,PoC 生成的切片保持了较高的 TRL(技术就绪水平),与所使用的商业级网络相当。
{"title":"Automating 5G network slice management for industrial applications","authors":"André Perdigão,&nbsp;José Quevedo,&nbsp;Rui L. Aguiar","doi":"10.1016/j.comcom.2024.107991","DOIUrl":"10.1016/j.comcom.2024.107991","url":null,"abstract":"<div><div>The transition to Industry 4.0 introduces new use cases with unique communication requirements, demanding wireless technologies capable of dynamically adjusting their performance to meet various demands. Leveraging network slicing, 5G technology offers the flexibility to support such use cases. However, the usage and deployment of network slices in networks are complex tasks. To increase the adoption of 5G, there is a need for mechanisms that automate the deployment and management of network slices. This paper introduces a design for a network slice manager capable of such mechanisms in 5G networks. This design adheres to related standards, facilitating interoperability with other software, while also considering the capabilities and limitations of the technology. The proposed design can provision custom slices tailored to meet the unique requirements of verticals, offering communication performance across the spectrum of the three primary 5G services (eMBB, URLLC, and mMTC/mIoT). To access the proposed design, a Proof-of-Concept (PoC) prototype was developed and evaluated. The evaluation results demonstrate the flexibility of the proposed solution for deploying slices adjusted to the vertical use cases. Additionally, the slices generated by the PoC maintain a high TRL (Technology Readiness Level) equivalent to that of the commercial-graded network used.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"229 ","pages":"Article 107991"},"PeriodicalIF":4.5,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1