首页 > 最新文献

Computer Communications最新文献

英文 中文
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark 利用区块链和 Apache spark 实时防范社交物联网中与信任相关的攻击
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1016/j.comcom.2024.06.019
Mariam Masmoudi , Ikram Amous , Corinne Amel Zayani , Florence Sèdes

The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating social contexts. However, this approach encounters various challenges that impact its performance and reliability. One of the most prominent challenges is trust, specifically trust-related attacks, where certain users engage in malicious behaviors and launch attacks to spread harmful services. To ensure a trustworthy experience for end-users and prevent such attacks in real-time, it is highly significant to incorporate a trust management mechanism within the Social IoT network. To address this challenge, we propose a novel trust management mechanism that leverages blockchain technology. By integrating this technology, we aim to prevent trust-related attacks and create a secure environment. Additionally, we introduce a new consensus protocol for the blockchain called Spark-based Proof of Trust-related Attacks (SPoTA). This protocol is designed to process stream transactions in real-time using Apache Spark, a distributed stream processing engine. To implement SPoTA, we have developed a new classifier utilizing Spark Libraries. This classifier is capable of accurately categorizing transactions as either malicious or secure. As new transaction streams are read, the classifier is employed to classify and assign a label to each stream. This label assists the SPoTA protocol in making informed decisions regarding the validation or rejection of transactions. Our research findings demonstrate the effectiveness of our classifier in predicting malicious transactions, outstripping our previous works and other approaches reported in the literature. Additionally, our new protocol exhibits improved transaction processing times.

社交物联网(Social IoT)引入了一种全新的方法,通过结合社交背景来提高物联网网络的可用性并增强服务发现功能。然而,这种方法遇到了影响其性能和可靠性的各种挑战。其中最突出的挑战之一是信任问题,特别是与信任相关的攻击,即某些用户参与恶意行为并发起攻击以传播有害服务。为了确保终端用户获得值得信赖的体验并实时防止此类攻击,在社交物联网网络中纳入信任管理机制意义重大。为了应对这一挑战,我们提出了一种利用区块链技术的新型信任管理机制。通过整合该技术,我们旨在防止与信任相关的攻击,并创建一个安全的环境。此外,我们还为区块链引入了一种新的共识协议,称为基于火花的信任相关攻击证明(SpoTA)。该协议旨在使用分布式流处理引擎 Apache Spark 实时处理流交易。为了实现 SPoTA,我们利用 Spark 库开发了一种新的分类器。该分类器能够准确地将交易分为恶意交易和安全交易。在读取新的交易流时,分类器会对每个流进行分类并分配一个标签。该标签有助于 SPoTA 协议就验证或拒绝交易做出明智的决策。我们的研究结果表明,我们的分类器在预测恶意交易方面非常有效,超过了我们以前的工作和文献中报道的其他方法。此外,我们的新协议还改善了交易处理时间。
{"title":"Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark","authors":"Mariam Masmoudi ,&nbsp;Ikram Amous ,&nbsp;Corinne Amel Zayani ,&nbsp;Florence Sèdes","doi":"10.1016/j.comcom.2024.06.019","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.019","url":null,"abstract":"<div><p>The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating social contexts. However, this approach encounters various challenges that impact its performance and reliability. One of the most prominent challenges is trust, specifically trust-related attacks, where certain users engage in malicious behaviors and launch attacks to spread harmful services. To ensure a trustworthy experience for end-users and prevent such attacks in real-time, it is highly significant to incorporate a trust management mechanism within the Social IoT network. To address this challenge, we propose a novel trust management mechanism that leverages blockchain technology. By integrating this technology, we aim to prevent trust-related attacks and create a secure environment. Additionally, we introduce a new consensus protocol for the blockchain called Spark-based Proof of Trust-related Attacks (SPoTA). This protocol is designed to process stream transactions in real-time using Apache Spark, a distributed stream processing engine. To implement SPoTA, we have developed a new classifier utilizing Spark Libraries. This classifier is capable of accurately categorizing transactions as either malicious or secure. As new transaction streams are read, the classifier is employed to classify and assign a label to each stream. This label assists the SPoTA protocol in making informed decisions regarding the validation or rejection of transactions. Our research findings demonstrate the effectiveness of our classifier in predicting malicious transactions, outstripping our previous works and other approaches reported in the literature. Additionally, our new protocol exhibits improved transaction processing times.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 65-82"},"PeriodicalIF":4.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141607895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach 高动态异构车载边缘计算的多目标任务卸载:一种高效的强化学习方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-29 DOI: 10.1016/j.comcom.2024.06.018
ZhiDong Huang, XiaoFei Wu, ShouBin Dong

Vehicular Edge Computing (VEC) provides a flexible distributed computing paradigm for offloading computations to the vehicular network, which can effectively solve the problem of limited vehicle computing resources and meet the on-vehicle computing requests of users. However, the conflict of interest between vehicle users and service providers leads to the need to consider a variety of conflict optimization goals for computing offloading, and the dynamic nature of vehicle networks, such as vehicle mobility and time-varying network conditions, make the offloading effectiveness of vehicle computing requests and the adaptability to complex VEC scenarios challenging. To address these challenges, this paper proposes a multi-objective optimization model suitable for computational offloading of dynamic heterogeneous VEC networks. By formulating the dynamic multi-objective computational offloading problem as a multi-objective Markov Decision Process (MOMDP), this paper designs a novel multi-objective reinforcement learning algorithm EMOTO, which aims to minimize the average task execution delay and average vehicle energy consumption, and maximize the revenue of service providers. In this paper, a preference priority sampling module is proposed, and a model-augmented environment estimator is introduced to learn the environmental model for multi-objective optimization, so as to solve the problem that the agent is difficult to learn steadily caused by the highly dynamic change of VEC environment, thus to effectively realize the joint optimization of multiple objectives and improve the decision-making accuracy and efficiency of the algorithm. Experiments show that EMOTO has superior performance on multiple optimization objectives compared with advanced multi-objective reinforcement learning algorithms. In addition, the algorithm shows robustness when applied to different environmental settings and better adapting to highly dynamic environments, and balancing the conflict of interest between vehicle users and service providers.

车载边缘计算(Vehicular Edge Computing,VEC)为将计算卸载到车载网络提供了一种灵活的分布式计算范式,可以有效解决车载计算资源有限的问题,满足用户的车载计算需求。然而,车辆用户和服务提供商之间的利益冲突导致计算卸载需要考虑各种冲突优化目标,而车辆网络的动态特性,如车辆移动性和网络条件的时变性,使得车辆计算请求的卸载有效性和对复杂 VEC 场景的适应性面临挑战。针对这些挑战,本文提出了一种适用于动态异构 VEC 网络计算卸载的多目标优化模型。通过将动态多目标计算卸载问题表述为多目标马尔可夫决策过程(MOMDP),本文设计了一种新颖的多目标强化学习算法 EMOTO,其目标是使平均任务执行延迟和平均车辆能耗最小化,并使服务提供商的收益最大化。本文提出了偏好优先级抽样模块,并引入了模型增强环境估计器来学习多目标优化的环境模型,从而解决了 VEC 环境高度动态变化导致的代理难以稳定学习的问题,有效地实现了多目标的联合优化,提高了算法的决策精度和效率。实验表明,与先进的多目标强化学习算法相比,EMOTO 在多优化目标上具有更优越的性能。此外,该算法在应用于不同环境设置时表现出鲁棒性,能更好地适应高动态环境,并平衡车辆用户与服务提供商之间的利益冲突。
{"title":"Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach","authors":"ZhiDong Huang,&nbsp;XiaoFei Wu,&nbsp;ShouBin Dong","doi":"10.1016/j.comcom.2024.06.018","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.018","url":null,"abstract":"<div><p>Vehicular Edge Computing (VEC) provides a flexible distributed computing paradigm for offloading computations to the vehicular network, which can effectively solve the problem of limited vehicle computing resources and meet the on-vehicle computing requests of users. However, the conflict of interest between vehicle users and service providers leads to the need to consider a variety of conflict optimization goals for computing offloading, and the dynamic nature of vehicle networks, such as vehicle mobility and time-varying network conditions, make the offloading effectiveness of vehicle computing requests and the adaptability to complex VEC scenarios challenging. To address these challenges, this paper proposes a multi-objective optimization model suitable for computational offloading of dynamic heterogeneous VEC networks. By formulating the dynamic multi-objective computational offloading problem as a multi-objective Markov Decision Process (MOMDP), this paper designs a novel multi-objective reinforcement learning algorithm EMOTO, which aims to minimize the average task execution delay and average vehicle energy consumption, and maximize the revenue of service providers. In this paper, a preference priority sampling module is proposed, and a model-augmented environment estimator is introduced to learn the environmental model for multi-objective optimization, so as to solve the problem that the agent is difficult to learn steadily caused by the highly dynamic change of VEC environment, thus to effectively realize the joint optimization of multiple objectives and improve the decision-making accuracy and efficiency of the algorithm. Experiments show that EMOTO has superior performance on multiple optimization objectives compared with advanced multi-objective reinforcement learning algorithms. In addition, the algorithm shows robustness when applied to different environmental settings and better adapting to highly dynamic environments, and balancing the conflict of interest between vehicle users and service providers.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 27-43"},"PeriodicalIF":4.5,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CATFSID: A few-shot human identification system based on cross-domain adversarial training CATFSID:基于跨域对抗训练的几发人类识别系统
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.comcom.2024.06.014
Zhongcheng Wei , Wei Chen , Weitao Tao , Shuli Ning , Bin Lian , Xiang Sun , Jijun Zhao

With the advancement of wireless sensing technology, human identification based on WiFi sensing has garnered significant attention in the fields of human–computer interaction and home security. Despite the initial success of WiFi sensing based human identification when the environment is fixed, the performance of the trained identity sensing model will be severely degraded when applied to unfamiliar environments. In this paper, a cross-domain human identification system (CATFSID) is proposed, which is able to achieve environment migration of trained model using up to 3-shot. CATFSID utilizes a dual adversarial training network, including cross-adversarial training between source and source domain classifiers, and adversarial training between source and target domain discriminators to extract environment-independent identity features. Introducing a method based on pseudo-label prediction, which assigns labels to target domain samples similar to the source domain samples, reduces the distribution bias of identity features between the source and target domains. The experimental results show accuracy of 90.1% and F1-Score of 89.33% when using 3 samples per user in the new environment.

随着无线传感技术的发展,基于 WiFi 传感的人类识别技术在人机交互和家庭安全领域引起了广泛关注。尽管在环境固定的情况下,基于 WiFi 传感的人类识别取得了初步成功,但当应用于陌生环境时,经过训练的身份传感模型的性能将严重下降。本文提出了一种跨域人体识别系统(CATFSID),该系统能够使用最多 3 次拍摄实现训练模型的环境迁移。CATFSID 利用双对抗训练网络,包括源域分类器和源域分类器之间的交叉对抗训练,以及源域判别器和目标域判别器之间的对抗训练,提取与环境无关的身份特征。引入一种基于伪标签预测的方法,为目标域样本分配与源域样本相似的标签,从而减少了身份特征在源域和目标域之间的分布偏差。实验结果表明,在新环境中每个用户使用 3 个样本时,准确率为 90.1%,F1 分数为 89.33%。
{"title":"CATFSID: A few-shot human identification system based on cross-domain adversarial training","authors":"Zhongcheng Wei ,&nbsp;Wei Chen ,&nbsp;Weitao Tao ,&nbsp;Shuli Ning ,&nbsp;Bin Lian ,&nbsp;Xiang Sun ,&nbsp;Jijun Zhao","doi":"10.1016/j.comcom.2024.06.014","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.014","url":null,"abstract":"<div><p>With the advancement of wireless sensing technology, human identification based on WiFi sensing has garnered significant attention in the fields of human–computer interaction and home security. Despite the initial success of WiFi sensing based human identification when the environment is fixed, the performance of the trained identity sensing model will be severely degraded when applied to unfamiliar environments. In this paper, a cross-domain human identification system (CATFSID) is proposed, which is able to achieve environment migration of trained model using up to 3-shot. CATFSID utilizes a dual adversarial training network, including cross-adversarial training between source and source domain classifiers, and adversarial training between source and target domain discriminators to extract environment-independent identity features. Introducing a method based on pseudo-label prediction, which assigns labels to target domain samples similar to the source domain samples, reduces the distribution bias of identity features between the source and target domains. The experimental results show accuracy of 90.1% and F1-<em>Score</em> of 89.33% when using 3 samples per user in the new environment.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 275-284"},"PeriodicalIF":4.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation AGCM:基于图聚合的多阶段攻击关联和场景重构方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.comcom.2024.06.016
Hongshuo Lyu , Jing Liu , Yingxu Lai , Beifeng Mao , Xianting Huang

With an increase in the complexity and scale of networks, cybersecurity faces increasingly severe challenges. For instance, an attacker can combine individual attacks into complex multi-stage attacks to infiltrate targets. Traditional intrusion detection systems (IDS) generate large number of alerts during an attack, including attack clues along with many false positives. Furthermore, due to the complexity and changefulness of attacks, security analysts spend considerable time and effort on discovering attack paths. Existing methods rely on attack knowledgebases or predefined correlation rules but can only identify known attacks. To address these limitations, this paper presents an attack correlation and scenario reconstruction method. We transform the abnormal flows corresponding to the alerts into abnormal states relationship graph (ASR-graph) and automatically correlate attacks through graph aggregation and clustering. We also implemented an attack path search algorithm to mine attack paths and trace the attack process. This method does not rely on prior knowledge; thus, it can well adapt to the changed attack plan, making it effective in correlating unknown attacks and identifying attack paths. Evaluation results show that the proposed method has higher accuracy and effectiveness than existing methods.

随着网络复杂性和规模的增加,网络安全面临着日益严峻的挑战。例如,攻击者可以将单个攻击组合成复杂的多阶段攻击,以渗透目标。传统的入侵检测系统(IDS)会在攻击过程中产生大量警报,包括攻击线索和许多误报。此外,由于攻击的复杂性和多变性,安全分析人员需要花费大量时间和精力来发现攻击路径。现有的方法依赖于攻击知识库或预定义的相关规则,但只能识别已知的攻击。为了解决这些局限性,本文提出了一种攻击关联和场景重构方法。我们将警报对应的异常流转化为异常状态关系图(ASR-graph),并通过图聚合和聚类自动关联攻击。我们还实现了一种攻击路径搜索算法,以挖掘攻击路径并追踪攻击过程。该方法不依赖于先验知识,因此能很好地适应变化的攻击计划,在关联未知攻击和识别攻击路径方面非常有效。评估结果表明,与现有方法相比,所提出的方法具有更高的准确性和有效性。
{"title":"AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation","authors":"Hongshuo Lyu ,&nbsp;Jing Liu ,&nbsp;Yingxu Lai ,&nbsp;Beifeng Mao ,&nbsp;Xianting Huang","doi":"10.1016/j.comcom.2024.06.016","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.016","url":null,"abstract":"<div><p>With an increase in the complexity and scale of networks, cybersecurity faces increasingly severe challenges. For instance, an attacker can combine individual attacks into complex multi-stage attacks to infiltrate targets. Traditional intrusion detection systems (IDS) generate large number of alerts during an attack, including attack clues along with many false positives. Furthermore, due to the complexity and changefulness of attacks, security analysts spend considerable time and effort on discovering attack paths. Existing methods rely on attack knowledgebases or predefined correlation rules but can only identify known attacks. To address these limitations, this paper presents an attack correlation and scenario reconstruction method. We transform the abnormal flows corresponding to the alerts into abnormal states relationship graph (ASR-graph) and automatically correlate attacks through graph aggregation and clustering. We also implemented an attack path search algorithm to mine attack paths and trace the attack process. This method does not rely on prior knowledge; thus, it can well adapt to the changed attack plan, making it effective in correlating unknown attacks and identifying attack paths. Evaluation results show that the proposed method has higher accuracy and effectiveness than existing methods.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 302-313"},"PeriodicalIF":4.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CSMA/CA and HCCA uplink medium access control protocol for VLC based heterogeneous users 基于 VLC 的异构用户的 CSMA/CA 和 HCCA 混合上行链路介质访问控制协议
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.comcom.2024.06.017
Saswati Paramita , Arani Bhattacharya , Anand Srivastava , Vivek Ashok Bohara

Light fidelity (LiFi) is an emerging wireless networking technology of visible light communication (VLC) paradigm for multiuser communication. This technology enables high data rates due to the availability of large visible light spectrum. While current studies have shown the potential for LiFi technology, they borrow the MAC-layer protocols from traditional WiFi. However, a number of prior studies have shown the challenges faced by the MAC-layer of WiFi in the presence of large number and types of devices. In this work, we show that the hybrid-coordination-function-controlled-access (HCCA) MAC protocol in LiFi provides higher throughput than the traditional CSMA/CA mechanism to user devices. We also show that HCCA has the limitation of higher message overhead in the presence of a large number of devices. We also evaluate the collision probability, busy channel probability, and delay for HCCA and CSMA/CA MAC protocol. We utilize both theoretical analysis and extensive simulations to study these performance tradeoffs and identify a threshold when a LiFi access point should switch to HCCA from CSMA/CA and vice-versa. Finally, based on our findings, we design a hybrid-MAC mechanism that switches between HCCA and CSMA/CA based on the number and type of devices present. Our evaluation shows that this hybrid mechanism can outperform both HCCA and CSMA/CA individually in the presence of different number of devices.

光保真(LiFi)是一种用于多用户通信的新兴可见光通信(VLC)无线网络技术。由于可获得大量可见光频谱,该技术可实现高数据传输速率。虽然目前的研究显示了 LiFi 技术的潜力,但它们借用了传统 WiFi 的 MAC 层协议。然而,之前的一些研究表明,WiFi 的 MAC 层在存在大量和各种类型的设备时面临着挑战。在这项工作中,我们证明了 LiFi 中的混合协调功能控制访问(HCCA)MAC 协议比传统的 CSMA/CA 机制为用户设备提供了更高的吞吐量。我们还表明,在有大量设备的情况下,HCCA 存在信息开销较高的限制。我们还评估了 HCCA 和 CSMA/CA MAC 协议的碰撞概率、忙道概率和延迟。我们利用理论分析和大量仿真来研究这些性能权衡,并确定 LiFi 接入点从 CSMA/CA 切换到 HCCA 的阈值,反之亦然。最后,基于我们的研究结果,我们设计了一种混合 MAC 机制,可根据设备的数量和类型在 HCCA 和 CSMA/CA 之间切换。我们的评估结果表明,在设备数量不同的情况下,这种混合机制的性能优于 HCCA 和 CSMA/CA。
{"title":"Hybrid CSMA/CA and HCCA uplink medium access control protocol for VLC based heterogeneous users","authors":"Saswati Paramita ,&nbsp;Arani Bhattacharya ,&nbsp;Anand Srivastava ,&nbsp;Vivek Ashok Bohara","doi":"10.1016/j.comcom.2024.06.017","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.017","url":null,"abstract":"<div><p>Light fidelity (LiFi) is an emerging wireless networking technology of visible light communication (VLC) paradigm for multiuser communication. This technology enables high data rates due to the availability of large visible light spectrum. While current studies have shown the potential for LiFi technology, they borrow the MAC-layer protocols from traditional WiFi. However, a number of prior studies have shown the challenges faced by the MAC-layer of WiFi in the presence of large number and types of devices. In this work, we show that the hybrid-coordination-function-controlled-access (HCCA) MAC protocol in LiFi provides higher throughput than the traditional CSMA/CA mechanism to user devices. We also show that HCCA has the limitation of higher message overhead in the presence of a large number of devices. We also evaluate the collision probability, busy channel probability, and delay for HCCA and CSMA/CA MAC protocol. We utilize both theoretical analysis and extensive simulations to study these performance tradeoffs and identify a threshold when a LiFi access point should switch to HCCA from CSMA/CA and vice-versa. Finally, based on our findings, we design a hybrid-MAC mechanism that switches between HCCA and CSMA/CA based on the number and type of devices present. Our evaluation shows that this hybrid mechanism can outperform both HCCA and CSMA/CA individually in the presence of different number of devices.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 54-64"},"PeriodicalIF":4.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141607894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless sensing applications with Wi-Fi Channel State Information, preprocessing techniques, and detection algorithms: A survey 利用 Wi-Fi 信道状态信息、预处理技术和检测算法的无线传感应用:调查
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1016/j.comcom.2024.06.011
Jesus A. Armenta-Garcia, Felix F. Gonzalez-Navarro, Jesus Caro-Gutierrez

Recently, using Wi-Fi devices as sensing technology has garnered significant attention and found numerous applications. This trend has given birth to what is known as Wi-Fi sensing. This innovative approach has been made possible by analyzing the Channel State Information (CSI) of the Wi-Fi communication channel, which can be calculated from the frame preamble. CSI captures multipath effects, attenuations, and phase shifts in signal propagation, among other fading effects caused, for example, by reflection with objects or a person. Extensive research in this field has revealed that these effects can be utilized for sensing purposes, supposing that the cause of the effects is a person, leading to the development of Wi-Fi sensing applications such as Activity Recognition, Gesture Recognition, and Vital Signs monitoring. This Survey highlights recent works and advances in Wi-Fi sensing applications, identifying and exposing significant applications. For each paper selected, the following sections have been emphasized: Data Collection, Data Preprocessing, Detection Algorithm, Performance, and Application, as these are part of the methodology followed for the functioning of Wi-Fi sensing systems. Furthermore, the techniques and tools commonly used in Wi-Fi sensing are described. Finally, the current challenges associated with Wi-Fi as a wireless sensing technology and possible ways to address these challenges are discussed.

最近,使用 Wi-Fi 设备作为传感技术引起了广泛关注,并得到了大量应用。这一趋势催生了所谓的 Wi-Fi 传感技术。这种创新方法是通过分析 Wi-Fi 通信信道的信道状态信息(CSI)实现的,而信道状态信息可以通过帧前导码计算出来。CSI 可捕捉信号传播过程中的多径效应、衰减和相移,以及由物体或人的反射等引起的其他衰减效应。该领域的广泛研究表明,假设这些效应的起因是人,则可以利用这些效应进行传感,从而开发出活动识别、手势识别和生命体征监测等 Wi-Fi 传感应用。本调查报告重点介绍了 Wi-Fi 传感应用的最新研究成果和进展,确定并揭示了重要应用。每篇入选论文都强调了以下几个部分:数据收集、数据预处理、检测算法、性能和应用,因为这些都是 Wi-Fi 传感系统运行方法的一部分。此外,还介绍了 Wi-Fi 传感中常用的技术和工具。最后,还讨论了 Wi-Fi 作为无线传感技术目前面临的挑战以及应对这些挑战的可能方法。
{"title":"Wireless sensing applications with Wi-Fi Channel State Information, preprocessing techniques, and detection algorithms: A survey","authors":"Jesus A. Armenta-Garcia,&nbsp;Felix F. Gonzalez-Navarro,&nbsp;Jesus Caro-Gutierrez","doi":"10.1016/j.comcom.2024.06.011","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.011","url":null,"abstract":"<div><p>Recently, using Wi-Fi devices as sensing technology has garnered significant attention and found numerous applications. This trend has given birth to what is known as Wi-Fi sensing. This innovative approach has been made possible by analyzing the Channel State Information (CSI) of the Wi-Fi communication channel, which can be calculated from the frame preamble. CSI captures multipath effects, attenuations, and phase shifts in signal propagation, among other fading effects caused, for example, by reflection with objects or a person. Extensive research in this field has revealed that these effects can be utilized for sensing purposes, supposing that the cause of the effects is a person, leading to the development of Wi-Fi sensing applications such as Activity Recognition, Gesture Recognition, and Vital Signs monitoring. This Survey highlights recent works and advances in Wi-Fi sensing applications, identifying and exposing significant applications. For each paper selected, the following sections have been emphasized: Data Collection, Data Preprocessing, Detection Algorithm, Performance, and Application, as these are part of the methodology followed for the functioning of Wi-Fi sensing systems. Furthermore, the techniques and tools commonly used in Wi-Fi sensing are described. Finally, the current challenges associated with Wi-Fi as a wireless sensing technology and possible ways to address these challenges are discussed.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 254-274"},"PeriodicalIF":4.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage 云存储中具有隐私保护和无证书完整性审计功能的安全数据共享方案
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1016/j.comcom.2024.06.013
Xuening Guan , Jinyong Chang , Wei Zhang

With cloud storage services becoming wildspread and low-cost, individuals and organizations select outsourcing large amounts of document to cloud. Cloud storage applications provide data sharing services with varying functionality. In some cloud storage systems that provide data sharing, such as e-health systems, hiding sensitive information fields is a necessity. Meanwhile, in sharing process, unauthorized entities may have access to these privacy fields. The resource-constrained computation capability for data owner (DO) is universal. To tackle above problems, we propose a sanitizer-based secure data sharing scheme where sanitizer performs most computations of encryption and signature after receiving the partially blinded data from DO. It also checks the legitimacy of visitors before CSP returns stored data file. Besides, adopting an attribute-based access policy guarantees further privacy and fine-grained access authorization. After verification, cloud will return the required data to the legitimate visitors. Moreover, integrity auditing to shared data file is based on certificateless authentication technique, which removes certificates issue of traditional cryptographic technique, avoids key-escrow attack risk caused by identity-based cryptography. Finally, the performance analysis and experimental results show that our proposed scheme is competitive in practical applications since it reduces the authenticator generation overhead by up to 21.6% and proof generation overhead by up to 12% compared with related schemes.

随着云存储服务的普及和低成本化,个人和组织纷纷选择将大量文件外包到云端。云存储应用程序提供功能各异的数据共享服务。在一些提供数据共享的云存储系统(如电子医疗系统)中,必须隐藏敏感信息字段。同时,在共享过程中,未经授权的实体可能会访问这些隐私字段。数据所有者(DO)的计算能力普遍受到资源限制。为解决上述问题,我们提出了一种基于消毒器的安全数据共享方案。在该方案中,消毒器在收到数据所有者提供的部分盲数据后,执行大部分加密和签名计算。在 CSP 返回存储的数据文件之前,它还会检查访问者的合法性。此外,采用基于属性的访问策略可进一步保证隐私和细粒度访问授权。经过验证后,云会将所需数据返回给合法访问者。此外,共享数据文件的完整性审计基于无证书认证技术,消除了传统密码技术的证书问题,避免了基于身份的密码技术所带来的密钥逃避攻击风险。最后,性能分析和实验结果表明,与相关方案相比,我们提出的方案减少了 21.6% 的验证器生成开销和 12% 的证明生成开销,因此在实际应用中很有竞争力。
{"title":"Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage","authors":"Xuening Guan ,&nbsp;Jinyong Chang ,&nbsp;Wei Zhang","doi":"10.1016/j.comcom.2024.06.013","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.013","url":null,"abstract":"<div><p>With cloud storage services becoming wildspread and low-cost, individuals and organizations select outsourcing large amounts of document to cloud. Cloud storage applications provide data sharing services with varying functionality. In some cloud storage systems that provide data sharing, such as e-health systems, hiding sensitive information fields is a necessity. Meanwhile, in sharing process, unauthorized entities may have access to these privacy fields. The resource-constrained computation capability for data owner (DO) is universal. To tackle above problems, we propose a sanitizer-based secure data sharing scheme where sanitizer performs most computations of encryption and signature after receiving the partially blinded data from DO. It also checks the legitimacy of visitors before CSP returns stored data file. Besides, adopting an attribute-based access policy guarantees further privacy and fine-grained access authorization. After verification, cloud will return the required data to the legitimate visitors. Moreover, integrity auditing to shared data file is based on certificateless authentication technique, which removes certificates issue of traditional cryptographic technique, avoids key-escrow attack risk caused by identity-based cryptography. Finally, the performance analysis and experimental results show that our proposed scheme is competitive in practical applications since it reduces the authenticator generation overhead by up to 21.6% and proof generation overhead by up to 12% compared with related schemes.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 285-301"},"PeriodicalIF":4.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference aware path planning for mobile robots under joint communication and sensing in mmWave networks 毫米波网络中联合通信和传感条件下移动机器人的干扰感知路径规划
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-25 DOI: 10.1016/j.comcom.2024.06.012
Yijing Ren, Vasilis Friderikos

The beyond fifth-generation (B5G) and emerging sixth-generation (6G) wireless networks are considered as key enablers in supporting a diversified set of applications for industrial mobile robots (MRs). In this paper, we consider mobile robots that autonomously roam on an industrial floor and perform a variety of tasks at different locations, whilst utilizing high directivity beamformers in millimeter wave (mmWave) small cells for joint communication and sensing. In such scenarios, the potential close proximity of MRs connected to different base stations, may cause excessive levels of interference having as a net result a decrease in the overall achievable data rate and network service degradation. To mitigate this effect an interference aware path planning algorithm is proposed by explicitly taking into account both achievable communication and sensing performance. More specifically, the proposed heuristic scheme aims to find paths with minimal interfering time whilst improving the overall joint communication and sensing quality of service. A wide set of numerical investigations reveal that the proposed heuristic path planning scheme for the mmWave networked mobile robots can improve the overall achievable communication throughput and the sensing mutual information by up to 35.6% and 23.6% respectively compared with an interference oblivious scheme. Most importantly, those gains are attained without penalizing noticeably the total travel time of the MRs.

超越第五代(B5G)和新兴的第六代(6G)无线网络被认为是支持工业移动机器人(MR)多样化应用的关键因素。在本文中,我们考虑的移动机器人可在工业地板上自主漫游,并在不同位置执行各种任务,同时利用毫米波 (mmWave) 小蜂窝中的高指向性波束成形器进行联合通信和传感。在这种情况下,连接到不同基站的磁共振可能距离很近,这可能会造成干扰水平过高,最终导致整体可实现数据速率下降和网络服务退化。为了减轻这种影响,我们提出了一种干扰感知路径规划算法,明确考虑了可实现的通信和传感性能。更具体地说,所提出的启发式方案旨在找到干扰时间最小的路径,同时提高整体的联合通信和感知服务质量。一系列广泛的数值研究表明,与忽略干扰的方案相比,为毫米波联网移动机器人提出的启发式路径规划方案可将整体可实现通信吞吐量和感知互信息分别提高 35.6% 和 23.6%。最重要的是,在实现这些增益的同时,移动机器人的总旅行时间不会受到明显影响。
{"title":"Interference aware path planning for mobile robots under joint communication and sensing in mmWave networks","authors":"Yijing Ren,&nbsp;Vasilis Friderikos","doi":"10.1016/j.comcom.2024.06.012","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.012","url":null,"abstract":"<div><p>The beyond fifth-generation (B5G) and emerging sixth-generation (6G) wireless networks are considered as key enablers in supporting a diversified set of applications for industrial mobile robots (MRs). In this paper, we consider mobile robots that autonomously roam on an industrial floor and perform a variety of tasks at different locations, whilst utilizing high directivity beamformers in millimeter wave (mmWave) small cells for joint communication and sensing. In such scenarios, the potential close proximity of MRs connected to different base stations, may cause excessive levels of interference having as a net result a decrease in the overall achievable data rate and network service degradation. To mitigate this effect an interference aware path planning algorithm is proposed by explicitly taking into account both achievable communication and sensing performance. More specifically, the proposed heuristic scheme aims to find paths with minimal interfering time whilst improving the overall joint communication and sensing quality of service. A wide set of numerical investigations reveal that the proposed heuristic path planning scheme for the mmWave networked mobile robots can improve the overall achievable communication throughput and the sensing mutual information by up to 35.6% and 23.6% respectively compared with an interference oblivious scheme. Most importantly, those gains are attained without penalizing noticeably the total travel time of the MRs.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 1-9"},"PeriodicalIF":4.5,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme 支持 IEEE 802.11ax 网络中的 VoIP 通信:一种新的准入控制和调度资源分配方案
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-20 DOI: 10.1016/j.comcom.2024.06.010
Rafael Estepa , Mark Davis , Vicente Mayor , Antonio Estepa

The current IEEE 802.11ax standard enhances Wi-Fi networks with a series of new features, such as multi-user (MU) transmission, an Orthogonal Frequency Division Multiple Access (OFDMA) scheme and the ability to multiplex traffic from different access categories (ACs). These features can be utilized to enhance the QoS support for VoIP traffic and optimize the usage of IEEE 802.11ax network resources. This work proposes a new scheme to multiplex VoIP calls in IEEE 802.11ax MU frames and a new scheduler and resource allocation algorithm specifically designed for VoIP data traffic. Our scheduler allocates VoIP packets requiring longer transmission times into the same frame(s), minimizing the channel air-time assigned to VoIP transmission. In addition, unused radio resources in the MU frame are leveraged to transmit best-effort packets along with VoIP packets. For completeness, we also define a call admission control (CAC) algorithm that anticipates channel saturation conditions to ensure VoIP users can maintain a guaranteed level of QoS. Based on simulation results, our scheme is more efficient in reducing channel utilization than other schedulers such as multi-user round-robin (RR) (implemented by ns-3) or single-user FIFO. For example, for 30 VoIP stations using the G.711 codec under mixed channel conditions, our scheme reduces by 30% the air-time required to transmit VoIP packets. When coupled with the ability to also send best-effort packets along with VoIP packets, this translates into a higher throughput (i.e. 10 Mbit/s vs 4 Mbit/s) and more simultaneous VoIP users with guaranteed QoS (up to 46 VoIP users vs 26 and 28 users for the multi-user RR and single-user FIFO scheduling algorithms, respectively).

当前的 IEEE 802.11ax 标准通过一系列新功能增强了 Wi-Fi 网络,如多用户(MU)传输、正交频分多址(OFDMA)方案以及从不同接入类别(AC)复用流量的能力。这些功能可用于增强对 VoIP 流量的 QoS 支持,并优化 IEEE 802.11ax 网络资源的使用。本研究提出了一种在 IEEE 802.11ax MU 帧中复用 VoIP 呼叫的新方案,以及一种专为 VoIP 数据流量设计的新调度器和资源分配算法。我们的调度器将需要较长传输时间的 VoIP 数据包分配到相同的帧中,从而最大限度地减少分配给 VoIP 传输的信道空闲时间。此外,我们还利用 MU 帧中未使用的无线电资源,在传输 VoIP 数据包的同时传输尽力而为数据包。为完整起见,我们还定义了一种呼叫准入控制(CAC)算法,可预测信道饱和情况,以确保 VoIP 用户能保持有保证的 QoS 水平。根据仿真结果,我们的方案在降低信道利用率方面比其他调度器(如多用户循环(RR)(由 ns-3 实现)或单用户先进先出(FIFO))更有效。例如,对于在混合信道条件下使用 G.711 编解码器的 30 个 VoIP 站,我们的方案可将传输 VoIP 数据包所需的通话时间减少 30%。再加上在发送 VoIP 数据包的同时还能发送尽力数据包,这就意味着更高的吞吐量(即 10 Mbit/s 对 4 Mbit/s)和更多的同时 VoIP 用户,并保证了服务质量(多达 46 个 VoIP 用户,而多用户 RR 和单用户 FIFO 调度算法分别为 26 和 28 个用户)。
{"title":"Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme","authors":"Rafael Estepa ,&nbsp;Mark Davis ,&nbsp;Vicente Mayor ,&nbsp;Antonio Estepa","doi":"10.1016/j.comcom.2024.06.010","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.010","url":null,"abstract":"<div><p>The current IEEE 802.11ax standard enhances Wi-Fi networks with a series of new features, such as multi-user (MU) transmission, an Orthogonal Frequency Division Multiple Access (OFDMA) scheme and the ability to multiplex traffic from different access categories (ACs). These features can be utilized to enhance the QoS support for VoIP traffic and optimize the usage of IEEE 802.11ax network resources. This work proposes a new scheme to multiplex VoIP calls in IEEE 802.11ax MU frames and a new scheduler and resource allocation algorithm specifically designed for VoIP data traffic. Our scheduler allocates VoIP packets requiring longer transmission times into the same frame(s), minimizing the channel air-time assigned to VoIP transmission. In addition, unused radio resources in the MU frame are leveraged to transmit best-effort packets along with VoIP packets. For completeness, we also define a call admission control (CAC) algorithm that anticipates channel saturation conditions to ensure VoIP users can maintain a guaranteed level of QoS. Based on simulation results, our scheme is more efficient in reducing channel utilization than other schedulers such as multi-user round-robin (RR) (implemented by ns-3) or single-user FIFO. For example, for 30 VoIP stations using the G.711 codec under mixed channel conditions, our scheme reduces by 30% the air-time required to transmit VoIP packets. When coupled with the ability to also send best-effort packets along with VoIP packets, this translates into a higher throughput (i.e. 10 Mbit/s vs 4 Mbit/s) and more simultaneous VoIP users with guaranteed QoS (up to 46 VoIP users vs 26 and 28 users for the multi-user RR and single-user FIFO scheduling algorithms, respectively).</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 225-241"},"PeriodicalIF":4.5,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002202/pdfft?md5=1604cf69e94954462b4546a1e8e22b26&pid=1-s2.0-S0140366424002202-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COSIER: A comprehensive lightweight blockchain system for IoT networks COSIER:适用于物联网网络的综合性轻量级区块链系统
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-11 DOI: 10.1016/j.comcom.2024.06.007
Khaleel Mershad

Internet of Things (IoT) networks have spread to many important fields and applications. The security of these networks remains a big challenge due to their unique characteristics and delicate operations. The blockchain has recently been proposed as a system to secure IoT data and communications. However, the blockchain demands a heavy load that cannot be handled by light IoT devices. For this reason, a large number of “lightweight blockchain” solutions were proposed that aim to modify the blockchain structure and characteristics to make it suitable for IoT networks. In this paper, we propose a novel and unique blockchain system for IoT networks that is based on four lightweight features: “lightweight architecture”, “lightweight authentication”, “lightweight consensus”, and “lightweight storage”. While previous research works focused on one or two of these features, we propose a system that combines the four features into a comprehensive lightweight blockchain system that utilizes a “lightweight cryptography” mechanism to achieve better performance from several perspectives, such as transaction latency, block generation delay, network overhead, and resilience to attacks.

物联网(IoT)网络已普及到许多重要领域和应用。由于其独特的特性和微妙的操作,这些网络的安全性仍然是一个巨大的挑战。最近,有人提出将区块链作为确保物联网数据和通信安全的系统。然而,区块链要求的负载很重,轻型物联网设备无法处理。为此,人们提出了大量 "轻量级区块链 "解决方案,旨在修改区块链的结构和特性,使其适用于物联网网络。在本文中,我们为物联网网络提出了一种新颖独特的区块链系统,该系统基于四个轻量级特征:"轻量级架构"、"轻量级认证"、"轻量级共识 "和 "轻量级存储"。以往的研究工作主要集中在其中的一个或两个特性上,而我们提出的系统则将这四个特性结合成一个全面的轻量级区块链系统,利用 "轻量级密码学 "机制,从交易延迟、区块生成延迟、网络开销和抗攻击能力等多个角度实现更好的性能。
{"title":"COSIER: A comprehensive lightweight blockchain system for IoT networks","authors":"Khaleel Mershad","doi":"10.1016/j.comcom.2024.06.007","DOIUrl":"10.1016/j.comcom.2024.06.007","url":null,"abstract":"<div><p>Internet of Things (IoT) networks have spread to many important fields and applications. The security of these networks remains a big challenge due to their unique characteristics and delicate operations. The blockchain has recently been proposed as a system to secure IoT data and communications. However, the blockchain demands a heavy load that cannot be handled by light IoT devices. For this reason, a large number of “lightweight blockchain” solutions were proposed that aim to modify the blockchain structure and characteristics to make it suitable for IoT networks. In this paper, we propose a novel and unique blockchain system for IoT networks that is based on four lightweight features: “lightweight architecture”, “lightweight authentication”, “lightweight consensus”, and “lightweight storage”. While previous research works focused on one or two of these features, we propose a system that combines the four features into a comprehensive lightweight blockchain system that utilizes a “lightweight cryptography” mechanism to achieve better performance from several perspectives, such as transaction latency, block generation delay, network overhead, and resilience to attacks.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 125-144"},"PeriodicalIF":6.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141407259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1