首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Evaluating the quality of service of Opportunistic Mobile Ad Hoc Network routing algorithms on real devices: A software-driven approach 在真实设备上评估机会移动 Ad Hoc 网络路由算法的服务质量:软件驱动方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.adhoc.2024.103591
Manuel Jesús-Azabal, José García-Alonso, Jaime Galán-Jiménez

Opportunistic Mobile Ad Hoc Networks (MANETs) offer versatile solutions in contexts where the Internet is unavailable. These networks facilitate the transmission between endpoints using a store-carry-forward strategy, thereby allowing information to be stored during periods of disconnection. Consequently, selecting the next hop in the routing process becomes a significant challenge for nodes, particularly because of its impact on Quality of Service (QoS). Therefore, routing strategies are crucial in opportunistic MANETs; however, their deployment and evaluation in real scenarios can be challenging. In response to this context, this paper introduces a monitoring software-driven tool designed to evaluate the QoS of routing algorithms in physical opportunistic MANETs. The implementation and its components are detailed, along with a case study and the outcomes provided by an implementation of the proposed solution. The results demonstrate the effectiveness of the implementation in enabling the analysis of routing protocols in real scenarios, highlighting significant differences with simulation results: mobility patterns in simulations tend to be inaccurate and overly optimistic, leading to a higher delivery probability and lower latency than what is observed in the real testbed.

机会移动特设局域网(MANET)为无法使用互联网的情况提供了多功能解决方案。这些网络采用存储-携带-转发策略促进端点之间的传输,从而允许在断开连接期间存储信息。因此,在路由过程中选择下一跳成为节点面临的一个重大挑战,尤其是因为它对服务质量(QoS)的影响。因此,路由策略在机会主义城域网中至关重要;然而,在实际场景中部署和评估路由策略却极具挑战性。针对这种情况,本文介绍了一种监测软件驱动工具,旨在评估物理机会主义城域网中路由算法的 QoS。本文详细介绍了该工具的实施及其组成部分,同时还介绍了一个案例研究以及实施该建议解决方案所取得的成果。结果表明,该实施方案能有效分析真实场景中的路由协议,突出显示了与仿真结果的显著差异:仿真中的移动模式往往不准确且过于乐观,导致与真实测试平台中观察到的结果相比,交付概率更高,延迟更短。
{"title":"Evaluating the quality of service of Opportunistic Mobile Ad Hoc Network routing algorithms on real devices: A software-driven approach","authors":"Manuel Jesús-Azabal,&nbsp;José García-Alonso,&nbsp;Jaime Galán-Jiménez","doi":"10.1016/j.adhoc.2024.103591","DOIUrl":"10.1016/j.adhoc.2024.103591","url":null,"abstract":"<div><p>Opportunistic Mobile Ad Hoc Networks (MANETs) offer versatile solutions in contexts where the Internet is unavailable. These networks facilitate the transmission between endpoints using a store-carry-forward strategy, thereby allowing information to be stored during periods of disconnection. Consequently, selecting the next hop in the routing process becomes a significant challenge for nodes, particularly because of its impact on Quality of Service (QoS). Therefore, routing strategies are crucial in opportunistic MANETs; however, their deployment and evaluation in real scenarios can be challenging. In response to this context, this paper introduces a monitoring software-driven tool designed to evaluate the QoS of routing algorithms in physical opportunistic MANETs. The implementation and its components are detailed, along with a case study and the outcomes provided by an implementation of the proposed solution. The results demonstrate the effectiveness of the implementation in enabling the analysis of routing protocols in real scenarios, highlighting significant differences with simulation results: mobility patterns in simulations tend to be inaccurate and overly optimistic, leading to a higher delivery probability and lower latency than what is observed in the real testbed.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103591"},"PeriodicalIF":4.4,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002026/pdfft?md5=b5858b4584b1baf264ed6cb852f8b0d1&pid=1-s2.0-S1570870524002026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoftWind: Software-defined trajectory correction modelling of gust wind effects on internet of drone things using glowworm swarm optimization SoftWind:利用萤火虫群优化对无人机物联网的阵风效应进行软件定义的轨迹修正建模
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1016/j.adhoc.2024.103577
Arnab Hazra , Debashis De

The dynamic nature of the atmosphere, especially wind gust, poses a crucial challenge to efficient and real-time drone operations. This article presents a novel MQTT based software-defined drone network for trajectory correction of drone flights in gusty wind conditions using Glowworm Swarm Optimization (GSO). By imposing the GSO to the software-defined drone network, our proposed model SoftWind has optimized the navigation and control capabilities of drones by correcting the trajectories in a gusty wind environment. We have analyzed the trajectories and convergence of drones due to wind gusts. As wind disturbances affect the trajectories of drones, we have corrected it by our trajectory correction model and evaluated the direction of the drones must fly to mitigate the wind gust and the resultant velocity compared to the no-wind environment. This study analyzed the trajectories of 100 drone flights due to various wind gust lengths (i.e., 40 m, 10 m, 6 m, and 3 m) for a fixed gust amplitude of 15 m/s and various gust amplitude (i.e., 0 m/s, 5 m/s, 15 m/s, and 40 m/s) for a fixed gust length 5 m. We observed that all the drones are converged to a single point due to low gust length (≤ 5 m) and high gust amplitude (≥ 35 m/s). It is also found that the direction of the drone must fly 28.87°. East of South to mitigate the effect of wind gusts having 10 m gust length and 15 m/s gust amplitude and the resultant velocity of the drone is 22.38 m/s. The result shows that SoftWind reduces the convergence time by 26 %-54 % as compared to other existing models.

大气层的动态特性,尤其是阵风,对无人机的高效和实时运行提出了严峻的挑战。本文介绍了一种基于 MQTT 的新型软件定义无人机网络,该网络利用萤火虫群优化(GSO)技术对阵风条件下的无人机飞行轨迹进行修正。通过将 GSO 应用于软件定义的无人机网络,我们提出的 SoftWind 模型通过修正阵风环境下的飞行轨迹,优化了无人机的导航和控制能力。我们分析了阵风导致的无人机轨迹和收敛情况。由于风扰动会影响无人机的飞行轨迹,我们通过轨迹修正模型对其进行了修正,并评估了无人机为减缓阵风而必须飞行的方向,以及与无风环境相比所产生的速度。这项研究分析了 100 架无人机在不同阵风长度(即 40 米、10 米、6 米和 3 米)、固定阵风振幅为 15 米/秒和不同阵风振幅(即 0 米/秒、5 米/秒、15 米/秒和 40 米/秒)、固定阵风长度为 5 米的情况下的飞行轨迹。同时还发现,无人机的飞行方向必须为 28.87°。南偏东 28.87°,以减轻阵风长度为 10 米、阵风振幅为 15 米/秒的阵风的影响,无人机的速度为 22.38 米/秒。结果表明,与其他现有模型相比,SoftWind 缩短了 26 %-54 % 的收敛时间。
{"title":"SoftWind: Software-defined trajectory correction modelling of gust wind effects on internet of drone things using glowworm swarm optimization","authors":"Arnab Hazra ,&nbsp;Debashis De","doi":"10.1016/j.adhoc.2024.103577","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103577","url":null,"abstract":"<div><p>The dynamic nature of the atmosphere, especially wind gust, poses a crucial challenge to efficient and real-time drone operations. This article presents a novel MQTT based software-defined drone network for trajectory correction of drone flights in gusty wind conditions using Glowworm Swarm Optimization (GSO). By imposing the GSO to the software-defined drone network, our proposed model SoftWind has optimized the navigation and control capabilities of drones by correcting the trajectories in a gusty wind environment. We have analyzed the trajectories and convergence of drones due to wind gusts. As wind disturbances affect the trajectories of drones, we have corrected it by our trajectory correction model and evaluated the direction of the drones must fly to mitigate the wind gust and the resultant velocity compared to the no-wind environment. This study analyzed the trajectories of 100 drone flights due to various wind gust lengths (i.e., 40 m, 10 m, 6 m, and 3 m) for a fixed gust amplitude of 15 m/s and various gust amplitude (i.e., 0 m/s, 5 m/s, 15 m/s, and 40 m/s) for a fixed gust length 5 m. We observed that all the drones are converged to a single point due to low gust length (≤ 5 m) and high gust amplitude (≥ 35 m/s). It is also found that the direction of the drone must fly 28.87°. East of South to mitigate the effect of wind gusts having 10 m gust length and 15 m/s gust amplitude and the resultant velocity of the drone is 22.38 m/s. The result shows that SoftWind reduces the convergence time by 26 %-54 % as compared to other existing models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103577"},"PeriodicalIF":4.4,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new priority aware routing protocol for efficient emergency data transmissions in MANETs 城域网中高效紧急数据传输的新型优先级感知路由协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1016/j.adhoc.2024.103592
Yunus Ozen , Goksu Zekiye Ozen

This paper introduces a new priority-aware routing protocol for mobile Ad-hoc networks to be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive use in various domains including military operations, environmental monitoring, healthcare, disaster response, smart transportation systems, unmanned aerial vehicles, and smart homes. During emergencies, communication can be severely restricted or even impossible due to the congestion of physical communication channels and unexpected technical failures in the infrastructure. Mobile Ad-hoc networks offer a solution to maintain continuous and reliable communication under such challenging conditions. In emergency scenarios, it is crucial for any node in the network to promptly deliver urgent messages to the intended destination, especially when certain nodes require ongoing active communication. The proposed routing protocol effectively addresses this requirement through its priority-aware mechanisms. The protocol ensures that nodes not involved in emergency tasks select the least congested route to prevent any delays or disruptions in the transmission of critical emergency data. This approach guarantees seamless communication for emergency nodes while allowing non-emergency nodes to communicate with each other as well. The study proposed in this paper introduces a new priority-aware routing protocol based on AODV for mobile Ad-hoc networks in emergencies. The packet transmission ratio of emergency nodes within the network is improved while maintaining the overall network performance unaffected. The adoption of proposed mechanisms to enhance performance does not necessitate an expansion in the size of data and control packets. These mechanisms do not inflict any supplementary latency or incur packet loss expenses on the network. The proposed protocol has been implemented and evaluated using ns-3 simulation software across various emergency scenarios. The results show that emergency nodes using the proposed protocol, achieve better packet delivery ratios compared to the original AODV, DSR, P-AODV, and AOMDV protocols, with improvements of 10.8%, 15.9%, 6.2%, and 5.9% respectively. This improvement in the packet delivery ratio for emergency data traffic is achieved without causing any disruptions in the overall network communication flow.

本文以 AODV 为基础,为移动 Ad-hoc 网络引入了一种新的优先级感知路由协议,可用于紧急情况下。移动 Ad-hoc 网络广泛应用于军事行动、环境监测、医疗保健、灾难响应、智能交通系统、无人机和智能家居等多个领域。在紧急情况下,由于物理通信信道拥塞和基础设施出现意外技术故障,通信可能会受到严重限制,甚至无法进行。移动 Ad-hoc 网络提供了一种解决方案,可在这种具有挑战性的条件下保持持续可靠的通信。在紧急情况下,网络中的任何节点都必须及时将紧急信息传送到预定目的地,尤其是当某些节点需要持续进行主动通信时。拟议的路由协议通过优先感知机制有效地满足了这一要求。该协议确保不参与紧急任务的节点选择拥堵最少的路由,以防止关键紧急数据传输出现任何延迟或中断。这种方法既保证了紧急节点的无缝通信,又允许非紧急节点相互通信。本文提出的研究介绍了一种基于 AODV 的新优先级感知路由协议,适用于紧急情况下的移动 Ad-hoc 网络。在保持网络整体性能不受影响的情况下,提高了网络内紧急节点的数据包传输率。采用建议的机制来提高性能并不需要扩大数据包和控制包的大小。这些机制不会对网络造成任何额外的延迟或数据包丢失费用。我们使用 ns-3 仿真软件在各种紧急情况下对所提出的协议进行了实施和评估。结果表明,与最初的 AODV、DSR、P-AODV 和 AOMDV 协议相比,使用拟议协议的紧急节点能实现更好的数据包传送率,分别提高了 10.8%、15.9%、6.2% 和 5.9%。紧急数据流量数据包传输率的提高不会对整个网络通信流造成任何干扰。
{"title":"A new priority aware routing protocol for efficient emergency data transmissions in MANETs","authors":"Yunus Ozen ,&nbsp;Goksu Zekiye Ozen","doi":"10.1016/j.adhoc.2024.103592","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103592","url":null,"abstract":"<div><p>This paper introduces a new priority-aware routing protocol for mobile Ad-hoc networks to be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive use in various domains including military operations, environmental monitoring, healthcare, disaster response, smart transportation systems, unmanned aerial vehicles, and smart homes. During emergencies, communication can be severely restricted or even impossible due to the congestion of physical communication channels and unexpected technical failures in the infrastructure. Mobile Ad-hoc networks offer a solution to maintain continuous and reliable communication under such challenging conditions. In emergency scenarios, it is crucial for any node in the network to promptly deliver urgent messages to the intended destination, especially when certain nodes require ongoing active communication. The proposed routing protocol effectively addresses this requirement through its priority-aware mechanisms. The protocol ensures that nodes not involved in emergency tasks select the least congested route to prevent any delays or disruptions in the transmission of critical emergency data. This approach guarantees seamless communication for emergency nodes while allowing non-emergency nodes to communicate with each other as well. The study proposed in this paper introduces a new priority-aware routing protocol based on AODV for mobile Ad-hoc networks in emergencies. The packet transmission ratio of emergency nodes within the network is improved while maintaining the overall network performance unaffected. The adoption of proposed mechanisms to enhance performance does not necessitate an expansion in the size of data and control packets. These mechanisms do not inflict any supplementary latency or incur packet loss expenses on the network. The proposed protocol has been implemented and evaluated using ns-3 simulation software across various emergency scenarios. The results show that emergency nodes using the proposed protocol, achieve better packet delivery ratios compared to the original AODV, DSR, P-AODV, and AOMDV protocols, with improvements of 10.8%, 15.9%, 6.2%, and 5.9% respectively. This improvement in the packet delivery ratio for emergency data traffic is achieved without causing any disruptions in the overall network communication flow.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103592"},"PeriodicalIF":4.4,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate and multistep mobile traffic prediction with SLA constraints: A comparative study 具有 SLA 约束条件的多变量和多步骤移动流量预测:比较研究
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.adhoc.2024.103594
Evren Tuna , Asude Baykal , Alkan Soysal

This paper proposes a new method for predicting downlink traffic volume in mobile networks, aiming to minimize overprovisioning while meeting specified service-level agreement (SLA) violation rates. We introduce a multivariate and multi-step prediction approach and compare four machine learning (ML) architectures: long short-term memory (LSTM), convolutional neural network (CNN), transformer, and light gradient-boosting machine (LightGBM). Our models predict up to 24 steps ahead and are evaluated under both single-step and multi-step conditions. Additionally, we propose parametric loss functions to adhere to SLA violation rate constraints.

Our results emphasize the importance of using parametric loss functions to meet SLA constraints. We discovered that LSTM when paired with our custom multivariate feature sets, outperforms the transformer architecture in short-term forecasting up to 4 h ahead. For these short-term predictions, we demonstrate that methods based on domain knowledge, like our custom feature sets combined with simpler models such as LSTM, surpass more complex models like transformers. However, for long-term forecasting (8 to 24 h ahead), transformers outperform all other models.

本文提出了一种预测移动网络下行链路流量的新方法,旨在最大限度地减少超额配置,同时满足指定的服务级别协议(SLA)违规率。我们介绍了一种多变量、多步骤预测方法,并比较了四种机器学习(ML)架构:长短期记忆(LSTM)、卷积神经网络(CNN)、变换器和轻梯度提升机(LightGBM)。我们的模型最多可提前 24 步进行预测,并在单步和多步条件下进行了评估。此外,我们还提出了参数损失函数,以遵守 SLA 违反率约束。我们发现,当 LSTM 与我们定制的多变量特征集搭配使用时,它在提前 4 小时以内的短期预测方面优于变压器架构。在这些短期预测中,我们证明了基于领域知识的方法(如我们的自定义特征集与 LSTM 等较简单模型的组合)超越了变压器等较复杂的模型。不过,在长期预测(提前 8 到 24 小时)方面,变换器的表现优于所有其他模型。
{"title":"Multivariate and multistep mobile traffic prediction with SLA constraints: A comparative study","authors":"Evren Tuna ,&nbsp;Asude Baykal ,&nbsp;Alkan Soysal","doi":"10.1016/j.adhoc.2024.103594","DOIUrl":"10.1016/j.adhoc.2024.103594","url":null,"abstract":"<div><p>This paper proposes a new method for predicting downlink traffic volume in mobile networks, aiming to minimize overprovisioning while meeting specified service-level agreement (SLA) violation rates. We introduce a multivariate and multi-step prediction approach and compare four machine learning (ML) architectures: long short-term memory (LSTM), convolutional neural network (CNN), transformer, and light gradient-boosting machine (LightGBM). Our models predict up to 24 steps ahead and are evaluated under both single-step and multi-step conditions. Additionally, we propose parametric loss functions to adhere to SLA violation rate constraints.</p><p>Our results emphasize the importance of using parametric loss functions to meet SLA constraints. We discovered that LSTM when paired with our custom multivariate feature sets, outperforms the transformer architecture in short-term forecasting up to 4 h ahead. For these short-term predictions, we demonstrate that methods based on domain knowledge, like our custom feature sets combined with simpler models such as LSTM, surpass more complex models like transformers. However, for long-term forecasting (8 to 24 h ahead), transformers outperform all other models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103594"},"PeriodicalIF":4.4,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Computer Networks and Distributed Systems 智能计算机网络和分布式系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.adhoc.2024.103595
Carlos Kamienski , Eduardo Cerqueira , Dave Cavalcanti , Marco Di Felice , Stênio Fernandes
{"title":"Intelligent Computer Networks and Distributed Systems","authors":"Carlos Kamienski ,&nbsp;Eduardo Cerqueira ,&nbsp;Dave Cavalcanti ,&nbsp;Marco Di Felice ,&nbsp;Stênio Fernandes","doi":"10.1016/j.adhoc.2024.103595","DOIUrl":"10.1016/j.adhoc.2024.103595","url":null,"abstract":"","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103595"},"PeriodicalIF":4.4,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT 用于 IIoT 多用户物理层身份验证的多属性加权卷积注意力神经网络
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.adhoc.2024.103593
Yue Wu , Tao Jing , Qinghe Gao , Jian Mao , Yan Huo , Zhiwei Yang

Compared with upper layer authentication, physical layer authentication (PLA) is essential in unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and lightweight. However, in dynamic environments, as the amount of users expands, the accuracy of single-attribute-based authentication decreases drastically, which becomes an urgent issue for IIoT. Accordingly, this paper proposes a novel multi-attribute-based convolutional attention neural network (CANN) for multiuser PLA. Using characteristics such as amplitude, phase, and delay, the multiple attributes from a real industrial scene are first constructed into three-dimensional matrices fed into CANN. Then, attention blocks are designed to learn the correlation between attributes and extract the attribute parts that are more instrumental in the CANN to improve authentication accuracy. In addition, to avoid confusing multiple users, a center confidence loss is introduced, which adaptively adjusts the weight of the center loss and works together with the softmax loss to train the CANN. The effectiveness of the proposed CANN-based multiuser PLA and center confidence loss is supported by experimental results. Compared with the recently proposed latent perturbed convolutional neural network (LPCNN), the CANN-based scheme improves the authentication accuracy by 8.11%, which is superior to the existing learning-based approaches. As the CANN is further trained with the loss function that combines center confidence loss, the authentication accuracy can be improved by at least 2.22%.

与上层身份验证相比,物理层身份验证(PLA)因其低复杂性和轻量级而在无人工业物联网(IIoT)场景中至关重要。然而,在动态环境中,随着用户数量的增加,基于单一属性的身份验证的准确性急剧下降,这成为 IIoT 迫切需要解决的问题。因此,本文针对多用户 PLA 提出了一种新颖的基于多属性的卷积注意力神经网络(CANN)。首先,利用振幅、相位和延迟等特征,将真实工业场景中的多个属性构建成三维矩阵并输入 CANN。然后,设计注意力模块来学习属性之间的相关性,并提取 CANN 中更有用的属性部分,以提高认证准确性。此外,为了避免混淆多个用户,还引入了中心置信度损失,自适应地调整中心损失的权重,并与 softmax 损失一起用于训练 CANN。实验结果证明了所提出的基于 CANN 的多用户 PLA 和中心置信度损失的有效性。与最近提出的潜扰卷积神经网络(LPCNN)相比,基于 CANN 的方案提高了 8.11% 的认证准确率,优于现有的基于学习的方法。在结合中心置信度损失的损失函数对 CANN 进行进一步训练后,认证准确率至少提高了 2.22%。
{"title":"Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT","authors":"Yue Wu ,&nbsp;Tao Jing ,&nbsp;Qinghe Gao ,&nbsp;Jian Mao ,&nbsp;Yan Huo ,&nbsp;Zhiwei Yang","doi":"10.1016/j.adhoc.2024.103593","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103593","url":null,"abstract":"<div><p>Compared with upper layer authentication, physical layer authentication (PLA) is essential in unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and lightweight. However, in dynamic environments, as the amount of users expands, the accuracy of single-attribute-based authentication decreases drastically, which becomes an urgent issue for IIoT. Accordingly, this paper proposes a novel multi-attribute-based convolutional attention neural network (CANN) for multiuser PLA. Using characteristics such as amplitude, phase, and delay, the multiple attributes from a real industrial scene are first constructed into three-dimensional matrices fed into CANN. Then, attention blocks are designed to learn the correlation between attributes and extract the attribute parts that are more instrumental in the CANN to improve authentication accuracy. In addition, to avoid confusing multiple users, a center confidence loss is introduced, which adaptively adjusts the weight of the center loss and works together with the softmax loss to train the CANN. The effectiveness of the proposed CANN-based multiuser PLA and center confidence loss is supported by experimental results. Compared with the recently proposed latent perturbed convolutional neural network (LPCNN), the CANN-based scheme improves the authentication accuracy by 8.11%, which is superior to the existing learning-based approaches. As the CANN is further trained with the loss function that combines center confidence loss, the authentication accuracy can be improved by at least 2.22%.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103593"},"PeriodicalIF":4.4,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning iTRPL:基于多代理强化学习的智能可信 RPL 协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103586
Debasmita Dey, Nirnay Ghosh

Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes iTRPL, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its ϵ-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that iTRPL learns to make optimal decisions with time.

低功耗和低损耗网络路由协议(RPL)是物联网网络中事实上的路由标准。它使节点能够协作并自主构建以树状面向目的地的直接非循环图(DODAG)为模型的 ad-hoc 网络。尽管 RPL 在工业和医疗保健领域得到广泛应用,但它很容易受到内部攻击。尽管最先进的 RPL 可确保只有经过验证的节点才能参与 DODAG,但这种硬性安全措施仍不足以防止内部威胁。这就需要整合软安全机制来支持决策。本文提出的 iTRPL 是一种基于行为的智能框架,它结合了信任来隔离 DODAG 中的诚实节点和恶意节点。它还利用多代理强化学习(MARL)做出有关 DODAG 的自主决策。该框架使父节点能够计算其子节点的信任度,并决定后者是否可以加入 DODAG。父节点跟踪子节点的行为,更新信任度,计算奖励(或惩罚),并与根节点共享。根节点汇总所有节点的奖励/惩罚,计算总回报,并通过其ϵ-贪婪 MARL 模块决定未来是否保留或修改 DODAG。基于模拟的性能评估表明,随着时间的推移,iTRPL 能够学会做出最优决策。
{"title":"iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning","authors":"Debasmita Dey,&nbsp;Nirnay Ghosh","doi":"10.1016/j.adhoc.2024.103586","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103586","url":null,"abstract":"<div><p>Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes <em>iTRPL</em>, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its <span><math><mi>ϵ</mi></math></span>-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that <em>iTRPL</em> learns to make optimal decisions with time.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103586"},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning IoV-BCFL:基于区块链和联合学习的物联网入侵检测方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103590
Nannan Xie, Chuanxue Zhang, Qizhao Yuan, Jing Kong, Xiaoqiang Di

In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal and social security. Traditional IoV intrusion detection usually adopts a centralized detection model, which has the disadvantages of untimely detection results and is difficult to protect vehicle privacy in practical applications. Meanwhile, centralized computation requires a large amount of vehicle data transmission, which overloads the wireless bandwidth. Combined the distributed computing resources of Federated Learning (FL) and the decentralized features of blockchain, an IoV intrusion detection framework named IoV-BCFL is proposed, which is capable of distributed intrusion detection and reliable logging with privacy protection. FL is used for distributing training on vehicle nodes and aggregating the training models at Road Side Unit (RSU) to reduce data transmission, protect the privacy of training data, and ensure the security of the model. A blockchain-based intrusion logging mechanism is presented, which enhances vehicle privacy protection through Rivest-Shamir-Adleman (RSA) algorithm encryption and uses Inter Planetary File System (IPFS) to store the intrusion logs. The intrusion behavior can be faithfully recorded by logging smart contract after detecting the intrusion, which can be used to track intruders, analyze security vulnerabilities, and collect evidence. Experiments based on different open source datasets show that FL achieves a high detection rates on intrusion data and effectively reduce the communication overhead, the smart contract performs well on evaluation indicators such as sending rate, latency, and throughput.

近年来,车联网(IoV)正处于蓬勃发展阶段。但与此同时,拒绝服务(DoS)、欺骗等针对车联网的攻击手段也对个人和社会安全造成了极大威胁。传统的物联网入侵检测通常采用集中式检测模式,其缺点是检测结果不及时,在实际应用中难以保护车辆隐私。同时,集中式计算需要传输大量车辆数据,无线带宽不堪重负。结合联邦学习(Federated Learning,FL)的分布式计算资源和区块链的去中心化特性,提出了一种名为IoV-BCFL的物联网入侵检测框架,能够实现分布式入侵检测和可靠的日志记录,并保护隐私。FL 用于在车辆节点上分布式训练,并将训练模型汇聚到路侧单元(RSU),以减少数据传输,保护训练数据的隐私,确保模型的安全性。本文提出了一种基于区块链的入侵日志机制,该机制通过Rivest-Shamir-Adleman(RSA)算法加密加强车辆隐私保护,并使用星际文件系统(IPFS)存储入侵日志。在检测到入侵行为后,可通过记录智能合约忠实记录入侵行为,用于追踪入侵者、分析安全漏洞和收集证据。基于不同开源数据集的实验表明,FL 对入侵数据实现了较高的检测率,并有效降低了通信开销,智能合约在发送率、延迟和吞吐量等评价指标上表现良好。
{"title":"IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning","authors":"Nannan Xie,&nbsp;Chuanxue Zhang,&nbsp;Qizhao Yuan,&nbsp;Jing Kong,&nbsp;Xiaoqiang Di","doi":"10.1016/j.adhoc.2024.103590","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103590","url":null,"abstract":"<div><p>In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal and social security. Traditional IoV intrusion detection usually adopts a centralized detection model, which has the disadvantages of untimely detection results and is difficult to protect vehicle privacy in practical applications. Meanwhile, centralized computation requires a large amount of vehicle data transmission, which overloads the wireless bandwidth. Combined the distributed computing resources of Federated Learning (FL) and the decentralized features of blockchain, an IoV intrusion detection framework named IoV-BCFL is proposed, which is capable of distributed intrusion detection and reliable logging with privacy protection. FL is used for distributing training on vehicle nodes and aggregating the training models at Road Side Unit (RSU) to reduce data transmission, protect the privacy of training data, and ensure the security of the model. A blockchain-based intrusion logging mechanism is presented, which enhances vehicle privacy protection through Rivest-Shamir-Adleman (RSA) algorithm encryption and uses Inter Planetary File System (IPFS) to store the intrusion logs. The intrusion behavior can be faithfully recorded by logging smart contract after detecting the intrusion, which can be used to track intruders, analyze security vulnerabilities, and collect evidence. Experiments based on different open source datasets show that FL achieves a high detection rates on intrusion data and effectively reduce the communication overhead, the smart contract performs well on evaluation indicators such as sending rate, latency, and throughput.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103590"},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning assisted framework to periodically identify user communities in urban space 联合学习辅助框架,定期识别城市空间中的用户社区
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1016/j.adhoc.2024.103589
Cláudio Diego T. de Souza , José Ferreira de Rezende , Carlos Alberto V. Campos

Identifying individuals with similar behaviors and mobility patterns has become essential to improving the functioning of urban services. However, since these patterns can vary over time, such identification needs to be done periodically. Furthermore, once mobility data expresses the routine of individuals, privacy must be guaranteed. In this work, we propose a framework for periodically detecting and grouping individuals with behavioral similarities into communities. To accomplish this, we built an autoencoder model to extract spatio-temporal mobility features from raw user data at periodic intervals. We used Federated Learning (FL) as a training approach to preserve privacy and alleviate time-consuming training and communication costs. To determine the number of communities without risking an arbitrary number, we compared the choices of two probabilistic methods, the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Since the communities are updated periodically, we also analyzed the impact of aged samples on the proposed framework. Finally, we compared the performance of our FL-based solution to a centralized training approach. We analyzed similarity and dissimilarity metrics on mobility samples and the contact time of individuals in three different scenarios. Our results indicate that AIC outperforms BIC when choosing the number of communities, although both satisfy the evaluation metrics. We also found that using older samples benefits more complex spatio-temporal scenarios. Finally, no significant losses were detected when compared to a centralized training approach, reinforcing the advantages of using the FL-based method.

识别具有相似行为和流动模式的个人对于改善城市服务功能至关重要。然而,由于这些模式会随着时间的推移而变化,因此需要定期进行识别。此外,一旦移动数据表示了个人的日常行为,就必须保证隐私。在这项工作中,我们提出了一个框架,用于定期检测行为相似的个人并将其归类为社区。为此,我们建立了一个自动编码器模型,定期从原始用户数据中提取时空移动特征。我们使用联盟学习(FL)作为训练方法,以保护隐私并减轻耗时的训练和通信成本。为了确定社区数量而不冒任意数量的风险,我们比较了两种概率方法的选择:阿凯克信息准则(AIC)和贝叶斯信息准则(BIC)。由于社区会定期更新,我们还分析了老化样本对拟议框架的影响。最后,我们比较了基于 FL 的解决方案和集中式训练方法的性能。我们分析了三种不同场景中移动样本和个体接触时间的相似度和不相似度指标。我们的结果表明,在选择社区数量时,AIC 优于 BIC,尽管两者都能满足评估指标。我们还发现,使用较老的样本有利于更复杂的时空场景。最后,与集中式训练方法相比,我们没有发现明显的损失,这加强了使用基于 FL 的方法的优势。
{"title":"Federated Learning assisted framework to periodically identify user communities in urban space","authors":"Cláudio Diego T. de Souza ,&nbsp;José Ferreira de Rezende ,&nbsp;Carlos Alberto V. Campos","doi":"10.1016/j.adhoc.2024.103589","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103589","url":null,"abstract":"<div><p>Identifying individuals with similar behaviors and mobility patterns has become essential to improving the functioning of urban services. However, since these patterns can vary over time, such identification needs to be done periodically. Furthermore, once mobility data expresses the routine of individuals, privacy must be guaranteed. In this work, we propose a framework for periodically detecting and grouping individuals with behavioral similarities into communities. To accomplish this, we built an autoencoder model to extract spatio-temporal mobility features from raw user data at periodic intervals. We used Federated Learning (FL) as a training approach to preserve privacy and alleviate time-consuming training and communication costs. To determine the number of communities without risking an arbitrary number, we compared the choices of two probabilistic methods, the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Since the communities are updated periodically, we also analyzed the impact of aged samples on the proposed framework. Finally, we compared the performance of our FL-based solution to a centralized training approach. We analyzed similarity and dissimilarity metrics on mobility samples and the contact time of individuals in three different scenarios. Our results indicate that AIC outperforms BIC when choosing the number of communities, although both satisfy the evaluation metrics. We also found that using older samples benefits more complex spatio-temporal scenarios. Finally, no significant losses were detected when compared to a centralized training approach, reinforcing the advantages of using the FL-based method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103589"},"PeriodicalIF":4.4,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ILLUMINE: Illumination UAVs deployment optimization based on consumer drone ILLUMINE:基于消费级无人机的照明无人机部署优化
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.adhoc.2024.103587
Bo Ma, Yexin Pan, Yong Xu, Zitian Zhang, Chao Chen, Chuanhuang Li

Traditional ground-based illumination equipment is limited in mobility and light source height, making it difficult to adapt to diverse living scenarios such as camping that require quick and flexible illumination solutions. With the rapid development of Unmanned Aerial Vehicle (UAV) technology, particularly in illumination services, UAVs have demonstrated unique advantages. Addressing the inadequacies of conventional illumination, this study proposes a prototype of an autonomously deployed illumination system based on the RoboMaster Tello Talent (Tello) UAV, designed to provide quick and flexible on-site illumination solutions. The system’s design encompasses three complementary modules to enhance its overall functionality and efficiency. Firstly, the illumination module equips the Tello UAV with a specialized illumination extension, ensuring flight stability and effective illumination. Secondly, the addressing module employs iterative algorithms to identify optimal UAV deployment locations and precisely plan flight paths. Lastly, the flight control module, guided by the results from the addressing module, scripts flight commands, integrates with the Tello UAV’s Application Programming Interface (API), and executes flight plans optimized for path efficiency, ensuring the UAV quickly and accurately reaches designated locations, coordinating with the illumination module to deliver effective illumination. Experimental results demonstrate that the proposed illumination system can swiftly respond to various user demands, autonomously deploy UAVs to optimal illumination positions, and provide high-quality service.

传统的地面照明设备在移动性和光源高度方面受到限制,难以适应露营等需要快速灵活照明解决方案的多样化生活场景。随着无人机(UAV)技术的快速发展,尤其是在照明服务方面,无人机已显示出独特的优势。针对传统照明的不足,本研究提出了一种基于 RoboMaster Tello Talent(Tello)无人机的自主部署照明系统原型,旨在提供快速灵活的现场照明解决方案。该系统的设计包括三个互补模块,以增强其整体功能和效率。首先,照明模块为 Tello 无人机配备了专门的照明扩展装置,确保飞行稳定性和有效照明。其次,寻址模块采用迭代算法确定无人机的最佳部署位置,并精确规划飞行路径。最后,飞行控制模块在寻址模块结果的指导下,编写飞行指令脚本,与 Tello 无人机的应用程序接口(API)集成,执行优化路径效率的飞行计划,确保无人机快速、准确地到达指定地点,并与照明模块协调,提供有效的照明。实验结果表明,拟议的照明系统能够迅速响应各种用户需求,自主将无人机部署到最佳照明位置,并提供高质量的服务。
{"title":"ILLUMINE: Illumination UAVs deployment optimization based on consumer drone","authors":"Bo Ma,&nbsp;Yexin Pan,&nbsp;Yong Xu,&nbsp;Zitian Zhang,&nbsp;Chao Chen,&nbsp;Chuanhuang Li","doi":"10.1016/j.adhoc.2024.103587","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103587","url":null,"abstract":"<div><p>Traditional ground-based illumination equipment is limited in mobility and light source height, making it difficult to adapt to diverse living scenarios such as camping that require quick and flexible illumination solutions. With the rapid development of Unmanned Aerial Vehicle (UAV) technology, particularly in illumination services, UAVs have demonstrated unique advantages. Addressing the inadequacies of conventional illumination, this study proposes a prototype of an autonomously deployed illumination system based on the RoboMaster Tello Talent (Tello) UAV, designed to provide quick and flexible on-site illumination solutions. The system’s design encompasses three complementary modules to enhance its overall functionality and efficiency. Firstly, the illumination module equips the Tello UAV with a specialized illumination extension, ensuring flight stability and effective illumination. Secondly, the addressing module employs iterative algorithms to identify optimal UAV deployment locations and precisely plan flight paths. Lastly, the flight control module, guided by the results from the addressing module, scripts flight commands, integrates with the Tello UAV’s Application Programming Interface (API), and executes flight plans optimized for path efficiency, ensuring the UAV quickly and accurately reaches designated locations, coordinating with the illumination module to deliver effective illumination. Experimental results demonstrate that the proposed illumination system can swiftly respond to various user demands, autonomously deploy UAVs to optimal illumination positions, and provide high-quality service.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103587"},"PeriodicalIF":4.4,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1