首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Learning-based joint recommendation, caching, and transmission optimization for cooperative edge video caching in Internet of Vehicles 基于学习的联合推荐、缓存和传输优化,用于车联网中的合作边缘视频缓存
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1016/j.adhoc.2024.103667
Zhipeng Cheng , Lu Liu , Minghui Liwang , Ning Chen , Xuwei Fan
In an era dominated by multimedia information, achieving efficient video transmission in the Internet of Vehicles (IoV) is crucial because of the inherent bandwidth constraints and network volatility within vehicular environments. In this paper, we propose a cooperative edge video caching framework designed to enhance video delivery efficiency in IoV by integrating joint recommendation, caching, and transmission optimization. Leveraging deep reinforcement learning with the discrete soft actor–critic algorithm, our methodology dynamically adapts to fluctuating network conditions and diverse user preferences, aiming to optimize content delivery efficiency and quality of experience. The proposed approach combines recommendation and caching strategies with transmission optimization to provide a comprehensive solution for high-performance video services. Extensive simulation results demonstrate that our framework significantly outperforms traditional baseline methods, achieving superior outcomes in terms of service utility, delivery rate, and delay reduction. These results highlight the robust potential of our solution to facilitate seamless and high-quality video experiences in the complex and dynamic landscape of vehicular networks, advancing the capabilities of IoV content delivery.
在多媒体信息占主导地位的时代,由于车辆环境中固有的带宽限制和网络不稳定性,在车联网(IoV)中实现高效视频传输至关重要。在本文中,我们提出了一种合作式边缘视频缓存框架,旨在通过整合联合推荐、缓存和传输优化来提高 IoV 中的视频传输效率。我们的方法利用深度强化学习和离散软演员批评算法,动态适应波动的网络条件和多样化的用户偏好,旨在优化内容传输效率和体验质量。所提出的方法将推荐和缓存策略与传输优化相结合,为高性能视频服务提供了全面的解决方案。广泛的模拟结果表明,我们的框架明显优于传统的基准方法,在服务效用、传输速率和延迟减少方面都取得了卓越的成果。这些结果凸显了我们的解决方案在复杂多变的车载网络环境中促进无缝和高质量视频体验的强大潜力,从而推动了物联网内容交付能力的发展。
{"title":"Learning-based joint recommendation, caching, and transmission optimization for cooperative edge video caching in Internet of Vehicles","authors":"Zhipeng Cheng ,&nbsp;Lu Liu ,&nbsp;Minghui Liwang ,&nbsp;Ning Chen ,&nbsp;Xuwei Fan","doi":"10.1016/j.adhoc.2024.103667","DOIUrl":"10.1016/j.adhoc.2024.103667","url":null,"abstract":"<div><div>In an era dominated by multimedia information, achieving efficient video transmission in the Internet of Vehicles (IoV) is crucial because of the inherent bandwidth constraints and network volatility within vehicular environments. In this paper, we propose a cooperative edge video caching framework designed to enhance video delivery efficiency in IoV by integrating joint recommendation, caching, and transmission optimization. Leveraging deep reinforcement learning with the discrete soft actor–critic algorithm, our methodology dynamically adapts to fluctuating network conditions and diverse user preferences, aiming to optimize content delivery efficiency and quality of experience. The proposed approach combines recommendation and caching strategies with transmission optimization to provide a comprehensive solution for high-performance video services. Extensive simulation results demonstrate that our framework significantly outperforms traditional baseline methods, achieving superior outcomes in terms of service utility, delivery rate, and delay reduction. These results highlight the robust potential of our solution to facilitate seamless and high-quality video experiences in the complex and dynamic landscape of vehicular networks, advancing the capabilities of IoV content delivery.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103667"},"PeriodicalIF":4.4,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-stage machine learning approach for advanced malicious node detection in WSNs WSN 中高级恶意节点检测的双阶段机器学习方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1016/j.adhoc.2024.103672
Osama A. Khashan
Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly those originating from malicious nodes (MNs), which lead to compromised data integrity, network stability, and critical application reliability. Although security and energy efficiency remain critical, current MN detection methods are resource-intensive and time-consuming, rendering them unsuitable for constrained WSNs. Although machine learning-based methods excel at detecting MNs, they often incur significant time overhead owing to extensive data transmission and coordination, leading to increased latency and energy consumption within the network. This study introduces DSMND, a novel dual-stage MN detection scheme that harnesses machine learning to enhance MN identification in WSNs. The initial stage uses dynamic threshold detection and decision-tree algorithms at the cluster head (CH) level. This adaptive detection process optimizes CH resource levels, feature counts, and threshold values for efficient MN identification. When thresholds are exceeded, the second stage activates on the server side, employing an advanced MN detection model that seamlessly integrates a hybrid convolutional neural network and a random forest classifier to boost detection accuracy. Leveraging SensorNetGuard, a dataset with diverse node and network features, further enhances reliability. Extensive analysis shows that our scheme achieves up to 99.5 % detection accuracy at the CH level and nearly 100 % at the server side. The average execution time is 124.63 ms, making it 97 % faster than conventional methods. Additionally, DSMND reduces CH power consumption by up to 70 % and extends network lifetime by 2.7 times compared to existing methods. These results confirm the effectiveness of our approach for real-time detection and mitigation of MNs within WSNs.
在无线传感器网络(WSN)中,可能会出现许多漏洞,特别是那些来自恶意节点(MN)的漏洞,从而导致数据完整性、网络稳定性和关键应用可靠性受到影响。尽管安全性和能效仍然至关重要,但目前的 MN 检测方法需要大量资源和时间,因此不适合受限的 WSN。虽然基于机器学习的方法在检测 MN 方面表现出色,但由于需要进行大量数据传输和协调,它们往往会产生大量时间开销,导致网络内的延迟和能耗增加。本研究介绍了一种新颖的双阶段 MN 检测方案 DSMND,它利用机器学习来增强 WSN 中的 MN 识别能力。初始阶段在簇头(CH)级别使用动态阈值检测和决策树算法。这种自适应检测过程可优化 CH 资源水平、特征计数和阈值,以实现高效的 MN 识别。当超过阈值时,第二阶段在服务器端启动,采用先进的 MN 检测模型,无缝集成混合卷积神经网络和随机森林分类器,以提高检测精度。利用具有不同节点和网络特征的数据集 SensorNetGuard,进一步提高了可靠性。广泛的分析表明,我们的方案在 CH 层实现了高达 99.5% 的检测准确率,在服务器端实现了接近 100% 的检测准确率。平均执行时间为 124.63 毫秒,比传统方法快 97%。此外,与现有方法相比,DSMND 最多可将 CH 的功耗降低 70%,将网络寿命延长 2.7 倍。这些结果证实了我们的方法在 WSN 中实时检测和缓解 MN 的有效性。
{"title":"Dual-stage machine learning approach for advanced malicious node detection in WSNs","authors":"Osama A. Khashan","doi":"10.1016/j.adhoc.2024.103672","DOIUrl":"10.1016/j.adhoc.2024.103672","url":null,"abstract":"<div><div>Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly those originating from malicious nodes (MNs), which lead to compromised data integrity, network stability, and critical application reliability. Although security and energy efficiency remain critical, current MN detection methods are resource-intensive and time-consuming, rendering them unsuitable for constrained WSNs. Although machine learning-based methods excel at detecting MNs, they often incur significant time overhead owing to extensive data transmission and coordination, leading to increased latency and energy consumption within the network. This study introduces DSMND, a novel dual-stage MN detection scheme that harnesses machine learning to enhance MN identification in WSNs. The initial stage uses dynamic threshold detection and decision-tree algorithms at the cluster head (CH) level. This adaptive detection process optimizes CH resource levels, feature counts, and threshold values for efficient MN identification. When thresholds are exceeded, the second stage activates on the server side, employing an advanced MN detection model that seamlessly integrates a hybrid convolutional neural network and a random forest classifier to boost detection accuracy. Leveraging SensorNetGuard, a dataset with diverse node and network features, further enhances reliability. Extensive analysis shows that our scheme achieves up to 99.5 % detection accuracy at the CH level and nearly 100 % at the server side. The average execution time is 124.63 ms, making it 97 % faster than conventional methods. Additionally, DSMND reduces CH power consumption by up to 70 % and extends network lifetime by 2.7 times compared to existing methods. These results confirm the effectiveness of our approach for real-time detection and mitigation of MNs within WSNs.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103672"},"PeriodicalIF":4.4,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142322575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs 面向 VANET 的无托管、高效的动态匿名隐私保护批量可验证认证方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-22 DOI: 10.1016/j.adhoc.2024.103670
Girraj Kumar Verma , Vinay Chamola , Asheesh Tiwari , Neeraj Kumar , Dheerendra Mishra , Saurabh Rana , Ahmed Barnawi
To enhance road safety, Vehicular Ad-hoc Networks (VANETs) facilitate the exchange of safety-critical messages between smart vehicles and road traffic authorities. However, VANET’s wireless channels are prone to several attacks, such as replay or modification. Therefore, to protect the links, robust authentication and message integrity mechanisms are required. Previously, several robust authentication schemes have been devised. However, those designs often struggle with complex certificate management, the key escrow problem, and the necessity for secure channels to establish user keys. Additionally, prior methods rely on pseudonyms to ensure user privacy. To implement it, several pseudonyms are stored in the vehicle’s device, which burdens the device. To overcome these limitations, this study introduces an efficient and escrow-free dynamic anonymous authentication scheme tailored for VANETs. By utilizing the paradigm of certificate-based cryptography and fuzzy identity generation, the proposed design eliminates the limitations. Through rigorous security analysis, the proposed design’s effectiveness against various threats is demonstrated. Furthermore, a detailed performance analysis, including computational and communication cost comparisons, showcases the scheme’s feasibility for VANET deployment. An NS-3 simulation further confirms the suitability of the proposed scheme for real-world VANET communication scenarios.
为了加强道路安全,车载 Ad-hoc 网络(VANET)促进了智能车辆与道路交通管理机构之间安全关键信息的交换。然而,VANET 的无线信道很容易受到重放或修改等攻击。因此,为了保护链路,需要强大的身份验证和信息完整性机制。在此之前,已经设计出了几种稳健的身份验证方案。但是,这些设计通常都要面对复杂的证书管理、密钥托管问题以及建立用户密钥的安全通道的必要性。此外,以前的方法依赖假名来确保用户隐私。为了实现这一点,需要在车载设备中存储多个假名,这给设备带来了负担。为了克服这些局限性,本研究为 VANET 引入了一种高效且无需托管的动态匿名身份验证方案。通过利用基于证书的密码学范例和模糊身份生成,所提出的设计消除了这些限制。通过严格的安全分析,证明了所提出的设计能有效抵御各种威胁。此外,详细的性能分析(包括计算和通信成本比较)展示了该方案在 VANET 部署中的可行性。NS-3 仿真进一步证实了所提方案在实际 VANET 通信场景中的适用性。
{"title":"Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs","authors":"Girraj Kumar Verma ,&nbsp;Vinay Chamola ,&nbsp;Asheesh Tiwari ,&nbsp;Neeraj Kumar ,&nbsp;Dheerendra Mishra ,&nbsp;Saurabh Rana ,&nbsp;Ahmed Barnawi","doi":"10.1016/j.adhoc.2024.103670","DOIUrl":"10.1016/j.adhoc.2024.103670","url":null,"abstract":"<div><div>To enhance road safety, Vehicular Ad-hoc Networks (VANETs) facilitate the exchange of safety-critical messages between smart vehicles and road traffic authorities. However, VANET’s wireless channels are prone to several attacks, such as replay or modification. Therefore, to protect the links, robust authentication and message integrity mechanisms are required. Previously, several robust authentication schemes have been devised. However, those designs often struggle with complex certificate management, the key escrow problem, and the necessity for secure channels to establish user keys. Additionally, prior methods rely on pseudonyms to ensure user privacy. To implement it, several pseudonyms are stored in the vehicle’s device, which burdens the device. To overcome these limitations, this study introduces an efficient and escrow-free dynamic anonymous authentication scheme tailored for VANETs. By utilizing the paradigm of certificate-based cryptography and fuzzy identity generation, the proposed design eliminates the limitations. Through rigorous security analysis, the proposed design’s effectiveness against various threats is demonstrated. Furthermore, a detailed performance analysis, including computational and communication cost comparisons, showcases the scheme’s feasibility for VANET deployment. An NS-3 simulation further confirms the suitability of the proposed scheme for real-world VANET communication scenarios.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103670"},"PeriodicalIF":4.4,"publicationDate":"2024-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method for simultaneously implementing trajectory planning and DAG task scheduling in multi-UAV assisted edge computing 在多无人机辅助边缘计算中同时实施轨迹规划和 DAG 任务调度的方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-21 DOI: 10.1016/j.adhoc.2024.103668
Wenchao Yang, Yuxing Mao, Xueshuo Chen, Chunxu Chen, Bozheng Lei, Qing He
UAV-assisted edge computing(UEC) as a new framework is able to provide computing services to remote areas. However, facing computationally intensive tasks with huge computation time forces them to hover near the user’s devices(UDs) for long periods of time. To better utilize the available arithmetic resources and reduce the computation time of UAVs, it is imperative to introduce directed acyclic graph (DAG) task scheduling into the UEC framework. Therefore, this article proposes a DAG-type task-driven trajectory planning (DAG-TDTP) model, which can plan UAV routes while scheduling DAG subtasks between UAVs that offload from UDs. To implement the DAG-TDTP model, we propose a distance-based heterogeneous earliest-finish-time (D-HEFT) algorithm and a time segmentation method based on the cooperative task offloading matrix. To stimulate the potential of the DAG-TDTP model in reducing energy consumption, we propose a genetic algorithm based on temporary key nodes (TKNGA) for the proposed model. Through simulation analysis, we verify the superiority of the proposed model in reducing UAV system energy consumption and the superiority of TKNGA compared to other algorithms.
无人机辅助边缘计算(UEC)作为一种新型框架,能够为偏远地区提供计算服务。然而,面对计算时间巨大的计算密集型任务,无人机不得不长时间悬停在用户设备(UD)附近。为了更好地利用可用的计算资源并减少无人机的计算时间,必须在 UEC 框架中引入有向无环图(DAG)任务调度。因此,本文提出了一种 DAG 型任务驱动轨迹规划(DAG-TDTP)模型,该模型可以在规划无人机航线的同时,在无人机之间调度从 UD 卸载的 DAG 子任务。为实现 DAG-TDTP 模型,我们提出了基于距离的异构最早完成时间(D-HEFT)算法和基于合作任务卸载矩阵的时间分割方法。为了激发 DAG-TDTP 模型在降低能耗方面的潜力,我们为该模型提出了一种基于临时关键节点(TKNGA)的遗传算法。通过仿真分析,我们验证了所提模型在降低无人机系统能耗方面的优势,以及 TKNGA 与其他算法相比的优越性。
{"title":"A method for simultaneously implementing trajectory planning and DAG task scheduling in multi-UAV assisted edge computing","authors":"Wenchao Yang,&nbsp;Yuxing Mao,&nbsp;Xueshuo Chen,&nbsp;Chunxu Chen,&nbsp;Bozheng Lei,&nbsp;Qing He","doi":"10.1016/j.adhoc.2024.103668","DOIUrl":"10.1016/j.adhoc.2024.103668","url":null,"abstract":"<div><div>UAV-assisted edge computing(UEC) as a new framework is able to provide computing services to remote areas. However, facing computationally intensive tasks with huge computation time forces them to hover near the user’s devices(UDs) for long periods of time. To better utilize the available arithmetic resources and reduce the computation time of UAVs, it is imperative to introduce directed acyclic graph (DAG) task scheduling into the UEC framework. Therefore, this article proposes a DAG-type task-driven trajectory planning (DAG-TDTP) model, which can plan UAV routes while scheduling DAG subtasks between UAVs that offload from UDs. To implement the DAG-TDTP model, we propose a distance-based heterogeneous earliest-finish-time (D-HEFT) algorithm and a time segmentation method based on the cooperative task offloading matrix. To stimulate the potential of the DAG-TDTP model in reducing energy consumption, we propose a genetic algorithm based on temporary key nodes (TKNGA) for the proposed model. Through simulation analysis, we verify the superiority of the proposed model in reducing UAV system energy consumption and the superiority of TKNGA compared to other algorithms.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103668"},"PeriodicalIF":4.4,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142357129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers TAVA:动态多充电服务提供商上的可追踪匿名-自控 V2X 验证
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.adhoc.2024.103666
Qingwen Han , Tianlin Yang , Yao Li , Yongsheng Zhao , Shuai Zhang , Guoqiang Zu

The widespread deployment of Electric vehicles (EVs) leads to an increasing demand for charging piles and corresponding charging service (CS) from CS providers (CSPs). Pseudonym-based authentication mechanisms have been designed to resist the attacks which exploit the charging-authentication information to infer EV users’ identities and their driving routes. However, these existing mechanisms generated EV users' pseudonyms by relying on a trusted third entity, which affects the authentication system's resilience and EV user privacy-preservation.

To this end, this paper proposes a Traceable Anonymity-self-controllable V2X Authentication (TAVA) scheme for the multiple-CSP (forming a CSP set) scenario, where each CSP independently manages its own CPs and a CSP randomly joins or leaves the CSP set. TAVA has a series of security capabilities. (1) First, it allows the mutual authentication between an EV user and a CP, while preserving EV user privacy and also assuring forward and backward security. This capability is achieved by using the multi-party computation technique to let all CSPs join the process of generating EV-users’ credentials but each CSP knows nothing about the credentials. (2) Secondly, TAVA has the capabilities of self-controllable anonymity and unlinkability by allowing each EV user to self-generate verifiable and unlinkable one-time pseudonyms based on bilinear- mapping technique. (3) At last, each EV user under TAVA is traceable. It is achieved by applying the two-factor authentication technique in TAVA and linking the one-time pseudonym to the two factors, namely, the credential and the EV user's biometric characteristics with low entropy rates. Note that all these security capabilities are achieved with less performance degradation in terms of communication and storage overheads in the dynamic environment. We conduct the informal and formal analysis of security capabilities and also make performance evaluations. The results indicate that, compared with the latest works, the computation overhead of the mutual authentication in TAVA is reduced by up to 89 %.

电动汽车(EV)的广泛使用导致对充电桩和充电服务提供商(CSP)提供的相应充电服务(CS)的需求不断增加。人们设计了基于假名的认证机制,以抵御利用充电认证信息推断电动汽车用户身份及其驾驶路线的攻击。为此,本文针对多 CSP(形成一个 CSP 集)场景,即每个 CSP 独立管理自己的 CPs,且一个 CSP 随机加入或离开 CSP 集的情况,提出了一种可追踪匿名-自控 V2X 身份验证(TAVA)方案。TAVA 具有一系列安全功能。(1) 首先,它允许 EV 用户和 CP 之间相互认证,同时保护 EV 用户的隐私,并确保前向和后向安全。这种能力是通过多方计算技术实现的,即让所有的 CSP 都加入到生成 EV 用户凭证的过程中,但每个 CSP 对凭证一无所知。(2)其次,TAVA 具有可自我控制的匿名性和不可链接性,允许每个 EV 用户基于双线性映射技术自我生成可验证和不可链接的一次性假名。(3) 最后,TAVA 下的每个 EV 用户都是可追踪的。这是通过在 TAVA 中应用双因素认证技术,并将一次性假名与两个因素(即凭证和 EV 用户的低熵率生物特征)相联系来实现的。需要注意的是,所有这些安全功能都是在动态环境中以较低的通信和存储开销降低性能的情况下实现的。我们对安全能力进行了非正式和正式分析,并进行了性能评估。结果表明,与最新成果相比,TAVA 中相互认证的计算开销最多减少了 89%。
{"title":"TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers","authors":"Qingwen Han ,&nbsp;Tianlin Yang ,&nbsp;Yao Li ,&nbsp;Yongsheng Zhao ,&nbsp;Shuai Zhang ,&nbsp;Guoqiang Zu","doi":"10.1016/j.adhoc.2024.103666","DOIUrl":"10.1016/j.adhoc.2024.103666","url":null,"abstract":"<div><p>The widespread deployment of Electric vehicles (EVs) leads to an increasing demand for charging piles and corresponding charging service (CS) from CS providers (CSPs). Pseudonym-based authentication mechanisms have been designed to resist the attacks which exploit the charging-authentication information to infer EV users’ identities and their driving routes. However, these existing mechanisms generated EV users' pseudonyms by relying on a trusted third entity, which affects the authentication system's resilience and EV user privacy-preservation.</p><p>To this end, this paper proposes a <em>T</em>raceable <em>A</em>nonymity-self-controllable <em>V</em>2X <em>A</em>uthentication (TAVA) scheme for the multiple-CSP (forming a CSP set) scenario, where each CSP independently manages its own CPs and a CSP randomly joins or leaves the CSP set. TAVA has a series of security capabilities. (1) First, it allows the mutual authentication between an EV user and a CP, while preserving EV user privacy and also assuring forward and backward security. This capability is achieved by using the multi-party computation technique to let all CSPs join the process of generating EV-users’ credentials but each CSP knows nothing about the credentials. (2) Secondly, TAVA has the capabilities of self-controllable anonymity and unlinkability by allowing each EV user to self-generate verifiable and unlinkable one-time pseudonyms based on bilinear- mapping technique. (3) At last, each EV user under TAVA is traceable. It is achieved by applying the two-factor authentication technique in TAVA and linking the one-time pseudonym to the two factors, namely, the credential and the EV user's biometric characteristics with low entropy rates. Note that all these security capabilities are achieved with less performance degradation in terms of communication and storage overheads in the dynamic environment. We conduct the informal and formal analysis of security capabilities and also make performance evaluations. The results indicate that, compared with the latest works, the computation overhead of the mutual authentication in TAVA is reduced by up to 89 %.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103666"},"PeriodicalIF":4.4,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks 基于 RL 的移动边缘计算方案,为无人机辅助的 IIoT 网络提供高可靠性低延迟服务
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.adhoc.2024.103646
Zahraa Sweidan , Sanaa Sharafeddine , Mariette Awad

The prevailing adoption of Internet of Things paradigm is giving rise to a wide range of use cases in various vertical industries including remote health, industrial automation, and smart agriculture. However, the realization of such use cases is mainly challenged due to their stringent service requirements of high reliability and low latency. This challenge grows further when the service entails processing collected data for informed decision making. In this work, we consider a field of industrial Internet of Things devices that generate computational tasks and are covered by a nearby base station equipped with an edge server. The edge server offers fast processing to the devices’ tasks to help in meeting their latency requirement. Due to statistical wireless variability, the task data may not be correctly delivered in time for processing. To this end, we utilize an unmanned aerial vehicle as a supplemental edge server that tailors its trajectory and flies closer to the IIoT devices to ensure a highly reliable task delivery based on the given task reliability constraints. We formulate the problem as a Markov Decision Process, and propose a deep reinforcement learning-based approach using proximal policy optimization to optimize the unmanned aerial vehicle trajectory and scheduling devices to offload their data for processing. We present simulation results for various system scenarios to illustrate the effectiveness of the proposed solution as compared to several baseline approaches.

物联网范例的普遍采用正在催生各种垂直行业的广泛用例,包括远程医疗、工业自动化和智能农业。然而,这些用例的实现主要面临着高可靠性和低延迟的严格服务要求。当服务需要处理收集到的数据以做出明智决策时,这一挑战就会进一步加大。在这项工作中,我们考虑了工业物联网设备领域,这些设备会产生计算任务,并由附近配备边缘服务器的基站覆盖。边缘服务器为设备任务提供快速处理,以帮助满足其延迟要求。由于统计上的无线变异性,任务数据可能无法及时正确交付处理。为此,我们利用无人驾驶飞行器作为补充边缘服务器,调整其飞行轨迹并飞近 IIoT 设备,以确保在给定任务可靠性约束的基础上实现高可靠性的任务交付。我们将该问题表述为马尔可夫决策过程,并提出了一种基于深度强化学习的方法,利用近端策略优化来优化无人飞行器的轨迹,并调度设备卸载其数据以进行处理。我们展示了各种系统场景的仿真结果,以说明与几种基线方法相比,所提解决方案的有效性。
{"title":"RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks","authors":"Zahraa Sweidan ,&nbsp;Sanaa Sharafeddine ,&nbsp;Mariette Awad","doi":"10.1016/j.adhoc.2024.103646","DOIUrl":"10.1016/j.adhoc.2024.103646","url":null,"abstract":"<div><p>The prevailing adoption of Internet of Things paradigm is giving rise to a wide range of use cases in various vertical industries including remote health, industrial automation, and smart agriculture. However, the realization of such use cases is mainly challenged due to their stringent service requirements of high reliability and low latency. This challenge grows further when the service entails processing collected data for informed decision making. In this work, we consider a field of industrial Internet of Things devices that generate computational tasks and are covered by a nearby base station equipped with an edge server. The edge server offers fast processing to the devices’ tasks to help in meeting their latency requirement. Due to statistical wireless variability, the task data may not be correctly delivered in time for processing. To this end, we utilize an unmanned aerial vehicle as a supplemental edge server that tailors its trajectory and flies closer to the IIoT devices to ensure a highly reliable task delivery based on the given task reliability constraints. We formulate the problem as a Markov Decision Process, and propose a deep reinforcement learning-based approach using proximal policy optimization to optimize the unmanned aerial vehicle trajectory and scheduling devices to offload their data for processing. We present simulation results for various system scenarios to illustrate the effectiveness of the proposed solution as compared to several baseline approaches.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103646"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks PLLM-CS:用于卫星网络网络威胁检测的预训练大型语言模型(LLM)
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.adhoc.2024.103645
Mohammed Hassanin , Marwa Keshk , Sara Salim , Majid Alsubaie , Dharmendra Sharma

Satellite networks are vital in facilitating communication services for various critical infrastructures. These networks can seamlessly integrate with a diverse array of systems. However, some of these systems are vulnerable due to the absence of effective intrusion detection systems, which can be attributed to limited research and the high costs associated with deploying, fine-tuning, monitoring, and responding to security breaches. To address these challenges, we propose a pre-trained Large Language Model for Cyber Security, for short PLLM-CS, which is a variant of pre-trained Transformers, which includes a specialized module for transforming network data into contextually suitable inputs. This transformation enables the proposed LLM to encode contextual information within the cyber data. To validate the efficacy of the proposed method, we conducted empirical experiments using two publicly available network datasets, UNSW_NB 15 and TON_IoT, both providing Internet of Things (IoT)-based traffic data. Our experiments demonstrate that proposed LLM method outperforms state-of-the-art techniques such as BiLSTM, GRU, and CNN. Notably, the PLLM-CS method achieves an outstanding accuracy level of 100% on the UNSW_NB 15 dataset, setting a new standard for benchmark performance in this domain.

卫星网络对促进各种关键基础设施的通信服务至关重要。这些网络可以与各种系统无缝集成。然而,由于缺乏有效的入侵检测系统,其中一些系统很容易受到攻击,原因可能是研究有限,以及与部署、微调、监控和应对安全漏洞相关的成本高昂。为了应对这些挑战,我们提出了一种预训练的网络安全大型语言模型(简称 PLLM-CS),它是预训练 Transformers 的一种变体,其中包括一个专门模块,用于将网络数据转换为适合上下文的输入。这种转换使拟议的 LLM 能够对网络数据中的上下文信息进行编码。为了验证所提方法的有效性,我们使用两个公开网络数据集(UNSW_NB 15 和 TON_IoT)进行了实证实验,这两个数据集都提供了基于物联网(IoT)的流量数据。实验证明,所提出的 LLM 方法优于 BiLSTM、GRU 和 CNN 等最先进的技术。值得注意的是,PLLM-CS 方法在 UNSW_NB 15 数据集上达到了 100% 的出色准确率水平,为该领域的基准性能设定了新标准。
{"title":"PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks","authors":"Mohammed Hassanin ,&nbsp;Marwa Keshk ,&nbsp;Sara Salim ,&nbsp;Majid Alsubaie ,&nbsp;Dharmendra Sharma","doi":"10.1016/j.adhoc.2024.103645","DOIUrl":"10.1016/j.adhoc.2024.103645","url":null,"abstract":"<div><p>Satellite networks are vital in facilitating communication services for various critical infrastructures. These networks can seamlessly integrate with a diverse array of systems. However, some of these systems are vulnerable due to the absence of effective intrusion detection systems, which can be attributed to limited research and the high costs associated with deploying, fine-tuning, monitoring, and responding to security breaches. To address these challenges, we propose a pre-trained Large Language Model for Cyber Security, for short PLLM-CS, which is a variant of pre-trained Transformers, which includes a specialized module for transforming network data into contextually suitable inputs. This transformation enables the proposed LLM to encode contextual information within the cyber data. To validate the efficacy of the proposed method, we conducted empirical experiments using two publicly available network datasets, UNSW_NB 15 and TON_IoT, both providing Internet of Things (IoT)-based traffic data. Our experiments demonstrate that proposed LLM method outperforms state-of-the-art techniques such as BiLSTM, GRU, and CNN. Notably, the PLLM-CS method achieves an outstanding accuracy level of 100% on the UNSW_NB 15 dataset, setting a new standard for benchmark performance in this domain.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103645"},"PeriodicalIF":4.4,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-context-aware approach for navigation: A case study for vehicular route recommendation 双情境感知导航方法:车辆路线推荐案例研究
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.adhoc.2024.103655
Rafael S. Barbon , Edmundo R.M. Madeira , Ademar T. Akabane

In contemporary urban environments, route recommendation systems have become an indispensable tool in moving the population from large centers, serving as valuable resources for circumventing traffic congestion. Enhancing vehicular traffic flow through strategic route adjustments is a pivotal element in improving traffic mobility. However, depending exclusively on traffic-related data for route recommendations fails to meet the essential criteria for ensuring effective management and safety for drivers and passengers during travel. Thus, context awareness and traffic data are crucial for enhancing efficiency and safety in traffic management. Our study proposes a two-context-aware approach to recommend safe routes for urban traffic management, considering road safety and travel time. Experiments were carried out using the widely recognized tool — HERE Navigation. Comparatively, our approach signifies a progressive stride in balancing mobility and security when contrasted with a single focus on travel time.

在当代城市环境中,路线推荐系统已成为大型中心城市人口流动不可或缺的工具,是规避交通拥堵的宝贵资源。通过战略性路线调整提高车辆交通流量是改善交通流动性的关键因素。然而,仅仅依靠交通相关数据来提供路线建议,并不能满足确保有效管理和驾乘人员出行安全的基本标准。因此,情境感知和交通数据对于提高交通管理的效率和安全性至关重要。我们的研究提出了一种双情境感知方法,在考虑道路安全和旅行时间的情况下,为城市交通管理推荐安全路线。我们使用广受认可的工具 HERE 导航进行了实验。与只关注出行时间的方法相比,我们的方法在平衡机动性和安全性方面取得了长足进步。
{"title":"A two-context-aware approach for navigation: A case study for vehicular route recommendation","authors":"Rafael S. Barbon ,&nbsp;Edmundo R.M. Madeira ,&nbsp;Ademar T. Akabane","doi":"10.1016/j.adhoc.2024.103655","DOIUrl":"10.1016/j.adhoc.2024.103655","url":null,"abstract":"<div><p>In contemporary urban environments, route recommendation systems have become an indispensable tool in moving the population from large centers, serving as valuable resources for circumventing traffic congestion. Enhancing vehicular traffic flow through strategic route adjustments is a pivotal element in improving traffic mobility. However, depending exclusively on traffic-related data for route recommendations fails to meet the essential criteria for ensuring effective management and safety for drivers and passengers during travel. Thus, context awareness and traffic data are crucial for enhancing efficiency and safety in traffic management. Our study proposes a two-context-aware approach to recommend safe routes for urban traffic management, considering road safety and travel time. Experiments were carried out using the widely recognized tool — HERE Navigation. Comparatively, our approach signifies a progressive stride in balancing mobility and security when contrasted with a single focus on travel time.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103655"},"PeriodicalIF":4.4,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400266X/pdfft?md5=a85e68699e4c9d590fd509b0f69d7794&pid=1-s2.0-S157087052400266X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks 高移动性车载多接入边缘计算网络中资源分配管理和多任务卸载的联合优化
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1016/j.adhoc.2024.103656
Hong Min , Amir Masoud Rahmani , Payam Ghaderkourehpaz , Komeil Moghaddasi , Mehdi Hosseinzadeh

Vehicular communications have advanced data exchange and real-time services in intelligent transportation systems by exploiting advanced communication between vehicles and infrastructure. The emergence of Multi-access Edge Computing (MEC) has further elevated this field by utilizing distributed edge resources near vehicles for low-latency data processing and high-reliability communication. In this dynamic environment, adequate resource allocation and task offloading are pivotal to ensure superior performance, lower latency, and efficient network resource utilization, enhancing Quality of Service (QoS) and overall driving experience and safety. This paper presents a developed vehicular network and offloading mechanism, introducing a resource management model with real-time allocation and load balancing. The proposed method integrates task prioritization, multi-agent collaboration, context-aware decision-making, and distributed learning to optimize network performance. The introduced optimized algorithm initializes Q-networks and target networks, sets up an experience replay buffer, and configures agents with local state representations. Agents use an ε-greedy policy for action selection, update Q-values through experience replay, and prioritize tasks based on urgency while sharing state information for collaborative decision-making. Evaluations through simulation demonstrate optimized performance, enhancing efficiency in vehicular MEC networks compared to baseline and the other well-known algorithms.

通过利用车辆与基础设施之间的先进通信,车载通信推进了智能交通系统中的数据交换和实时服务。通过利用车辆附近的分布式边缘资源进行低延迟数据处理和高可靠性通信,多接入边缘计算(MEC)的出现进一步提升了这一领域。在这种动态环境中,适当的资源分配和任务卸载对于确保卓越性能、较低延迟和高效网络资源利用、提高服务质量(QoS)以及整体驾驶体验和安全性至关重要。本文介绍了一种开发的车载网络和卸载机制,引入了一种具有实时分配和负载平衡功能的资源管理模型。所提出的方法整合了任务优先级、多代理协作、情境感知决策和分布式学习,以优化网络性能。引入的优化算法会初始化 Q 网络和目标网络,建立经验重放缓冲区,并配置具有本地状态表示的代理。代理使用ε-贪婪策略进行行动选择,通过经验回放更新Q值,并根据紧迫性确定任务的优先级,同时共享状态信息以进行协同决策。通过仿真进行的评估表明,与基线算法和其他著名算法相比,该算法性能优化,提高了车辆 MEC 网络的效率。
{"title":"A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks","authors":"Hong Min ,&nbsp;Amir Masoud Rahmani ,&nbsp;Payam Ghaderkourehpaz ,&nbsp;Komeil Moghaddasi ,&nbsp;Mehdi Hosseinzadeh","doi":"10.1016/j.adhoc.2024.103656","DOIUrl":"10.1016/j.adhoc.2024.103656","url":null,"abstract":"<div><p>Vehicular communications have advanced data exchange and real-time services in intelligent transportation systems by exploiting advanced communication between vehicles and infrastructure. The emergence of Multi-access Edge Computing (MEC) has further elevated this field by utilizing distributed edge resources near vehicles for low-latency data processing and high-reliability communication. In this dynamic environment, adequate resource allocation and task offloading are pivotal to ensure superior performance, lower latency, and efficient network resource utilization, enhancing Quality of Service (QoS) and overall driving experience and safety. This paper presents a developed vehicular network and offloading mechanism, introducing a resource management model with real-time allocation and load balancing. The proposed method integrates task prioritization, multi-agent collaboration, context-aware decision-making, and distributed learning to optimize network performance. The introduced optimized algorithm initializes Q-networks and target networks, sets up an experience replay buffer, and configures agents with local state representations. Agents use an ε-greedy policy for action selection, update Q-values through experience replay, and prioritize tasks based on urgency while sharing state information for collaborative decision-making. Evaluations through simulation demonstrate optimized performance, enhancing efficiency in vehicular MEC networks compared to baseline and the other well-known algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103656"},"PeriodicalIF":4.4,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain gesture recognition via WiFi signals with deep learning 利用深度学习通过 WiFi 信号进行跨域手势识别
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.adhoc.2024.103654
Baogang Li , Jiale Chen , Xinlong Yu , Zhi Yang , Jingxi Zhang

Compared with systems rely on wearable sensors, cameras or other devices, WiFi-based gesture recognition systems are convenient, non-contact and privacy-friendly, which have received widespread attention in recent years. In WiFi-based gesture recognition systems, the channel state information (CSI) carried by WiFi signals contains fine-grained information, which is commonly used to extract features of gesture activities. However, since the CSI patterns of the same gesture change across domains, these gesture recognition systems cannot effectively work without retraining in new domains, which will hinder the practical adoption of gesture recognition systems. Therefore, we propose a novel gesture recognition system that can address the issue of cross-domain recognition while achieving higher recognition accuracy for in-domain scenarios. Firstly, we employ CSI ratio and subcarrier selection to effectively eliminate noise from the CSI, and propose a method to reconstruct CSI sequence using low-frequency signals, which can effectively remove irrelevant noise in the high-frequency part and ensure the validity of the data. Next, we calculate the phase difference to explore the intrinsic features of gesture and convert the obtained data into RGB image. Finally, we use Dense Convolutional Network as backbone network, combined with dynamic convolution module, for RGB image recognition. Extensive experiments demonstrate that our proposed system can achieve 99.58% in-domain gesture recognition, and its performance across new person and orientations is 99.15% and 98.31%, respectively.

与依赖可穿戴传感器、摄像头或其他设备的系统相比,基于 WiFi 的手势识别系统具有便捷、非接触、隐私友好等特点,近年来受到广泛关注。在基于 WiFi 的手势识别系统中,WiFi 信号携带的信道状态信息(CSI)包含细粒度信息,通常用于提取手势活动的特征。然而,由于同一手势在不同领域的 CSI 模式会发生变化,这些手势识别系统如果不在新领域进行再训练,就无法有效工作,这将阻碍手势识别系统的实际应用。因此,我们提出了一种新型手势识别系统,既能解决跨域识别问题,又能在域内场景中实现更高的识别准确率。首先,我们利用 CSI 比值和子载波选择来有效消除 CSI 中的噪声,并提出了一种利用低频信号重构 CSI 序列的方法,可以有效去除高频部分的无关噪声,确保数据的有效性。接下来,我们通过计算相位差来探索手势的内在特征,并将获得的数据转换为 RGB 图像。最后,我们使用密集卷积网络(Dense Convolutional Network)作为骨干网络,结合动态卷积模块,实现 RGB 图像识别。大量实验证明,我们提出的系统可以达到 99.58% 的域内手势识别率,其跨新人物和新方向的识别率分别为 99.15% 和 98.31%。
{"title":"Cross-domain gesture recognition via WiFi signals with deep learning","authors":"Baogang Li ,&nbsp;Jiale Chen ,&nbsp;Xinlong Yu ,&nbsp;Zhi Yang ,&nbsp;Jingxi Zhang","doi":"10.1016/j.adhoc.2024.103654","DOIUrl":"10.1016/j.adhoc.2024.103654","url":null,"abstract":"<div><p>Compared with systems rely on wearable sensors, cameras or other devices, WiFi-based gesture recognition systems are convenient, non-contact and privacy-friendly, which have received widespread attention in recent years. In WiFi-based gesture recognition systems, the channel state information (CSI) carried by WiFi signals contains fine-grained information, which is commonly used to extract features of gesture activities. However, since the CSI patterns of the same gesture change across domains, these gesture recognition systems cannot effectively work without retraining in new domains, which will hinder the practical adoption of gesture recognition systems. Therefore, we propose a novel gesture recognition system that can address the issue of cross-domain recognition while achieving higher recognition accuracy for in-domain scenarios. Firstly, we employ CSI ratio and subcarrier selection to effectively eliminate noise from the CSI, and propose a method to reconstruct CSI sequence using low-frequency signals, which can effectively remove irrelevant noise in the high-frequency part and ensure the validity of the data. Next, we calculate the phase difference to explore the intrinsic features of gesture and convert the obtained data into RGB image. Finally, we use Dense Convolutional Network as backbone network, combined with dynamic convolution module, for RGB image recognition. Extensive experiments demonstrate that our proposed system can achieve 99.58% in-domain gesture recognition, and its performance across new person and orientations is 99.15% and 98.31%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103654"},"PeriodicalIF":4.4,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1