首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms 利用无人机群实现农村地区超可靠低延迟通信
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1016/j.adhoc.2024.103603

Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.

对于依赖互联网的各种应用(如 IP 语音(VoIP)或电话会议)来说,延迟是一个至关重要的方面,即使在成熟经济体的农村地区,缺乏超高速和高可靠性通信的问题也很突出。我们的建议侧重于优化微服务导向架构(MSA)在支持计算和路由的无人驾驶飞行器(UAV)中的部署。为此,我们开发了一个信息系统,用于收集飞行临时网络(FANET)的所有信息。在此基础上,我们提出了基于整数线性规划(ILP)和启发式的多种方法,通过在无人飞行器中部署多个微服务实例来最大限度地减少端到端延迟,因为无人飞行器离使用它们的用户很近。基于网络模拟的大量实验证明了我们对问题的 ILP 表述的性能,并解决了基于 ILP 的方法与启发式方法之间的优化差距,这种方法具有高度可扩展性,可实时用于大规模场景。
{"title":"Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms","authors":"","doi":"10.1016/j.adhoc.2024.103603","DOIUrl":"10.1016/j.adhoc.2024.103603","url":null,"abstract":"<div><p>Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002142/pdfft?md5=954d5bdc1eb5189baec918aa54fbcb74&pid=1-s2.0-S1570870524002142-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring mobile applications usage from DNS traffic 从 DNS 流量推断移动应用程序的使用情况
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1016/j.adhoc.2024.103601

In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.

在数字时代,我们的生活与移动应用程序的日常使用密不可分。因此,我们产生并传输了大量个人数据,这些数据会危及我们的隐私。尽管有加密通信,但 DNS 流量通常没有加密,因此有可能从移动应用程序产生的流量中提取有价值的信息。本研究的重点是分析移动应用跟踪中发现的 DNS 流量行为,并开发出一种能够根据移动应用查询的域名来识别移动应用的方法。利用这种方法,我们能够以 98% 的准确率识别应用程序。此外,我们还通过识别其他独立数据集的痕迹,验证了通过一个数据集获得的特征描述的有效性。评估结果表明,该方法在识别移动应用程序方面取得了成功。
{"title":"Inferring mobile applications usage from DNS traffic","authors":"","doi":"10.1016/j.adhoc.2024.103601","DOIUrl":"10.1016/j.adhoc.2024.103601","url":null,"abstract":"<div><p>In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002129/pdfft?md5=b9892553e1c370ae53ebbd8a9ac2a96c&pid=1-s2.0-S1570870524002129-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs DBCPCA:面向 VANET 的双层区块链辅助条件式隐私保护跨域认证
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1016/j.adhoc.2024.103600

Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.

确保 VANET 中参与实体之间的安全认证已成为一项严峻挑战。大多数现有方案主要考虑单个管理域的身份验证问题,存在各种局限性,包括隐私保护和恶意实体跟踪。本文提出了一种双层区块链辅助的有条件隐私保护跨域身份验证方案(DBCPCA),利用区块链技术和无证书签名来应对这些挑战。在 DBCPCA 中,上层区块链用于跨域身份验证,在多个不同的管理域之间共享域间信息。下层区块链用于域内身份验证。在 DBCPCA 中,我们还引入了匿名机制,以保护车辆的真实身份,同时使系统能够追踪恶意车辆,从而解决保护隐私的条件问题。此外,对所提出方案的安全性分析表明,该方案能够满足我们指定的安全目标。最后,我们与 BCPPA 和 BCGS 等最相关的解决方案进行了详细的实验比较。结果表明,在签名生成阶段,DBCPCA 方案比 BCPPA 方案至少减少了 66.68% 的时间成本。在签名验证阶段,DBCPCA 方案比 BCGS 方案至少减少了 62.39% 的时间成本。
{"title":"DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs","authors":"","doi":"10.1016/j.adhoc.2024.103600","DOIUrl":"10.1016/j.adhoc.2024.103600","url":null,"abstract":"<div><p>Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141693143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles 基于图像的无人机 GPS 欺骗网络攻击入侵检测系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1016/j.adhoc.2024.103597

The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.

无人驾驶飞行器(UAVs)的运行很容易受到网络安全风险的影响,这主要是因为它们完全依赖于全球定位系统(GPS)和射频(RF)传感器。全球定位系统和射频传感器容易受到潜在的威胁,如欺骗攻击,这会导致无人机行为异常。由于这些威胁普遍存在,而且十分强大,因此开发有效的入侵检测系统势在必行。在本文中,我们提出了一种基于图像的入侵检测系统,用于检测基于深度学习方法的 GPS 欺骗网络攻击。我们将卷积神经网络与主成分分析(PCA)相结合,以降低数据集特征的维度;将数据扩增与迁移学习相结合,以增加训练数据集的规模和多样性;将迁移学习与有限数据相结合,以提高所提模型的性能,从而设计出一种快速、准确、通用的方法。广泛的数值实验证明了利用基准数据集提出的解决方案的有效性。我们在 0.3529 毫秒延迟、120.64 秒运行时间和 2.035 秒检测时间内实现了 100% 的准确率。此外,利用这个训练有素的模型,我们在一个与模型训练无关的未见数据集上,在 2.721 秒的检测时间内取得了 99.25% 的准确率。相比之下,Inception-v3 等其他模型在未知数据集上的准确率较低。不过,经过贝叶斯优化后,Inception-v3 的性能有了显著提高,树状结构 Parzen 估算器的准确率达到了 99.06%。我们的研究结果表明,所提出的基于图像的入侵检测方法优于现有的解决方案,同时还为检测未见数据集中的网络攻击提供了一个通用模型。
{"title":"Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles","authors":"","doi":"10.1016/j.adhoc.2024.103597","DOIUrl":"10.1016/j.adhoc.2024.103597","url":null,"abstract":"<div><p>The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002087/pdfft?md5=d30620521269b235094b2feafd0ab331&pid=1-s2.0-S1570870524002087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET 用于 VANET 的高效多目标无人机辅助 RSU 部署(MOURD)方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1016/j.adhoc.2024.103598

A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU & UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.

路边装置(RSU)是车载 Ad Hoc 网络(VANET)的重要基础设施,通过为车辆用户、驾驶员和行人提供安全服务、共享存储和增强的互联网连接,支持实现智能交通系统(ITS)的目标。此外,VANET 在网络服务实用性和延迟方面的效率取决于这些 RSU 在网络拓扑结构中的相对位置。现有的 RSU 部署方法大多只有一个目标,即提高网络服务效用或尽量减少延迟。例如,一些研究建议在高流量路段部署 RSU,这样可以提高网络服务效用,但会导致更高的延迟。相反,一些研究建议将 RSU 部署在交通流量较小的路段,这样可以最大限度地减少网络延迟,但网络服务效用也会降低。因此,在 VANET 中,这两个相互冲突的目标之间存在着权衡,没有一项研究能同时解决这两个目标。为了实现这两个目标之间的平衡,本文提出了一种多目标无人机辅助 RSU 部署(MOURD)方案,利用无人机(UAV)提高 VANET 的效率。MOURD 方案静态地将 RSU 部署在交通流量大的路段,动态地将无人机调度到交通流量小的路段,以促进无缝网络覆盖并最大限度地减少整体网络延迟。对印度德里道路网络的仿真结果表明,与其他基准 RSU & 和无人机部署方法相比,拟议的 MOURD 方案非常有效。MOURD 方案在车辆连接时间、数据包交付率、吞吐量和延迟方面的平均表现分别优于其他方案 17.42%、13.29%、15.67% 和 6.23%。
{"title":"An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET","authors":"","doi":"10.1016/j.adhoc.2024.103598","DOIUrl":"10.1016/j.adhoc.2024.103598","url":null,"abstract":"<div><p>A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU &amp; UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic spectrum access for Internet-of-Things with joint GNN and DQN 联合 GNN 和 DQN 的物联网动态频谱接入
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.adhoc.2024.103596

With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.

随着物联网(IoT)设备接入需求的快速增长,有效利用频谱资源已成为确保可靠通信的关键挑战。传统的动态频谱接入方法在设备接入过多、信道减少和信道质量下降时效率低下。本文提出了一种基于图神经网络(GNN)和深度 Q 网络(DQN)融合算法的动态频谱接入方法,在提高频谱接入效率的同时保持了良好的接入成功率。与传统的 DQN 相比,计算时间可减少 35% 以上。我们的方法首先使用 GNN 与环境交互,预测物联网频谱环境的状态。随后,利用 DQN 的目标网络、经验回放和强化学习技术,根据这些预测状态选择移动物联网用户的行动,从而实现自动学习和优化频谱访问策略。仿真结果表明,与传统方法相比,基于所提方法的系统模型能以更高的效率运行,同时保持良好的信道接入率和信道质量。
{"title":"Dynamic spectrum access for Internet-of-Things with joint GNN and DQN","authors":"","doi":"10.1016/j.adhoc.2024.103596","DOIUrl":"10.1016/j.adhoc.2024.103596","url":null,"abstract":"<div><p>With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141636873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the quality of service of Opportunistic Mobile Ad Hoc Network routing algorithms on real devices: A software-driven approach 在真实设备上评估机会移动 Ad Hoc 网络路由算法的服务质量:软件驱动方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.adhoc.2024.103591

Opportunistic Mobile Ad Hoc Networks (MANETs) offer versatile solutions in contexts where the Internet is unavailable. These networks facilitate the transmission between endpoints using a store-carry-forward strategy, thereby allowing information to be stored during periods of disconnection. Consequently, selecting the next hop in the routing process becomes a significant challenge for nodes, particularly because of its impact on Quality of Service (QoS). Therefore, routing strategies are crucial in opportunistic MANETs; however, their deployment and evaluation in real scenarios can be challenging. In response to this context, this paper introduces a monitoring software-driven tool designed to evaluate the QoS of routing algorithms in physical opportunistic MANETs. The implementation and its components are detailed, along with a case study and the outcomes provided by an implementation of the proposed solution. The results demonstrate the effectiveness of the implementation in enabling the analysis of routing protocols in real scenarios, highlighting significant differences with simulation results: mobility patterns in simulations tend to be inaccurate and overly optimistic, leading to a higher delivery probability and lower latency than what is observed in the real testbed.

机会移动特设局域网(MANET)为无法使用互联网的情况提供了多功能解决方案。这些网络采用存储-携带-转发策略促进端点之间的传输,从而允许在断开连接期间存储信息。因此,在路由过程中选择下一跳成为节点面临的一个重大挑战,尤其是因为它对服务质量(QoS)的影响。因此,路由策略在机会主义城域网中至关重要;然而,在实际场景中部署和评估路由策略却极具挑战性。针对这种情况,本文介绍了一种监测软件驱动工具,旨在评估物理机会主义城域网中路由算法的 QoS。本文详细介绍了该工具的实施及其组成部分,同时还介绍了一个案例研究以及实施该建议解决方案所取得的成果。结果表明,该实施方案能有效分析真实场景中的路由协议,突出显示了与仿真结果的显著差异:仿真中的移动模式往往不准确且过于乐观,导致与真实测试平台中观察到的结果相比,交付概率更高,延迟更短。
{"title":"Evaluating the quality of service of Opportunistic Mobile Ad Hoc Network routing algorithms on real devices: A software-driven approach","authors":"","doi":"10.1016/j.adhoc.2024.103591","DOIUrl":"10.1016/j.adhoc.2024.103591","url":null,"abstract":"<div><p>Opportunistic Mobile Ad Hoc Networks (MANETs) offer versatile solutions in contexts where the Internet is unavailable. These networks facilitate the transmission between endpoints using a store-carry-forward strategy, thereby allowing information to be stored during periods of disconnection. Consequently, selecting the next hop in the routing process becomes a significant challenge for nodes, particularly because of its impact on Quality of Service (QoS). Therefore, routing strategies are crucial in opportunistic MANETs; however, their deployment and evaluation in real scenarios can be challenging. In response to this context, this paper introduces a monitoring software-driven tool designed to evaluate the QoS of routing algorithms in physical opportunistic MANETs. The implementation and its components are detailed, along with a case study and the outcomes provided by an implementation of the proposed solution. The results demonstrate the effectiveness of the implementation in enabling the analysis of routing protocols in real scenarios, highlighting significant differences with simulation results: mobility patterns in simulations tend to be inaccurate and overly optimistic, leading to a higher delivery probability and lower latency than what is observed in the real testbed.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002026/pdfft?md5=b5858b4584b1baf264ed6cb852f8b0d1&pid=1-s2.0-S1570870524002026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoftWind: Software-defined trajectory correction modelling of gust wind effects on internet of drone things using glowworm swarm optimization SoftWind:利用萤火虫群优化对无人机物联网的阵风效应进行软件定义的轨迹修正建模
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1016/j.adhoc.2024.103577
Arnab Hazra , Debashis De

The dynamic nature of the atmosphere, especially wind gust, poses a crucial challenge to efficient and real-time drone operations. This article presents a novel MQTT based software-defined drone network for trajectory correction of drone flights in gusty wind conditions using Glowworm Swarm Optimization (GSO). By imposing the GSO to the software-defined drone network, our proposed model SoftWind has optimized the navigation and control capabilities of drones by correcting the trajectories in a gusty wind environment. We have analyzed the trajectories and convergence of drones due to wind gusts. As wind disturbances affect the trajectories of drones, we have corrected it by our trajectory correction model and evaluated the direction of the drones must fly to mitigate the wind gust and the resultant velocity compared to the no-wind environment. This study analyzed the trajectories of 100 drone flights due to various wind gust lengths (i.e., 40 m, 10 m, 6 m, and 3 m) for a fixed gust amplitude of 15 m/s and various gust amplitude (i.e., 0 m/s, 5 m/s, 15 m/s, and 40 m/s) for a fixed gust length 5 m. We observed that all the drones are converged to a single point due to low gust length (≤ 5 m) and high gust amplitude (≥ 35 m/s). It is also found that the direction of the drone must fly 28.87°. East of South to mitigate the effect of wind gusts having 10 m gust length and 15 m/s gust amplitude and the resultant velocity of the drone is 22.38 m/s. The result shows that SoftWind reduces the convergence time by 26 %-54 % as compared to other existing models.

大气层的动态特性,尤其是阵风,对无人机的高效和实时运行提出了严峻的挑战。本文介绍了一种基于 MQTT 的新型软件定义无人机网络,该网络利用萤火虫群优化(GSO)技术对阵风条件下的无人机飞行轨迹进行修正。通过将 GSO 应用于软件定义的无人机网络,我们提出的 SoftWind 模型通过修正阵风环境下的飞行轨迹,优化了无人机的导航和控制能力。我们分析了阵风导致的无人机轨迹和收敛情况。由于风扰动会影响无人机的飞行轨迹,我们通过轨迹修正模型对其进行了修正,并评估了无人机为减缓阵风而必须飞行的方向,以及与无风环境相比所产生的速度。这项研究分析了 100 架无人机在不同阵风长度(即 40 米、10 米、6 米和 3 米)、固定阵风振幅为 15 米/秒和不同阵风振幅(即 0 米/秒、5 米/秒、15 米/秒和 40 米/秒)、固定阵风长度为 5 米的情况下的飞行轨迹。同时还发现,无人机的飞行方向必须为 28.87°。南偏东 28.87°,以减轻阵风长度为 10 米、阵风振幅为 15 米/秒的阵风的影响,无人机的速度为 22.38 米/秒。结果表明,与其他现有模型相比,SoftWind 缩短了 26 %-54 % 的收敛时间。
{"title":"SoftWind: Software-defined trajectory correction modelling of gust wind effects on internet of drone things using glowworm swarm optimization","authors":"Arnab Hazra ,&nbsp;Debashis De","doi":"10.1016/j.adhoc.2024.103577","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103577","url":null,"abstract":"<div><p>The dynamic nature of the atmosphere, especially wind gust, poses a crucial challenge to efficient and real-time drone operations. This article presents a novel MQTT based software-defined drone network for trajectory correction of drone flights in gusty wind conditions using Glowworm Swarm Optimization (GSO). By imposing the GSO to the software-defined drone network, our proposed model SoftWind has optimized the navigation and control capabilities of drones by correcting the trajectories in a gusty wind environment. We have analyzed the trajectories and convergence of drones due to wind gusts. As wind disturbances affect the trajectories of drones, we have corrected it by our trajectory correction model and evaluated the direction of the drones must fly to mitigate the wind gust and the resultant velocity compared to the no-wind environment. This study analyzed the trajectories of 100 drone flights due to various wind gust lengths (i.e., 40 m, 10 m, 6 m, and 3 m) for a fixed gust amplitude of 15 m/s and various gust amplitude (i.e., 0 m/s, 5 m/s, 15 m/s, and 40 m/s) for a fixed gust length 5 m. We observed that all the drones are converged to a single point due to low gust length (≤ 5 m) and high gust amplitude (≥ 35 m/s). It is also found that the direction of the drone must fly 28.87°. East of South to mitigate the effect of wind gusts having 10 m gust length and 15 m/s gust amplitude and the resultant velocity of the drone is 22.38 m/s. The result shows that SoftWind reduces the convergence time by 26 %-54 % as compared to other existing models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new priority aware routing protocol for efficient emergency data transmissions in MANETs 城域网中高效紧急数据传输的新型优先级感知路由协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1016/j.adhoc.2024.103592
Yunus Ozen , Goksu Zekiye Ozen

This paper introduces a new priority-aware routing protocol for mobile Ad-hoc networks to be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive use in various domains including military operations, environmental monitoring, healthcare, disaster response, smart transportation systems, unmanned aerial vehicles, and smart homes. During emergencies, communication can be severely restricted or even impossible due to the congestion of physical communication channels and unexpected technical failures in the infrastructure. Mobile Ad-hoc networks offer a solution to maintain continuous and reliable communication under such challenging conditions. In emergency scenarios, it is crucial for any node in the network to promptly deliver urgent messages to the intended destination, especially when certain nodes require ongoing active communication. The proposed routing protocol effectively addresses this requirement through its priority-aware mechanisms. The protocol ensures that nodes not involved in emergency tasks select the least congested route to prevent any delays or disruptions in the transmission of critical emergency data. This approach guarantees seamless communication for emergency nodes while allowing non-emergency nodes to communicate with each other as well. The study proposed in this paper introduces a new priority-aware routing protocol based on AODV for mobile Ad-hoc networks in emergencies. The packet transmission ratio of emergency nodes within the network is improved while maintaining the overall network performance unaffected. The adoption of proposed mechanisms to enhance performance does not necessitate an expansion in the size of data and control packets. These mechanisms do not inflict any supplementary latency or incur packet loss expenses on the network. The proposed protocol has been implemented and evaluated using ns-3 simulation software across various emergency scenarios. The results show that emergency nodes using the proposed protocol, achieve better packet delivery ratios compared to the original AODV, DSR, P-AODV, and AOMDV protocols, with improvements of 10.8%, 15.9%, 6.2%, and 5.9% respectively. This improvement in the packet delivery ratio for emergency data traffic is achieved without causing any disruptions in the overall network communication flow.

本文以 AODV 为基础,为移动 Ad-hoc 网络引入了一种新的优先级感知路由协议,可用于紧急情况下。移动 Ad-hoc 网络广泛应用于军事行动、环境监测、医疗保健、灾难响应、智能交通系统、无人机和智能家居等多个领域。在紧急情况下,由于物理通信信道拥塞和基础设施出现意外技术故障,通信可能会受到严重限制,甚至无法进行。移动 Ad-hoc 网络提供了一种解决方案,可在这种具有挑战性的条件下保持持续可靠的通信。在紧急情况下,网络中的任何节点都必须及时将紧急信息传送到预定目的地,尤其是当某些节点需要持续进行主动通信时。拟议的路由协议通过优先感知机制有效地满足了这一要求。该协议确保不参与紧急任务的节点选择拥堵最少的路由,以防止关键紧急数据传输出现任何延迟或中断。这种方法既保证了紧急节点的无缝通信,又允许非紧急节点相互通信。本文提出的研究介绍了一种基于 AODV 的新优先级感知路由协议,适用于紧急情况下的移动 Ad-hoc 网络。在保持网络整体性能不受影响的情况下,提高了网络内紧急节点的数据包传输率。采用建议的机制来提高性能并不需要扩大数据包和控制包的大小。这些机制不会对网络造成任何额外的延迟或数据包丢失费用。我们使用 ns-3 仿真软件在各种紧急情况下对所提出的协议进行了实施和评估。结果表明,与最初的 AODV、DSR、P-AODV 和 AOMDV 协议相比,使用拟议协议的紧急节点能实现更好的数据包传送率,分别提高了 10.8%、15.9%、6.2% 和 5.9%。紧急数据流量数据包传输率的提高不会对整个网络通信流造成任何干扰。
{"title":"A new priority aware routing protocol for efficient emergency data transmissions in MANETs","authors":"Yunus Ozen ,&nbsp;Goksu Zekiye Ozen","doi":"10.1016/j.adhoc.2024.103592","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103592","url":null,"abstract":"<div><p>This paper introduces a new priority-aware routing protocol for mobile Ad-hoc networks to be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive use in various domains including military operations, environmental monitoring, healthcare, disaster response, smart transportation systems, unmanned aerial vehicles, and smart homes. During emergencies, communication can be severely restricted or even impossible due to the congestion of physical communication channels and unexpected technical failures in the infrastructure. Mobile Ad-hoc networks offer a solution to maintain continuous and reliable communication under such challenging conditions. In emergency scenarios, it is crucial for any node in the network to promptly deliver urgent messages to the intended destination, especially when certain nodes require ongoing active communication. The proposed routing protocol effectively addresses this requirement through its priority-aware mechanisms. The protocol ensures that nodes not involved in emergency tasks select the least congested route to prevent any delays or disruptions in the transmission of critical emergency data. This approach guarantees seamless communication for emergency nodes while allowing non-emergency nodes to communicate with each other as well. The study proposed in this paper introduces a new priority-aware routing protocol based on AODV for mobile Ad-hoc networks in emergencies. The packet transmission ratio of emergency nodes within the network is improved while maintaining the overall network performance unaffected. The adoption of proposed mechanisms to enhance performance does not necessitate an expansion in the size of data and control packets. These mechanisms do not inflict any supplementary latency or incur packet loss expenses on the network. The proposed protocol has been implemented and evaluated using ns-3 simulation software across various emergency scenarios. The results show that emergency nodes using the proposed protocol, achieve better packet delivery ratios compared to the original AODV, DSR, P-AODV, and AOMDV protocols, with improvements of 10.8%, 15.9%, 6.2%, and 5.9% respectively. This improvement in the packet delivery ratio for emergency data traffic is achieved without causing any disruptions in the overall network communication flow.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate and multistep mobile traffic prediction with SLA constraints: A comparative study 具有 SLA 约束条件的多变量和多步骤移动流量预测:比较研究
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.adhoc.2024.103594

This paper proposes a new method for predicting downlink traffic volume in mobile networks, aiming to minimize overprovisioning while meeting specified service-level agreement (SLA) violation rates. We introduce a multivariate and multi-step prediction approach and compare four machine learning (ML) architectures: long short-term memory (LSTM), convolutional neural network (CNN), transformer, and light gradient-boosting machine (LightGBM). Our models predict up to 24 steps ahead and are evaluated under both single-step and multi-step conditions. Additionally, we propose parametric loss functions to adhere to SLA violation rate constraints.

Our results emphasize the importance of using parametric loss functions to meet SLA constraints. We discovered that LSTM when paired with our custom multivariate feature sets, outperforms the transformer architecture in short-term forecasting up to 4 h ahead. For these short-term predictions, we demonstrate that methods based on domain knowledge, like our custom feature sets combined with simpler models such as LSTM, surpass more complex models like transformers. However, for long-term forecasting (8 to 24 h ahead), transformers outperform all other models.

本文提出了一种预测移动网络下行链路流量的新方法,旨在最大限度地减少超额配置,同时满足指定的服务级别协议(SLA)违规率。我们介绍了一种多变量、多步骤预测方法,并比较了四种机器学习(ML)架构:长短期记忆(LSTM)、卷积神经网络(CNN)、变换器和轻梯度提升机(LightGBM)。我们的模型最多可提前 24 步进行预测,并在单步和多步条件下进行了评估。此外,我们还提出了参数损失函数,以遵守 SLA 违反率约束。我们发现,当 LSTM 与我们定制的多变量特征集搭配使用时,它在提前 4 小时以内的短期预测方面优于变压器架构。在这些短期预测中,我们证明了基于领域知识的方法(如我们的自定义特征集与 LSTM 等较简单模型的组合)超越了变压器等较复杂的模型。不过,在长期预测(提前 8 到 24 小时)方面,变换器的表现优于所有其他模型。
{"title":"Multivariate and multistep mobile traffic prediction with SLA constraints: A comparative study","authors":"","doi":"10.1016/j.adhoc.2024.103594","DOIUrl":"10.1016/j.adhoc.2024.103594","url":null,"abstract":"<div><p>This paper proposes a new method for predicting downlink traffic volume in mobile networks, aiming to minimize overprovisioning while meeting specified service-level agreement (SLA) violation rates. We introduce a multivariate and multi-step prediction approach and compare four machine learning (ML) architectures: long short-term memory (LSTM), convolutional neural network (CNN), transformer, and light gradient-boosting machine (LightGBM). Our models predict up to 24 steps ahead and are evaluated under both single-step and multi-step conditions. Additionally, we propose parametric loss functions to adhere to SLA violation rate constraints.</p><p>Our results emphasize the importance of using parametric loss functions to meet SLA constraints. We discovered that LSTM when paired with our custom multivariate feature sets, outperforms the transformer architecture in short-term forecasting up to 4 h ahead. For these short-term predictions, we demonstrate that methods based on domain knowledge, like our custom feature sets combined with simpler models such as LSTM, surpass more complex models like transformers. However, for long-term forecasting (8 to 24 h ahead), transformers outperform all other models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1