首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD) 利用多云环境确保结构化数据安全的混合分片技术(MFT-SSD)
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103625
Rabab Mohamed Nabawy , Mohammed Hassanin , Mohamed Hassan Ibrahim , Mostafa Rabea Kaseb

Large data storage security is a topic of great interest to researchers, particularly in the age of big data where preserving data from theft, unauthorized access, and storage failure has become a crucial concern. To safeguard such data, encryption/decryption approaches have been employed, which are time-consuming and inefficient. The aim of this study is to develop a method, namely Mixed Fragmentation Technique for Securing Structured Data using Multi-Cloud Environment (MFT-SSD), for protecting large-scale data stored in a multi-cloud environment. This prevents insider attacks by adopting a mixed fragmentation approach to split the data into three files. For example, healthcare data is will be distributed among many clouds, each of which stores a partially unrecognized fraction of data without the need for an encryption or decryption layer. Comparing MFT-SSD to various encryption/decryption algorithms, our results show significant improvement; hence, the total performance of big data security is also improved.

大数据存储安全是研究人员非常感兴趣的一个话题,尤其是在大数据时代,防止数据被盗、未经授权的访问和存储故障已成为一个至关重要的问题。为了保护这些数据,人们采用了既耗时又低效的加密/解密方法。本研究旨在开发一种方法,即利用多云环境保护结构化数据安全的混合碎片技术(MFT-SSD),用于保护存储在多云环境中的大规模数据。该技术通过采用混合分片方法将数据分成三个文件,从而防止内部攻击。例如,医疗保健数据将分布在许多云中,每个云都存储了部分未识别的数据,无需加密或解密层。将 MFT-SSD 与各种加密/解密算法进行比较,我们的结果表明,MFT-SSD 有了显著的改进;因此,大数据安全的总体性能也得到了提高。
{"title":"Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD)","authors":"Rabab Mohamed Nabawy ,&nbsp;Mohammed Hassanin ,&nbsp;Mohamed Hassan Ibrahim ,&nbsp;Mostafa Rabea Kaseb","doi":"10.1016/j.adhoc.2024.103625","DOIUrl":"10.1016/j.adhoc.2024.103625","url":null,"abstract":"<div><p>Large data storage security is a topic of great interest to researchers, particularly in the age of big data where preserving data from theft, unauthorized access, and storage failure has become a crucial concern. To safeguard such data, encryption/decryption approaches have been employed, which are time-consuming and inefficient. The aim of this study is to develop a method, namely Mixed Fragmentation Technique for Securing Structured Data using Multi-Cloud Environment (MFT-SSD), for protecting large-scale data stored in a multi-cloud environment. This prevents insider attacks by adopting a mixed fragmentation approach to split the data into three files. For example, healthcare data is will be distributed among many clouds, each of which stores a partially unrecognized fraction of data without the need for an encryption or decryption layer. Comparing MFT-SSD to various encryption/decryption algorithms, our results show significant improvement; hence, the total performance of big data security is also improved.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103625"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An edge computing and distributed ledger technology architecture for secure and efficient transportation 用于安全高效运输的边缘计算和分布式账本技术架构
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103633
Douglas L.L. Moura , Andre L.L. Aquino , Antonio A.F. Loureiro

Intelligent Transportation Systems (ITS) faces significant challenges in achieving its goal of sustainable and efficient transportation. These challenges include real-time data processing bottlenecks caused by high communication latency and security vulnerabilities related to centralized data storage. We propose a novel architecture that leverages Edge Computing and Distributed Ledger Technology (DLT) to address these concerns. Edge computing pushes cloud services, such as vehicles and roadside units, closer to the data source. This strategy reduces latency and network congestion. DLT provides a secure, decentralized platform for storing and sharing ITS data. Its tamper-proof nature ensures data integrity and prevents unauthorized access. Our architecture utilizes these technologies to create a decentralized platform for ITS data management. This platform facilitates secure processing, storage, and data exchange from various sources in the transportation network. This paper delves deeper into the architecture, explaining its essential components and functionalities. Additionally, we explore its potential applications and benefits for ITS. We describe a case study focusing on a data marketplace system for connected vehicles to assess the architecture’s effectiveness. The simulation results show an average latency reduction of 83.35% for publishing and 87.57% for purchasing datasets compared to the cloud architecture. Additionally, transaction processing speed improved by 18.73% and network usage decreased by 96.67%. The proposed architecture also achieves up to 99.61% reduction in mining centralization.

智能交通系统(ITS)在实现可持续和高效交通目标方面面临着巨大挑战。这些挑战包括高通信延迟导致的实时数据处理瓶颈,以及与集中式数据存储相关的安全漏洞。我们提出了一种新型架构,利用边缘计算和分布式账本技术(DLT)来解决这些问题。边缘计算将车辆和路边装置等云服务推近数据源。这种策略可以减少延迟和网络拥塞。DLT 为存储和共享智能交通系统数据提供了一个安全、分散的平台。其防篡改特性可确保数据完整性,防止未经授权的访问。我们的架构利用这些技术为智能交通系统数据管理创建了一个分散式平台。该平台有助于安全处理、存储和交换来自交通网络中各种来源的数据。本文将深入探讨该架构,解释其基本组件和功能。此外,我们还探讨了其在智能交通系统中的潜在应用和优势。我们描述了一个案例研究,重点是互联车辆的数据市场系统,以评估该架构的有效性。模拟结果显示,与云架构相比,发布数据集的平均延迟降低了 83.35%,购买数据集的平均延迟降低了 87.57%。此外,交易处理速度提高了 18.73%,网络使用率降低了 96.67%。所提出的架构还将采矿集中化程度降低了 99.61%。
{"title":"An edge computing and distributed ledger technology architecture for secure and efficient transportation","authors":"Douglas L.L. Moura ,&nbsp;Andre L.L. Aquino ,&nbsp;Antonio A.F. Loureiro","doi":"10.1016/j.adhoc.2024.103633","DOIUrl":"10.1016/j.adhoc.2024.103633","url":null,"abstract":"<div><p>Intelligent Transportation Systems (ITS) faces significant challenges in achieving its goal of sustainable and efficient transportation. These challenges include real-time data processing bottlenecks caused by high communication latency and security vulnerabilities related to centralized data storage. We propose a novel architecture that leverages Edge Computing and Distributed Ledger Technology (DLT) to address these concerns. Edge computing pushes cloud services, such as vehicles and roadside units, closer to the data source. This strategy reduces latency and network congestion. DLT provides a secure, decentralized platform for storing and sharing ITS data. Its tamper-proof nature ensures data integrity and prevents unauthorized access. Our architecture utilizes these technologies to create a decentralized platform for ITS data management. This platform facilitates secure processing, storage, and data exchange from various sources in the transportation network. This paper delves deeper into the architecture, explaining its essential components and functionalities. Additionally, we explore its potential applications and benefits for ITS. We describe a case study focusing on a data marketplace system for connected vehicles to assess the architecture’s effectiveness. The simulation results show an average latency reduction of 83.35% for publishing and 87.57% for purchasing datasets compared to the cloud architecture. Additionally, transaction processing speed improved by 18.73% and network usage decreased by 96.67%. The proposed architecture also achieves up to 99.61% reduction in mining centralization.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103633"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel differentiated coverage-based lifetime metric for wireless sensor networks 基于覆盖范围的新型无线传感器网络寿命指标
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103636
Derya Nurcan-Atceken , Aysegul Altin-Kayhan , Bulent Tavli

This paper delves into optimizing network lifetime (NL) subject to connected-coverage requirement, a pivotal issue for realistic wireless sensor network (WSN) design. A key challenge in designing WSNs consisting of energy-limited sensors is maximizing NL, the time a network remains functional by providing the desired service quality. To this end, we introduce a novel NL metric addressing target-specific coverage requirements that remedies the shortcomings imposed by conventional definitions like first node die (FND) and last node die (LND). In this context, while we want targets to be sensed by multiple sensors for a portion of the network lifetime, we let the periods, during which cells are monitored by at least one sensor, vary. We also allow the ratios of multiple and single tracking times to differ depending on the target and incorporate target-based prioritization in coverage. Moreover, we address role assignment to sensors and propose a selective target-sensor assignment strategy. As such, we aim to reduce redundant data transmissions and hence overall energy consumption in WSNs. We first propose a unique 0-1 mixed integer programming (MIP) model, to analyze the impact of our proposal on optimal WSN performance, precisely. Next, we present comprehensive comparative studies of WSN performance for alternative NL metrics regarding different coverage requirements and priorities across a wide range of parameters. Our test results reveal that by utilizing our novel NL metric total coverage time can be improved significantly, while facilitating more reliable sensing of the target region.

本文探讨了在满足连接覆盖要求的前提下优化网络寿命(NL)的问题,这是现实无线传感器网络(WSN)设计中的一个关键问题。设计由能量有限的传感器组成的 WSN 时面临的一个关键挑战是最大化 NL,即网络通过提供所需的服务质量而保持功能的时间。为此,我们引入了一种新的 NL 指标,以满足特定目标的覆盖要求,弥补了传统定义(如第一个节点死亡(FND)和最后一个节点死亡(LND))的不足。在这种情况下,虽然我们希望目标在网络生命周期的一部分时间内被多个传感器感知,但我们允许至少有一个传感器监测单元的时间段各不相同。我们还允许多个和单个跟踪时间的比例因目标而异,并在覆盖范围中加入基于目标的优先级排序。此外,我们还解决了传感器的角色分配问题,并提出了一种选择性目标-传感器分配策略。因此,我们的目标是减少冗余数据传输,从而降低 WSN 的总体能耗。我们首先提出了一个独特的 0-1 混合整数编程(MIP)模型,以精确分析我们的建议对 WSN 最佳性能的影响。接下来,我们针对不同的覆盖要求和优先级,在广泛的参数范围内对替代 NL 指标的 WSN 性能进行了全面的比较研究。我们的测试结果表明,通过使用我们新颖的 NL 指标,总覆盖时间可以显著改善,同时促进对目标区域更可靠的感知。
{"title":"A novel differentiated coverage-based lifetime metric for wireless sensor networks","authors":"Derya Nurcan-Atceken ,&nbsp;Aysegul Altin-Kayhan ,&nbsp;Bulent Tavli","doi":"10.1016/j.adhoc.2024.103636","DOIUrl":"10.1016/j.adhoc.2024.103636","url":null,"abstract":"<div><p>This paper delves into optimizing network lifetime (NL) subject to connected-coverage requirement, a pivotal issue for realistic wireless sensor network (WSN) design. A key challenge in designing WSNs consisting of energy-limited sensors is maximizing NL, the time a network remains functional by providing the desired service quality. To this end, we introduce a novel NL metric addressing target-specific coverage requirements that remedies the shortcomings imposed by conventional definitions like <em>first node die</em> (FND) and <em>last node die</em> (LND). In this context, while we want targets to be sensed by multiple sensors for a portion of the network lifetime, we let the periods, during which cells are monitored by at least one sensor, vary. We also allow the ratios of multiple and single tracking times to differ depending on the target and incorporate target-based prioritization in coverage. Moreover, we address role assignment to sensors and propose a selective target-sensor assignment strategy. As such, we aim to reduce redundant data transmissions and hence overall energy consumption in WSNs. We first propose a unique 0-1 mixed integer programming (MIP) model, to analyze the impact of our proposal on optimal WSN performance, precisely. Next, we present comprehensive comparative studies of WSN performance for alternative NL metrics regarding different coverage requirements and priorities across a wide range of parameters. Our test results reveal that by utilizing our novel NL metric total coverage time can be improved significantly, while facilitating more reliable sensing of the target region.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103636"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy minimization for IRS-and-UAV-assisted mobile edge computing 最小化 IRS 和无人机辅助移动边缘计算的能耗
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.adhoc.2024.103635
Tingting Li , Yanjun Li , Ping Hu , Yuzhe Chen , Zheng Yin

Intelligent reconfigurable surface (IRS) is an emerging technology for the enhancement of spectrum and energy efficiency. We propose a novel IRS-and-unmanned aerial vehicle (UAV)-Assisted mobile edge computing (MEC) framework, where a MEC server installing on an UAV to facilitate task calculations by mobile users (MUs), and an IRS modulates channels between MUs and the UAV. Non-orthogonal multiple access (NOMA) is employed for further improving system-wide spectral efficiency. There are needs for joint optimization of multiple parameters, e.g., the task partition parameters and the transmit power of all MUs, the reflection coefficient matrix of the IRS and the movement trajectory of the UAV, and such needs raises the challenge of minimizing the long-term total energy consumption of all MUs while satisfying required transmission rate and task completion delay. We divide optimization tasks into two sub-problems and propose specific solutions respectively, i.e., relevant decisions about the UAV and MUs to be solved by deep reinforcement learning (DRL); and the reflection coefficient matrix of the IRS to be solved by block coordinate descent (BCD). A series of experiments have verified the effectiveness of the proposed communication techniques and optimization algorithms. Simulation results demonstrate that (1) NOMA-IRS technique achieves better energy efficacy compared to the cases where random IRS or no IRS is deployed and the conventional orthogonal multiple access (OMA) technique with IRS. (2) our proposed deep deterministic policy gradient (DDPG)-BCD algorithm outperforms other four benchmark algorithms in solving the complex and dynamic optimization problem.

智能可重构表面(IRS)是一种提高频谱和能源效率的新兴技术。我们提出了一种新颖的 IRS-无人机辅助移动边缘计算(MEC)框架,其中 MEC 服务器安装在无人机上,以方便移动用户(MU)进行任务计算,而 IRS 则调制 MU 与无人机之间的信道。为进一步提高整个系统的频谱效率,采用了非正交多址接入(NOMA)技术。需要对多个参数进行联合优化,例如任务分区参数和所有 MU 的发射功率、IRS 的反射系数矩阵和无人机的运动轨迹,这些需求提出了一个挑战,即在满足所需的传输速率和任务完成延迟的同时,最大限度地降低所有 MU 的长期总能耗。我们将优化任务分为两个子问题,并分别提出了具体的解决方案,即通过深度强化学习(DRL)解决无人机和 MU 的相关决策问题;通过块坐标下降(BCD)解决 IRS 的反射系数矩阵问题。一系列实验验证了所提出的通信技术和优化算法的有效性。仿真结果表明:(1) NOMA-IRS 技术与随机部署 IRS 或不部署 IRS 的情况相比,以及与传统的带 IRS 的正交多址(OMA)技术相比,实现了更好的能效。(2) 在解决复杂的动态优化问题时,我们提出的深度确定性策略梯度(DDPG)-BCD 算法优于其他四种基准算法。
{"title":"Energy minimization for IRS-and-UAV-assisted mobile edge computing","authors":"Tingting Li ,&nbsp;Yanjun Li ,&nbsp;Ping Hu ,&nbsp;Yuzhe Chen ,&nbsp;Zheng Yin","doi":"10.1016/j.adhoc.2024.103635","DOIUrl":"10.1016/j.adhoc.2024.103635","url":null,"abstract":"<div><p>Intelligent reconfigurable surface (IRS) is an emerging technology for the enhancement of spectrum and energy efficiency. We propose a novel IRS-and-unmanned aerial vehicle (UAV)-Assisted mobile edge computing (MEC) framework, where a MEC server installing on an UAV to facilitate task calculations by mobile users (MUs), and an IRS modulates channels between MUs and the UAV. Non-orthogonal multiple access (NOMA) is employed for further improving system-wide spectral efficiency. There are needs for joint optimization of multiple parameters, e.g., the task partition parameters and the transmit power of all MUs, the reflection coefficient matrix of the IRS and the movement trajectory of the UAV, and such needs raises the challenge of minimizing the long-term total energy consumption of all MUs while satisfying required transmission rate and task completion delay. We divide optimization tasks into two sub-problems and propose specific solutions respectively, i.e., relevant decisions about the UAV and MUs to be solved by deep reinforcement learning (DRL); and the reflection coefficient matrix of the IRS to be solved by block coordinate descent (BCD). A series of experiments have verified the effectiveness of the proposed communication techniques and optimization algorithms. Simulation results demonstrate that (1) NOMA-IRS technique achieves better energy efficacy compared to the cases where random IRS or no IRS is deployed and the conventional orthogonal multiple access (OMA) technique with IRS. (2) our proposed deep deterministic policy gradient (DDPG)-BCD algorithm outperforms other four benchmark algorithms in solving the complex and dynamic optimization problem.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103635"},"PeriodicalIF":4.4,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges 基于人工智能的移动人群感知和来源解决方案的系统调查:应用和安全挑战
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.adhoc.2024.103634
Ruba Nasser, Rabeb Mizouni, Shakti Singh, Hadi Otrok

Mobile Crowd Sensing/Souring (MCS) is a novel sensing approach that leverages the collective participation of users and their mobile devices to collect sensing data. As large volumes of data get stored and processed by the MCS platform, Artificial Intelligence (AI) techniques are being deployed to make informed decisions that help optimize the system performance. Despite their effectiveness in solving many of the challenges, incorporating AI models in the system introduces many concerns, which could adversely affect its performance. This includes exploiting the vulnerabilities of the models by an adversary to manipulate the data and cause harm to the system. Adversarial Machine Learning (AML) is a field of research that studies attacks and defences against machine learning models. In this study, we conduct a systematic literature review to comprehensively analyze state-of-the-art works that address various aspects of AI-based MCS systems. The review focuses mainly on the applications of AI in different components of MCS, including task allocation and data aggregation, to improve its performance and enhance its security. This work also proposes a novel classification framework that can be adapted to compare works in this domain. This framework can help study AML in the context of MCS, as it facilitates identifying the attack surfaces that adversaries can exploit, and hence highlights the potential vulnerabilities of AI-based MCS systems to adversarial attacks, motivating future research to focus on designing resilient systems.

移动人群传感(MCS)是一种新型传感方法,它利用用户及其移动设备的集体参与来收集传感数据。随着大量数据被 MCS 平台存储和处理,人工智能(AI)技术正被用于做出有助于优化系统性能的明智决策。尽管人工智能技术能有效解决许多挑战,但将人工智能模型纳入系统会带来许多问题,可能会对系统性能产生不利影响。这包括对手利用模型的漏洞来操纵数据并对系统造成伤害。对抗式机器学习(AML)是研究针对机器学习模型的攻击和防御的一个研究领域。在本研究中,我们进行了系统的文献综述,全面分析了解决基于人工智能的监控监系统各方面问题的最新成果。综述主要侧重于人工智能在 MCS 不同组件(包括任务分配和数据聚合)中的应用,以提高其性能并增强其安全性。这项工作还提出了一个新颖的分类框架,可用于比较该领域的工作。这一框架有助于研究反洗钱在监控监听系统中的应用,因为它有助于识别对手可以利用的攻击面,从而突出基于人工智能的监控监听系统在对抗性攻击面前的潜在弱点,促使未来的研究重点放在设计弹性系统上。
{"title":"Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges","authors":"Ruba Nasser,&nbsp;Rabeb Mizouni,&nbsp;Shakti Singh,&nbsp;Hadi Otrok","doi":"10.1016/j.adhoc.2024.103634","DOIUrl":"10.1016/j.adhoc.2024.103634","url":null,"abstract":"<div><p>Mobile Crowd Sensing/Souring (MCS) is a novel sensing approach that leverages the collective participation of users and their mobile devices to collect sensing data. As large volumes of data get stored and processed by the MCS platform, Artificial Intelligence (AI) techniques are being deployed to make informed decisions that help optimize the system performance. Despite their effectiveness in solving many of the challenges, incorporating AI models in the system introduces many concerns, which could adversely affect its performance. This includes exploiting the vulnerabilities of the models by an adversary to manipulate the data and cause harm to the system. Adversarial Machine Learning (AML) is a field of research that studies attacks and defences against machine learning models. In this study, we conduct a systematic literature review to comprehensively analyze state-of-the-art works that address various aspects of AI-based MCS systems. The review focuses mainly on the applications of AI in different components of MCS, including task allocation and data aggregation, to improve its performance and enhance its security. This work also proposes a novel classification framework that can be adapted to compare works in this domain. This framework can help study AML in the context of MCS, as it facilitates identifying the attack surfaces that adversaries can exploit, and hence highlights the potential vulnerabilities of AI-based MCS systems to adversarial attacks, motivating future research to focus on designing resilient systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103634"},"PeriodicalIF":4.4,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things APPS:面向物联网安全数据传输的认证式隐私保护方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.adhoc.2024.103631
Aditya Kaushal Ranjan, Prabhat Kumar

The Internet of Things (IoT) is an emerging field that encompasses several heterogeneous devices and smart objects that are integrated with the network. In open platforms, these objects are deployed to present advanced services in numerous applications. Innumerable security-sensitive data is generated by the IoT device and therefore, the security of these devices is an important task. This work formulates a secure data transfer technique in IoT, named Authentication enabled Privacy Protection (APPS) scheme for resource-constrained IoT devices. The proposed scheme demonstrates resilience against various attacks; such as resisting reply attacks, device anonymity, untracebility, session key establishment, quantum attacks and resisting MITM attacks. For the privacy protection scheme, the secured data transfer is initiated between the entities, like IoT devices, servers, and registration centers, by using various phases, namely registration phase, key generation phase, data encryption, authentication, verification, and data retrieval phase. Here, a mathematical model is designed for protecting data privacy using hashing, encryption, secret keys, etc. Finally, performance of proposed APPS model is analyzed; wherein the outcomes reveal that the proposed APPS model attained the maximum detection rate of 0.85, minimal memory usage of 0.497MB, and minimal computational time of 112. 79 sec and minimal turnaround time 131.91 sec.

物联网(IoT)是一个新兴领域,它包含了多个与网络集成的异构设备和智能物体。在开放平台中,这些物体被部署到众多应用中,提供先进的服务。物联网设备会产生无数对安全敏感的数据,因此,这些设备的安全性是一项重要任务。这项工作为资源受限的物联网设备制定了一种安全的物联网数据传输技术,名为 "认证启用隐私保护(APPS)"方案。所提出的方案能抵御各种攻击,如抵御回复攻击、设备匿名性、不可追踪性、会话密钥建立、量子攻击和抵御 MITM 攻击。在隐私保护方案中,物联网设备、服务器和注册中心等实体之间通过不同阶段(即注册阶段、密钥生成阶段、数据加密、身份验证、验证和数据检索阶段)启动安全数据传输。在此,设计了一个数学模型,利用散列、加密、秘钥等方法保护数据隐私。最后,对所提出的 APPS 模型的性能进行了分析;结果表明,所提出的 APPS 模型的最高检测率为 0.85,内存使用量最小为 0.497MB,计算时间最短为 112.79 秒,最短周转时间为 131.91 秒。
{"title":"APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things","authors":"Aditya Kaushal Ranjan,&nbsp;Prabhat Kumar","doi":"10.1016/j.adhoc.2024.103631","DOIUrl":"10.1016/j.adhoc.2024.103631","url":null,"abstract":"<div><p>The Internet of Things (IoT) is an emerging field that encompasses several heterogeneous devices and smart objects that are integrated with the network. In open platforms, these objects are deployed to present advanced services in numerous applications. Innumerable security-sensitive data is generated by the IoT device and therefore, the security of these devices is an important task. This work formulates a secure data transfer technique in IoT, named Authentication enabled Privacy Protection (APPS) scheme for resource-constrained IoT devices. The proposed scheme demonstrates resilience against various attacks; such as resisting reply attacks, device anonymity, untracebility, session key establishment, quantum attacks and resisting MITM attacks. For the privacy protection scheme, the secured data transfer is initiated between the entities, like IoT devices, servers, and registration centers, by using various phases, namely registration phase, key generation phase, data encryption, authentication, verification, and data retrieval phase. Here, a mathematical model is designed for protecting data privacy using hashing, encryption, secret keys, etc. Finally, performance of proposed APPS model is analyzed; wherein the outcomes reveal that the proposed APPS model attained the maximum detection rate of 0.85, minimal memory usage of 0.497MB, and minimal computational time of 112. 79 sec and minimal turnaround time 131.91 sec.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103631"},"PeriodicalIF":4.4,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles 基于可靠覆盖分析的车联网多目标路边装置部署策略
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.adhoc.2024.103630
Yan Huo , Ruixue Yang , Guanlin Jing , Xiaoxuan Wang , Jian Mao

The deployment of Roadside Units (RSUs) in the Cellular-Vehicle to Everything enabled Internet of Vehicles is crucial for the transition from individual intelligence of vehicles to collective intelligence of vehicle-road collaboration. In this paper, we focus on improving the adaptability of RSU deployment to real scenarios, and optimizing deployment costs and vehicle-oriented service performance. The RSU deployment problem is modeled as a Multi-objective Optimization Problem (MOP), with a cost model integrating the purchase and installation costs, and a service-oriented Quality of Service (QoS) model adopting the total time the RSUs cover the vehicles as the evaluation metric. Specifically, we propose an RSU reliable coverage analysis method based on Packet Delivery Ratio model to estimate the coverage distances in different scenarios, which will be used in QoS calculation. Then, an evolutionary RSU deployment algorithm is designed to solve the MOP. The performance of the proposed method is simulated and discussed in real road network and dynamic scenarios. The results prove that our method outperforms the baseline method in terms of significant cost reduction and total coverage time improvement.

在支持 "蜂窝-车辆-万物互联 "的车联网中部署路侧装置(RSU),对于从车辆的个体智能过渡到车路协同的集体智能至关重要。本文的重点是提高 RSU 部署对实际场景的适应性,优化部署成本和面向车辆的服务性能。RSU 部署问题被建模为多目标优化问题(MOP),其成本模型包括购买和安装成本,而面向服务的服务质量(QoS)模型则采用 RSU 覆盖车辆的总时间作为评估指标。具体来说,我们提出了一种基于数据包传送比模型的 RSU 可靠性覆盖分析方法,以估算不同场景下的覆盖距离,并将其用于 QoS 计算。然后,设计了一种进化式 RSU 部署算法来解决澳门威尼斯人官网作。在真实路网和动态场景中模拟并讨论了所提方法的性能。结果证明,我们的方法在显著降低成本和改善总覆盖时间方面优于基线方法。
{"title":"A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles","authors":"Yan Huo ,&nbsp;Ruixue Yang ,&nbsp;Guanlin Jing ,&nbsp;Xiaoxuan Wang ,&nbsp;Jian Mao","doi":"10.1016/j.adhoc.2024.103630","DOIUrl":"10.1016/j.adhoc.2024.103630","url":null,"abstract":"<div><p>The deployment of Roadside Units (RSUs) in the Cellular-Vehicle to Everything enabled Internet of Vehicles is crucial for the transition from individual intelligence of vehicles to collective intelligence of vehicle-road collaboration. In this paper, we focus on improving the adaptability of RSU deployment to real scenarios, and optimizing deployment costs and vehicle-oriented service performance. The RSU deployment problem is modeled as a Multi-objective Optimization Problem (MOP), with a cost model integrating the purchase and installation costs, and a service-oriented Quality of Service (QoS) model adopting the total time the RSUs cover the vehicles as the evaluation metric. Specifically, we propose an RSU reliable coverage analysis method based on Packet Delivery Ratio model to estimate the coverage distances in different scenarios, which will be used in QoS calculation. Then, an evolutionary RSU deployment algorithm is designed to solve the MOP. The performance of the proposed method is simulated and discussed in real road network and dynamic scenarios. The results prove that our method outperforms the baseline method in terms of significant cost reduction and total coverage time improvement.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103630"},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios 利用 QUIC 中的流调度:无线连接情况下的性能评估
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-12 DOI: 10.1016/j.adhoc.2024.103599
Fátima Fernández , Fátima Khan , Mihail Zverev , Luis Diez , José R. Juárez , Anna Brunstrom , Ramón Agüero

The advent of wireless technologies has led to the development of novel services for end-users, with stringent needs and requirements. High availability, very high throughput, low latency, and reliability are all of them crucial performance parameters. To address these demands, emerging technologies, such as non-terrestrial networks or millimeter wave (mmWave), are being included in 5G and Beyond 5G (B5G) specifications. mmWave enables massive data transmissions, at the expense of a more hostile propagation, typical for high frequency bands. Consequently, the inherent instability of the physical channel significantly affects the upper layers of the protocol stack, resulting in congestion and data losses, which might strongly hinder the overall communication performance. These challenges can be addressed not only at the link layer, but at any affected layer. QUIC is a new transport protocol designed to reduce communications latency in many ways. Among other features, it enables the use of multiple streams to effectively manage data flows sent through its underlying UDP socket. This paper introduces an implementation of priority-based stream schedulers along with the design of a flexible interface. Exploiting the proposed approach, applications are able to set the required scheduling scheme, as well as the stream priorities. The feasibility of the proposed approach is validated through an extensive experiment campaign, which combines Docker containers, the ns-3 simulator and the Mahimahi framework, which is exploited to introduce realistic mmWave channel traces. The results evince that an appropriate stream scheduler can indeed yield lower delays for time-sensitive applications by up to 36% under unreliable conditions.

无线技术的出现促使为终端用户开发新的服务,并提出了严格的需求和要求。高可用性、极高吞吐量、低延迟和可靠性都是至关重要的性能参数。为满足这些需求,非地面网络或毫米波(mmWave)等新兴技术正被纳入 5G 和超越 5G(B5G)技术规范。毫米波可实现海量数据传输,但传播环境更为恶劣,是高频段的典型特征。因此,物理信道固有的不稳定性会严重影响协议栈的上层,导致拥塞和数据丢失,从而严重影响整体通信性能。这些挑战不仅可以在链路层解决,也可以在任何受影响的层上解决。QUIC 是一种新的传输协议,旨在以多种方式减少通信延迟。除其他功能外,它还能使用多数据流来有效管理通过其底层 UDP 套接字发送的数据流。本文介绍了基于优先级的流调度器的实现方法以及灵活接口的设计。利用所提出的方法,应用程序能够设置所需的调度方案以及流优先级。通过广泛的实验活动,结合 Docker 容器、ns-3 模拟器和 Mahimahi 框架,验证了所提方法的可行性。结果表明,在不可靠的条件下,适当的流调度器确实可以将时间敏感型应用的延迟降低 36%。
{"title":"Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios","authors":"Fátima Fernández ,&nbsp;Fátima Khan ,&nbsp;Mihail Zverev ,&nbsp;Luis Diez ,&nbsp;José R. Juárez ,&nbsp;Anna Brunstrom ,&nbsp;Ramón Agüero","doi":"10.1016/j.adhoc.2024.103599","DOIUrl":"10.1016/j.adhoc.2024.103599","url":null,"abstract":"<div><p>The advent of wireless technologies has led to the development of novel services for end-users, with stringent needs and requirements. High availability, very high throughput, low latency, and reliability are all of them crucial performance parameters. To address these demands, emerging technologies, such as non-terrestrial networks or millimeter wave (mmWave), are being included in 5G and Beyond 5G (B5G) specifications. mmWave enables massive data transmissions, at the expense of a more hostile propagation, typical for high frequency bands. Consequently, the inherent instability of the physical channel significantly affects the upper layers of the protocol stack, resulting in congestion and data losses, which might strongly hinder the overall communication performance. These challenges can be addressed not only at the link layer, but at any affected layer. QUIC is a new transport protocol designed to reduce communications latency in many ways. Among other features, it enables the use of multiple streams to effectively manage data flows sent through its underlying UDP socket. This paper introduces an implementation of priority-based stream schedulers along with the design of a flexible interface. Exploiting the proposed approach, applications are able to set the required scheduling scheme, as well as the stream priorities. The feasibility of the proposed approach is validated through an extensive experiment campaign, which combines Docker containers, the ns-3 simulator and the Mahimahi framework, which is exploited to introduce realistic mmWave channel traces. The results evince that an appropriate stream scheduler can indeed yield lower delays for time-sensitive applications by up to 36% under unreliable conditions.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103599"},"PeriodicalIF":4.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002105/pdfft?md5=460c9f73b298581eb5c0a0504f183755&pid=1-s2.0-S1570870524002105-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECMSH: An Energy-efficient and Cost-effective data harvesting protocol for Mobile Sink-based Heterogeneous WSNs using PSO-TVAC ECMSH:利用 PSO-TVAC 为基于移动 Sink 的异构 WSN 制定的高能效、低成本数据采集协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.adhoc.2024.103629
Mahdieh Rahnemay , Leili Farzinvash , Mina Zolfi , Amir Taherkordi

Efficient energy consumption is crucial in Wireless Sensor Networks (WSNs). Uncontrolled energy usage can lead to the hotspot issue, hindering network lifetime and successful packet delivery. Sink mobility has been suggested as a solution, but it comes with challenges such as high data gathering delay and poor packet reception. These problems stem from the short contact time of nodes with the Mobile Sink (MS). To tackle these issues, we present an MS-based heterogeneous WSN with super and normal nodes. Most previous studies only considered the energy heterogeneity of sensors. These methods also suffered from different issues such as fixed MS tours, including inappropriate criteria in cluster construction, proposing greedy schemes, and employing basic metaheuristic algorithms. In our proposed model, super nodes are richer in initial energy and transmission range than normal sensors. In each round, the nodes are organized into clusters, and the MS visits the Cluster Heads (CHs) to gather data packets. Super nodes, owing to their elevated initial energy, are more adept at executing energy-sensitive tasks compared to normal sensors. Additionally, as CH, super nodes extend the contact time with the MS due to their longer transmission range, delivering more packets. The clusters are constructed using a variant of Particle Swarm Optimization (PSO), namely PSO-TVAC. We empower this method with effective initialization and decoding methods. Furthermore, we propose a heuristic intra-cluster multi-hop routing algorithm to enhance network lifetime. Our other contribution is to propose an efficient algorithm to determine the time to reconfigure the network, while the other algorithms mainly reconfigure the WSN periodically. Simulation results demonstrate superior performance compared to state-of-the-art algorithms, showcasing lower energy consumption, higher energy efficiency, higher lifetime, reduced packet delivery delay, and higher number of received packets by 30%, 38.2%, four times, 20.6%, and 22.6%, respectively.

高效的能源消耗在无线传感器网络(WSN)中至关重要。不加控制地使用能源会导致热点问题,影响网络寿命和数据包的成功传送。有人建议将 Sink 移动作为一种解决方案,但它也带来了数据收集延迟高和数据包接收不佳等挑战。这些问题源于节点与移动 Sink(MS)的接触时间较短。为了解决这些问题,我们提出了一种基于 MS 的超级节点和普通节点的异构 WSN。以前的研究大多只考虑了传感器的能量异质性。这些方法也存在不同的问题,如固定的 MS 行程、在集群构建中采用不恰当的标准、提出贪婪方案以及采用基本的元启发式算法。在我们提出的模型中,超级节点的初始能量和传输距离都比普通传感器丰富。在每一轮中,节点被组织成簇群,MS 访问簇头(CHs)收集数据包。与普通传感器相比,超级节点由于初始能量较高,更善于执行对能量敏感的任务。此外,作为 CH,超级节点由于传输距离更远,可以延长与 MS 的接触时间,从而传送更多数据包。簇的构建采用了粒子群优化(PSO)的一种变体,即 PSO-TVAC。我们通过有效的初始化和解码方法增强了这种方法的能力。此外,我们还提出了一种启发式簇内多跳路由算法,以提高网络寿命。我们的另一个贡献是提出了一种高效算法来确定重新配置网络的时间,而其他算法主要是周期性地重新配置 WSN。仿真结果表明,与最先进的算法相比,该算法性能优越,能耗更低、能效更高、寿命更长、数据包传送延迟更短、接收到的数据包数量更多,分别增加了 30%、38.2%、4 倍、20.6% 和 22.6%。
{"title":"ECMSH: An Energy-efficient and Cost-effective data harvesting protocol for Mobile Sink-based Heterogeneous WSNs using PSO-TVAC","authors":"Mahdieh Rahnemay ,&nbsp;Leili Farzinvash ,&nbsp;Mina Zolfi ,&nbsp;Amir Taherkordi","doi":"10.1016/j.adhoc.2024.103629","DOIUrl":"10.1016/j.adhoc.2024.103629","url":null,"abstract":"<div><p>Efficient energy consumption is crucial in Wireless Sensor Networks (WSNs). Uncontrolled energy usage can lead to the hotspot issue, hindering network lifetime and successful packet delivery. Sink mobility has been suggested as a solution, but it comes with challenges such as high data gathering delay and poor packet reception. These problems stem from the short contact time of nodes with the Mobile Sink (MS). To tackle these issues, we present an MS-based heterogeneous WSN with super and normal nodes. Most previous studies only considered the energy heterogeneity of sensors. These methods also suffered from different issues such as fixed MS tours, including inappropriate criteria in cluster construction, proposing greedy schemes, and employing basic metaheuristic algorithms. In our proposed model, super nodes are richer in initial energy and transmission range than normal sensors. In each round, the nodes are organized into clusters, and the MS visits the Cluster Heads (CHs) to gather data packets. Super nodes, owing to their elevated initial energy, are more adept at executing energy-sensitive tasks compared to normal sensors. Additionally, as CH, super nodes extend the contact time with the MS due to their longer transmission range, delivering more packets. The clusters are constructed using a variant of Particle Swarm Optimization (PSO), namely PSO-TVAC. We empower this method with effective initialization and decoding methods. Furthermore, we propose a heuristic intra-cluster multi-hop routing algorithm to enhance network lifetime. Our other contribution is to propose an efficient algorithm to determine the time to reconfigure the network, while the other algorithms mainly reconfigure the WSN periodically. Simulation results demonstrate superior performance compared to state-of-the-art algorithms, showcasing lower energy consumption, higher energy efficiency, higher lifetime, reduced packet delivery delay, and higher number of received packets by 30%, 38.2%, four times, 20.6%, and 22.6%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103629"},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141990906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589] 定期识别城市空间用户社区的联合学习辅助框架》[Ad Hoc Networks 163 (2024) pp.]
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.adhoc.2024.103624
Cláudio Diego T. de Souza , José Ferreira de Rezende , Carlos Alberto V. Campos
{"title":"Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589]","authors":"Cláudio Diego T. de Souza ,&nbsp;José Ferreira de Rezende ,&nbsp;Carlos Alberto V. Campos","doi":"10.1016/j.adhoc.2024.103624","DOIUrl":"10.1016/j.adhoc.2024.103624","url":null,"abstract":"","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103624"},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400235X/pdfft?md5=770a0dc2de0a497c0572d54beb2b7660&pid=1-s2.0-S157087052400235X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1