首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method 多无人机协作网络的通信和任务性能联合优化:一种多代理强化学习方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1016/j.adhoc.2024.103602
Yuan He, Jun Xie, Guyu Hu, Yaqun Liu, Xijian Luo

In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.

在使用无人飞行器(UAV)执行紧急救援、目标搜索等任务时,中继无人飞行器(RU)和任务无人飞行器(MU)可以协同完成未知环境中的任务。本文研究了 MU 和 RU 协作的轨迹规划和功率控制问题。首先,考虑到 MU 与地面控制站之间多跳数据传输的特点,设计了多无人机协作覆盖模型。同时,提出了基于多代理强化学习的无人机控制算法 MUTTO。为了解决目标数量和位置信息未知的问题,用地理覆盖率代替目标覆盖率进行决策。然后,为了更好地合作,分别设计了两种无人机的奖励函数。通过同时规划 RU 和 MU 的轨迹和发射功率,使任务目标覆盖率和网络传输率最大化,同时使无人机的能耗最小化。最后,数值模拟结果表明,MUTTO 可以高效地解决无人机网络控制问题,其性能优于基准方法。
{"title":"Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method","authors":"Yuan He,&nbsp;Jun Xie,&nbsp;Guyu Hu,&nbsp;Yaqun Liu,&nbsp;Xijian Luo","doi":"10.1016/j.adhoc.2024.103602","DOIUrl":"10.1016/j.adhoc.2024.103602","url":null,"abstract":"<div><p>In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103602"},"PeriodicalIF":4.4,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141840299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network 基于智能合约的 6G 认证方案,确保纳米医疗物联网网络安全
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.adhoc.2024.103606
Neeraj Kumar, Rifaqat Ali

Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.

纳米技术最近已成为一个具有广泛影响的关键领域。它与支持 6G 的物联网(IoT)的融合催生了支持 6G 的 IoNT(纳米物联网)模式,对医疗保健、工业、智能家居、航空航天和国防等领域产生了影响。这项技术为彻底改变现有方法和提高效率提供了机遇。目前,研究工作的重点是在纳米尺度上为医疗保健领域开发安全、可扩展的网络基础设施,从而提出了纳米医疗物联网(IoNMT)的概念。然而,纳米技术的独特性带来了安全挑战,尤其是在隐私、保密性、可靠性、延迟以及基于区块链存储的昂贵后果方面。要确保 IoNMT 网络中数据处理的安全性,身份验证和透明度至关重要,这就需要一种能抵御未经授权干扰的安全访问机制。为应对这些挑战,本研究提出了一种基于智能合约的认证协议,专门为 6G-IoNMT 网络开发。该框架旨在通过分散的点对点云服务器以最小的延迟管理实时信息,同时解决安全和隐私问题。全面的安全和隐私评估(包括 ROR 模型评估、Scyther 工具分析和非正式安全评估)验证了该协议的有效性。此外,模拟结果表明,与现有协议相比,该协议在安全性、效率和能耗方面都更胜一筹。
{"title":"A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network","authors":"Neeraj Kumar,&nbsp;Rifaqat Ali","doi":"10.1016/j.adhoc.2024.103606","DOIUrl":"10.1016/j.adhoc.2024.103606","url":null,"abstract":"<div><p>Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103606"},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks 基于强化学习的充电群确定算法,用于优化无线充电传感器网络中的充电器位置
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.adhoc.2024.103605
Haoran Wang , Jinglin Li , Wendong Xiao

Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.

无线功率传输(WPT)为无线可充电传感器网络(WRSN)的能量补充提供了一种前景广阔的技术,无线充电器可部署在固定位置,在有效充电范围内同时为节点充电。最佳充电器位置(OCP)可降低充电成本,实现 WRSN 的可持续运行,但由于其 NP 的完备性,这是一个具有挑战性的难题。本文提出了一种基于强化学习(RL)的新型 OCP 方法,首先将该问题表述为具有固定聚类半径的充电聚类确定问题,然后通过基于强化学习的充电聚类确定(RL-CCD)算法加以解决。具体来说,采用 K-Means++ 算法对节点进行粗略聚类,并将充电器置于聚类中心。同时,应用 RL 探索簇中心的潜在位置,以调整中心位置并减少簇的数量,使用簇中节点的数量和簇中心与节点之间的距离总和作为奖励。此外,还引入了经验强化机制,以学习当前的最佳充电经验。大量仿真表明,RL-CCD 明显优于现有算法。
{"title":"Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks","authors":"Haoran Wang ,&nbsp;Jinglin Li ,&nbsp;Wendong Xiao","doi":"10.1016/j.adhoc.2024.103605","DOIUrl":"10.1016/j.adhoc.2024.103605","url":null,"abstract":"<div><p>Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103605"},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks 用于 Ad Hoc 网络安全科学数据交换的新型集成量子抗性密码学
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1016/j.adhoc.2024.103607
Kranthi Kumar Singamaneni , Ghulam Muhammad

The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.

量子计算的快速发展对关键科研数据的隐私和安全构成了巨大挑战。这是因为在经典计算机中被证明有效的标准加密方法,在量子计算方法面前变得不那么安全了。在此之前,人们已经做出了许多努力,通过利用不同的标准和量子加密方法来保护机密信息。然而,目前的研究仍处于空白状态,面临着一些挑战和限制,包括过重的计算负担、易受各种攻击以及实施时硬件兼容性有限等。针对现有的局限性,我们提出了一种现代混合加密方法,以确保敏感数据免受各种攻击和漏洞。建议的标准整合了传统密码标准和抗量子标准,以提高敏感科学数据的隐私和安全性,并应对各种经典网络攻击和关键量子攻击。在科学数据隐私与安全方面,我们的工作通过系统地探索当前密码模型面临的挑战和问题(如调查数学密码模型的各种易感性),描绘了一种混合标准结构。在这项工作中,我们将基于网格的编码作为外层,将高级加密标准(AES)作为内层,以提高安全性和有效性。所提出的安全定理揭示了基于网格的编码在面对量子攻击时的可操作性,而对所提出的算法功效的全面研究则显示了预期混合标准横向输入敏感数据量的增强安全性和可扩展性。此外,这项研究还通过将 AES 和基于网格的密码学(LBC)结合在一起,提供了混合模型的安全可信度,从而保证了在量子和传统计算弱点面前的优势。研究结果证明,与传统和过去的抗量子模型相比,所提出的混合模型提高了效率。
{"title":"A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks","authors":"Kranthi Kumar Singamaneni ,&nbsp;Ghulam Muhammad","doi":"10.1016/j.adhoc.2024.103607","DOIUrl":"10.1016/j.adhoc.2024.103607","url":null,"abstract":"<div><p>The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103607"},"PeriodicalIF":4.4,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141848909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms 利用无人机群实现农村地区超可靠低延迟通信
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1016/j.adhoc.2024.103603
Santiago García-Gil, Juan Manuel Murillo, Jaime Galán-Jiménez

Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.

对于依赖互联网的各种应用(如 IP 语音(VoIP)或电话会议)来说,延迟是一个至关重要的方面,即使在成熟经济体的农村地区,缺乏超高速和高可靠性通信的问题也很突出。我们的建议侧重于优化微服务导向架构(MSA)在支持计算和路由的无人驾驶飞行器(UAV)中的部署。为此,我们开发了一个信息系统,用于收集飞行临时网络(FANET)的所有信息。在此基础上,我们提出了基于整数线性规划(ILP)和启发式的多种方法,通过在无人飞行器中部署多个微服务实例来最大限度地减少端到端延迟,因为无人飞行器离使用它们的用户很近。基于网络模拟的大量实验证明了我们对问题的 ILP 表述的性能,并解决了基于 ILP 的方法与启发式方法之间的优化差距,这种方法具有高度可扩展性,可实时用于大规模场景。
{"title":"Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms","authors":"Santiago García-Gil,&nbsp;Juan Manuel Murillo,&nbsp;Jaime Galán-Jiménez","doi":"10.1016/j.adhoc.2024.103603","DOIUrl":"10.1016/j.adhoc.2024.103603","url":null,"abstract":"<div><p>Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103603"},"PeriodicalIF":4.4,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002142/pdfft?md5=954d5bdc1eb5189baec918aa54fbcb74&pid=1-s2.0-S1570870524002142-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring mobile applications usage from DNS traffic 从 DNS 流量推断移动应用程序的使用情况
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1016/j.adhoc.2024.103601
Celeste Campo, Carlos Garcia-Rubio, Andrea Jimenez-Berenguel, Marta Moure-Garrido, Florina Almenares, Daniel Díaz-Sanchez

In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.

在数字时代,我们的生活与移动应用程序的日常使用密不可分。因此,我们产生并传输了大量个人数据,这些数据会危及我们的隐私。尽管有加密通信,但 DNS 流量通常没有加密,因此有可能从移动应用程序产生的流量中提取有价值的信息。本研究的重点是分析移动应用跟踪中发现的 DNS 流量行为,并开发出一种能够根据移动应用查询的域名来识别移动应用的方法。利用这种方法,我们能够以 98% 的准确率识别应用程序。此外,我们还通过识别其他独立数据集的痕迹,验证了通过一个数据集获得的特征描述的有效性。评估结果表明,该方法在识别移动应用程序方面取得了成功。
{"title":"Inferring mobile applications usage from DNS traffic","authors":"Celeste Campo,&nbsp;Carlos Garcia-Rubio,&nbsp;Andrea Jimenez-Berenguel,&nbsp;Marta Moure-Garrido,&nbsp;Florina Almenares,&nbsp;Daniel Díaz-Sanchez","doi":"10.1016/j.adhoc.2024.103601","DOIUrl":"10.1016/j.adhoc.2024.103601","url":null,"abstract":"<div><p>In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103601"},"PeriodicalIF":4.4,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002129/pdfft?md5=b9892553e1c370ae53ebbd8a9ac2a96c&pid=1-s2.0-S1570870524002129-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs DBCPCA:面向 VANET 的双层区块链辅助条件式隐私保护跨域认证
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1016/j.adhoc.2024.103600
Xian Guo, Xiangrong Lu, Yongbo Jiang, Junli Fang, Di Zhang

Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.

确保 VANET 中参与实体之间的安全认证已成为一项严峻挑战。大多数现有方案主要考虑单个管理域的身份验证问题,存在各种局限性,包括隐私保护和恶意实体跟踪。本文提出了一种双层区块链辅助的有条件隐私保护跨域身份验证方案(DBCPCA),利用区块链技术和无证书签名来应对这些挑战。在 DBCPCA 中,上层区块链用于跨域身份验证,在多个不同的管理域之间共享域间信息。下层区块链用于域内身份验证。在 DBCPCA 中,我们还引入了匿名机制,以保护车辆的真实身份,同时使系统能够追踪恶意车辆,从而解决保护隐私的条件问题。此外,对所提出方案的安全性分析表明,该方案能够满足我们指定的安全目标。最后,我们与 BCPPA 和 BCGS 等最相关的解决方案进行了详细的实验比较。结果表明,在签名生成阶段,DBCPCA 方案比 BCPPA 方案至少减少了 66.68% 的时间成本。在签名验证阶段,DBCPCA 方案比 BCGS 方案至少减少了 62.39% 的时间成本。
{"title":"DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs","authors":"Xian Guo,&nbsp;Xiangrong Lu,&nbsp;Yongbo Jiang,&nbsp;Junli Fang,&nbsp;Di Zhang","doi":"10.1016/j.adhoc.2024.103600","DOIUrl":"10.1016/j.adhoc.2024.103600","url":null,"abstract":"<div><p>Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103600"},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141693143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles 基于图像的无人机 GPS 欺骗网络攻击入侵检测系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1016/j.adhoc.2024.103597
Mohamed Selim Korium , Mohamed Saber , Ahmed Mahmoud Ahmed , Arun Narayanan , Pedro H.J. Nardelli

The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.

无人驾驶飞行器(UAVs)的运行很容易受到网络安全风险的影响,这主要是因为它们完全依赖于全球定位系统(GPS)和射频(RF)传感器。全球定位系统和射频传感器容易受到潜在的威胁,如欺骗攻击,这会导致无人机行为异常。由于这些威胁普遍存在,而且十分强大,因此开发有效的入侵检测系统势在必行。在本文中,我们提出了一种基于图像的入侵检测系统,用于检测基于深度学习方法的 GPS 欺骗网络攻击。我们将卷积神经网络与主成分分析(PCA)相结合,以降低数据集特征的维度;将数据扩增与迁移学习相结合,以增加训练数据集的规模和多样性;将迁移学习与有限数据相结合,以提高所提模型的性能,从而设计出一种快速、准确、通用的方法。广泛的数值实验证明了利用基准数据集提出的解决方案的有效性。我们在 0.3529 毫秒延迟、120.64 秒运行时间和 2.035 秒检测时间内实现了 100% 的准确率。此外,利用这个训练有素的模型,我们在一个与模型训练无关的未见数据集上,在 2.721 秒的检测时间内取得了 99.25% 的准确率。相比之下,Inception-v3 等其他模型在未知数据集上的准确率较低。不过,经过贝叶斯优化后,Inception-v3 的性能有了显著提高,树状结构 Parzen 估算器的准确率达到了 99.06%。我们的研究结果表明,所提出的基于图像的入侵检测方法优于现有的解决方案,同时还为检测未见数据集中的网络攻击提供了一个通用模型。
{"title":"Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles","authors":"Mohamed Selim Korium ,&nbsp;Mohamed Saber ,&nbsp;Ahmed Mahmoud Ahmed ,&nbsp;Arun Narayanan ,&nbsp;Pedro H.J. Nardelli","doi":"10.1016/j.adhoc.2024.103597","DOIUrl":"10.1016/j.adhoc.2024.103597","url":null,"abstract":"<div><p>The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103597"},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002087/pdfft?md5=d30620521269b235094b2feafd0ab331&pid=1-s2.0-S1570870524002087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET 用于 VANET 的高效多目标无人机辅助 RSU 部署(MOURD)方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1016/j.adhoc.2024.103598
Samkit Jain, Vinod Kumar Jain, Subodh Mishra

A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU & UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.

路边装置(RSU)是车载 Ad Hoc 网络(VANET)的重要基础设施,通过为车辆用户、驾驶员和行人提供安全服务、共享存储和增强的互联网连接,支持实现智能交通系统(ITS)的目标。此外,VANET 在网络服务实用性和延迟方面的效率取决于这些 RSU 在网络拓扑结构中的相对位置。现有的 RSU 部署方法大多只有一个目标,即提高网络服务效用或尽量减少延迟。例如,一些研究建议在高流量路段部署 RSU,这样可以提高网络服务效用,但会导致更高的延迟。相反,一些研究建议将 RSU 部署在交通流量较小的路段,这样可以最大限度地减少网络延迟,但网络服务效用也会降低。因此,在 VANET 中,这两个相互冲突的目标之间存在着权衡,没有一项研究能同时解决这两个目标。为了实现这两个目标之间的平衡,本文提出了一种多目标无人机辅助 RSU 部署(MOURD)方案,利用无人机(UAV)提高 VANET 的效率。MOURD 方案静态地将 RSU 部署在交通流量大的路段,动态地将无人机调度到交通流量小的路段,以促进无缝网络覆盖并最大限度地减少整体网络延迟。对印度德里道路网络的仿真结果表明,与其他基准 RSU & 和无人机部署方法相比,拟议的 MOURD 方案非常有效。MOURD 方案在车辆连接时间、数据包交付率、吞吐量和延迟方面的平均表现分别优于其他方案 17.42%、13.29%、15.67% 和 6.23%。
{"title":"An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET","authors":"Samkit Jain,&nbsp;Vinod Kumar Jain,&nbsp;Subodh Mishra","doi":"10.1016/j.adhoc.2024.103598","DOIUrl":"10.1016/j.adhoc.2024.103598","url":null,"abstract":"<div><p>A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU &amp; UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103598"},"PeriodicalIF":4.4,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic spectrum access for Internet-of-Things with joint GNN and DQN 联合 GNN 和 DQN 的物联网动态频谱接入
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.adhoc.2024.103596
Feng Li , Junyi Yang , Kwok-Yan Lam , Bowen Shen , Guiyi Wei

With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.

随着物联网(IoT)设备接入需求的快速增长,有效利用频谱资源已成为确保可靠通信的关键挑战。传统的动态频谱接入方法在设备接入过多、信道减少和信道质量下降时效率低下。本文提出了一种基于图神经网络(GNN)和深度 Q 网络(DQN)融合算法的动态频谱接入方法,在提高频谱接入效率的同时保持了良好的接入成功率。与传统的 DQN 相比,计算时间可减少 35% 以上。我们的方法首先使用 GNN 与环境交互,预测物联网频谱环境的状态。随后,利用 DQN 的目标网络、经验回放和强化学习技术,根据这些预测状态选择移动物联网用户的行动,从而实现自动学习和优化频谱访问策略。仿真结果表明,与传统方法相比,基于所提方法的系统模型能以更高的效率运行,同时保持良好的信道接入率和信道质量。
{"title":"Dynamic spectrum access for Internet-of-Things with joint GNN and DQN","authors":"Feng Li ,&nbsp;Junyi Yang ,&nbsp;Kwok-Yan Lam ,&nbsp;Bowen Shen ,&nbsp;Guiyi Wei","doi":"10.1016/j.adhoc.2024.103596","DOIUrl":"10.1016/j.adhoc.2024.103596","url":null,"abstract":"<div><p>With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103596"},"PeriodicalIF":4.4,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141636873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1