当前期刊: ACM Transactions on Internet Technology Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
  • Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-06-26
    Zakaria Benomar; Francesco Longo; Giovanni Merlino; Antonio Puliafito

    In recent years, a new trend of advanced applications with huge demands in terms of Quality of Service (QoS) is gaining ground. Even though Cloud computing provides mature management facilities with ubiquitous capabilities, novel requirements and workloads, foisted by new services, start to expose its weaknesses. In this context, a new Information and Communication Technologies (ICT) trend aims at

  • Parameter Self-Adaptation for Industrial Wireless Sensor-Actuator Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-06-26
    Junyang Shi; Mo Sha

    Wireless sensor-actuator network (WSAN) technology is gaining rapid adoption by industrial Internet of Things applications in recent years. A WSAN typically connects sensors, actuators, and controllers in industrial facilities, such as steel mills, oil refineries, chemical plants, and infrastructures implementing complex monitoring and control processes. IEEE 802.15.4–based WSANs operate at low power

  • An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-12
    Xingbin Jiang; Michele Lora; Sudipta Chattopadhyay

    The revolutionary development of the Internet of Things has triggered a huge demand for Internet of Things devices. They are extensively applied to various fields of social activities, and concerning manufacturing, they are a key enabling concept for the Industry 4.0 ecosystem. Industrial Internet of Things (IIoT) devices share common vulnerabilities with standard IoT devices, which are increasingly

  • Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-07
    Shijie Hao; Tao Chen; Yang Wang; Yanrong Guo; Meng Wang

    Multi-task learning has been widely applied to Alzheimer's Disease study due to its capability to simultaneously rating the disease severity (classification) and predicting corresponding clinical scores (regression). In this paper, we propose a novel technique of Adaptive Multi-task Dual-Structured Learning, named AMDSL, by mutually exploring the dual manifold structure for label and regression score

  • Large scale least squares twin SVMs
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-05
    M. TANVEER; Shilpa Sharma; Khan Muhammad

    In the last decade, twin support vector machines (TWSVMs) classifiers have been achieved considerable emphasis on pattern classification tasks. However, the TWSVM formulation still suffers from the following two shortcomings: (i) TWSVM deals with the inverse matrix calculation in the Wolfe-dual problems which is intractable for large scale datasets with numerous features and samples. (ii) TWSVM minimizes

  • Phishing Scams Detection in Ethereum Transaction Network
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-04
    Liang Chen; Jiaying Peng; Yang Liu; Jintang Li; Fenfang Xie; Zibin Zheng

    Blockchain has attracted an increasing amount of research, with lots of refreshing implementations in different fields. Cryptocurrency, as its most famous implementation, suffers economic loss due to phishing scams. In our work, accounts and transactions are treated as nodes and edges, thus detection of phishing accounts can be modelled as a node classification problem. To tackle the problem, we proprose

  • Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-30
    Amitangshu Pal; Krishna Kant

    Large networks of IoT devices, each consisting of one or more sensors, are being increasingly deployed for comprehensive real-time monitoring of cyber-physical systems. Such networks form an essential component of the emerging edge computing paradigm and are expected to increase in complexity and size. The physical phenomenon sensed by different sensors (within the same or different IoT devices in

  • Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-30
    Christos Tsigkanos; Martin Garriga; Luciano Baresi; Carlo Ghezzi

    Internet-enabled devices operating in the physical world are increasingly integrated in modern distributed systems. We focus on systems where the dynamics of spatial distribution is crucial; in such cases, devices may need to carry out complex computations (e.g., analyses) to check satisfaction of spatial requirements. The requirements are partly global—as the overall system should achieve certain

  • A Novel Multiobjective GDWCN-PSO Algorithm and its Application to Medical Data Security
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-29
    VANDANA BHARTI; Bhaskar Biswas; Kaushal Kumar Shukla

    Nature-inspired optimization is one of the most prevalent research domains with a confounding history that fascinates the research communities. Particle Swarm Optimization (PSO) is one of the well-known optimizer that belongs to the family of nature inspired algorithms. It often suffers from premature convergence leading to a local optimum. To address this, several methods were presented using different

  • EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-29
    Cong Peng; He Debiao; chen jianhua; Neeraj Kumar; Muhammad Khurram Khan

    As one of the essential applications of Health Information Technology (HIT), the eHealth system plays a significant role in enabling various internet medicine service scenes, most of which primarily rely on service recommendation or evaluation mechanism. To avoid privacy leakage, some privacy-preserving mechanisms must be adopted to protect raters' privacy and make evaluation trust reliable. To tackle

  • Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-28
    Yang Zhou; Ling Liu; Kisung Lee; Balaji Palanisamy; Qi Zhang

    This paper presents a social influence based collaborative filtering (CF) framework over heterogeneous information networks with three unique features. First, we integrate different types of entities, links, attributes, and activities from rating, social, and activity networks into a unified CF model through intra-network and inter-network social influence. Second, we propose three social influence

  • Blockchain-based Data Sharing System for Sensing-as-A-Service in Smart Cities
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-26
    Chao Lin; He Debiao; Sherali Zeadally; Xinyi Huang; Zhe Liu

    We propose a BBDS system model with its security requirements before we propose a concrete construction by combining $\Sigma$-protocol, Paillier and AES encryption schemes, and the ECDSA signature scheme. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost and

  • Unsupervised Derivation of Keyword Summary for Short Texts
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-24
    Bin Cao; Jiawei Wu; Sichao Wang; Jing Fan; Honghao Gao; Shuiguang Deng; Jianwei Yin; Xuan Liu

    Automatically summarizing a group of short texts that mainly share one topic is a fundamental task in many applications, e.g., summarizing the main symptoms for a disease based on a group of medical texts that are usually short. Conventional unsupervised short text summarization techniques tend to find the most representative short text document. However they may cause privacy issues, e.g., personal

  • Hybrid Feature Selection Algorithm Based on Discrete Artificial Bee Colony for Parkinson Diagnosis
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-23
    Haolun Li; Chi-Man Pun; Feng Xu; Longsheng Pan; Rui Zong; Hao Gao; Huimin Lu

    Parkinson's disease (PD) is a neurodegenerative disease that affects millions of people around the world and cannot be cured fundamentally. Automatic identification of early Parkinson's disease on feature data sets is one of the most challenging medical tasks today. Many features in these datasets are useless or suffering from problems like noise, which affect the learning process and increase the

  • Incentive-driven Computation Offloading in Blockchain-enabled E-Commerce
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-23
    Shuiguang Deng; Guanjie Chen; Hailiang Zhao; Honghao Gao; Jianwei Yin

    Blockchain is regarded as one of the most promising technologies to upgrade e-commerce. This paper analyzes the challenges that current e-commerce is facing and introduces a new scenario of e-commerce enabled by blockchain. A framework for mining tasks in this scenario offloaded onto edge servers based on mobile edge computing is proposed. Then the offloading issue is modelled as a multi-constrained

  • IoT Architecture for Urban Data-Centric Services and Applications
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-22
    Marcin Luckner; Maciej Grzenda; Robert Kunicki; Jaroslaw Legierski

    In this work, we outline urban IoT architecture, grounded in Big Data patterns and focused on the needs of cities and their key stakeholders. First, the architecture of dedicated platform USE4IoT that gathers and processes urban Big Data and extends Lambda architecture is proposed. How the platform was used to make IoT an enabling technology for intelligent transport planning is described. Moreover

  • An Emotional Analysis of False Information in Social Media and News Articles
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-19
    Bilal Ghanem; Paolo Rosso; Francisco Rangel

    Fake news is risky, since it has been created to manipulate readers’ opinions and beliefs. In this work, we compared the language of false news to the real one of real news from an emotional perspective, considering a set of false information types (propaganda, hoax, clickbait, and satire) from social media and online news article sources. Our experiments showed that false information has different

  • Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-15
    Xiaolong Xu; Dawei Zhu; Xiaoxian Yang; Shuo Wang; Lianyong Qi; Wanchun Dou

    Currently, the integration of the supply chain and blockchain is promising, as blockchain successfully eliminates the bullwhip effect in the supply chain. Generally, concurrent PBFT (Practical Byzantine Fault Tolerance) consensus method, named C-PBFT, is powerful to deal with the consensus inefficiencies, caused by the fast node expansion in the supply chain. However, due to the tremendous complicated

  • Emo2Vec
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Shuo Wang; Aishan Maoliniyazi; Xinle Wu; Xiaofeng Meng

    Sentiment analysis or opinion mining for subject information extraction from the text has become more and more dependent on natural language processing, especially for business and healthcare, since the online products and service reviews affect the consuming behaviors. Word embeddings that can map the words to low-dimensional vector representations have been widely used in natural language processing

  • A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Zhiheng Zhong; Rajkumar Buyya

    Containers, as a lightweight application virtualization technology, have recently gained immense popularity in mainstream cluster management systems like Google Borg and Kubernetes. Prevalently adopted by these systems for task deployments of diverse workloads such as big data, web services, and IoT, they support agile application deployment, environmental consistency, OS distribution portability,

  • Understanding Ethereum via Graph Analysis
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Ting Chen; Zihao Li; Yuxiao Zhu; Jiachi Chen; Xiapu Luo; John Chi-Shing Lui; Xiaodong Lin; Xiaosong Zhang

    Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M smart contracts have been deployed on Ethereum, little is known about the characteristics of its users, smart contracts, and the relationships among them. We conduct the first systematic study on Ethereum by leveraging graph analysis to characterize three major activities on Ethereum, namely

  • Design and Implementation of BCI-Based Intelligent Upper Limb Rehabilitation Robot System
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Tae-Yeun Kim; Sung-Hwan Kim; Hoon Ko

    The performance evaluation results showed that the optimal EEG electrode locations were F7, F8, FC5, and FC6, whereas the accuracy of learning and test data of user-intention recognition was found to be 94.2% and 92.3%, respectively, which suggests that the proposed system can be used to recognize user intention for specific behavior. The system proposed in the present study can allow continued rehabilitation

  • Enabling Reference Verifiability for the World Wide Web with Webchain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Elias Rohrer; Steffen Heidel; Florian Tschorsch

    As online sources are becoming more prevalent in journalism and scientific literature, the ephemeral nature of the World Wide Web is becoming an increasingly serious issue for their verifiability, replicability, and reproducibility. The architecture of Webchain, a new system enabling source and reference verifiability on the Web, is combining distributed ledger technologies with secure timestamping

  • Design and Implementation of a Compressed Certificate Status Protocol
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Michalis Pachilakis; Antonios A. Chariton; Panagiotis Papadopoulos; Panagiotis Ilia; Eirini Degkleri; Evangelos P Markatos

    Trust in SSL-based communications is provided by Certificate Authorities in the form of signed certificates. Despite the existence of several revocation checking mechanisms, sophisticated cyber-attackers can still trick web browsers to trust a revoked certificate, believing that it is still valid. In this paper, we present CCSP: a system to provide timely information regarding certificates status.

  • Serendipity-based Points-of-Interest Navigation
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-25
    Xiaoyu Ge; Panos K. Chrysanthis; Konstantinos Pelechrinis; Demetrios Zeinalipour-Yazti; Mohamed Sharaf

    In this paper we present MPG (Mobile Personal Guide), which provides: i) a set of diverse yet surprisingly interesting venue recommendations that are aligned with user preferences; and ii) a set of route recommendations that are constructed from the recommended venues. We also introduce EPUI (an Experimental Platform for Urban Informatics), a testbed we developed to evaluate venue and route recommendation

  • Optimally Self-Healing IoT Choreographies
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-24
    Jan Alexander Seeger; Arne Broering; Georg Carle

    In the industrial Internet of Things domain, applications are moving from the Cloud into the edge. Applications move from the scalable and homogeneous cloud environment into a constrained heterogeneous edge network. Making edge applications reliable enough to fulfill e.g. Industrie 4.0 use cases is still an open research challenge. Maintaining operation of an edge system requires advanced management

  • Big Data Analysis of Internet of Things System
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-19
    zhihan lv; Amit Kumar Singh

    The study aims at exploring the Internet of things (IoT) system from the perspective of data, and further improving the performance of the IoT system. The IoT data energy collection and information transmission system model is constructed by combining IoT and wireless relay cooperative transmission technology. Moreover, the energy efficiency, outage probability, and accuracy of the model are evaluated

  • A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-19
    Truc Nguyen; My T. Thai

    Current implementations of iterative double auction rely on a trusted third-party to handle the auction process. This imposes the risk of single point of failures and monopoly. We tackle this problem by proposing a novel decentralized and trustless blockchain-based framework for iterative double auction. Our design extends the state channel technologies to enable a double auction process among trading

  • Sub-Population Specific Models of Couples’ Conflict
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Krit Gupta; Aditya Gujral; Theodora Chaspari; Adela C. Timmons; Sohyun Han; Yehsong Kim; Sarah Barrett; Stassja Sichko; Gayla Margolin

    Interpersonal conflict between couples is a significant source of stress with long-lasting effects on partners’ physical and psychological health. Motivated by findings in psychological science, we study how couples with distinct relationship functioning characteristics experience conflict in real life. We propose sub-population specific machine learning models using hierarchical and adaptive learning

  • A Multilingual Evaluation for Online Hate Speech Detection
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Michele Corazza; Stefano Menini; Elena Cabrio; Sara Tonelli; Serena Villata

    The increasing popularity of social media platforms such as Twitter and Facebook has led to a rise in the presence of hate and aggressive speech on these platforms. Despite the number of approaches recently proposed in the Natural Language Processing research area for detecting these forms of abusive language, the issue of identifying hate speech at scale is still an unsolved problem. In this article

  • Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Flor-Miriam Plaza-Del-Arco; M. Dolores Molina-González; L. Alfonso Ureña-López; M. Teresa Martín-Valdivia

    Today, misogyny and xenophobia are some of the most important social problems. With the increase in the use of social media, this feeling of hatred toward women and immigrants can be more easily expressed, and therefore it can have harmful effects on social media users. For this reason, it is important to develop systems capable of detecting hateful comments automatically. In this article, we analyze

  • Improving Vaccine Safety Using Blockchain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-12
    Laizhong Cui; Zhe Xiao; Fei Chen; Jiahao Wang; Yi Pan; Hua Dai; Jing Qin

    In recent years, vaccine incidents occurred around the world. This paper presents a blockchain based solution to protect the whole process of vaccine circulation. We first propose a model to supervise the vaccine circulation process by incorporating existing regulatory practices. Then, we propose a blockchain based tracing system to implement this model. The proposed system takes the blockchain as

  • An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-11
    Meng Wang; Bo Cheng; Jun-liang Chen

    Mobile Edge Computing (MEC) is a promising architecture that pushes mobile computing to the network edge. Recent studies deploy MEC applications in Network Function Virtualization (NFV) environment. The mobile network service in NFV is deployed as a Service Function Chaining (SFC). In this paper, we solve the SFC placement problem in the MEC-NFV environment. We formulate the placement problem as a

  • FinPrivacy: A Privacy-Preserving Mechanismfor Fingerprint Identification
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-10
    Tao Wang; Zhigao Zheng; Ali Kashif Bashir; Alireza Jolfaei; Yanyan Xu

    This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading

  • An efficient angle based universum least squares twin support vector machine for classification
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-06
    Bharat Richhariya; M. TANVEER

    Universum based support vector machine (USVM) incorporates prior information about the distribution of data in training of the classifier using universum data points. This leads to better generalization performance, but with increased computation cost. Various twin hyperplane based classifiers are proposed to reduce the computation cost of universum based algorithms. In this work, we present an efficient

    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-04
    Demetris Paschalides; Dimosthenis Stephanidis; Andreas Andreou; Kalia Orphanou; George Pallis; Marios D. Dikaiakos; Evangelos Markatos

    In recent years, the increasing propagation of hate speech in online social networks and the need for effective counter-measures have drawn significant investment from social network companies and researchers. This has resulted in the development of many web platforms and mobile applications for reporting and monitoring online hate speech incidents. In this article, we present MANDOLA, a big-data processing

  • Trustworthy and Transparent Third Party Authority
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-01
    Runhua Xu; James Joshi

    A crucial component of emerging cryptographic schemes is a third-party authority (TPA) that must be trusted. However, several types of attacks and certificate mis-issuance problems in the CA infrastructure indicate that the successful deployment of newer emerging cryptographic schemes will also significantly depend on the trustworthiness of the TPAs. To address this issue, we propose an authority transparency

  • Privacy-preserving time series medical images analysis using a hybrid deep learning framework
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-15
    Zijie Yue; Shuai Ding; Lei Zhao; Youtao Zhang; Zehong Cao; M. TANVEER; Alireza Jolfaei; Xi Zheng

    Time series medical images are an important type of medical data that contain rich spatio-temporal information. Recently, computer-aided diagnosis algorithms are often used on honest-but-curious servers to analyze medical images, which introduces severe privacy concerns. This paper proposes a convolutional-LSTM network (HE-CLSTM) for analyzing encrypted medical image sequences. Specifically, several

  • Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-10
    Giovanni Schembra; Giuseppe Faraci; Christian Grasso

    This paper proposes to extend 5G network slices with Unmanned Aerial Vehicles (UAV) equipped with multi-access edge computing facilities. Since electricity supplying high-power computing elements can strongly reduce UAV battery duration, in this paper we propose a framework where it is possible to turn on and off computing elements installed on board of each UAV, and with the possibility of offloading

  • Secure Motif Finding Based on Candidate Pruning
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-10
    Kaijian Xia; Xiang Wu; Yaqing Mao; Huanhuan Wang

    DNA motif finding is an important study to understand the regulation of gene expression, however, the existing methods generally ignore the potential sensitive information that may be exposed in the process. In this work, we utilize the differential privacy model to provide provable privacy guarantees which is independent of attackers? background knowledge. Our method makes use of sample databases

  • Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-08
    Mohammed Al-Khafajiy; Safa Otoum; Thar Baker; Muhammad Asim; Zakaria Maamar; Moayad Aloqaily; Mark Taylor; Martin Randles

    There have been significant advances in the field of Internet of Things (IoT) recently. In most IoT based systems or applications, especially those within smart-homes and smart-cities, there is a bridging point (fog computing) between a sensor network and the Internet which often just performs basic functions such as translating between the protocols used in the Internet and sensor networks, as well

  • The Security of Medical Data on Internet Based on Differential Privacy Technology
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-08
    zhihan lv; Francesco Piccialli

    In the analysis of information loss, it is found that with the number of identifiers increasing in the Magic and EIA datasets, the algorithm in this paper is significantly lower than that in k-anonymity and l-diversity models, and achieves the expected effect. In the availability scoring analysis, for both Magic data set and EIA data set, the usability improvement value of k-anonymity-differential

  • Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-01-21
    Jian Qi; Jin Wang; Ren Yongjun; Yepeng Liu; Gwang-jun Kim

    This paper proposed a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security

  • Receivers Optimal Placement for K Barriers Coverage in Passive Bistatic Radar Sensor Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2019-12-21
    Jiaoyan Chen; Laurence Yang; Xianjun Deng; Xianggong Hong; Lingzhi Yi

    Constructing multiple barriers coverage to improve the coverage quality is a critical problem in a WSN. In this paper, we investigate the K barrier coverage construction with minimum receivers in passive bistatic radar sensor networks where the transmitters are pre-deployed. We first investigate the optimal placement of receivers between adjacent transmitters, then the optimal placement of receivers

  • Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2019-11-20
    Xia Cheng; Junyang Shi; Mo Sha

    To address the real-time and reliability requirements of industrial IoT applications, IEEE 802.15.4-based wireless sensor-actuator networks made unique design choices such as employing the Time-Synchronized Channel Hopping (TSCH). The function-based channel hopping used in TSCH simplifies the network operations at the cost of security. Our study shows that an attacker can reverse engineer the channel

Contents have been reproduced by permission of the publishers.
Springer Nature Live 产业与创新线上学术论坛
ACS ES&T Engineering
ACS ES&T Water