International Journal of Network Management最新文献

筛选
英文 中文
Domain-Adaptive Power Profiling Analysis Strategy for the Metaverse 面向元宇宙的领域自适应功率剖析分析策略
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-07-10 DOI: 10.1002/nem.2288
Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang, Jing Zhou
{"title":"Domain-Adaptive Power Profiling Analysis Strategy for the Metaverse","authors":"Xiang Li,&nbsp;Ning Yang,&nbsp;Weifeng Liu,&nbsp;Aidong Chen,&nbsp;Yanlong Zhang,&nbsp;Shuo Wang,&nbsp;Jing Zhou","doi":"10.1002/nem.2288","DOIUrl":"10.1002/nem.2288","url":null,"abstract":"<div>\u0000 \u0000 <p>In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high-end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side-channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross-device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141612824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovations in Blockchain for Crypto Assets and Exchanges 区块链在加密资产和交易所方面的创新
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-06-17 DOI: 10.1002/nem.2287
James Won-Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang
{"title":"Innovations in Blockchain for Crypto Assets and Exchanges","authors":"James Won-Ki Hong,&nbsp;Andreas Veneris,&nbsp;Hongtaek Ju,&nbsp;Taeyeol Jeong,&nbsp;Changhoon Kang","doi":"10.1002/nem.2287","DOIUrl":"https://doi.org/10.1002/nem.2287","url":null,"abstract":"<p>This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.</p><p>The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.</p><p>The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.</p><p>The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.</p><p>The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.</p><p>We believe that these four papers make significant cont","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain 离散傅里叶变换域中的抗屏幕拍摄稳健文件水印技术
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-06-02 DOI: 10.1002/nem.2278
Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu
{"title":"Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain","authors":"Yazhou Zhang,&nbsp;Chaoyue Huang,&nbsp;Shaoteng Liu,&nbsp;Leichao Huang,&nbsp;Tianshu Yang,&nbsp;Xinpeng Zhang,&nbsp;Hanzhou Wu","doi":"10.1002/nem.2278","DOIUrl":"10.1002/nem.2278","url":null,"abstract":"<p>Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head-mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross-media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross-media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen-shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen-shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141273737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and light-weight patient survival prediction in Internet of Medical Things framework 医疗物联网框架中的安全轻量级患者生存预测
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-30 DOI: 10.1002/nem.2286
Shubh Mittal, Tisha Chawla, Saifur Rahman, Shantanu Pal, Chandan Karmakar
{"title":"A secure and light-weight patient survival prediction in Internet of Medical Things framework","authors":"Shubh Mittal,&nbsp;Tisha Chawla,&nbsp;Saifur Rahman,&nbsp;Shantanu Pal,&nbsp;Chandan Karmakar","doi":"10.1002/nem.2286","DOIUrl":"10.1002/nem.2286","url":null,"abstract":"<p>Thoracic surgeries in major lung resections for primary lung cancer are fraught with potential risks, emphasising the need to understand factors contributing to postoperative mortality. This study investigates the interplay of objective and subjective data in predicting postoperative outcomes to reduce data transmission costs in the Internet of Medical Things (IoMT). Objective metrics, such as forced vital capacity (FVC), offer consistent, quantifiable insights essential for predictive modelling. Conversely, subjective data derived from patient self-reports suggest that the patient's personal experiences are crucial for assessing the quality of life postsurgery. Utilising a dataset from the University of California, Irvine's Machine Learning Repository (UCI), 17 distinct attributes were examined. Using ensemble learning classifiers, the extra trees classifier is superior when utilising all features, achieving an accuracy of 0.92. Combining select subjective features, specifically PRE6, PRE8 and AGE (demographic), with objective data, yielded a comparable accuracy of 0.91. Feature importance analysis further highlights the significance of features like PRE5, PRE4 and AGE. This suggests potential redundancies in the full feature set, emphasising the importance of feature selection. Importantly, when compared with existing literature, this study's findings offer insights into the future of predictive modelling in thoracic surgeries, with implications for the rapidly evolving field of the IoMT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2286","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things 基于区块链的医疗物联网中医疗数据共享的安全跨链交易
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-23 DOI: 10.1002/nem.2279
Bohao Jiang, Chaoyang Li, Yu Tang, Xiangjun Xin
{"title":"Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things","authors":"Bohao Jiang,&nbsp;Chaoyang Li,&nbsp;Yu Tang,&nbsp;Xiangjun Xin","doi":"10.1002/nem.2279","DOIUrl":"10.1002/nem.2279","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain technology has greatly promoted the development of the Internet of Medical Things (IoMT) from a centralized form to a distributed form. However, with many independent blockchain-based IoMT (BIoMT) systems being established by different institutions, these heterogeneous blockchain systems have created a new “data islands” problem. This paper proposes a multi-chain fusion (MCF) multi-party governance model based on relay chain technology. The MCF model helps establish cross-chain interaction and communication among the multiple heterogeneous blockchain systems in different medical institutions through the cross-chain gateway. Meanwhile, by utilizing the inter-blockchain transfer protocol (IBTP), the MCF model takes responsibility for legitimacy verification and reliable routing of cross-chain transactions, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems. Then, an elliptic curve signature scheme is adopted to protect user privacy in cross-chain transactions, which helps establish transaction verification for the MCF model in BIoMT systems. Finally, several experiments are carried out to prove the feasibility of the cross-chain scheme and the security of the elliptic curve signature scheme, and the performance index of the cross-chain system is evaluated. The performance results show that the MCF model can provide secure and efficient cross-chain services for sharing medical data among heterogeneous BIoMT systems, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transaction fee mechanisms with farsighted miners 有远见的矿工的交易费用机制
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-21 DOI: 10.1002/nem.2275
Jens Leth Hougaard, Mohsen Pourpouneh, Haiting Han
{"title":"Transaction fee mechanisms with farsighted miners","authors":"Jens Leth Hougaard,&nbsp;Mohsen Pourpouneh,&nbsp;Haiting Han","doi":"10.1002/nem.2275","DOIUrl":"10.1002/nem.2275","url":null,"abstract":"<p>We investigate the recent fee mechanism EIP1559 of the Ethereum network. Whereas previous studies have focused on myopic miners, we here focus on strategic miners in the sense of miners being able to reason about the future blocks. We derive expressions for optimal miner behavior (in terms of setting block sizes) in the case of two-block foresight and varying degrees of hashing power. Results indicate that a sufficiently large mining pool will have enough hashing power to gain by strategic foresight. We further use a simulation study to examine the impact of both two-block and three-block foresight. In particular, the simulation study indicates that for realistic levels of hashing power, mining pools do not gain from being able to reason more than two blocks ahead. Moreover, even though the presence of strategic miners increases the variation in block sizes and potentially empty blocks, overall system throughput tends to increase slightly compared with myopic mining. We further analyze the effect of varying the base fee updating rule.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Ponzi-like designs in stablecoins 利用稳定币中类似庞氏骗局的设计
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-19 DOI: 10.1002/nem.2277
Shange Fu, Qin Wang, Jiangshan Yu, Shiping Chen
{"title":"Leveraging Ponzi-like designs in stablecoins","authors":"Shange Fu,&nbsp;Qin Wang,&nbsp;Jiangshan Yu,&nbsp;Shiping Chen","doi":"10.1002/nem.2277","DOIUrl":"10.1002/nem.2277","url":null,"abstract":"<p>Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their prices easily deviate from the target or even fall into a catastrophic collapse and are as a result often dismissed as a Ponzi scheme. However, what is the essence of Ponzi? In this paper, we try to clarify such a deceptive concept and reveal how algorithmic stablecoin works from a higher level. We find that Ponzi is basically a financial protocol that pays existing investors with funds collected from new ones. Running a Ponzi, however, does not necessarily imply that any participant is in any sense losing out, as long as the game can be perpetually rolled over. Economists call such realization as a <i>rational Ponzi game</i>. We accordingly propose a rational model in the context of algorithmic stablecoin and draw its holding conditions. We apply the model and use historical data to examine if the major types of algorithmic stablecoins meet the criteria for being a rational Ponzi game.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141123335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem 经济调度问题的分布式算法,步长与网络无关,采用事件触发机制
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-16 DOI: 10.1002/nem.2276
Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz, Changhai Sun
{"title":"A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem","authors":"Baitong Chen,&nbsp;Jianhua Yang,&nbsp;Wei Lu,&nbsp;Witold Pedrycz,&nbsp;Changhai Sun","doi":"10.1002/nem.2276","DOIUrl":"10.1002/nem.2276","url":null,"abstract":"<p>The economic dispatch problem (EDP) poses a significant challenge in energy management for modern power systems, particularly as these systems undergo expansion. This growth escalates the demand for communication resources and increases the risk of communication failures. To address this challenge, we propose a distributed algorithm with network-independent step sizes and an event-triggered mechanism, which reduces communication requirements and enhances adaptability. Unlike traditional methods, our algorithm uses network-independent step sizes derived from each agent's local cost functions, thus eliminating the need for detailed network topology knowledge. The theoretical derivation identifies a range of step size values that depend solely on the objective function's strong convexity and the gradient's Lipschitz continuity. Furthermore, the proposed algorithm is shown to achieve a linear convergence rate, assuming the event triggering threshold criteria are met for linear convergence. Numerical experiments further validate the effectiveness and advantages of our proposed distributed algorithm by demonstrating its ability to maintain good convergence characteristics while reducing communication frequency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving data aggregation achieving completeness of data queries in smart grid 保护隐私的数据聚合实现智能电网数据查询的完整性
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-13 DOI: 10.1002/nem.2273
Xinyang Li, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang
{"title":"Privacy-preserving data aggregation achieving completeness of data queries in smart grid","authors":"Xinyang Li,&nbsp;Meng Zhao,&nbsp;Yong Ding,&nbsp;Changsong Yang,&nbsp;Huiyong Wang,&nbsp;Hai Liang,&nbsp;Yujue Wang","doi":"10.1002/nem.2273","DOIUrl":"10.1002/nem.2273","url":null,"abstract":"<p>In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While traditional data aggregation schemes can provide a certain level of privacy protection for users, they also impose limitations on the control center's access to fine-grained data. To address these challenges, we propose a privacy-preserving data aggregation scheme supporting data query (PAQ). We designed a multi-level data aggregation mechanism based on Paillier semi-homomorphic encryption to achieve efficient aggregation of user data in the control center. Additionally, a data query mechanism based on electricity consumption intervals is introduced, allowing the control center to query aggregated ciphertexts for different user categories from outsourced data on the cloud server. Security analysis demonstrates that PAQ design effectively solves security issues in data aggregation and query processes. Performance analysis indicates that the proposed scheme outperforms existing solutions in terms of efficiency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of security options for message protocols: A comparative analysis 信息协议安全选项的性能:比较分析
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-13 DOI: 10.1002/nem.2274
Wesley dos Reis Bezerra, Fernando Koch, Carlos Becker Westphall
{"title":"Performance of security options for message protocols: A comparative analysis","authors":"Wesley dos Reis Bezerra,&nbsp;Fernando Koch,&nbsp;Carlos Becker Westphall","doi":"10.1002/nem.2274","DOIUrl":"10.1002/nem.2274","url":null,"abstract":"<p>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信