Simulation Modelling Practice and Theory最新文献

筛选
英文 中文
Investigation on directional rock fracture mechanism under instantaneous expansion from the perspective of damage mechanics: A 3-D simulation 从损伤力学角度研究瞬时膨胀下的定向岩石断裂机制三维模拟
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-09-05 DOI: 10.1016/j.simpat.2024.103013
Shan Guo , Seokwon Jeon , Quan Zhang , Manchao He , Jianning Liu , Chao Wang , Qun Sui
{"title":"Investigation on directional rock fracture mechanism under instantaneous expansion from the perspective of damage mechanics: A 3-D simulation","authors":"Shan Guo ,&nbsp;Seokwon Jeon ,&nbsp;Quan Zhang ,&nbsp;Manchao He ,&nbsp;Jianning Liu ,&nbsp;Chao Wang ,&nbsp;Qun Sui","doi":"10.1016/j.simpat.2024.103013","DOIUrl":"10.1016/j.simpat.2024.103013","url":null,"abstract":"<div><p>With developments in geotechnical engineering, directional rock-breaking technology has been applied in large quantities. As a novel non-explosive rock-breaking technology, Instantaneous Expansion with a Single Crack (IESC) has been studied and applied to some extent in the past few years. IESC uses expansion gas to fracture rock mass in the predetermined direction by a special energy-gathering tube, which has the advantages of high safety, strong directional ability, and easy to operate. At present, there is a lack of in-depth investigation on the directional fracture mechanism of rock under the action of IESC. According to damage mechanics, the fundamental reason for rock fracture is due to the initiation, expansion, and penetration of internal cracks. In this study, a 3-D numerical model based on the theory of progressive failure is established to study the directional rock fracture mechanism of IESC, while a Conventional Expansion (CE) model without energy-gathering tube is established for comparative research. The maximum tensile stress criterion and unified strength criterion are used to identify damage failure of the element. The evolution processes of four key parameters are simulated, the types and degrees of tensile/compressive damage of the unit are analyzed, which aims to decipher the model's directional fracture mechanism under IESC loading. The established 3-D numerical models are validated by comparing with experimental results. The research results can contribute to further understanding the directional rock fracture mechanism of IESC and provide a theoretical basis for the application of IESC in the field.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HTSA: A novel hybrid task scheduling algorithm for heterogeneous cloud computing environment HTSA:适用于异构云计算环境的新型混合任务调度算法
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-30 DOI: 10.1016/j.simpat.2024.103014
Ipsita Behera, Srichandan Sobhanayak
{"title":"HTSA: A novel hybrid task scheduling algorithm for heterogeneous cloud computing environment","authors":"Ipsita Behera,&nbsp;Srichandan Sobhanayak","doi":"10.1016/j.simpat.2024.103014","DOIUrl":"10.1016/j.simpat.2024.103014","url":null,"abstract":"<div><p>Cloud computing provides users and programs with scalable resources and on-demand services virtually in real time, making it a fundamental paradigm in modern computing. The concept for using remote computing resources is novel. Cloud computing relies on task scheduling to boost system performance, reduce execution time, and optimize resource use. Due to exponential task increase and problem complexity, the search space is huge. Optimization tasks like this are NP-hard. This work aims to find a near-optimal solution for a multi-objective task scheduling problem in the cloud while lowering search time. Using the Genetic Algorithm (GA) and Gravitational Search Algorithms (GSA) benefits while avoiding their drawbacks, we offer a standard cloud computing task scheduling method to improve system performance and optimize the Quality of service (QoS) parameters like energy, makespan, resource utilization and throughput. We use CloudSim to test standard functions, real-time, and synthetic workloads. The obtained results are compared to other similar, metaheuristic-based techniques that were evaluated under the same conditions. The designed technique outperforms Gravitational Search Algorithms (GSA), Ant Colony Optimization(ACO), and Particle Swarm optimization(PSO) in Degree Of Imbalance (12%), resource utilization (9%), Mean Response Time (7%) and energy consumption (6%).</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the application of RHT model and SPG algorithm for the analysis of rock cutting process 论 RHT 模型和 SPG 算法在岩石切割过程分析中的应用
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-22 DOI: 10.1016/j.simpat.2024.103012
Ebrahim Farrokh , Hamid Rokhy , Davood Lotfi
{"title":"On the application of RHT model and SPG algorithm for the analysis of rock cutting process","authors":"Ebrahim Farrokh ,&nbsp;Hamid Rokhy ,&nbsp;Davood Lotfi","doi":"10.1016/j.simpat.2024.103012","DOIUrl":"10.1016/j.simpat.2024.103012","url":null,"abstract":"<div><p>The linear cutting process in rock poses challenges for verification in field experiments, laboratory investigations, or numerical simulations. This study aims to analyze the rock cutting process and disc cutter force estimation when using linear cutting mode. Three-dimensional numerical simulations using the explicit dynamic finite element method (LS-DYNA software) are conducted to characterize the cutting process. In this regard, two computational algorithms (Lagrangian and Smoothed Particle Hydrodynamics (SPH)) and two material models (Johnson-Holmquist Concrete (JHC) and Riedel-Hiermaier-Thoma (RHT)) are compared, with SPH and RHT identified as more suitable for rock cutting simulation. The results of comparative analyses show that the Lagrangian computational algorithm is highly dependent on the erosion value, hence this method is not suitable for the simulation of the rock-cutting process. Comparing to the RHT material constitutive model, the Johnson-Holmquist model does not well model the post-failure softening strain behavior, which leads to a reduction in the width of the failure area. The comparative analyses also show that the normal and rolling forces predicted by the JHC model are well over 30% higher than the actual experimental results, while the RHT model shows a good agreement between the predictions and the actual results. Overall, the RHT material model with the use of the SPH computational algorithm shows a very good combination in rock cutting process simulation.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin-driven proactive-reactive scheduling framework for port multi-equipment under a complex uncertain environment 复杂不确定环境下港口多设备数字孪生驱动的主动-反应调度框架
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-17 DOI: 10.1016/j.simpat.2024.103011
Wenfeng Li , Huixian Fan , Lei Cai , Wenjing Guo , Ziteng Wu , Pengfei Yang
{"title":"Digital twin-driven proactive-reactive scheduling framework for port multi-equipment under a complex uncertain environment","authors":"Wenfeng Li ,&nbsp;Huixian Fan ,&nbsp;Lei Cai ,&nbsp;Wenjing Guo ,&nbsp;Ziteng Wu ,&nbsp;Pengfei Yang","doi":"10.1016/j.simpat.2024.103011","DOIUrl":"10.1016/j.simpat.2024.103011","url":null,"abstract":"<div><p>The pervasive uncertainties in multiple port equipment scheduling frequently result in container handling delays or ineffective plans. To address the complexities and uncertainties of port multiple equipment integrated scheduling problem, this paper introduces a Digital Twin-driven (DT-driven) proactive-reactive scheduling framework for the first time. This framework is designed to promptly respond to uncertainties in the scheduling process and provide a transparent visualization of operational information. It specifically tackles the integrated scheduling problem of port quay cranes, Intelligent Guided Vehicles (IGVs), and yard cranes, considering uncertainties such as fluctuations in operating time, equipment failures, and IGV route conflicts. By developing a virtual container port simulation, which features a U-shaped port layout and double-cycling mode drawn from real-world scenarios, the paper evaluates the proposed framework's effectiveness. The experimental results demonstrate that the digital twin framework method significantly improves efficiency and conserves energy. Additionally, in large-scale conditions, the <em>makespan</em> difference between the DT-driven approach and the non-DT-driven approach is as much as 19.56 %. In terms of <em>energy consumption</em> savings, the DT-driven approach's scheduling plan can save 3.67 % of <em>energy consumption</em> under large-scale conditions. Moreover, as the fluctuation index increases, the <em>energy consumption</em> savings become even more significant. This paper also discusses the potential implications of adopting this framework for port companies, highlighting its benefits in enhancing operational and energy efficiency and its incorporation into port management systems. The sensitivity analysis can offer guidance to port companies on optimal equipment allocation strategies.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142040336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFED: Enhancing fire evacuation dynamics through 3D congestion-aware indoor navigation framework INFED:通过三维拥堵感知室内导航框架增强火灾疏散动力
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-14 DOI: 10.1016/j.simpat.2024.103010
Ritik Bhardwaj , Arpita Bhargava , Vaibhav Kumar
{"title":"INFED: Enhancing fire evacuation dynamics through 3D congestion-aware indoor navigation framework","authors":"Ritik Bhardwaj ,&nbsp;Arpita Bhargava ,&nbsp;Vaibhav Kumar","doi":"10.1016/j.simpat.2024.103010","DOIUrl":"10.1016/j.simpat.2024.103010","url":null,"abstract":"<div><p>This paper introduces Indoor Navigation Framework for Fire Evacuation Dynamics (INFED), a novel indoor navigation framework that combines dynamic fire constraints and path congestion management. INFED considers the three-dimensional (3D) attributes of both the agents (speed, volume, location, count) and the environment (3D volume, congestion, corridor height, and corridor length) to estimate navigation routes that avoid fire-affected evacuation paths. It achieves this by integrating various proposed algorithms as modules: Environment Establisher, Fired/Safe Node Identifier, Pre-processor, Weighted Graph Generator, and Path Generator. The 3D features of the agent and environment are used to effectively estimate the capacity of the corridors in an indoor environment for the estimation of path congestion. The path congestion so computed is used during evacuation to identify the safest and congestion-free path. We discuss the performance of INFED by implementing it on various realistic scenarios in a commercial floor setup. We found that the incorporation of safety constraints results in longer evacuation routes, ranging from a 6% increase under mild fire and congestion conditions to a 40% increase under severe fire and congestion conditions. In the event of a worst-case scenario where fire-free paths are scarce, INFED utilizes congestion to reduce agent speed along the recommended evacuation route. This mechanism is activated when congestion surpasses a threshold of 0.3. The system can be used by stakeholders to test various evacuation hypotheses, which can lead to better preparedness and rescue operations, ultimately saving lives in the event of a fire.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time screen space rendering method for particle-based multiphase fluid simulation 基于粒子的多相流体模拟的实时屏幕空间渲染方法
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-10 DOI: 10.1016/j.simpat.2024.103008
Yalan Zhang , Yuhang Xu , Yanrui Xu , Yue Hou , Xiaokun Wang , Yu Guo , Mohammad S. Obaidat , Xiaojuan Ban
{"title":"Real-time screen space rendering method for particle-based multiphase fluid simulation","authors":"Yalan Zhang ,&nbsp;Yuhang Xu ,&nbsp;Yanrui Xu ,&nbsp;Yue Hou ,&nbsp;Xiaokun Wang ,&nbsp;Yu Guo ,&nbsp;Mohammad S. Obaidat ,&nbsp;Xiaojuan Ban","doi":"10.1016/j.simpat.2024.103008","DOIUrl":"10.1016/j.simpat.2024.103008","url":null,"abstract":"<div><p>Existing fluid simulation techniques mainly process single-phase fluids, and they have difficulties in accurately simulating and visualizing multiphase fluid dynamics. This paper proposes a new method for the real-time rendering of multiphase fluid simulations, which uses smoothed particle hydrodynamics in screen space. Meanwhile, the method employs phase fraction textures to differentiate various materials in multiphase fluid simulations, thereby portraying mixing and separation effects more realistically. Besides, efficient texture computation allows it to be integrated seamlessly into real-time simulation rendering workflows. Extensive testing confirms the effectiveness of the proposed method in rendering multiphase fluid behaviors with high visual fidelity and demonstrates its capability to process frames within 0.01 s, even in cases with up to 300,000 particles. This study enhances the fluid dynamics simulation field and provides a more accurate and efficient method for visualizing complex multiphase fluids in simulations.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new approach for software-simulation of membrane systems using a multi-thread programming model 利用多线程编程模型进行膜系统软件模拟的新方法
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-10 DOI: 10.1016/j.simpat.2024.103007
Daniel Cascado-Caballero , Fernando Diaz-del-Rio , Daniel Cagigas-Muñiz , David Orellana-Martín , Ignacio Pérez-Hurtado
{"title":"A new approach for software-simulation of membrane systems using a multi-thread programming model","authors":"Daniel Cascado-Caballero ,&nbsp;Fernando Diaz-del-Rio ,&nbsp;Daniel Cagigas-Muñiz ,&nbsp;David Orellana-Martín ,&nbsp;Ignacio Pérez-Hurtado","doi":"10.1016/j.simpat.2024.103007","DOIUrl":"10.1016/j.simpat.2024.103007","url":null,"abstract":"<div><p>The evolution of simulation and implementation of P systems has been intense since the theoretical model of computation was created. In the field of software simulation of P systems, the proposals made so far have taken advantage mainly of the parallelism of GPUs, but not of the parallelism of existing multi-core processors. This paper proposes a new model for simulating P systems using a multi-threaded approach in a multi-core processor. This simulation approach establishes a new paradigm that is entirely in line with the philosophy of P-systems: since objects must react in parallel, asynchronously and autonomously with other objects, simulation using multiple synchronized threads completely mimics the behavior of objects within a membrane. This proposal has been implemented and tested using a simulator programmed in C#, and its correct operation has been tested for confluent and non-confluent systems. The experimental results confirm that the simulator scales well with the number of hardware threads of a multiprocessor. The obtained results show that the new model is correct and that it can be extended to other more complex types of P systems, in order to discover which are the limit of this multi-threaded approach when running it in multi-core processors.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24001217/pdfft?md5=051d2b5a0e4f14a254b5d9b67b0b861e&pid=1-s2.0-S1569190X24001217-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142011513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of the selective laser sintering/melting process of bioactive glass 45S5 模拟生物活性玻璃 45S5 的选择性激光烧结/熔化过程
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-10 DOI: 10.1016/j.simpat.2024.103009
Dmytro Svyetlichnyy
{"title":"Simulation of the selective laser sintering/melting process of bioactive glass 45S5","authors":"Dmytro Svyetlichnyy","doi":"10.1016/j.simpat.2024.103009","DOIUrl":"10.1016/j.simpat.2024.103009","url":null,"abstract":"<div><p>Additive manufacturing processes, including selective laser sintering (SLS) and selective laser melting (SLM), are rapidly developing industrial fields that require scientific support. Although SLS and SLM are very similar, the level of modeling and simulation of SLM is much higher than that of SLS. This results in the number of publications before 2024 according to Web of Science with SLM simulation approximately five times more than with SLS. To test the possibility of adequate SLS simulations, a platform based on the lattice Boltzmann method (LBM), previously developed and applied to model the SLM process, was used. In addition, the possibility of modeling similar processes (SLM, SLS, and SLS/SLM) using the same modeling tool on the same modeling platform is important. The objective of this paper is to present a model of the SLS process and confirmation of the possibility of using LBM for simulation of the SLS process. A simulation of SLS and SLM with the use of LBM, and qualitative comparison of the results of these simulation for bioactive glass 45S5 is the basis of the methodology used for the research. The simulation presented in this study confirmed the possibility of simulating SLM, SLS processes using common principles, approaches, and models. The results of SLS process simulations can be treated as qualitative and require further verification, whereas SLM simulations have been previously verified. The application of the lattice Boltzmann method, which is a computational fluid dynamics (CFD) method, opens the possibility of using almost every CFD method for the simulation of several kinds of SLS, and can accelerate research in this field.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24001230/pdfft?md5=b61dc3f5302cc0d90dcb32dd6b0b282a&pid=1-s2.0-S1569190X24001230-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mutual authentication enabled trust model for vehicular energy networks using Blockchain in Smart Healthcare Systems 智能医疗系统中使用区块链的车载能源网络相互认证信任模型
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-08-06 DOI: 10.1016/j.simpat.2024.103006
Muhammad Umar Javed , Nadeem Javaid , Nabil Alrajeh , Muhammad Shafiq , Jin-Ghoo Choi
{"title":"Mutual authentication enabled trust model for vehicular energy networks using Blockchain in Smart Healthcare Systems","authors":"Muhammad Umar Javed ,&nbsp;Nadeem Javaid ,&nbsp;Nabil Alrajeh ,&nbsp;Muhammad Shafiq ,&nbsp;Jin-Ghoo Choi","doi":"10.1016/j.simpat.2024.103006","DOIUrl":"10.1016/j.simpat.2024.103006","url":null,"abstract":"<div><p>Healthcare systems face critical issues worldwide such as data breaches, lack of interoperability and inefficiencies in patient data management. These challenges hinder the quality of care and patient outcomes. The increasing adoption of Electric Vehicles (EVs) in Smart Healthcare Systems (SHSs) has brought about new security and privacy challenges. EVs, including electric ambulances, rely on communication networks to exchange critical information and perform energy trading. However, the open nature of these networks makes them vulnerable to various attacks, such as false information dissemination and collusion attacks. In the recent years, Blockchain (BC) technology has emerged as a transformative solution for various industries, including healthcare. The integration of BC in healthcare systems offers enhanced security, transparency and efficiency in managing patient data and other critical information. The paper introduces a data-oriented trust paradigm that is facilitated by revocation transparency. In order to enable the present EVs operating in a SHS to realize their full potential, the model aims to successfully manage security, privacy, storage and other issues. The electric ambulance, an integral part of an SHS, is a special type of EV, which is considered in the study. The proposed approach employs the Password Authenticated Key Exchange by Juggling (J-PAKE) mechanism to provide mutual authentication across distinct entities inside a SHS. Moreover, the Real-time Message Content Validation (RMCV) approach precludes collusion attacks by performing a message credibility check. Moving ahead, anonymization of reputation data is performed via K-anonymity algorithm. Restrictions on the identification of the consistent patterns seen in the reputation data serve to avoid privacy leaks. Additionally, a Proof of Revocation (PoR) technique helps to provide revocation transparency. The Inter Planetary File System (IPFS), a decentralized storage system, houses the vehicle data in order to lessen the BC storage problem. Hashes of the data recorded in IPFS are also uploaded to the immutable BC ledger to prevent disputes. Moreover, IPFS and Cuckoo Filters (CFs) are used to enhance the efficiency of the system. In terms of execution time, data size and storage overhead, the performance evaluation is carried out to assess the proposed model’s efficiency. The simulation results show the execution time for a vast number of messages to be less than 0.6 s. Moreover, K-anonymity ensures storage overhead reduction of almost 35%–40%. Finally, Oyente is used to identify bugs in the smart contract. Overall, it is determined that the proposed approach is effective in establishing mutual authentication, revocation transparency and trust.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simulation framework for automotive cybersecurity risk assessment 汽车网络安全风险评估模拟框架
IF 3.5 2区 计算机科学
Simulation Modelling Practice and Theory Pub Date : 2024-07-31 DOI: 10.1016/j.simpat.2024.103005
Don Nalin Dharshana Jayaratne , Suraj Harsha Kamtam , Siraj Ahmed Shaikh , Muhamad Azfar Ramli , Qian Lu , Rakhi Manohar Mepparambath , Hoang Nga Nguyen , Abdur Rakib
{"title":"A simulation framework for automotive cybersecurity risk assessment","authors":"Don Nalin Dharshana Jayaratne ,&nbsp;Suraj Harsha Kamtam ,&nbsp;Siraj Ahmed Shaikh ,&nbsp;Muhamad Azfar Ramli ,&nbsp;Qian Lu ,&nbsp;Rakhi Manohar Mepparambath ,&nbsp;Hoang Nga Nguyen ,&nbsp;Abdur Rakib","doi":"10.1016/j.simpat.2024.103005","DOIUrl":"10.1016/j.simpat.2024.103005","url":null,"abstract":"<div><p>Human-initiated disruptions such as cyberattacks on connected vehicles have the potential to cause cascading failures in transport systems, leading to systemic risks. ‘ISO/SAE 21434:2021 Road vehicles - Cybersecurity engineering’ is the current standard for risk management of road vehicles. However, the threat analysis and risk assessment framework given in the standard focuses on asset-level analysis and assessment. Hence, this study develops a novel simulation-based framework to perform threat analysis and risk assessment on connected vehicles from a transport network perspective. The proposed framework is developed based on the ISO/SAE 21434 threat analysis and risk assessment methodology. We demonstrate the applicability and usefulness of the framework through a remote attack via the cellular network on the in-vehicle communication bus system of a connected vehicle to show the potential impacts on the transport network. Based on the findings of our case studies, we exemplify how cyberattacks on individual system components of a connected vehicle have the potential to cause systemic failures.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24001199/pdfft?md5=8fc9b5419afcd3b7fa0b3826ddccdaf9&pid=1-s2.0-S1569190X24001199-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信