• Current Issue
  • Cover Articles
  • Archive
  • Virtual Issues
  • Online First
  • Vol. 25  Issue 10, 2024 2024年 25卷 第10 Issue
    • Regular Papers

      Robertas DAMAŠEVIČIUS,Sanjay MISRA,Rytis MASKELIŪNAS,Anand NAYYAR

      Vol. 25, Issue 10, Pages: 1295-1321(2024) DOI: 10.1631/FITEE.2300215
      Abstract:Internet of Things (IoT) devices are becoming increasingly ubiquitous, and their adoption is growing at an exponential rate. However, they are vulnerable to security breaches, and traditional security mechanisms are not enough to protect them. The massive amounts of data generated by IoT devices can be easily manipulated or stolen, posing significant privacy concerns. This paper is to provide a comprehensive overview of the integration of blockchain and IoT technologies and their potential to enhance the security and privacy of IoT systems. The paper examines various security issues and vulnerabilities in IoT and explores how blockchain-based solutions can be used to address them. It provides insights into the various security issues and vulnerabilities in IoT and explores how blockchain can be used to enhance security and privacy. The paper also discusses the potential applications of blockchain-based IoT (B-IoT) systems in various sectors, such as healthcare, transportation, and supply chain management. The paper reveals that the integration of blockchain and IoT has the potential to enhance the security, privacy, and trustworthiness of IoT systems. The multi-layered architecture of B-IoT, consisting of perception, network, data processing, and application layers, provides a comprehensive framework for the integration of blockchain and IoT technologies. The study identifies various security solutions for B-IoT, including smart contracts, decentralized control, immutable data storage, identity and access management (IAM), and consensus mechanisms. The study also discusses the challenges and future research directions in the field of B-IoT.  
      Keywords:Blockchain;Internet of Things (IoT);Blockchain-based IoT (B-IoT);Security;Scalability;Privacy   
      71
      |
      67
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 44819286 false
      Updated:2024-11-07
    • Regular Papers

      Traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing Cover Article Enhanced Publication AI Introduction

      Reporting on the latest advancements in multicore system communication, this paper introduces a traffic-oriented reconfigurable NoC architecture that adapts to varying traffic flows with high flexibility. Expert researchers have established a system that greatly reduces packet latency and improves saturation throughput, laying a foundation for the construction of efficient multicore systems.

      Chenglong SUN,Yiming OUYANG,Huaguo LIANG

      Vol. 25, Issue 10, Pages: 1322-1336(2024) DOI: 10.1631/FITEE.2300458
      Abstract:As the number of cores in a multicore system increases, the communication pressure on the interconnection network also increases. The network-on-chip (NoC) architecture is expected to take on the ever-expanding communication demands triggered by the ever-increasing number of cores. The communication behavior of the NoC architecture exhibits significant spatial–temporal variation, posing a considerable challenge for NoC reconfiguration. In this paper, we propose a traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing to adapt to the varying traffic flows with a high flexibility. First, a modified input port is introduced to support buffer sharing between adjacent ports. Specifically, the modified input port can be dynamically reconfigured to react to on-demand traffic. Second, it is ascertained that a centralized output-oriented buffer management works well with the reconfigurable input ports. Finally, this reconfiguration method can be implemented with a low overhead hardware design without imposing a great burden on the system implementation. The experimental results show that compared to other proposals, the proposed NoC architecture can greatly reduce the packet latency and improve the saturation throughput, without incurring significant area and power overhead.  
      Keywords:Network-on-chip;Reconfigurable;Traffic-oriented;Buffer sharing   
      18
      |
      32
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 76761480 false
      Updated:2024-11-07
    • Regular Papers

      Dengyu RAN,Xiao CHEN,Lei SONG

      Vol. 25, Issue 10, Pages: 1337-1352(2024) DOI: 10.1631/FITEE.2300593
      Abstract:Dynamic bandwidth allocation (DBA) is a fundamental challenge in the realm of networking. The rapid, accurate, and fair allocation of bandwidth is crucial for network service providers to fulfill service-level agreements, alleviate link congestion, and devise strategies to counter network attacks. However, existing bandwidth allocation algorithms operate mainly on the control plane of the software-defined networking paradigm, which can lead to considerable probing overhead and convergence latency. Moreover, contemporary network architectures necessitate a hierarchical bandwidth allocation system that addresses latency requirements. We introduce a fine-grained, hierarchical, and scalable DBA algorithm, i.e., the HSDBA algorithm, implemented on the programmable data plane. This algorithm reduces network overhead and latency between the data plane and the controller, and it is proficient in dynamically adding and removing network configurations. We investigate the practicality of HSDBA using protocol-oblivious forwarding switches. Experimental results show that HSDBA achieves fair bandwidth allocation and isolation guarantee within approximately 25 packets. It boasts a convergence speed 0.5 times higher than that of the most recent algorithm, namely, approximate hierarchical allocation of bandwidth (AHAB); meanwhile, it maintains a bandwidth enforcement accuracy of 98.1%.  
      Keywords:Dynamic bandwidth allocation;Software-defined networking;Programmable data plane;Protocol-oblivious forwarding switch (POFSwitch)   
      26
      |
      35
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 76761481 false
      Updated:2024-11-07
    • Regular Papers

      In the realm of digital image security, a new reversible data hiding scheme for encrypted JPEG bitstreams has been introduced. This innovation ensures the protection of both secret messages and the integrity of the image载体, offering a robust solution to privacy concerns in image sharing. The research demonstrates superior performance in embedding capacity without compromising file size or format compatibility.

      Yongning GUO,Guodong SU,Zhiqiang YAO,Wang ZHOU

      Vol. 25, Issue 10, Pages: 1353-1369(2024) DOI: 10.1631/FITEE.2300749
      Abstract:Joint Photographic Experts Group (JPEG) format is extensively used for images in many practical applications due to its excellent compression ratio and satisfactory image quality. Considering compelling concerns about the invasion of privacy, this paper proposes an effective reversible data hiding scheme for encrypted JPEG bitstreams, to provide security and privacy for both secret messages and valuable carriers. First, a format-compatibility and file size preserving encryption algorithm is applied to encipher the plaintext JPEG image into a noise-like version. Then, we present an effective reversible data hiding scheme in encrypted JPEG bitstreams using adaptive RZL rotation, where the secret messages are concealed with the sequence of RZL pairs. When the authorized user receives the marked encrypted JPEG bitstreams, the error-free extraction of secret messages and the lossless recovery of the original plaintext JPEG image can be accomplished separately. Extensive experiments are conducted to show that, compared to some state-of-the-art schemes, the proposed scheme has a superior performance in terms of embedding capacity, while keeping file size preservation and format compatibility.  
      Keywords:Joint Photographic Experts Group (JPEG);Reversible data hiding;Embedding capacity;File size preservation;Format compatibility   
      16
      |
      29
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 76440694 false
      Updated:2024-11-07
    • Regular Papers

      In the field of extended finite state machines, this paper introduces its research progress. The author established the bilinear dynamic system model and verified the controllability and stabilizability of the EFSM, laying the foundation for the construction of the EFSM system.

      Chao DONG,Yongyi YAN,Huiqin LI,Jumei YUE

      Vol. 25, Issue 10, Pages: 1370-1377(2024) DOI: 10.1631/FITEE.2300578
      Abstract:This paper uses the semi-tensor product (STP) of matrices and adopts algebraic methods to study the controllability, reachability, and stabilizability of extended finite state machines (EFSMs). First, we construct the bilinear dynamic system model of the EFSM, laying the foundation for further research. Second, combined with this bilinear dynamic system model, we propose theorems for the controllability, reachability, and stabilizability of the bilinear dynamic system model of the EFSM. Finally, we design an algorithm to determine the controllability and stabilizability of the EFSM. The correctness of the main results is verified through examples.  
      Keywords:Semi-tensor product (STP);Matrix approach;Algebraic method;Finite-valued systems   
      43
      |
      89
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 44819316 false
      Updated:2024-11-07
    • Regular Papers

      Hangli REN,Qingxi FAN,Linlin HOU

      Vol. 25, Issue 10, Pages: 1378-1389(2024) DOI: 10.1631/FITEE.2400427
      Abstract:This paper focuses on addressing the problems of finite-time boundedness and guaranteed cost control in switched systems under asynchronous switching. To reduce redundant information transmission and alleviate data congestion of sensor nodes, two schemes are proposed: the event-triggered scheme (ETS) and the round-robin protocol (RRP). These schemes are designed to ensure that the system exhibits good dynamic characteristics while reducing communication resources. In the field of finite-time control, a switching signal is designed using the admissible edge-dependent average dwell time (AED-ADT) method. This method involves a slow AED-ADT switching and a fast AED-ADT switching, which are respectively suitable for finite-time stable and finite-time unstable situations of the controlled system within the asynchronous switching interval. By constructing a double-mode dependent Lyapunov function, the finite-time bounded criterion and the controller gain of the switched systems are obtained. Finally, the validity of the proposed results is showcased by implementing a buck-boost voltage circuit model.  
      Keywords:Switched systems;Event-triggered scheme;Round-robin protocol;Asynchronous switching;Admissible edge-dependent average dwell time (AED-ADT);Guaranteed cost control   
      14
      |
      29
      |
      0
      <HTML>
      <L-PDF><Meta-XML>
      <Citation> <Bulk Citation> 76761569 false
      Updated:2024-11-07
    SEE MORE

    Videos

    • 2023 Issue 1 | Scalability and efficiency challenges for the exascale supercomputing system: practice of a parallel supporting environment on the Sunway exascale prototype system 00:02:51

      2023 Issue 1 | Scalability and efficiency challenges for the exascale supercomputing system: practice of a parallel supporting environment on the Sunway exascale prototype system

      2023-12-30
      Play Total: 16
    • 2023 Issue 6 | Model division multiple access for semantic communications 00:02:30

      2023 Issue 6 | Model division multiple access for semantic communications

      2023-12-30
      Play Total: 8
    • 2022 Issue 10 | Discussion on a new paradigm of endogenous security towards 6G networks 00:02:15

      2022 Issue 10 | Discussion on a new paradigm of endogenous security towards 6G networks

      2023-12-30
      Play Total: 0
    • 2022 Issue 12 | Technology trends in large-scale high-efficiency network computing 00:02:22

      2022 Issue 12 | Technology trends in large-scale high-efficiency network computing

      2023-12-30
      Play Total: 2
    • 2022 Issue 6 | Self-deployed execution environment for high performance computing 00:02:48

      2022 Issue 6 | Self-deployed execution environment for high performance computing

      2022-08-03
      Play Total: 7
    • 2022 Issue 2 | A full-process intelligent trial system for smart court 00:02:24

      2022 Issue 2 | A full-process intelligent trial system for smart court

      2022-05-17
      Play Total: 6
    • 2022 Issue 3 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis 00:02:37

      2022 Issue 3 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis

      2022-05-17
      Play Total: 4
    • P1 Speech by Academician Baoyan Duan 00:05:36

      P1 Speech by Academician Baoyan Duan

      2022-04-17
      Play Total: 6
    • P2 Speech by Professor Min  Sheng, Xidian University 00:02:27

      P2 Speech by Professor Min Sheng, Xidian University

      2022-04-17
      Play Total: 3
    • P3 Speech by Professor Yunsong Li, Xidian University 00:02:37

      P3 Speech by Professor Yunsong Li, Xidian University

      2022-04-17
      Play Total: 9
    SEE MORE

    0