期刊文献+
共找到25,500篇文章
< 1 2 250 >
每页显示 20 50 100
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
1
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHallENGES Internet of things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
2
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 Internet of things Group retirement Quality assessment system
下载PDF
Developed Fall Detection of Elderly Patients in Internet of Healthcare Things
3
作者 Omar Reyad Hazem Ibrahim Shehata Mohamed Esmail Karar 《Computers, Materials & Continua》 SCIE EI 2023年第8期1689-1700,共12页
Falling is among the most harmful events older adults may encounter.With the continuous growth of the aging population in many societies,developing effective fall detection mechanisms empowered by machine learning tec... Falling is among the most harmful events older adults may encounter.With the continuous growth of the aging population in many societies,developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential.This paper presents a new healthcare Internet of Health Things(IoHT)architecture built around an ensemble machine learning-based fall detection system(FDS)for older people.Compared to deep neural networks,the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters.The number of cascaded random forest stages is automatically optimized.This study uses a public dataset of fall detection samples called SmartFall to validate the developed fall detection system.The SmartFall dataset is collected based on the acquired measurements of the three-axis accelerometer in a smartwatch.Each scenario in this dataset is classified and labeled as a fall or a non-fall.In comparison to the three machine learning models—K-nearest neighbors(KNN),decision tree(DT),and standard random forest(SRF),the proposed ensemble classifier outperformed the other models and achieved 98.4%accuracy.The developed healthcare IoHT framework can be realized for detecting fall accidents of older people by taking security and privacy concerns into account in future work. 展开更多
关键词 Elderly population fall detection wireless sensor networks Internet of health things ensemble machine learning
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions
4
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) Internet of things(IoT) Internet of Robotic things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Internet of Cultural Things: Current Research, Challenges and Opportunities
5
作者 Xiaoting Liang Fang Liu +2 位作者 Linqi Wang Baoying Zheng Yiyuan Sun 《Computers, Materials & Continua》 SCIE EI 2023年第1期469-488,共20页
Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural se... Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper. 展开更多
关键词 Internet of cultural things cultural applications IoCT technology platform architecture
下载PDF
User Scheduling and Slicing Resource Allocation in Industrial Internet of Things
6
作者 Sisi Li Yong Zhang +1 位作者 Siyu Yuan Tengteng Ma 《China Communications》 SCIE CSCD 2023年第6期368-381,共14页
Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising te... Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines. 展开更多
关键词 wireless communication resource allocation reinforcement learning heterogeneous network network slicing Internet of things
下载PDF
Internet of things:Conceptual network structure,main challenges and future directions
7
作者 Leonardo B.Furstenau Yan Pablo Reckziegel Rodrigues +6 位作者 Michele Kremer Sott Pedro Leivas Michael S.Dohan José Ricardo López-Robles Manuel J.Cobo Nicola Luigi Bragazzi Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2023年第3期677-687,共11页
Internet of Things(IoT)is a key technology trend that supports our digitalized society in applications such as smart countries and smart cities.In this study,we investigate the existing strategic themes,thematic evolu... Internet of Things(IoT)is a key technology trend that supports our digitalized society in applications such as smart countries and smart cities.In this study,we investigate the existing strategic themes,thematic evolution structure,key challenges,and potential research opportunities associated with the IoT.For this study,we conduct a Bibliometric Performance and Network Analysis(BPNA),supplemented by an exhaustive Systematic Literature Review(SLR).Specifically,in BPNA,the software SciMAT is used to analyze 14,385 documents and 30,381 keywords in the Web of Science(WoS)database,which was released between 2002 and 2019.The results reveal that 31 clusters are classified according to their importance and development,and the conceptual structures of key clusters are presented,along with their performance analysis and the relationship with other subthemes.The thematic evolution structure describes the important cluster(s)over time.For the SLR,23 documents are analyzed.The SLR reveals key challenges and limitations associated with the IoT.We expect the results will form the basis of future research and guide decision-making in the IoT and other supporting industries. 展开更多
关键词 Internet of things Strategic intelligence Industry 4.0 SciMAT Bibliometric analysis Science mapping
下载PDF
Teamwork Optimization with Deep Learning Based Fall Detection for IoT-Enabled Smart Healthcare System
8
作者 Sarah B.Basahel Saleh Bajaba +2 位作者 Mohammad Yamin Sachi Nandan Mohanty E.Laxmi Lydia 《Computers, Materials & Continua》 SCIE EI 2023年第4期1353-1369,共17页
The current advancement in cloud computing,Artificial Intelligence(AI),and the Internet of Things(IoT)transformed the traditional healthcare system into smart healthcare.Healthcare services could be enhanced by incorp... The current advancement in cloud computing,Artificial Intelligence(AI),and the Internet of Things(IoT)transformed the traditional healthcare system into smart healthcare.Healthcare services could be enhanced by incorporating key techniques like AI and IoT.The convergence of AI and IoT provides distinct opportunities in the medical field.Fall is regarded as a primary cause of death or post-traumatic complication for the ageing population.Therefore,earlier detection of older person falls in smart homes is required to improve the survival rate of an individual or provide the necessary support.Lately,the emergence of IoT,AI,smartphones,wearables,and so on making it possible to design fall detection(FD)systems for smart home care.This article introduces a new Teamwork Optimization with Deep Learning based Fall Detection for IoT Enabled Smart Healthcare Systems(TWODLFDSHS).The TWODL-FDSHS technique’s goal is to detect fall events for a smart healthcare system.Initially,the presented TWODL-FDSHS technique exploits IoT devices for the data collection process.Next,the TWODLFDSHS technique applies the TWO with Capsule Network(CapsNet)model for feature extraction.At last,a deep random vector functional link network(DRVFLN)with an Adam optimizer is exploited for fall event detection.A wide range of simulations took place to exhibit the enhanced performance of the presentedTWODL-FDSHS technique.The experimental outcomes stated the enhancements of the TWODL-FDSHS method over other models with increased accuracy of 98.30%on the URFD dataset. 展开更多
关键词 Internet of things smart healthcare deep learning team work optimizer capsnet fall detection
下载PDF
Time to forge ahead:The Internet of Things for healthcare
9
作者 Denzil Furtado Andre F.Gygax +1 位作者 Chien Aun Chan Ashley I.Bush 《Digital Communications and Networks》 SCIE CSCD 2023年第1期223-235,共13页
Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to over... Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to overburdened hospital systems,to dealing with the COVID-19 pandemic.However,despite considerable recent technological advances,the pace of successful implementation of promising IoT healthcare initiatives has been slow.To inspire more productive collaboration,we present here a simple—but surprisingly underrated—problemoriented approach to developing healthcare technologies.To further assist in this effort,we reviewed the various commercial,regulatory,social/cultural,and technological factors in the development of the IoT.We propose that fog computing—a technological paradigm wherein the burden of computing is shifted from a centralized cloud server closer to the data source—offers the greatest promise for building a robust and scalable healthcare IoT ecosystem.To this end,we explore the key enabling technologies that underpin the fog architecture,from the sensing layer all the way up to the cloud.It is our hope that ongoing advances in sensing,communications,cryptography,storage,machine learning,and artificial intelligence will be leveraged in meaningful ways to generate unprecedented medical intelligence and thus drive improvements in the health of many people. 展开更多
关键词 Internet of things Healthcare Information Fog computing Artificial intelligence Machine learning Big data COVID-19 pandemic
下载PDF
Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management
10
作者 Riya Kumarasamy Santhanaraj Surendran Rajendran +1 位作者 Carlos Andres Tavera Romero Sadish Sendil Murugaraj 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1561-1576,共16页
Wireless Sensor Networks(WSNs)are a major element of Internet of Things(IoT)networks which offer seamless sensing and wireless connectivity.Disaster management in smart cities can be considered as a safety critical ap... Wireless Sensor Networks(WSNs)are a major element of Internet of Things(IoT)networks which offer seamless sensing and wireless connectivity.Disaster management in smart cities can be considered as a safety critical application.Therefore,it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN.Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks.This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management(EAMCR-RTDM).The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization of nodes with the consideration of the features of the disaster region.To achieve this,EAMCR-RTDM technique primarily designs a yellow saddle goatfish based clustering(YSGF-C)technique to elect cluster heads(CHs)and organize clusters.In addition,enhanced cockroach swarm optimization(ECSO)based multihop routing(ECSO-MHR)approach was derived for optimal route selection.The YSGF-C and ECSO-MHR techniques compute fitness functions using different input variables for achieving improved energy efficiency and network lifetime.The design of YSGF-C and ECSO-MHR techniques for disaster management in IoT networks shows the novelty of the work.For examining the improved outcomes of the EAMCR-RTDM system,a wide range of simulations were performed and the extensive results are assessed in terms of different measures.The comparative outcomes highlighted the enhanced outcomes of the EAMCRRTDM algorithm over the existing approaches. 展开更多
关键词 Internet of things disaster management wireless sensor networks real time applications ROUTING CLUSTERING
下载PDF
Deep Forest-Based Fall Detection in Internet of Medical Things Environment
11
作者 Mohamed Esmail Karar Omar Reyad Hazem Ibrahim Shehata 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2377-2389,共13页
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest cl... This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural networks.Moreover,the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated layer.The suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset,which is acquired from three-axis accelerometer in a smartwatch.It includes 92781 training samples and 91025 testing samples with two labeled classes,namely non-fall and fall.Classification results of our deep forest classifier demonstrated a superior performance with the best accuracy score of 98.0%compared to three machine learning models,i.e.,K-nearest neighbors,decision trees and traditional random forest,and two deep learning models,which are dense neural networks and convolutional neural networks.By considering security and privacy aspects in the future work,our proposed medical IoT framework for fall detection of old people is valid for real-time healthcare application deployment. 展开更多
关键词 Elderly population fall detection wireless sensor networks internet of medical things deep forest
下载PDF
Joint optimization of serving node selection and wireless resources allocation for transactions data in mobile blockchain enhanced Internet of Things
12
作者 尹玉峰 WU Wenjun +3 位作者 GAO Yang JIN Kaiqi ZHANG Yanhua SUN Teng 《High Technology Letters》 EI CAS 2023年第2期181-193,共13页
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ... With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods. 展开更多
关键词 Internet of things(IoT) mobile edge computing(MEC) blockchain deep reinforcement learning(DRL)
下载PDF
Knowledge and Perceptions of Hospital Care Staff towards Medical Internet of Things and the Role of Awareness Videos: A Quasi Experimental Study
13
作者 Abdulaziz Alomari Ben Soh 《Advances in Internet of Things》 2023年第4期119-143,共25页
Introduction: The healthcare industry continues to adopt and integrate smart technology into its operations. However, the adoption of the eHealth solutions has not been smooth in the Kingdom of Saudi Arabia (KSA) due ... Introduction: The healthcare industry continues to adopt and integrate smart technology into its operations. However, the adoption of the eHealth solutions has not been smooth in the Kingdom of Saudi Arabia (KSA) due to negative beliefs about the technology, lack of awareness and motivation and resistance to change. Thus, this study was developed to investigate the knowledge and perceptions of hospital care staff towards the Medical Internet of Things and to explore the role of awareness videos in changing negative perceptions. Methods: One group pre-test post-test quasi-experimental study design was incorporated, and 116 participants from Ministry of Health hospitals in Riyadh, KSA, were included. A series of four videos were developed to observe their influence on the knowledge and perceptions of mIoT. Results: The findings showed that participants had more knowledge about the individual components of mIoT (particularly wearable devices) compared to the processes or functions of mIoT. Similarly, just over half (56.0%) of the individuals think that the current systems in the hospital are enough to deliver mIoT. However, 90% think mIoT is the future of digital health. Similarly, PE, SI, BI, EE and CESE were considered facilitators and PTA and CC were considered grave barriers to mIoT adoption. The awareness videos positively influenced knowledge and perceptions of PE, EE, CESE and SI. Conclusion: The study concludes that hospital staff in Riyadh (excluding doctors) possess basic mIoT knowledge, consider various adoption factors as enablers, and awareness video can play a critical role in effectively introducing the technology to the hospital care staff. 展开更多
关键词 Internet of things Healthcare Professionals eHealth Knowledge Awareness Intervention Experimental Study
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
14
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 Internet of things AUTHENTICITY security LOCATION communication
下载PDF
Internet of Things Authentication Protocols: Comparative Study
15
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY Internet of things SECURITY AUTHENTICATION
下载PDF
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
16
作者 Dinesh Mavaluru Chettupally Anil Carie +4 位作者 Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1487-1503,共17页
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e... In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings. 展开更多
关键词 Internet of things edge computing OFFLOADING NOMA
下载PDF
ResNeSt-biGRU: An Intrusion DetectionModel Based on Internet of Things
17
作者 Yan Xiang Daofeng Li +2 位作者 XinyiMeng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 Internet of things cyberattack intrusion detection internet security
下载PDF
Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things
18
作者 Bin Li Linghui Kong +3 位作者 Xiangyi Zhang Bochuo Kou Hui Yu Bowen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期3267-3282,共16页
The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power g... The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent security transmission strategy with sensor-transmission-computing linkage is proposed in this paper. The primary objective of this strategy is to maximize the confidentiality capacity of the system. To tackle this, an optimization problem is formulated, taking into consideration interruption probability and interception probability as constraints. To efficiently solve this optimization problem, a low-complexity algorithm rooted in deep reinforcement learning is designed, which aims to derive a suboptimal solution for the problem at hand. Ultimately, through simulation results, the validity of the proposed strategy in guaranteed communication security, stability, and timeliness is substantiated. The results confirm that the proposed intelligent security transmission strategy significantly contributes to the safeguarding of communication integrity, system stability, and timely data delivery. 展开更多
关键词 Secure transmission deep learning power Internet of things sensor-transmission-computing
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
19
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing Internet of things malicious software propagation model HETEROGENEITY
下载PDF
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
20
作者 Shafi Ullah Sibghat Ullah Bazai +9 位作者 Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第4期93-115,共23页
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency. 展开更多
关键词 AUTHENTICATION cyber security internet of things machine-type communication devices machine-to-machine communication
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部