期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
1
作者 Shafi Ullah Sibghat Ullah Bazai +9 位作者 Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第4期93-115,共23页
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency. 展开更多
关键词 AUTHENTICATION cyber security internet of things machine-type communication devices machine-to-machine communication
下载PDF
Social Distancing and Isolation Management Using Machine-to-Machine Technologies to Prevent Pandemics 被引量:2
2
作者 Muhammad Saad Maaz Bin Ahmad +2 位作者 Muhammad Asif Khalid Masood Mohammad A.Al Ghamdi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3545-3562,共18页
Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish u,swine u,and coronavirus disease 2019(COVID... Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish u,swine u,and coronavirus disease 2019(COVID-19).This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management.These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic.Initially,a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy beacon packets for smart contact tracing.Second,the connectivity of the device with Android or iOS applications using long-term evolution technology is realized to achieve mobility.Finally,mathematical formulations are proposed to measure the distance between coordinates in order to detect geo-fencing violations.These formulations are specically designed for the virtual circular and polygonal boundaries used to restrict suspected or infected persons from trespassing in predetermined areas,e.g.,at home,in a hospital,or in an isolation ward.The proposed framework outperforms existing solutions,since it is implemented on a wider scale,provides a range of functionalities,and is cost-effective. 展开更多
关键词 Coronavirus disease 2019 PANDEMIC machine-to-machine industrial internet of things social distance geo-fencing
下载PDF
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
3
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
下载PDF
Multiple Access Rateless Network Coding for Machine-to-Machine Communications
4
作者 JIAO Jian Rana Abbas +1 位作者 LI Yonghui ZHANG Qinyu 《ZTE Communications》 2016年第4期35-41,共7页
In this paper, we propose a novel multiple access rateless network coding scheme for machine-to-machine (M 2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupi... In this paper, we propose a novel multiple access rateless network coding scheme for machine-to-machine (M 2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupied time slots yet with high decoding suc-cess rates. Unlike existing state-of-the-art distributed rateless coding schemes, the proposed rateless network coding can dynami-cally recode by using simple yet effective XOR operations, which is suitable for M2M erasure networks. Simulation results and analysis demonstrate that the proposed scheme outperforms the existing distributed rateless network coding schemes in the scenar-io of M2M multicast network with heterogeneous erasure features. 展开更多
关键词 rateless network coding multiple accesss machine-to-machine communications (M2M)
下载PDF
Recent Advances in Machine-to-Machine Communications
5
作者 Nian Xia Chu-Sing Yang 《Journal of Computer and Communications》 2016年第5期107-111,共5页
In the near future, there are expected to have at least billions of devices interconnected with each other. How to connect so many devices becomes a big issue. Machine-to-Machine (M2M) communications serve as the fund... In the near future, there are expected to have at least billions of devices interconnected with each other. How to connect so many devices becomes a big issue. Machine-to-Machine (M2M) communications serve as the fundamental underlying technologies to support such Internet of Things (IoT) applications. The characteristics and services requirements of machine type communication devices (MTCDs) are totally different from the existing ones. Existing network technologies, ranging from personal area networks to wide area networks, are not well suited for M2M communications. Therefore, we first investigate the characteristics and service requirements for MTCDs. Recent advances in both cellular and capillary M2M communications are also discussed. Finally, we list some open issues and future research directions.  展开更多
关键词 machine-to-machine Communications IOT MTC Capillary M2M Communications Cellular M2M Communications
下载PDF
Ubiquitous Machine-to-Machine Service Networks
6
作者 Johanna Kallio Juhani Latvakoski 《射频世界》 2010年第1期76-77,共2页
In the near future,there will be many more embedded devices than there are mobile phones.When these devices are connected to the Internet,many novel kinds of ubiquitous service will be enabled.
关键词 THAN WILL MORE Ubiquitous machine-to-machine Service Networks FIGURE
原文传递
Random Access and Resource Allocation for the Coexistence of NOMA-Based and OMA-Based M2M Communications 被引量:2
7
作者 Yali Wu Guixia Kang Ningbo Zhang 《China Communications》 SCIE CSCD 2017年第6期43-53,共11页
In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we pro... In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications. 展开更多
关键词 machine-to-machine communications random access non-orthogonal multiple access user equipment paring power allocation resource allocation
下载PDF
An Improved Random Access Scheme for M2M Communications 被引量:2
8
作者 Yali Wu Guixia Kang +2 位作者 Yanyan Guo Xia Zhu Ningbo Zhang 《China Communications》 SCIE CSCD 2016年第6期12-21,共10页
In this study, an improved random access(RA) scheme for Machine-to-Machine(M2M) communications is proposed. The improved RA scheme is realized by two steps. First, the improved RA scheme achieves a reasonable resource... In this study, an improved random access(RA) scheme for Machine-to-Machine(M2M) communications is proposed. The improved RA scheme is realized by two steps. First, the improved RA scheme achieves a reasonable resource tradeoff between physical random access channel(PRACH) and physical uplink shared channel(PUSCH). To realize a low-complexity resource allocation between PRACH and PUSCH, a boundary of traffic load is derived to divide the number of active M2 M users(UEs) into multiple intervals. The corresponding resource allocation for these intervals is determined by e NB. Then the resource allocation for other number of UEs can be obtained from the allocation of these intervals with less computation. Second, the access barring on arrival rate of new UEs is introduced in the improved RA scheme to reduce the expected delay. Numerical results show that the proposed improved RA scheme can realize a low-complexity resource allocation between PRACH and PUSCH. Meanwhile, the expected delay can be effectively reduced by access barring on arriving rate of new M2 M UEs. 展开更多
关键词 machine-to-machine communications random access success access resource allocation
下载PDF
Self-Organization Approaches for Optimization in Cognitive Radio Networks 被引量:1
9
作者 XU Xu CHAI Xiaomeng ZHANG Zhongshan 《China Communications》 SCIE CSCD 2014年第4期121-129,共9页
Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,c... Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,cognitive radio networks(CRNs)may also impose some challenges due to the ever increasing complexity of network architecture,the increasing complexity with configuration and management of large-scale networks,fluctuating nature of the available spectrum,diverse Quality-of-Service(QoS)requirements of various applications,and the intensifying difficulties of centralized control,etc.Spectrum management functions with self-organization features can be used to address these challenges and realize this new network paradigm.In this paper,fundamentals of CR,including spectrum sensing,spectrum management,spectrum mobility and spectrum sharing,have been surveyed,with their paradigms of self-organization being emphasized.Variant aspects of selforganization paradigms in CRNs,including critical functionalities of Media Access Control(MAC)- and network-layer operations,are surveyed and compared.Furthermore,new directions and open problems in CRNs are also identified in this survey. 展开更多
关键词 cognitive radio self-organized networking heterogeneous machine-to-machine DECENTRALIZED load balancing cooperation.
下载PDF
Information security through controlled quantum teleportation networks 被引量:1
10
作者 Hala Hamdoun Alaa Sagheer 《Digital Communications and Networks》 SCIE 2020年第4期463-470,共8页
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m... Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions. 展开更多
关键词 Information security machine-to-machine COMMUNICATION Intelligent secure systems Quantum teleportation Quantum networks
下载PDF
Requirement-driven remote sensing metadata planning and online acquisition method for large-scale heterogeneous data
11
作者 Shuang Wang Guoqing Li +1 位作者 Wenyang Yu Yue Ma 《Geo-Spatial Information Science》 SCIE EI CSCD 2022年第2期169-181,共13页
Remote sensing data acquisition is one of the most essential processes in the field of Earth observation.However,traditional methods to acquire data do not satisfy the requirements of current applications because larg... Remote sensing data acquisition is one of the most essential processes in the field of Earth observation.However,traditional methods to acquire data do not satisfy the requirements of current applications because large-scale data processing is required.To address this issue,this paper proposes a data acquisition framework that carries out remote sensing metadata planning and then realizes the online acquisition of large amounts of data.Firstly,this paper establishes a unified metadata cataloging model and realizes the catalog of metadata in a local database.Secondly,a coverage calculation model is presented,which can show users the data coverage information in a selected geographical region under the data requirements of a specific application.Finally,according to the data retrieval results and the coverage calcula-tion,a machine-to-machine interface is provided to acquire target remote sensing data.Experiments were conducted to verify the availability and practicality of the proposed frame-work,and the results show the strengths and powerful capabilities of our framework by overcoming deficiencies in traditional methods.It also achieved the online automatic acquisi-tion of large-scale heterogeneous remote sensing data,which can provide guidance for remote sensing data acquisition strategies. 展开更多
关键词 Online data acquisition remote sensing metadata planning metadata cataloging model coverage calculation machine-to-machine interface
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部