With the advent of the fourth industrial revolution,the new generation of information technology industry represented by the internet of things(IoT)has continually nurtured new business models and economic growth poin...With the advent of the fourth industrial revolution,the new generation of information technology industry represented by the internet of things(IoT)has continually nurtured new business models and economic growth points and created one after another IoT mythology,which greatly promoted the global socioeconomic development and transformation.IoT has increasingly become the new engine of the current global economic development.To this end,this paper starts with the concept and connotation of the IoT,discusses the development and application of the global IoT and the types and characteristics of the IoT business model,and proposes the measures and countermeasures of the business model of the IoT in the context of globalization.展开更多
As an ingenious convergence between the Internet of Things and social networks,the Social Internet of Things(SIoT)can provide effective and intelligent information services and has become one of the main platforms for...As an ingenious convergence between the Internet of Things and social networks,the Social Internet of Things(SIoT)can provide effective and intelligent information services and has become one of the main platforms for people to spread and share information.Nevertheless,SIoT is characterized by high openness and autonomy,multiple kinds of information can spread rapidly,freely and cooperatively in SIoT,which makes it challenging to accurately reveal the characteristics of the information diffusion process and effectively control its diffusion.To this end,with the aim of exploring multi-information cooperative diffusion processes in SIoT,we first develop a dynamics model for multi-information cooperative diffusion based on the system dynamics theory in this paper.Subsequently,the characteristics and laws of the dynamical evolution process of multi-information cooperative diffusion are theoretically investigated,and the diffusion trend is predicted.On this basis,to further control the multi-information cooperative diffusion process efficiently,we propose two control strategies for information diffusion with control objectives,develop an optimal control system for the multi-information cooperative diffusion process,and propose the corresponding optimal control method.The optimal solution distribution of the control strategy satisfying the control system constraints and the control budget constraints is solved using the optimal control theory.Finally,extensive simulation experiments based on real dataset from Twitter validate the correctness and effectiveness of the proposed model,strategy and method.展开更多
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the...With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things.展开更多
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.展开更多
The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices ...The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings.In IoT,an object can offer multiple services and different objects can offer the same services with different parameters and interest factors.The proliferation of offered services led to difficulties during service customization and service filtering.This problem is known as service explosion.The selection of suitable service that fits the requirements of applications and objects is a challenging task.To address these issues,we propose an efficient automated query-based service search model based on the local network navigability concept for the SIoT.In the proposed model,objects can use information from their friends or friends of their friends while searching for the desired services,rather than exploring a global network.We employ a centrality metric that computes the degree of importance for each object in the social IoT that helps in selecting neighboring objects with high centrality scores.The distributed nature of our navigation model results in high scalability and short navigation times.We verified the efficacy of our model on a real-world SIoT-related dataset.The experimental results confirm the validity of our model in terms of scalability,navigability,and the desired objects that provide services are determined quickly via the shortest path,which in return improves the service search process in the SIoT.展开更多
The communications development requires interaction between converging heterogeneous technology environment, with quality and continuity of services to remain competitive. The full implementation of the Future Interne...The communications development requires interaction between converging heterogeneous technology environment, with quality and continuity of services to remain competitive. The full implementation of the Future Internet concept implies in the necessity to operate among heterogeneous technology platforms with continuity of QoS (Quality of Service), what leads to the necessity of an innovative business model to support it and new technical mechanisms of vertical handover to ensure the QoS continuity required and expected by final users but, mainly, perceived by them. An innovative business model that requires innovative QoS continuity mechanisms must consider technical and commercial interoperation among many telecommunication services providers, nationally and internationally based. This interaction demands clear rules to be followed by every player along the telecommunication services chain,i.e., it demands a set of regulation acts to guide them and allow their viability.展开更多
The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Alt...The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so far, the respective existing architectural models are rather monolithic and are dominated by several limitations. The paper introduces a generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Things building blocks towards shaping the “Social Internet of Things”. The proposed architecture is based on a layered lightweight and open middle-ware solution following the paradigm of Service Oriented Architecture and the Semantic Model Driven Ap-proach, which is realized at both design-time and deployment–time covering the whole service lifecycle for the corresponding services and applications provided.展开更多
Energy efficiency is very important for the Internet of Things(IoT),especially for front-end sensed terminal or node.It not only embodies the node’s life,but also reflects the lifetime of the network.Meanwhile,it is ...Energy efficiency is very important for the Internet of Things(IoT),especially for front-end sensed terminal or node.It not only embodies the node’s life,but also reflects the lifetime of the network.Meanwhile,it is also a key indicator of green communications.Unfortunately,there is no article on systematic analysis and review for energy efficiency evaluation in IoT.In this paper,we systemically analyze the architecture of IoT,and point out its energy distribution,Furthermore,we summarized the energy consumption model in IoT,analyzed the pros and cons of improving energy efficiency,presented a state of the art the evaluation metrics of energy efficiency.Finally,we conclude the techniques and methods,and carry out a few open research issues and directions in this field.展开更多
In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In thi...In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data.展开更多
Sensors are ubiquitous in the Internet of Things for measuring and collecting data. Analyzing these data derived from sensors is an essential task and can reveal useful latent information besides the data. Since the I...Sensors are ubiquitous in the Internet of Things for measuring and collecting data. Analyzing these data derived from sensors is an essential task and can reveal useful latent information besides the data. Since the Internet of Things contains many sorts of sensors, the measurement data collected by these sensors are multi-type data, sometimes contai- ning temporal series information. If we separately deal with different sorts of data, we will miss useful information. This paper proposes a method to dis- cover the correlation in multi-faceted data, which contains many types of data with temporal informa- tion, and our method can simultaneously deal with multi-faceted data. We transform high-dimensional multi-faeeted data into lower-dimensional data which is set as multivariate Gaussian Graphical Models, then mine the correlation in multi-faceted data by discover the structure of the multivariate Gausslan Graphical Models. With a real data set, we verifies our method, and the experiment demonstrates that the method we propose can correctly fred out the correlation among multi-faceted meas- urement data.展开更多
The Internet of Things (IoT) has recently emerged as enabling technology for the smart gird, smart health, smart transportation, and smart environment as well as for smart cities. The major smart grid devices are smar...The Internet of Things (IoT) has recently emerged as enabling technology for the smart gird, smart health, smart transportation, and smart environment as well as for smart cities. The major smart grid devices are smart home appliances, distributed renewable energy resources and power substations. The seven domains existing smart grid conceptual model was developed without the IoT concept in mind. As the smart grid evolved, many attempts started to introduce the IoT as enabling technology to the grid. Each device in the grid can be considered as an object. Utilizing the concept of IoT, each device can have a unique IP address that can upload its status and download control commands via the Internet. This paper proposes a conceptual model for the smart grid within the Internet of Things context. The proposed model is based on IPV6 as the backbone of the smart grid communications layer.展开更多
Aiming at the shortage of sufficient continuous parameters for using models to estimate farmland soil organic carbon(SOC) content, an acquisition method of factors influencing farmland SOC and an estimation method of ...Aiming at the shortage of sufficient continuous parameters for using models to estimate farmland soil organic carbon(SOC) content, an acquisition method of factors influencing farmland SOC and an estimation method of farmland SOC content with Internet of Things(IOT) are proposed in this paper. The IOT sensing device and transmission network were established in a wheat demonstration base in Yanzhou Distict of Jining City, Shandong Province, China to acquire data in real time. Using real-time data and statistics data, the dynamic changes of SOC content between October 2012 and June 2015 was simulated in the experimental area with SOC dynamic simulation model. In order to verify the estimation results, potassium dichromate external heating method was applied for measuring the SOC content. The results show that: 1) The estimated value matches the measured value in the lab very well. So the method is feasible in this paper. 2) There is a clear dynamic variation in the SOC content at 0.2 m soil depth in different growing periods of wheat. The content reached the highest level during the sowing period, and is lowest in the flowering period. 3) The SOC content at 0.2 m soil depth varies in accordance with the amount of returned straw. The larger the amount of returned straw is, the higher the SOC content.展开更多
The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementat...The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource sharing. The framework improves efficiency and scalability in IoT, exposes vulnerable subsystems and components as possible weak links to system compromise, and meets the requirements of a heterogeneous computing environment. Other features of the framework including efficient resource sharing, fault tolerance, and distributed storage support the Internet of Things. We discuss the design requirements and carry out the implementation of Proof of Concept and evaluation of our framework. Two underlying technologies: the actor model and the blockchain were used for the implementation. Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel. Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability. We conclude from the evaluations that the actor-based implementation has better scalability than the block-chain-based implementation. Also, the blockchain seems to be computationally more intensive than the actors and less suitable for IoT systems.展开更多
Semantic Internet of Things is an open-world service ecosystem formed on the basis of the Semantic Web, Internet of Things, and social networks. It forms and integrates physical space, cyberspace,and social space. The...Semantic Internet of Things is an open-world service ecosystem formed on the basis of the Semantic Web, Internet of Things, and social networks. It forms and integrates physical space, cyberspace,and social space. The data friction problem is the key issue of the semantic Internet from theory to practice. In order to solve the problem of information interoperation and data friction,it is necessary to deal with the heterogeneity, dynamicity, and uncertainty of data in the semantic Internet of Things. For this reason, this paper constructs a semantic object networking context aware system based on dynamic Bayesian network. The overall architecture of context awareness system based on semantic Internet of Things is proposed. The hierarchical structure of the framework and the functions implemented by each layer are introduced in detail. The contextual awareness system based on semantic Internet of Things is introduced into the overall design and implementation. The design and implementation process of each layer structure of the system is described in detail.展开更多
The existing systems sustained with the investments made require more automation and digital transformation with the continuous advancement of tech-nology.The aviation industry is a sector that is open to more automat...The existing systems sustained with the investments made require more automation and digital transformation with the continuous advancement of tech-nology.The aviation industry is a sector that is open to more automation and digi-tal transformation,mainly because of the intense competition and the analysis of a large variety of data.The long duration of operations in current airline processes and some processflows cause customer dissatisfaction and cost increase.In this study,the boarding process,which is one of the operational processes of airline transportation and is open to improvement,was discussed.The classical boarding process has been redesigned using Internet of Things technology a model called Boarding 4.0 was created.With Boarding 4.0,it is aimed to design a process where passengers can take their time before boarding more efficiently.In the study,the sub-processes of the Boarding 4.0 model,other processes that the sub-processes interact with,their activities,and data exchange passenger move-ments during the activities are explained in detail.Compared to the classical boarding process and Boarding 4.0 with the fuzzy ahp technique,it has been shown that boarding 4.0 is more advantageous and passenger movement times can be reduced during boarding.As a result of the evaluation made with the fuzzy ahp,it was determined that boarding 4.0 is more advantageous than the classical boarding process.In addition,when the total time of the sub-activities in the board-ing process is calculated,boarding activities for a passenger take 50 min with the classic boarding process and 20 min with Boarding 4.0.Thus,when Boarding 4.0 is used,the passenger gains 30 min.Furthermore,when the calculation is made concerning the airport’s current capacity,two passengers are hosted with the clas-sical boarding process,whilefive passengers are hosted with Boarding 4.0.This acquisition is significant for airports in terms of efficient use of resources.展开更多
The Internet of things(IoT)has become a key infrastructure providing up-to-date and fresh information for policy analysis and decision-making of upper-layer applications.However,there are limited sensing and communica...The Internet of things(IoT)has become a key infrastructure providing up-to-date and fresh information for policy analysis and decision-making of upper-layer applications.However,there are limited sensing and communication resources in IoT devices,which significantly affects the timeliness and freshness of the updated status.This work proposes two schemes,namely,the generation rate control and service rate reservation schemes,to improve the overall information freshness of multiple status update streams at the receiver.Specifically,using the recently proposed Age of Information(AoI)as the metric for evaluating information freshness,we characterized the overall information freshness,i.e.,the overall average AoI at the receiver for both schemes,by considering the urgency difference of status update and streams.Both schemes for status updates and streams,respectively,were formulated as two optimization problems.We proved that both problems are convex and the optimal generation and service rates for different streams are found by the standard convex optimization algorithm.Moreover,we proposed both approximate optimal generation and approximate optimal service rate for fast deployment in heavy and light load cases.Numerical results verify the theoretical findings and accuracy of the proposed approximate solutions,guiding the design and deployment of IoT.展开更多
In recent years,the Internet of Things(IoT)technology has been widely used in the production and sales of tropical fruits,with strong practicability and wide application prospects.The tropical fruit dynamic pricing mo...In recent years,the Internet of Things(IoT)technology has been widely used in the production and sales of tropical fruits,with strong practicability and wide application prospects.The tropical fruit dynamic pricing model based on the IoT technology can promote the healthy development of the tropical fruit industry in Hainan and ensure the income of fruit farmers.Based on IoT technology,the quality grade of tropical fruits in Hainan is obtained.According to the dynamic pricing strategy of revenue management,a dynamic pricing model based on the quality of tropical fruits and a dynamic pricing model based on consumer segmentation are established to study the dynamic pricing problem under the condition of maximum profit for tropical fruit sellers.The research results show that for different fruit quality and consumer groups,different pricing models are required for pricing,in order to get the maximum profit from tropical fruit sales.Sellers must flexibly adopt different dynamic pricing models to price tropical fruits to enhance the competitiveness of the tropical fruit industry.展开更多
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ...The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks.展开更多
Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computa...Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing.However,different service architecture and offloading strategies have a different impact on the service time performance of IoT applications.Therefore,this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network.Also,it introduces the offloading latency models to investigate the delay of different offloading scenarios/schemes and explores the effect of computational and communication demand on each one.A series of experiments conducted on an EdgeCloudSim show that different offloading decisions within the Edge-Cloud system can lead to various service times due to the computational resources and communications types.Finally,this paper presents a comprehensive review of the current state-of-the-art research on task offloading issues in the Edge-Cloud environment.展开更多
文摘With the advent of the fourth industrial revolution,the new generation of information technology industry represented by the internet of things(IoT)has continually nurtured new business models and economic growth points and created one after another IoT mythology,which greatly promoted the global socioeconomic development and transformation.IoT has increasingly become the new engine of the current global economic development.To this end,this paper starts with the concept and connotation of the IoT,discusses the development and application of the global IoT and the types and characteristics of the IoT business model,and proposes the measures and countermeasures of the business model of the IoT in the context of globalization.
基金supported by the National Natural Science Foundation of China(Grant Nos.62102240,62071283)the China Postdoctoral Science Foundation(Grant No.2020M683421)the Key R&D Program of Shaanxi Province(Grant No.2020ZDLGY10-05).
文摘As an ingenious convergence between the Internet of Things and social networks,the Social Internet of Things(SIoT)can provide effective and intelligent information services and has become one of the main platforms for people to spread and share information.Nevertheless,SIoT is characterized by high openness and autonomy,multiple kinds of information can spread rapidly,freely and cooperatively in SIoT,which makes it challenging to accurately reveal the characteristics of the information diffusion process and effectively control its diffusion.To this end,with the aim of exploring multi-information cooperative diffusion processes in SIoT,we first develop a dynamics model for multi-information cooperative diffusion based on the system dynamics theory in this paper.Subsequently,the characteristics and laws of the dynamical evolution process of multi-information cooperative diffusion are theoretically investigated,and the diffusion trend is predicted.On this basis,to further control the multi-information cooperative diffusion process efficiently,we propose two control strategies for information diffusion with control objectives,develop an optimal control system for the multi-information cooperative diffusion process,and propose the corresponding optimal control method.The optimal solution distribution of the control strategy satisfying the control system constraints and the control budget constraints is solved using the optimal control theory.Finally,extensive simulation experiments based on real dataset from Twitter validate the correctness and effectiveness of the proposed model,strategy and method.
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things.
基金This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(2020R1A2B5B01002145).
文摘The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings.In IoT,an object can offer multiple services and different objects can offer the same services with different parameters and interest factors.The proliferation of offered services led to difficulties during service customization and service filtering.This problem is known as service explosion.The selection of suitable service that fits the requirements of applications and objects is a challenging task.To address these issues,we propose an efficient automated query-based service search model based on the local network navigability concept for the SIoT.In the proposed model,objects can use information from their friends or friends of their friends while searching for the desired services,rather than exploring a global network.We employ a centrality metric that computes the degree of importance for each object in the social IoT that helps in selecting neighboring objects with high centrality scores.The distributed nature of our navigation model results in high scalability and short navigation times.We verified the efficacy of our model on a real-world SIoT-related dataset.The experimental results confirm the validity of our model in terms of scalability,navigability,and the desired objects that provide services are determined quickly via the shortest path,which in return improves the service search process in the SIoT.
文摘The communications development requires interaction between converging heterogeneous technology environment, with quality and continuity of services to remain competitive. The full implementation of the Future Internet concept implies in the necessity to operate among heterogeneous technology platforms with continuity of QoS (Quality of Service), what leads to the necessity of an innovative business model to support it and new technical mechanisms of vertical handover to ensure the QoS continuity required and expected by final users but, mainly, perceived by them. An innovative business model that requires innovative QoS continuity mechanisms must consider technical and commercial interoperation among many telecommunication services providers, nationally and internationally based. This interaction demands clear rules to be followed by every player along the telecommunication services chain,i.e., it demands a set of regulation acts to guide them and allow their viability.
文摘The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so far, the respective existing architectural models are rather monolithic and are dominated by several limitations. The paper introduces a generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Things building blocks towards shaping the “Social Internet of Things”. The proposed architecture is based on a layered lightweight and open middle-ware solution following the paradigm of Service Oriented Architecture and the Semantic Model Driven Ap-proach, which is realized at both design-time and deployment–time covering the whole service lifecycle for the corresponding services and applications provided.
基金This work is partially supported by the National Natural Science Foundation of China(No.61571004,No.61571303)the National Science and Technology Major Project of China(No.2018ZX03001031)+3 种基金National Key Research and Development Program of China(No.2019YFB2101602)the Science and Technology Innovation Program of Shanghai(No.17DZ2292000,No.16510711600)the Shanghai Natural Science Foundation(No.16ZR1435200)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074).
文摘Energy efficiency is very important for the Internet of Things(IoT),especially for front-end sensed terminal or node.It not only embodies the node’s life,but also reflects the lifetime of the network.Meanwhile,it is also a key indicator of green communications.Unfortunately,there is no article on systematic analysis and review for energy efficiency evaluation in IoT.In this paper,we systemically analyze the architecture of IoT,and point out its energy distribution,Furthermore,we summarized the energy consumption model in IoT,analyzed the pros and cons of improving energy efficiency,presented a state of the art the evaluation metrics of energy efficiency.Finally,we conclude the techniques and methods,and carry out a few open research issues and directions in this field.
基金supported in part by the National Key R&D Program of China under Grant 2018YFA0701601part by the National Natural Science Foundation of China(Grant No.U22A2002,61941104,62201605)part by Tsinghua University-China Mobile Communications Group Co.,Ltd.Joint Institute。
文摘In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data.
基金the Project"The Basic Research on Internet of Things Architecture"supported by National Key Basic Research Program of China(No.2011CB302704)supported by National Natural Science Foundation of China(No.60802034)+2 种基金Specialized Research Fund for the Doctoral Program of Higher Education(No.20070013026)Beijing Nova Program(No.2008B50)"New generation broadband wireless mobile communication network"Key Projects for Science and Technology Development(No.2011ZX03002-002-01)
文摘Sensors are ubiquitous in the Internet of Things for measuring and collecting data. Analyzing these data derived from sensors is an essential task and can reveal useful latent information besides the data. Since the Internet of Things contains many sorts of sensors, the measurement data collected by these sensors are multi-type data, sometimes contai- ning temporal series information. If we separately deal with different sorts of data, we will miss useful information. This paper proposes a method to dis- cover the correlation in multi-faceted data, which contains many types of data with temporal informa- tion, and our method can simultaneously deal with multi-faceted data. We transform high-dimensional multi-faeeted data into lower-dimensional data which is set as multivariate Gaussian Graphical Models, then mine the correlation in multi-faceted data by discover the structure of the multivariate Gausslan Graphical Models. With a real data set, we verifies our method, and the experiment demonstrates that the method we propose can correctly fred out the correlation among multi-faceted meas- urement data.
文摘The Internet of Things (IoT) has recently emerged as enabling technology for the smart gird, smart health, smart transportation, and smart environment as well as for smart cities. The major smart grid devices are smart home appliances, distributed renewable energy resources and power substations. The seven domains existing smart grid conceptual model was developed without the IoT concept in mind. As the smart grid evolved, many attempts started to introduce the IoT as enabling technology to the grid. Each device in the grid can be considered as an object. Utilizing the concept of IoT, each device can have a unique IP address that can upload its status and download control commands via the Internet. This paper proposes a conceptual model for the smart grid within the Internet of Things context. The proposed model is based on IPV6 as the backbone of the smart grid communications layer.
基金Under the auspices of National High-tech R&D Program of China(No.2013AA102301)National Natural Science Foundation of China(No.71503148)
文摘Aiming at the shortage of sufficient continuous parameters for using models to estimate farmland soil organic carbon(SOC) content, an acquisition method of factors influencing farmland SOC and an estimation method of farmland SOC content with Internet of Things(IOT) are proposed in this paper. The IOT sensing device and transmission network were established in a wheat demonstration base in Yanzhou Distict of Jining City, Shandong Province, China to acquire data in real time. Using real-time data and statistics data, the dynamic changes of SOC content between October 2012 and June 2015 was simulated in the experimental area with SOC dynamic simulation model. In order to verify the estimation results, potassium dichromate external heating method was applied for measuring the SOC content. The results show that: 1) The estimated value matches the measured value in the lab very well. So the method is feasible in this paper. 2) There is a clear dynamic variation in the SOC content at 0.2 m soil depth in different growing periods of wheat. The content reached the highest level during the sowing period, and is lowest in the flowering period. 3) The SOC content at 0.2 m soil depth varies in accordance with the amount of returned straw. The larger the amount of returned straw is, the higher the SOC content.
文摘The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource sharing. The framework improves efficiency and scalability in IoT, exposes vulnerable subsystems and components as possible weak links to system compromise, and meets the requirements of a heterogeneous computing environment. Other features of the framework including efficient resource sharing, fault tolerance, and distributed storage support the Internet of Things. We discuss the design requirements and carry out the implementation of Proof of Concept and evaluation of our framework. Two underlying technologies: the actor model and the blockchain were used for the implementation. Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel. Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability. We conclude from the evaluations that the actor-based implementation has better scalability than the block-chain-based implementation. Also, the blockchain seems to be computationally more intensive than the actors and less suitable for IoT systems.
文摘Semantic Internet of Things is an open-world service ecosystem formed on the basis of the Semantic Web, Internet of Things, and social networks. It forms and integrates physical space, cyberspace,and social space. The data friction problem is the key issue of the semantic Internet from theory to practice. In order to solve the problem of information interoperation and data friction,it is necessary to deal with the heterogeneity, dynamicity, and uncertainty of data in the semantic Internet of Things. For this reason, this paper constructs a semantic object networking context aware system based on dynamic Bayesian network. The overall architecture of context awareness system based on semantic Internet of Things is proposed. The hierarchical structure of the framework and the functions implemented by each layer are introduced in detail. The contextual awareness system based on semantic Internet of Things is introduced into the overall design and implementation. The design and implementation process of each layer structure of the system is described in detail.
文摘The existing systems sustained with the investments made require more automation and digital transformation with the continuous advancement of tech-nology.The aviation industry is a sector that is open to more automation and digi-tal transformation,mainly because of the intense competition and the analysis of a large variety of data.The long duration of operations in current airline processes and some processflows cause customer dissatisfaction and cost increase.In this study,the boarding process,which is one of the operational processes of airline transportation and is open to improvement,was discussed.The classical boarding process has been redesigned using Internet of Things technology a model called Boarding 4.0 was created.With Boarding 4.0,it is aimed to design a process where passengers can take their time before boarding more efficiently.In the study,the sub-processes of the Boarding 4.0 model,other processes that the sub-processes interact with,their activities,and data exchange passenger move-ments during the activities are explained in detail.Compared to the classical boarding process and Boarding 4.0 with the fuzzy ahp technique,it has been shown that boarding 4.0 is more advantageous and passenger movement times can be reduced during boarding.As a result of the evaluation made with the fuzzy ahp,it was determined that boarding 4.0 is more advantageous than the classical boarding process.In addition,when the total time of the sub-activities in the board-ing process is calculated,boarding activities for a passenger take 50 min with the classic boarding process and 20 min with Boarding 4.0.Thus,when Boarding 4.0 is used,the passenger gains 30 min.Furthermore,when the calculation is made concerning the airport’s current capacity,two passengers are hosted with the clas-sical boarding process,whilefive passengers are hosted with Boarding 4.0.This acquisition is significant for airports in terms of efficient use of resources.
基金sponsored by the National Natural Science Foundation of China under Grant 61901066,Grant 61971077sponsored by Natural Science Foundation of Chongqing,China under Grant cstc2019jcyjmsxmX0575,Grant cstc2021jcyj-msxmX0458+2 种基金in part by the Entrepreneurship and Innovation Support Plan of Chongqing for Returned Overseas Scholars under Grant cx2021092supported by the open research fund of National Mobile Communications Research Laboratory,Southeast University(No.2021D13,No.2022D06)the Industrial Internet innovation and development project(No.TC200A00M).
文摘The Internet of things(IoT)has become a key infrastructure providing up-to-date and fresh information for policy analysis and decision-making of upper-layer applications.However,there are limited sensing and communication resources in IoT devices,which significantly affects the timeliness and freshness of the updated status.This work proposes two schemes,namely,the generation rate control and service rate reservation schemes,to improve the overall information freshness of multiple status update streams at the receiver.Specifically,using the recently proposed Age of Information(AoI)as the metric for evaluating information freshness,we characterized the overall information freshness,i.e.,the overall average AoI at the receiver for both schemes,by considering the urgency difference of status update and streams.Both schemes for status updates and streams,respectively,were formulated as two optimization problems.We proved that both problems are convex and the optimal generation and service rates for different streams are found by the standard convex optimization algorithm.Moreover,we proposed both approximate optimal generation and approximate optimal service rate for fast deployment in heavy and light load cases.Numerical results verify the theoretical findings and accuracy of the proposed approximate solutions,guiding the design and deployment of IoT.
基金Central Public-interest Scientific Institution Basal Research Fund for Chinese Academy of Tropical Agricultural Sciences(1630062019003,19CXTD-31)Youth Foundation of Natural Science Foundation of Hainan Province(719QN282).
文摘In recent years,the Internet of Things(IoT)technology has been widely used in the production and sales of tropical fruits,with strong practicability and wide application prospects.The tropical fruit dynamic pricing model based on the IoT technology can promote the healthy development of the tropical fruit industry in Hainan and ensure the income of fruit farmers.Based on IoT technology,the quality grade of tropical fruits in Hainan is obtained.According to the dynamic pricing strategy of revenue management,a dynamic pricing model based on the quality of tropical fruits and a dynamic pricing model based on consumer segmentation are established to study the dynamic pricing problem under the condition of maximum profit for tropical fruit sellers.The research results show that for different fruit quality and consumer groups,different pricing models are required for pricing,in order to get the maximum profit from tropical fruit sales.Sellers must flexibly adopt different dynamic pricing models to price tropical fruits to enhance the competitiveness of the tropical fruit industry.
基金in part by National Undergraduate Innovation and Entrepreneurship Training Program under Grant No.202310347039Zhejiang Provincial Natural Science Foundation of China under Grant No.LZ22F020002Huzhou Science and Technology Planning Foundation under Grant No.2023GZ04.
文摘The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks.
基金In addition,the authors would like to thank the Deanship of Scientific Research,Prince Sattam bin Abdulaziz University,Al-Kharj,Saudi Arabia,for supporting this work.
文摘Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing.However,different service architecture and offloading strategies have a different impact on the service time performance of IoT applications.Therefore,this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network.Also,it introduces the offloading latency models to investigate the delay of different offloading scenarios/schemes and explores the effect of computational and communication demand on each one.A series of experiments conducted on an EdgeCloudSim show that different offloading decisions within the Edge-Cloud system can lead to various service times due to the computational resources and communications types.Finally,this paper presents a comprehensive review of the current state-of-the-art research on task offloading issues in the Edge-Cloud environment.