期刊文献+
共找到27,525篇文章
< 1 2 250 >
每页显示 20 50 100
Interworking between Modbus and internet of things platform for industrial services
1
作者 Sherzod Elamanov Hyeonseo Son +3 位作者 Bob Flynn Seong Ki Yoo Naqqash Dilshad JaeSeung Song 《Digital Communications and Networks》 SCIE CSCD 2024年第2期461-471,共11页
In the era of rapid development of Internet of Things(IoT),numerous machine-to-machine technologies have been applied to the industrial domain.Due to the divergence of IoT solutions,the industry is faced with a need t... In the era of rapid development of Internet of Things(IoT),numerous machine-to-machine technologies have been applied to the industrial domain.Due to the divergence of IoT solutions,the industry is faced with a need to apply various technologies for automation and control.This fact leads to a demand for an establishing interworking mechanism which would allow smooth interoperability between heterogeneous devices.One of the major protocols widely used today in industrial electronic devices is Modbus.However,data generated by Modbus devices cannot be understood by IoT applications using different protocols,so it should be applied in a couple with an IoT service layer platform.oneM2M,a global IoT standard,can play the role of interconnecting various protocols,as it provides flexible tools suitable for building an interworking framework for industrial services.Therefore,in this paper,we propose an interworking architecture between devices working on the Modbus protocol and an IoT platform implemented based on oneM2M standards.In the proposed architecture,we introduce the way to model Modbus data as oneM2M resources,rules to map them to each other,procedures required to establish interoperable communication,and optimization methods for this architecture.We analyze our solution and provide an evaluation by implementing it based on a solar power management use case.The results demonstrate that our model is feasible and can be applied to real case scenarios. 展开更多
关键词 Internet of things INTEROPERABILITY INTERWORKING MODBUS oneM2M
下载PDF
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things
2
作者 Lizong Zhang Yiming Wang +3 位作者 Ke Yan Yi Su Nawaf Alharbe Shuxin Feng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期666-675,共10页
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy... With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency. 展开更多
关键词 behaviour recognition Motion features Attention mechanism Internet of things Crowdsensing
下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
3
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite Internet of things
下载PDF
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment
4
作者 Abdulrahman Alzahrani 《Computers, Materials & Continua》 SCIE EI 2024年第8期2331-2349,共19页
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent ... The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices.Anomaly detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual activities.Machine learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device behaviour.In addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to botnets.Various ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT systems.To overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)technique.The GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT environment.For data preprocessing,the min-max data normalization approach is primarily used.The GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature subsets.Moreover,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet detection.Finally,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM method.The experimental validation of the GTODL-BADC technique can be tested on a benchmark dataset.The simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process. 展开更多
关键词 Botnet detection internet of things gorilla troops optimizer hyperparameter tuning intrusion detection system
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
5
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 Internet of things (IoT) M2M Factors Obstacles Potential benefits UNIVERSITIES
下载PDF
Fiber-Optic Sensors and Their Practical Research in the Internet of Things
6
作者 Hanqing Liu 《Journal of Electronic Research and Application》 2024年第5期1-5,共5页
With the rapid development of the Internet of Things(IoT)technology,fiber-optic sensors,as a kind of high-precision and high-sensitivity measurement tool,are increasingly widely used in the field of IoT.This paper out... With the rapid development of the Internet of Things(IoT)technology,fiber-optic sensors,as a kind of high-precision and high-sensitivity measurement tool,are increasingly widely used in the field of IoT.This paper outlines the advantages of fiber-optic sensors over traditional sensors,such as high precision,strong resistance to electromagnetic interference,and long transmission distance.On this basis,the paper discusses the application scenarios of fiber-optic sensors in the Internet of Things,including environmental monitoring,intelligent industry,medical and health care,intelligent transportation,and other fields.It is hoped that this study can provide theoretical support and practical guidance for the further development of fiber-optic sensors in the field of the Internet of Things,as well as promote the innovation and application of IoT. 展开更多
关键词 Fiber-optic sensor Internet of things Practical application
下载PDF
Things Should Always Be Scanned Widely ——Sino-US Relations:Present Status and Its Prospect
7
作者 Tao Wenzhao 《和平与发展》 1999年第4期59-64,共6页
关键词 be things Should Always be Scanned Widely US Status and Its Prospect Sino-US Relations
下载PDF
Construction of Cucumber Powdery Mildew Early Warning System in Solar Greenhouse Based on Internet of Things 被引量:1
8
作者 吕雄杰 王晓蓉 贾宝红 《Agricultural Science & Technology》 CAS 2016年第12期2873-2876,2884,共5页
ln order to explore the design and construction of cucumber powdery mildew warning system in solar greenhouse, internet of things technology was used to conduct the real-time dynamic monitoring of the incidence of cuc... ln order to explore the design and construction of cucumber powdery mildew warning system in solar greenhouse, internet of things technology was used to conduct the real-time dynamic monitoring of the incidence of cucumber powdery mildew and cucumber growth environment in solar greenhouse. The growth environ-ment included temperature and humidity of air and soil. Logistic regression model was used to construct cucumber powdery mildew warning model. The results showed that humidity characteristic variable (maximum air humidity) and temperature characteristic variable (maximum air temperature) had significant effects on the inci-dence probability of cucumber powdery mildew in solar greenhouse. And it was fea-sible to construct cucumber powdery mildew warning system in solar greenhouse with internet of things. 展开更多
关键词 Solar Greenhouse CUCUMbeR Powdery Mildew lnternet of things Warning Model
下载PDF
基于CAN和REST物联网技术的智能矿山安全检测系统研发 被引量:2
9
作者 夏利玲 孙翠玲 +1 位作者 张慧 黄春香 《金属矿山》 CAS 北大核心 2024年第3期215-220,共6页
针对矿井安全生产检测数据传输效率低下和共享性差的特点,综合考虑开发成本与工作环境要求,基于CAN(Controller Area Network)和REST(Representational State Transfer)物联网技术提出了智能矿山安全检测方法,设计了矿山安全检测判别程... 针对矿井安全生产检测数据传输效率低下和共享性差的特点,综合考虑开发成本与工作环境要求,基于CAN(Controller Area Network)和REST(Representational State Transfer)物联网技术提出了智能矿山安全检测方法,设计了矿山安全检测判别程序,采用最大熵模型算法开发了数据信息预警程序。结合CAN总线技术,将多传感器信息进行有机融合并进行安全数据检测,将井下传感器设备相关信息经过判断分析后传输至总机。将所提安全检测方法进行了系统开发,并在淮北某矿进行了应用。结果表明:基于CAN和REST物联网技术的安全检测方法能够实现多点测量,并可随机增减检测设备,可实现数据实时传输和共享,有助于实现矿山安全实时检测。 展开更多
关键词 物联网 智能矿山 安全检测 最大熵模型 can总线
下载PDF
分布式CAN、ZigBee混合物联网
10
作者 周娜 何铮 《单片机与嵌入式系统应用》 2016年第12期3-6,共4页
在组建大型物联网系统中,采用分布式CAN-ZigBee混合物联网架构是融合了全ZigBee系统、多叠CAN系统、分布式物联网系统优点的一种优化设计。它在测控小数据实时传输中,以高速、安全、硬件滤波点到点的CAN传输取代以太网传输,同时保留了... 在组建大型物联网系统中,采用分布式CAN-ZigBee混合物联网架构是融合了全ZigBee系统、多叠CAN系统、分布式物联网系统优点的一种优化设计。它在测控小数据实时传输中,以高速、安全、硬件滤波点到点的CAN传输取代以太网传输,同时保留了分布式系统的优点。在大系统中,各种感知网的节点统一赋以全系统唯一地址,从而可采用简单、快捷的路由实现节点任意布设、移动和跨子网的测控。 展开更多
关键词 物联网 分布式 can总线 ZIGbeE
下载PDF
Cyber-Physical-Social Based Security Architecture for Future Internet of Things 被引量:10
11
作者 Huansheng Ning Hong Liu 《Advances in Internet of Things》 2012年第1期1-7,共7页
As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this pa... As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM;2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms;3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection. 展开更多
关键词 Internet of things PHYSICAL SOCIAL CYbeR Security Architecture
下载PDF
WiFi over Fiber Link and Wavelength Assignment Protocol for Internet of Things 被引量:2
12
作者 徐坤 庞文凤 +5 位作者 孙小强 沈希 刘盈 梅仲豪 孟学军 林金桐 《China Communications》 SCIE CSCD 2011年第1期119-125,共7页
A novel Wireless Fidelity (WiFi) over fiber link and a wavelength assignment protocol are proposed to provide sufficient bandwidth and extensive coverage range for the various applications in the Internet of Things (I... A novel Wireless Fidelity (WiFi) over fiber link and a wavelength assignment protocol are proposed to provide sufficient bandwidth and extensive coverage range for the various applications in the Internet of Things (IoT).The performance of the WiFi over fiber-based wireless IoT network is evaluated in terms of error vector magnitude (EVM) and data throughput for both the up and down links between the WiFi central control system and remote radio units (RRUs).The experimental results illustrate the reliability of the fiber transmission of 64 Quadrature Amplitude Modulation (64QAM) WiFi signals by direct analog modulation.In order to efficiently utilize the wavelength resources,we also demonstrated the wavelength assignment protocol by employing optical switching configurations in Central Station (CS) to realize the wavelength switching,and the simulation results indicate the queuing size and the corresponding queue delay for different numbers of available wavelengths. 展开更多
关键词 wireless fidelity radio over fiber wavelength assignment Internet of things
下载PDF
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions 被引量:1
13
作者 Mohammad Rafsun Islam K. M. Aktheruzzaman 《Journal of Computer and Communications》 2020年第4期11-25,共15页
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied... Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices. 展开更多
关键词 Internet of things IOT IOT Architecture CYbeRSECURITY ATTACKS Security Solutions
下载PDF
An ensemble deep learning model for cyber threat hunting in industrial internet of things 被引量:1
14
作者 Abbas Yazdinejad Mostafa Kazemi +2 位作者 Reza M.Parizi Ali Dehghantanha Hadis Karimipour 《Digital Communications and Networks》 SCIE CSCD 2023年第1期101-110,共10页
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)platforms.Such vast heterogeneous data i... By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)platforms.Such vast heterogeneous data increase the challenges of security risks and data analysis procedures.As IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to operate.In this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is proposed.In this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data dimension.In addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and performance.To solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection model.In this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on data.The results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,respectively.Moreover,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model. 展开更多
关键词 Internet of things IIoT Anomaly detection Ensemble deep learning Neural networks LSTM
下载PDF
Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment 被引量:1
15
作者 Fadwa Alrowais Sami Althahabi +3 位作者 Saud S.Alotaibi Abdullah Mohamed Manar Ahmed Hamza Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期687-700,共14页
Recently,Internet of Things(IoT)devices produces massive quantity of data from distinct sources that get transmitted over public networks.Cybersecurity becomes a challenging issue in the IoT environment where the exis... Recently,Internet of Things(IoT)devices produces massive quantity of data from distinct sources that get transmitted over public networks.Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved.The development of automated tools for cyber threat detection and classification using machine learning(ML)and artificial intelligence(AI)tools become essential to accomplish security in the IoT environment.It is needed to minimize security issues related to IoT gadgets effectively.Therefore,this article introduces a new Mayfly optimization(MFO)with regularized extreme learning machine(RELM)model,named MFO-RELM for Cybersecurity Threat Detection and classification in IoT environment.The presented MFORELM technique accomplishes the effectual identification of cybersecurity threats that exist in the IoT environment.For accomplishing this,the MFO-RELM model pre-processes the actual IoT data into a meaningful format.In addition,the RELM model receives the pre-processed data and carries out the classification process.In order to boost the performance of the RELM model,the MFO algorithm has been employed to it.The performance validation of the MFO-RELM model is tested using standard datasets and the results highlighted the better outcomes of the MFO-RELM model under distinct aspects. 展开更多
关键词 Cybersecurity threats classification internet of things machine learning parameter optimization
下载PDF
Cyber Security and Privacy Issues in Industrial Internet of Things 被引量:1
16
作者 NZ Jhanjhi Mamoona Humayun Saleh NAlmuayqil 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期361-380,共20页
The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.Howev... The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.However,this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting(various pillars of)industry 4.0.However,before providing a concrete solution certain aspect need to be researched,for instance,cybersecurity threats and privacy issues in the industry.To fill this gap,this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures(in detail).In particular,the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0.Based on a detailed review of existing literature,in this study,we have identified possible cyber threats,their consequences,and countermeasures.Further,we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges.The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications. 展开更多
关键词 Industrial Internet of things(IIoT) CYbeRSECURITY industry 4.0 cyber-attacks
下载PDF
Technologies Behind the Smart Grid and Internet of Things: A System Survey 被引量:1
17
作者 Kuldeep Sharma Arun Malik +3 位作者 Isha Batra A.S.M.Sanwar Hosen Md Abdul Latif Sarker Dong Seog Han 《Computers, Materials & Continua》 SCIE EI 2023年第6期5049-5072,共24页
Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need... Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need for an environmentally friendly system that is transparent,sustainable,cost-saving,energy-efficient,agile and secure.This paper provides an overview of the emerging technologies behind smart grids and the internet of things.The dependent variables are identified by analyzing the electricity consumption patterns for optimal utilization and planning preventive maintenance of their legacy assets like power distribution transformers with real-time parameters to ensure an uninterrupted and reliable power supply.In addition,the paper sorts out challenges in the traditional or legacy electricity grid,power generation,transmission,distribution,and revenue management challenges such as reduc-ing aggregate technical and commercial loss by reforming the existing manual or semi-automatic techniques to fully smart or automatic systems.This article represents a concise review of research works in creating components of the smart grid like smart metering infrastructure for postpaid as well as in prepaid mode,internal structure comparison of advanced metering methods in present scenarios,and communication systems. 展开更多
关键词 Electricity consumption BIDIRECTIONAL advanced meter infrastructure energy internet of things smart grid smart meter
下载PDF
Anomaly Detection for Internet of Things Cyberattacks 被引量:1
18
作者 Manal Alanazi Ahamed Aljuhani 《Computers, Materials & Continua》 SCIE EI 2022年第7期261-279,共19页
The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains... The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains by improving efficiency,productivity,and cost-effectiveness.Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’operation;however,IoT security issues remain a significant challenge.To minimize the risk of cyberattacks on IoT networks,anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks.Although various detection techniques have been proposed in the literature,existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations.In this paper,we propose an intelligent,effective,and lightweight detection approach to detect several IoT attacks.Our proposed model includes a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model.In the detection phase,we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks.The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%,a precision rate of 99.982%,a recall rate of 99.984%,and an F1-score of 99.983%. 展开更多
关键词 Anomaly detection anomaly-based IDS CYbeRSECURITY feature selection Internet of things(IoT) intrusion detection
下载PDF
Anomaly Detection for Industrial Internet of Things Cyberattacks 被引量:1
19
作者 Rehab Alanazi Ahamed Aljuhani 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2361-2378,共18页
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver... The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%. 展开更多
关键词 Anomaly detection anomaly-based IDS Industrial Internet of things(IIoT) IOT industrial control systems(ICSs) X-IIoTID
下载PDF
From Mechatronic Components to Industrial Automation Things: An IoT Model for Cyber-Physical Manufacturing Systems
20
作者 Theodoros Foradis Kleanthis Thramboulidis 《Journal of Software Engineering and Applications》 2017年第8期734-753,共20页
IoT is considered as one of the key enabling technologies for the fourth industrial revolution that is known as Industry 4.0. In this paper, we consider the mechatronic component as the lowest level in the system comp... IoT is considered as one of the key enabling technologies for the fourth industrial revolution that is known as Industry 4.0. In this paper, we consider the mechatronic component as the lowest level in the system composition hierarchy that tightly integrates mechanics with the electronics and software required to convert the mechanics to intelligent (smart) object offering well defined services to its environment. For this mechatronic component to be integrated in the IoT-based industrial automation environment, a software layer is required on top of it to convert its conventional interface to an IoT compliant one. This layer, which we call IoT wrapper, transforms the conventional mechatronic component to an Industrial Automation Thing (IAT). The IAT is the key element of an IoT model specifically developed in the context of this work for the manufacturing domain. The model is compared to existing IoT models and its main differences are discussed. A model-to-model transformer is presented to automatically transform the legacy mechatronic component to an IAT ready to be integrated in the IoT-based industrial automation environment. The UML4IoT profile is used in the form of a Domain Specific Modelling Language to automate this transformation. A prototype implementation of an Industrial Automation Thing using C and the Contiki operating system demonstrates the effectiveness of the proposed approach. 展开更多
关键词 MECHATRONICS Cyber-Physical Systems Internet of things (IoT) Contiki UML4IoT PROFILE
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部