期刊文献+
共找到387篇文章
< 1 2 20 >
每页显示 20 50 100
A dynamic algorithm for trust inference based on double DQN in the internet of things
1
作者 Xiaodong Zhuang Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1024-1034,共11页
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t... The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability. 展开更多
关键词 internet of things Information security Reinforcement learning trust propagation trust inference
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
2
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things
3
作者 Lizong Zhang Yiming Wang +3 位作者 Ke Yan Yi Su Nawaf Alharbe Shuxin Feng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期666-675,共10页
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy... With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency. 展开更多
关键词 Behaviour recognition Motion features Attention mechanism internet of things Crowdsensing
下载PDF
Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis 被引量:1
4
作者 Feslin Anish Mon Solomon Godfrey Winster Sathianesan R.Ramesh 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1125-1142,共18页
Internet of Things(IoT)is a popular social network in which devices are virtually connected for communicating and sharing information.This is applied greatly in business enterprises and government sectors for deliveri... Internet of Things(IoT)is a popular social network in which devices are virtually connected for communicating and sharing information.This is applied greatly in business enterprises and government sectors for delivering the services to their customers,clients and citizens.But,the interaction is success-ful only based on the trust that each device has on another.Thus trust is very much essential for a social network.As Internet of Things have access over sen-sitive information,it urges to many threats that lead data management to risk.This issue is addressed by trust management that help to take decision about trust-worthiness of requestor and provider before communication and sharing.Several trust-based systems are existing for different domain using Dynamic weight meth-od,Fuzzy classification,Bayes inference and very few Regression analysis for IoT.The proposed algorithm is based on Logistic Regression,which provide strong statistical background to trust prediction.To make our stand strong on regression support to trust,we have compared the performance with equivalent sound Bayes analysis using Beta distribution.The performance is studied in simu-lated IoT setup with Quality of Service(QoS)and Social parameters for the nodes.The proposed model performs better in terms of various metrics.An IoT connects heterogeneous devices such as tags and sensor devices for sharing of information and avail different application services.The most salient features of IoT system is to design it with scalability,extendibility,compatibility and resiliency against attack.The existing worksfinds a way to integrate direct and indirect trust to con-verge quickly and estimate the bias due to attacks in addition to the above features. 展开更多
关键词 LRtrust logistic regression trust management internet of things
下载PDF
Trust Management Mechanism for Internet of Things 被引量:4
5
作者 GU Lize WANG Jingpei SUN Bin 《China Communications》 SCIE CSCD 2014年第2期148-156,共9页
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches ab... Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT. 展开更多
关键词 internet of things trustmanagement formal semantics trust decision-making
下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
6
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things trusted mea-surement trusted attestation: group signature
下载PDF
Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing
7
作者 Xinyi Qing Baopeng Ye +3 位作者 Yuanquan Shi Tao Li Yuling Chen Lei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3607-3624,共18页
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ... Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput. 展开更多
关键词 Blockchain internet of things storage optimization transaction verification cloud computing incentive mechanism
下载PDF
SBFT:A BFT Consensus Mechanism Based on DQN Algorithm for Industrial Internet of Thing
8
作者 Ningjie Gao Ru Huo +3 位作者 Shuo Wang Jiang Liu Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2023年第10期185-199,共15页
With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to ... With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to the conflict between the operational performance and security of the blockchain system and the compatibility issues with a large number of IIoT devices running together,the mainstream blockchain system cannot be applied to IIoT scenarios.In order to solve these problems,this paper proposes SBFT(Speculative Byzantine Consensus Protocol),a flexible and scalable blockchain consensus mechanism for the Industrial Internet of Things.SBFT has a consensus process based on speculation,improving the throughput and consensus speed of blockchain systems and reducing communication overhead.In order to improve the compatibility and scalability of the blockchain system,we select some nodes to participate in the consensus,and these nodes have better performance in the network.Since multiple properties determine node performance,we abstract the node selection problem as a joint optimization problem and use Dueling Deep Q Learning(DQL)to solve it.Finally,we evaluate the performance of the scheme through simulation,and the simulation results prove the superiority of our scheme. 展开更多
关键词 Industrial internet of things Byzantine fault tolerance speculative consensus mechanism Markov decision process deep reinforcement learning
下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
9
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography internet of things radio frequency identification security system trusting system.
下载PDF
DDoS Detection for 6G Internet of Things: Spatial-Temporal Trust Model and New Architecture 被引量:2
10
作者 Yinglun Ma Xu Chen +1 位作者 Wei Feng Ning Ge 《China Communications》 SCIE CSCD 2022年第5期141-149,共9页
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows. 展开更多
关键词 sixth generation(6G)network internet of things(IoT) trust model distributed denial of service(DDoS)
下载PDF
A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter 被引量:1
11
作者 Shan Chun Xiaolong Chen +1 位作者 Guoqiang Deng Hao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第3期1203-1216,共14页
The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it... The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it is difficult to predict the congestion state of the link-end accurately at the source.In this paper,we presented an improved NUMFabric algorithm for calculating the overall congestion price.In the proposed scheme,the whole network structure had been obtained by the central control server in the Software Defined Network,and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.In this scheme,the first hierarchy algorithm was set up in a central control server like Opendaylight and the guiding parameter B is obtained based on the intelligent data of global link state information.Based on the historical data,the congestion state of the network and the guiding parameter B is accurately predicted by the machine learning algorithm.The second hierarchy algorithm was installed in the Openflow link and the link price was calculated based on guiding parameter B given by the first algorithm.We evaluate this evolved NUMFabric algorithm in NS3,which demonstrated that the proposed NUMFabric algorithm could efficiently increase the link bandwidth utilization of cloud computing IoT datacenters. 展开更多
关键词 internet of things cloud computing intelligent data aggregation distributed optimization trusted network calculation
下载PDF
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism
12
作者 Hamid Taramit Luis Orozco-Barbosa Abdelkrim Haqiq 《Digital Communications and Networks》 SCIE CSCD 2023年第1期236-251,共16页
IEEE 802.11ah is a new Wi-Fi standard for sub-1Ghz communications,aiming to address the challenges of the Internet of Things(IoT).Significant changes in the legacy 802.11 standards have been proposed to improve the ne... IEEE 802.11ah is a new Wi-Fi standard for sub-1Ghz communications,aiming to address the challenges of the Internet of Things(IoT).Significant changes in the legacy 802.11 standards have been proposed to improve the network performance in high contention scenarios,the most important of which is the Restricted Access Window(RAW)mechanism.This mechanism promises to increase the throughput and energy efficiency by dividing stations into different groups.Under this scheme,only the stations belonging to the same group may access the channel,which reduces the collision probability in dense scenarios.However,the standard does not define the RAW grouping strategy.In this paper,we develop a new mathematical model based on the renewal theory,which allows for tracking the number of transmissions within the limited RAW slot contention period defined by the standard.We then analyze and evaluate the performance of RAW mechanism.We also introduce a grouping scheme to organize the stations and channel access time into different groups within the RAW.Furthermore,we propose an algorithm to derive the RAW configuration parameters of a throughput maximizing grouping scheme.We additionally explore the impact of channel errors on the contention within the time-limited RAW slot and the overall RAW optimal configuration.The presented analytical framework can be applied to many other Wi-Fi standards that integrate periodic channel reservations.Extensive simulations using the MATLAB software validate the analytical model and prove the effectiveness of the proposed RAW configuration scheme. 展开更多
关键词 IEEE 802.11ah Performance evaluation Renewal theory RAW mechanism internet of things
下载PDF
A roadmap for security challenges in the Internet of Things 被引量:7
13
作者 Arbia Riahi Sfar Enrico Natalizio +1 位作者 Yacine Challal Zied Chtourou 《Digital Communications and Networks》 SCIE 2018年第2期118-137,共20页
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent object... Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications. 展开更多
关键词 internet of things Systemic and cognitive approach SECURITY PRIVACY trust Identification Access control
下载PDF
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household 被引量:2
14
作者 Xiangdong Hu Hongru Xu Kaimin Han 《Journal of Computer and Communications》 2014年第7期1-7,共7页
As one of the most important uses of the Internet of things (IOT), the intelligent household is becoming more and more popular. There are many fragile nodes in the intelligent household and they are bound to encounter... As one of the most important uses of the Internet of things (IOT), the intelligent household is becoming more and more popular. There are many fragile nodes in the intelligent household and they are bound to encounter some potential risks of hostile attacks, such as eavesdropping, denial of service, error instructs, non-authorized access or fabrication and others. This paper presents a method of design and implement of secure nodes for the intelligent household based on the IOT technology, besides giving the hardware model of nodes, the management of key, the access authentication of network, the transmission of encrypted data, and the alarm based on intrusion detection and other security mechanisms. That is, to improve the security of the based-IOT intelligent household from the viewpoint of nodes security. A test platform is built and the results of simulation prove that the proposed method can effectively improve the security of the intelligent household from access safety and transmission security. 展开更多
关键词 The INTELLIGENT HOUSEHOLD The internet of things SECURE NODES CC2530 mechanism of Security
下载PDF
Information Collection System of Crop Growth Environment Based on the Internet of Things 被引量:1
15
作者 Hua YU Guangyu ZHANG Ningbo LU 《Asian Agricultural Research》 2013年第5期148-150,共3页
Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information c... Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent. 展开更多
关键词 The internet of things NODE mechanism ROUTING mech
下载PDF
An Efficient Security Solution for Industrial Internet of Things Applications 被引量:1
16
作者 Alaa Omran Almagrabi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3961-3983,共23页
The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual need... The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%. 展开更多
关键词 Industrial internet of things(IIoT) blockchain trusted third parties endpoint verification
下载PDF
Research and Implementation of the SDN Resources Transaction Process Based on Trust Mechanism
17
作者 ZHUGE Bin PENG Dan +1 位作者 BU Xiaobo WANG Weiming 《China Communications》 SCIE CSCD 2016年第S1期190-207,共18页
SDN network as new network architecture,can address a range of issues of the current internet effectively,this paper in the view of SDN network resources' allocation,for decreasing resources waste and achieving a ... SDN network as new network architecture,can address a range of issues of the current internet effectively,this paper in the view of SDN network resources' allocation,for decreasing resources waste and achieving a reasonable distribution of SDN resources,come up with a suitable resource price negotiation algorithm based on trust mechanism in SDN network environment.According to the characteristics of the trust mechanism,simulating on the unit utility and equivalent price of SDN network resources in three aspects(remove individual malicious nodes,remove most malicious nodes and remove all malicious nodes),through the above simulation,combined trust mechanism with MCDAM algorithm,can form a weighing system which pricing and trust comprehensive competitive,so that the whole SDN trading environment become safer and more stable.So trust mechanism as the patch of SDN pricing negotiation algorithm.Finally,propose the planned trading model based on trust mechanism as a management method of SDN trading. 展开更多
关键词 SDN internet RESOURCES trust mechanism PLANNED TRADING
下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives
18
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 Wireless sensor networks Ad-hoc networks internet of things Localization algorithms Node mobility Security mechanisms Energy-efficient communication
下载PDF
Handover Mechanism Based on Underwater Hybrid Software-Defined Modem in Advanced Diver Networks
19
作者 K.M.Delphin Raj Sun-Ho Yum +3 位作者 Jinyoung Lee Eunbi Ko Soo-Yong Shin Soo-Hyun Park 《Computers, Materials & Continua》 SCIE EI 2022年第3期5721-5743,共23页
For the past few decades,the internet of underwater things(IoUT)otained a lot of attention in mobile aquatic applications such as oceanography,diver network monitoring,unmanned underwater exploration,underwater survei... For the past few decades,the internet of underwater things(IoUT)otained a lot of attention in mobile aquatic applications such as oceanography,diver network monitoring,unmanned underwater exploration,underwater surveillance,location tracking system,etc.Most of the IoUT applications rely on acoustic medium.The current IoUT applications face difficulty in delivering a reliable communication system due to the various technical limitations of IoUT environment such as low data rate,attenuation,limited bandwidth,limited battery,limited memory,connectivity problem,etc.One of the significant applications of IoUT include monitoring underwater diver networks.In order to perform a reliable and energy-efficient communication system in the underwater diver networks,a smart underwater hybrid softwaredefined modem(UHSDM)for the mobile ad-hoc network was developed that is used for selecting the best channel/medium among acoustic,visible light communication(VLC),and infrared(IR)based on the criteria established within the system.However,due to the mobility of underwater divers,the developed UHSDMmeets the challenges such as connectivity errors,frequent link failure,transmission delay caused by re-routing,etc.During emergency,the divers are most at the risk of survival.To deal with diver mobility,connectivity,energy efficiency,and reducing the latency in ADN,a handover mechanism based on pre-built UHSDM is proposed in this paper.This paper focuses on(1)design of UHSDM for ADN(2)propose the channel selection mechanism in UHSDM for selecting the best medium for handover and(3)propose handover protocol inADN.The implementation result shows that the proposed mechanism can be used to find the new route for divers in advance and the latency can be reduced significantly.Additionally,this paper shows the real field experiment of air tests and underwater tests with various distances.This research will contribute much to the profit of researchers in underwater diver networks and underwater networks,for improving the quality of services(QoS)of underwater applications. 展开更多
关键词 internet of underwater things(IoUT) underwater hybrid software-defined modem(UHSDM) advanced diver networks(ADN) channel selection mechanism(CSM) handover mechanism acoustic visible light communication(VLC) infrared(IR)
下载PDF
物联网中基于信任抗On-off攻击的自适应安全机制 被引量:4
20
作者 张光华 杨耀红 +1 位作者 庞少博 陈振国 《计算机应用》 CSCD 北大核心 2018年第3期682-687,共6页
为了降低静态安全机制中不必要的数据源认证开销和防御信任阈值机制中存在的On-off攻击,在物联网(IoT)环境下提出了一种基于信任的自适应安全机制。首先,根据节点在信息交互中的行为表现建立节点间的信任评估模型,进而给出节点总体信任... 为了降低静态安全机制中不必要的数据源认证开销和防御信任阈值机制中存在的On-off攻击,在物联网(IoT)环境下提出了一种基于信任的自适应安全机制。首先,根据节点在信息交互中的行为表现建立节点间的信任评估模型,进而给出节点总体信任值的度量方法;然后,对于总体信任值高于信任阈值的节点,采用基于信任的自适应检测算法实时地检测这些节点总体信任值的变化情况;最终,中继节点根据自适应检测的结果决定是否验证接收到的消息。仿真实验结果和分析表明,该机制降低了中继节点的能量开销,同时对物联网中的On-off攻击起到较好的防御作用。 展开更多
关键词 物联网 On-off攻击 信任评估 自适应安全 能耗
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部