The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno...The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models.展开更多
Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services w...Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.展开更多
Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),a...Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),and beyond wireless ecosystems.Rectennas,which are the combination of rectifying circuits and antennas,are the most critical components in far-field WPT systems.However,compact application devices require even smaller integrated rectennas that simultaneously have large electromagnetic wave capture capabilities,high alternating current(AC)-to-direct current(DC)(AC-to-DC)conversion efficiencies,and facilitate a multifunctional wireless performance.This paper reviews various rectenna miniaturization techniques such as meandered planar inverted-F antenna(PIFA)rectennas;miniaturized monopole-and dipole-based rectennas;fractal loop and patch rectennas;dielectric-loaded rectennas;and electrically small near-field resonant parasitic rectennas.Their performance characteristics are summarized and then compared with our previously developed electrically small Huygens rectennas that are proven to be more suitable for IoT applications.They have been tailored,for example,to achieve batteryfree IoT sensors as is demonstrated in this paper.Battery-free,wirelessly powered devices are smaller and lighter in weight in comparison to battery-powered devices.Moreover,they are environmentally friendly and,hence,have a significant societal benefit.A series of high-performance electrically small Huygens rectennas are presented including Huygens linearly-polarized(HLP)and circularly-polarized(HCP)rectennas;wirelessly powered IoT sensors based on these designs;and a dual-functional HLP rectenna and antenna system.Finally,two linear uniform HLP rectenna array systems are considered for significantly larger wireless power capture.Example arrays illustrate how they can be integrated advantageously with DC or radio frequency(RF)power-combining schemes for practical IoT applications.展开更多
Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such ...Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.展开更多
Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT gen...Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT generally faces the challenges from energy constraint and implementation cost. In this paper, we will introduce a new green communication paradigm, the ambient backscatter (AmBC), that could utilize the environmental wireless signals for both powering a tiny-cost device and backscattering the information symbols. Specifically, we will present the basic principles of AmBC, analyze its features and advantages, suggest its open problems, and predict its potential applications for our future IoT.展开更多
Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing an...Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.展开更多
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.展开更多
The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after a...The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies.展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
文章深入研究物联网中的窄带物联网(Narrow Band Internet of Things,NB-IoT)技术,重点探讨基于省电模式(Power Saving Mode,PSM)机制的优化方法,分析NB-IoT的数学原理,研究一种基于PSM机制的动态调整算法,并利用MATLAB平台上的Simulin...文章深入研究物联网中的窄带物联网(Narrow Band Internet of Things,NB-IoT)技术,重点探讨基于省电模式(Power Saving Mode,PSM)机制的优化方法,分析NB-IoT的数学原理,研究一种基于PSM机制的动态调整算法,并利用MATLAB平台上的Simulink工具进行仿真实验。实验结果显示,相比传统方法,文章方法能显著降低平均功耗,在实际应用中具有有效性和稳定性。展开更多
文章旨在探讨窄带物联网(Narrow Band Internet of Things,NB-IoT)中通信数据传输的优化方法。通过分析NB-IoT的特点和数据传输过程中的瓶颈,提出一系列针对性的优化策略,包括数据压缩与封装优化、数据聚合与帧结构设计、时间间隔调整...文章旨在探讨窄带物联网(Narrow Band Internet of Things,NB-IoT)中通信数据传输的优化方法。通过分析NB-IoT的特点和数据传输过程中的瓶颈,提出一系列针对性的优化策略,包括数据压缩与封装优化、数据聚合与帧结构设计、时间间隔调整与功耗控制、自适应重传机制以及网络优化与协议改进等,以提高NB-IoT的数据传输效率并降低能耗,为NB-IoT的进一步发展和应用提供参考。展开更多
针对城市窨井数量大、位置分散、安全事故频发、管理困难等问题,设计出一种基于窄带物联网技术(Narrow Band Internet of Things,NB-IoT)的井下数据无线采集终端。终端采用低功耗STM32芯片作为主控制器,NB-IoT无线通信模块采用BC26模组...针对城市窨井数量大、位置分散、安全事故频发、管理困难等问题,设计出一种基于窄带物联网技术(Narrow Band Internet of Things,NB-IoT)的井下数据无线采集终端。终端采用低功耗STM32芯片作为主控制器,NB-IoT无线通信模块采用BC26模组,数据采集终端具有自动采集数据、主动预警、初始蓝牙配置等功能。实验结果表明:所设计的无线采集终端功耗低、稳定性高,让城市井盖管理更加智能化,让故障检修更加便捷化,提高城市管理的智能化水平。展开更多
Non-orthogonal multiple access is a promising technique to meet the harsh requirements for the internet of things devices in cognitive radio networks.To improve the energy efficiency(EE)of the unlicensed secondary use...Non-orthogonal multiple access is a promising technique to meet the harsh requirements for the internet of things devices in cognitive radio networks.To improve the energy efficiency(EE)of the unlicensed secondary users(SU),a power allocation(PA)algorithm with polynomial complexity is investigated.We first establish the feasible range of power consumption ratio using Karush-Kuhn-Tucker optimality conditions to support each SU’s minimum quality of service and the effectiveness of successive interference cancellation.Then,we formulate the EE optimization problem considering the total transmit power requirements which leads to a non-convex fractional programming problem.To efficiently solve the problem,we divide it into an inner-layer and outer-layer optimization sub-problems.The inner-layer optimization which is formulated to maximize the sub-carrier PA coefficients can be transformed into the difference of convex programming by using the first-order Taylor expansion.Based on the solution of the inner-layer optimization sub-problem,the concave-convex fractional programming problem of the outer-layer optimization sub-problem may be converted into the Lagrangian relaxation model employing the Dinkelbach algorithm.Simulation results demonstrate that the proposed algorithm has a faster convergence speed than the simulated annealing algorithm,while the average system EE loss is only less than 2%.展开更多
针对野生保护动物跟踪与监测的低功耗、远程监测、可定制、低成本要求,提出了基于窄带物联网(narrow band internet of things,NB-IoT)的分布式系统设计方案,给出了高效能耗管理、并发通信处理、网络透传关键技术的解决方法。系统由跟...针对野生保护动物跟踪与监测的低功耗、远程监测、可定制、低成本要求,提出了基于窄带物联网(narrow band internet of things,NB-IoT)的分布式系统设计方案,给出了高效能耗管理、并发通信处理、网络透传关键技术的解决方法。系统由跟踪器和监测信息系统组成,跟踪器包括NB-IoT通信与定位模块、低功耗微控制器、锂电池太阳能复合供电组件、高效率电源转换器;监测信息系统包括数据通信设备、服务器和监控终端。实验表明:系统能长期远程采集动物的位置并在WEB地图上显示实时位置和活动轨迹,能对数据进行定制化统计分析并生成报表,跟踪器平均功耗小于50 mW,平均定位误差小于20 m。系统监测范围大、成本低,已试用于某野生动物保护站,效果良好。展开更多
The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart dev...The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart devices equipped with sensors that have the ability to calculate data,and carry out actions in the environment in which they are located,they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection,despite the efficiency of the IoT supported by the five G technology,it is subject to many security challenges.In this paper,we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.展开更多
5G通信技术的大规模应用对物联网(Internet of Things,IoT)的产业发展起到了极大的推动.研究了5G通信技术发展视域下物联网产业链的总体架构、产业规模、应用特点,给出了多个具体应用场景实例,并对基于5G通信技术的物联网产业链尚存问...5G通信技术的大规模应用对物联网(Internet of Things,IoT)的产业发展起到了极大的推动.研究了5G通信技术发展视域下物联网产业链的总体架构、产业规模、应用特点,给出了多个具体应用场景实例,并对基于5G通信技术的物联网产业链尚存问题及未来发展进行了探讨.展开更多
文摘The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models.
基金supported in part by the National Natural Science Foundation of China (No.62002113)the Natural Science Foundation of Hunan Province (No. 2021JJ40122).
文摘Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.
基金supported by the University of Technology Sydney (UTS) Chancellor’s Postdoctoral Fellowship (PRO18-6147)Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) (PRO20-9959)
文摘Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),and beyond wireless ecosystems.Rectennas,which are the combination of rectifying circuits and antennas,are the most critical components in far-field WPT systems.However,compact application devices require even smaller integrated rectennas that simultaneously have large electromagnetic wave capture capabilities,high alternating current(AC)-to-direct current(DC)(AC-to-DC)conversion efficiencies,and facilitate a multifunctional wireless performance.This paper reviews various rectenna miniaturization techniques such as meandered planar inverted-F antenna(PIFA)rectennas;miniaturized monopole-and dipole-based rectennas;fractal loop and patch rectennas;dielectric-loaded rectennas;and electrically small near-field resonant parasitic rectennas.Their performance characteristics are summarized and then compared with our previously developed electrically small Huygens rectennas that are proven to be more suitable for IoT applications.They have been tailored,for example,to achieve batteryfree IoT sensors as is demonstrated in this paper.Battery-free,wirelessly powered devices are smaller and lighter in weight in comparison to battery-powered devices.Moreover,they are environmentally friendly and,hence,have a significant societal benefit.A series of high-performance electrically small Huygens rectennas are presented including Huygens linearly-polarized(HLP)and circularly-polarized(HCP)rectennas;wirelessly powered IoT sensors based on these designs;and a dual-functional HLP rectenna and antenna system.Finally,two linear uniform HLP rectenna array systems are considered for significantly larger wireless power capture.Example arrays illustrate how they can be integrated advantageously with DC or radio frequency(RF)power-combining schemes for practical IoT applications.
文摘Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.
基金supported in part by National Key R&D Program of China under Grant 2016YFE0200900part by Scientific Research Program of Beijing Municipal Commission of Education under Grant KM201910853003part by Major projects of Beijing Municipal Science and Technology Commission under Grant Z181100003218010
文摘Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT generally faces the challenges from energy constraint and implementation cost. In this paper, we will introduce a new green communication paradigm, the ambient backscatter (AmBC), that could utilize the environmental wireless signals for both powering a tiny-cost device and backscattering the information symbols. Specifically, we will present the basic principles of AmBC, analyze its features and advantages, suggest its open problems, and predict its potential applications for our future IoT.
基金supported by the National Key R&D Program of China(2020YFB1807801,2020YFB1807800)in part by Project Supported by Engineering Research Center of Mobile Communications,Ministry of Education(cqupt-mct-202003)+2 种基金in part by Key Lab of Information Network Security,Ministry of Public Security under Grant C19603in part by National Natural Science Foundation of China(Grant No.61901067 and 61901013)in part by Chongqing Municipal Natural Science Foundation(Grant No.cstc2020jcyj-msxmX0339).
文摘Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.
基金This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
文摘The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies.
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
文摘文章深入研究物联网中的窄带物联网(Narrow Band Internet of Things,NB-IoT)技术,重点探讨基于省电模式(Power Saving Mode,PSM)机制的优化方法,分析NB-IoT的数学原理,研究一种基于PSM机制的动态调整算法,并利用MATLAB平台上的Simulink工具进行仿真实验。实验结果显示,相比传统方法,文章方法能显著降低平均功耗,在实际应用中具有有效性和稳定性。
文摘文章旨在探讨窄带物联网(Narrow Band Internet of Things,NB-IoT)中通信数据传输的优化方法。通过分析NB-IoT的特点和数据传输过程中的瓶颈,提出一系列针对性的优化策略,包括数据压缩与封装优化、数据聚合与帧结构设计、时间间隔调整与功耗控制、自适应重传机制以及网络优化与协议改进等,以提高NB-IoT的数据传输效率并降低能耗,为NB-IoT的进一步发展和应用提供参考。
文摘针对城市窨井数量大、位置分散、安全事故频发、管理困难等问题,设计出一种基于窄带物联网技术(Narrow Band Internet of Things,NB-IoT)的井下数据无线采集终端。终端采用低功耗STM32芯片作为主控制器,NB-IoT无线通信模块采用BC26模组,数据采集终端具有自动采集数据、主动预警、初始蓝牙配置等功能。实验结果表明:所设计的无线采集终端功耗低、稳定性高,让城市井盖管理更加智能化,让故障检修更加便捷化,提高城市管理的智能化水平。
基金supported in part by the Science and Technology Research Program of the National Science Foundation of China(No.61671096)Chongqing Research Program of Basic Science and Frontier Technology(No.cstc2017jcyj BX0005)+1 种基金Chongqing Municipal Education Commission(No.KJQN201800642)Doctoral Student Training Program(No.BYJS2016009)。
文摘Non-orthogonal multiple access is a promising technique to meet the harsh requirements for the internet of things devices in cognitive radio networks.To improve the energy efficiency(EE)of the unlicensed secondary users(SU),a power allocation(PA)algorithm with polynomial complexity is investigated.We first establish the feasible range of power consumption ratio using Karush-Kuhn-Tucker optimality conditions to support each SU’s minimum quality of service and the effectiveness of successive interference cancellation.Then,we formulate the EE optimization problem considering the total transmit power requirements which leads to a non-convex fractional programming problem.To efficiently solve the problem,we divide it into an inner-layer and outer-layer optimization sub-problems.The inner-layer optimization which is formulated to maximize the sub-carrier PA coefficients can be transformed into the difference of convex programming by using the first-order Taylor expansion.Based on the solution of the inner-layer optimization sub-problem,the concave-convex fractional programming problem of the outer-layer optimization sub-problem may be converted into the Lagrangian relaxation model employing the Dinkelbach algorithm.Simulation results demonstrate that the proposed algorithm has a faster convergence speed than the simulated annealing algorithm,while the average system EE loss is only less than 2%.
文摘针对野生保护动物跟踪与监测的低功耗、远程监测、可定制、低成本要求,提出了基于窄带物联网(narrow band internet of things,NB-IoT)的分布式系统设计方案,给出了高效能耗管理、并发通信处理、网络透传关键技术的解决方法。系统由跟踪器和监测信息系统组成,跟踪器包括NB-IoT通信与定位模块、低功耗微控制器、锂电池太阳能复合供电组件、高效率电源转换器;监测信息系统包括数据通信设备、服务器和监控终端。实验表明:系统能长期远程采集动物的位置并在WEB地图上显示实时位置和活动轨迹,能对数据进行定制化统计分析并生成报表,跟踪器平均功耗小于50 mW,平均定位误差小于20 m。系统监测范围大、成本低,已试用于某野生动物保护站,效果良好。
文摘The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart devices equipped with sensors that have the ability to calculate data,and carry out actions in the environment in which they are located,they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection,despite the efficiency of the IoT supported by the five G technology,it is subject to many security challenges.In this paper,we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.