期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
A Review of Road Accidents Detection through Wireless Technology—5G, MIMO and Internet of Things
1
作者 Stephen Ojo Samuel Olugbade Taiwo P. Ojo 《Open Journal of Applied Sciences》 CAS 2022年第12期1968-1978,共11页
Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such ... Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends. 展开更多
关键词 5g internet of thing (IoT) Wireless Communication TECHNOLOgY Road Transportation
下载PDF
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks 被引量:1
2
作者 Isaac Appiah Xiaoming Jiang +1 位作者 Edward Kwadwo Boahen Ebenezer Owusu 《International Journal of Communications, Network and System Sciences》 2023年第8期169-190,共22页
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno... The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models. 展开更多
关键词 internet of things 5g SDNs Security and Privacy INTRUSION Network Communications
下载PDF
The Roles of 5G Mobile Broadband in the Development of IoT, Big Data, Cloud and SDN 被引量:1
3
作者 Bao-Shuh Paul Lin Fuchun Joseph Lin Li-Ping Tung 《Communications and Network》 2016年第1期9-21,共13页
The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after a... The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies. 展开更多
关键词 5g internet of things (IoT) Software Defined Networks (SDN) Big Data Analytics Cloud Computing
下载PDF
5G移动通信支撑下的物联网技术及应用 被引量:1
4
作者 田霞 《通信电源技术》 2021年第20期111-113,共3页
近年来国内的物联网(Internet of Things,IoT)技术实现了显著的发展,是现代信息技术领域中重要的技术内容。在5G时代,将5G网络技术作为发展物联网技术的核心,可以为物联网技术的研究创造良好的基础条件,大幅提高物联网技术的实际应用水... 近年来国内的物联网(Internet of Things,IoT)技术实现了显著的发展,是现代信息技术领域中重要的技术内容。在5G时代,将5G网络技术作为发展物联网技术的核心,可以为物联网技术的研究创造良好的基础条件,大幅提高物联网技术的实际应用水平,扩大物联网技术的影响范围,使得物联网技术在信息交流与通信过程中具有更好的优势,相关领域对于5G网络技术与物联网技术的融合研究也更加深刻,能够充分认识到物联网技术对现代社会发展的重要作用。对5G网络技术的应用现状进行分析,研究了5G网络技术的基本特点,分析了5G网络技术与物联网技术的融合趋势,旨在推进我国5G移动通信与物联网技术的同步发展。 展开更多
关键词 5g时代 移动通信技术 物联网(internet of things IoT)技术 融合应用 城市安全
下载PDF
Security Attacks on the IoT Network with 5G Wireless Communication
5
作者 Ghada Sultan Aljumaie Ghada Hisham Alzeer Sultan S.Alshamrani 《Journal on Internet of Things》 2021年第3期119-130,共12页
The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart dev... The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart devices equipped with sensors that have the ability to calculate data,and carry out actions in the environment in which they are located,they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection,despite the efficiency of the IoT supported by the five G technology,it is subject to many security challenges.In this paper,we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks. 展开更多
关键词 internet of things IOT 5g SECURITY
下载PDF
基于物联网形势下的5G通信技术应用分析
6
作者 甘沁宇 《数码设计》 2020年第6期19-19,共1页
物联网不同于互联网,互联网可以实现对虚拟信息资源的共享与连接,而物联网可以将实物通过网络连接在一起,从而能够让身边的事物智能化,为人们的生活、工作与学习都带来了许多的便利。但是,物联网的发展由于受到了网络传输速度的限制,导... 物联网不同于互联网,互联网可以实现对虚拟信息资源的共享与连接,而物联网可以将实物通过网络连接在一起,从而能够让身边的事物智能化,为人们的生活、工作与学习都带来了许多的便利。但是,物联网的发展由于受到了网络传输速度的限制,导致在获取实物信息与传输操控质量的时候会受到数据延迟的影响,进而导致控制的准确性下降,因此对于物联网的操控效率也遇到了瓶颈。5G通信技术的出现有效地解决了这一问题,因为5G通信技术高效的传输效率高,因此可以有效地帮助物联网提升操控与管理效率。 展开更多
关键词 物联网 5g 通信技术
下载PDF
Cloud control for IIoT in a cloud-edge environment
7
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5g and time sensitive network(TSN) industrial internet of things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
The Impact of Internet of Things Supported by Emerging 5G in Power Systems: A Review 被引量:7
8
作者 Jinsong Tao Muhammad Umair +1 位作者 Muhammad Ali Jian Zhou 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2020年第2期344-352,共9页
The Internet of Things(IoT)is playing an important role in providing access to affordable,clean and green energy worldwide through the use of smart devices.The current electric power networks will be more reliable,sec... The Internet of Things(IoT)is playing an important role in providing access to affordable,clean and green energy worldwide through the use of smart devices.The current electric power networks will be more reliable,secure,flexible and durable by implementing IoT in power systems.This paper presents a brief discussion about IoT contributions in the development of power systems from a generation,transmission,distribution and consumption point of view.5G cellular networks have a great potential for the development of IoT technology.Additionally,5G cellular networks can be instrumental in supporting the greater communication needs of IoT.This review provides a comprehensive analysis about the role of 5G cellular networks in the growth of IoT technology and power systems.Large amounts of data will be generated due to the incorporation of renewable energy,deployment of the smart grid and the improvements to the electricity market.In this way,in order to realize the connection between things and people,things and things and people and people in power systems,it is essential to apply IoT in power systems.In this case,5G is providing numerous advantages to Power IoT(PIoT)by offering greater opportunities in progress and improvements;however,there are also numerous challenges with the deployment of 5G in PIoT.Finally,this review article provides an overview of the role,implications and challenges of 5G in PIoT. 展开更多
关键词 Fifth generation(5g) internet of things(IoT) Power IoT(PIoT)
原文传递
The Way to Apply Machine Learning to IoT Driven Wireless Network from Channel Perspective 被引量:6
9
作者 Wei Li Jianhua Zhang +3 位作者 Xiaochuan Ma Yuxiang Zhang Hua Huang Yongmei Cheng 《China Communications》 SCIE CSCD 2019年第1期148-164,共17页
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning... Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly. 展开更多
关键词 5g internet of things MACHINE learning WIRELESS CHANNEL
下载PDF
Data Traffic Reduction with Compressed Sensing in an AIoT System 被引量:3
10
作者 Hye-Min Kwon Seng-Phil Hong +1 位作者 Mingoo Kang Jeongwook Seo 《Computers, Materials & Continua》 SCIE EI 2022年第1期1769-1780,共12页
To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT ... To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT networks to be severely overloaded.In this paper,therefore,we propose a novel oneM2M-compliant Artificial Intelligence of Things(AIoT)system for reducing overall data traffic and offering object detection.It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing(CS)rate,an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing,and a YOLOv5 deep learning function for object detection,and an IoT server.By analyzing the effects of compressed sensing on data traffic reduction in terms of data rate per IoT sensor device,we showed that the proposed AIoT system can reduce the overall data traffic by changing compressed sensing rates of random sampling functions in IoT sensor devices.In addition,we analyzed the effects of the compressed sensing on YOLOv5 object detection in terms of performance metrics such as recall,precision,mAP50,and mAP,and found that recall slightly decreases but precision remains almost constant even though the compressed sensing rate decreases and that mAP50 and mAP are gradually degraded according to the decreased compressed sensing rate.Consequently,if proper compressed sensing rates are chosen,the proposed AIoT system will reduce the overall data traffic without significant performance degradation of YOLOv5. 展开更多
关键词 5g internet of things data traffic compressed sensing YOLOv5
下载PDF
Blockchain-based fog radio access networks:Architecture,key technologies,and challenges
11
作者 Zixin Wang Bin Cao +2 位作者 Chenxi Liu Congfang Xu Lei Zhang 《Digital Communications and Networks》 SCIE CSCD 2022年第5期720-726,共7页
Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resourc... Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified. 展开更多
关键词 F-RAN Blockchain 5g internet of things
下载PDF
Analysis and Suggestions on the Latest Trend of“BDS+”Application Development
12
作者 LI Qi SUN Dongzhi +2 位作者 SUN Tianyang MA Yinhu REN Yu 《Aerospace China》 2021年第3期42-45,共4页
The indigenous developed global BeiDou Navigation System(BDS-3)was formally commissioned,marking the completion of the three-step BDS development strategy,and a new era for BDS to better serve people from all walks of... The indigenous developed global BeiDou Navigation System(BDS-3)was formally commissioned,marking the completion of the three-step BDS development strategy,and a new era for BDS to better serve people from all walks of life.In this paper,the recent progress and main characteristics of BDS technology fusion and industry integration are analyzed.The discussion on the latest development on"BDS+"application starts from"BDS+Technology"and"BDS+Industry",through to the future prospective BDS applications. 展开更多
关键词 BDS satellite navigation 5g internet of things
下载PDF
5G and intelligence medicine—howthe next generation of wireless technology will reconstruct healthcare? 被引量:13
13
作者 Dong Li 《Precision Clinical Medicine》 2019年第4期205-208,共4页
Despite intensive efforts,there are still enormous challenges in provision of healthcare services to the increasing aging population.Recent observations have raised concerns regarding the soaring costs of healthcare,t... Despite intensive efforts,there are still enormous challenges in provision of healthcare services to the increasing aging population.Recent observations have raised concerns regarding the soaring costs of healthcare,the imbalance of medical resources,inefficient healthcare system administration,and inconvenient medical experiences.However,cutting-edge technologies are being developed to meet these challenges,including,but not limited to,Internet of Things(IoT),big data,artificial intelligence,and 5G wireless transmission technology to improve the patient experience and healthcare service quality,while cutting the total cost attributable to healthcare.This is not an unrealistic fantasy,as these emerging technologies are beginning to impact and reconstruct healthcare in subtleways.Although the technologies mentioned above are integrated,in this review we take a brief look at cases focusing on the application of 5G wireless transmission technology in healthcare.We also highlight the potential pitfalls to availability of 5G technologies. 展开更多
关键词 healthcare 5g the internet of things big data artificial intelligence
原文传递
QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks 被引量:1
14
作者 Saurabh Chandra Prateek +2 位作者 Rohit Sharma Rajeev Arya Korhan Cengiz 《Intelligent and Converged Networks》 2021年第4期295-305,共11页
The existing literature on device-to-device(D2D)architecture suffers from a dearth of analysis under imperfect channel conditions.There is a need for rigorous analyses on the policy improvement and evaluation of netwo... The existing literature on device-to-device(D2D)architecture suffers from a dearth of analysis under imperfect channel conditions.There is a need for rigorous analyses on the policy improvement and evaluation of network performance.Accordingly,a two-stage transmit power control approach(named QSPCA)is proposed:First,a reinforcement Q-learning based power control technique and;second,a supervised learning based support vector machine(SVM)model.This model replaces the unified communication model of the conventional D2D setup with a distributed one,thereby requiring lower resources,such as D2D throughput,transmit power,and signal-to-interference-plus-noise ratio as compared to existing algorithms.Results confirm that the QSPCA technique is better than existing models by at least 15.31%and 19.5%in terms of throughput as compared to SVM and Q-learning techniques,respectively.The customizability of the QSPCA technique opens up multiple avenues and industrial communication technologies in 5G networks,such as factory automation. 展开更多
关键词 device-to-device(D2D) interference internet of things(IoT) machine learning power control Q-LEARNINg support vector machine(SVM) 5g
原文传递
A Survey of Edge Caching:Key Issues and Challenges
15
作者 Hanwen Li Mingtao Sun +2 位作者 Fan Xia Xiaolong Xu Muhammad Bilal 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第3期818-842,共25页
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user demand.Edge caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user experience.In this paper,we aim to survey the edge caching techniques from a comprehensive and systematic perspective.We first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching metrics.We then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,respectively.In particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service cache.Finally,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area. 展开更多
关键词 edge caching edge computing caching location caching object caching strategy 5g networkarchitecture internet of things(IoT)
原文传递
张家港广电物联网市场探索
16
作者 樊颖灏 《中国有线电视》 2020年第9期1015-1016,共2页
随着移动互联网、传感技术的快速发展,物联网已呈现加速发展的态势,从智慧城市到共享单车,物联网已成为新一代信息技术发展的大趋势,是继计算机、互联网与移动互联网后的第三次信息化浪潮,已成为最具发展前景的领域和风口。广电网络由... 随着移动互联网、传感技术的快速发展,物联网已呈现加速发展的态势,从智慧城市到共享单车,物联网已成为新一代信息技术发展的大趋势,是继计算机、互联网与移动互联网后的第三次信息化浪潮,已成为最具发展前景的领域和风口。广电网络由于自身连接千家万户的特性,发展物联网具有天然的优势,在已有的网络上进一步深耕、挖掘物联网更多的价值,这是广电物联网未来发展的趋势。 展开更多
关键词 万物互联 5 g LoRA 窄带物联网
下载PDF
DBST:a lightweight block cipher based on dynamic S-box 被引量:2
17
作者 Liuyan YAN Lang LI Ying GUO 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期177-185,共9页
IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ... IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks. 展开更多
关键词 internet of things 5g dynamic S-box bit-slice technology lightweight block cipher
原文传递
Multiple-antenna techniques in nonorthogonal multiple access:a review 被引量:1
18
作者 Fei-yan TIAN Xiao-ming CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第12期1665-1697,共33页
As a promising physical layer technique, nonorthogonal multiple access(NOMA) can admit multiple users over the same space-time resource block, and thus improve the spectral efficiency and increase the number of access... As a promising physical layer technique, nonorthogonal multiple access(NOMA) can admit multiple users over the same space-time resource block, and thus improve the spectral efficiency and increase the number of access users. Specifically, NOMA provides a feasible solution to massive Internet of Things(IoT) in 5G and beyond-5G wireless networks over a limited radio spectrum. However, severe co-channel interference and high implementation complexity hinder its application in practical systems. To solve these problems, multiple-antenna techniques have been widely used in NOMA systems by exploiting the benefits of spatial degrees of freedom. This study provides a comprehensive review of various multiple-antenna techniques in NOMA systems, with an emphasis on spatial interference cancellation and complexity reduction. In particular, we provide a detailed investigation on multiple-antenna techniques in two-user, multiuser, massive connectivity, and heterogeneous NOMA systems.Finally, future research directions and challenges are identified. 展开更多
关键词 Nonorthogonal multiple access Multiple-antenna technique B5g internet of things
原文传递
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
19
作者 Runchen Gao Shen Li +1 位作者 Yuqi Gao Rui Guo 《Cybersecurity》 EI CSCD 2021年第1期26-36,共11页
With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the he... With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform. 展开更多
关键词 5g internet of things(IoT) Mobile edge computing Feistel architecture SCESW gRC algorithm
原文传递
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
20
作者 Runchen Gao Shen Li +1 位作者 Yuqi Gao Rui Guo 《Cybersecurity》 2018年第1期1-11,共11页
With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the he... With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform. 展开更多
关键词 5g internet of things(IoT) Mobile edge computing Feistel architecture SCESW gRC algorithm
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部