期刊文献+
共找到115,484篇文章
< 1 2 250 >
每页显示 20 50 100
移动智能网的业务控制点对IN/Internet互通的支持
1
作者 刘红旗 朱晓民 +1 位作者 廖建新 陈俊亮 《高技术通讯》 EI CAS CSCD 2001年第5期45-49,共5页
首先说明了业务控制点在IN/Internet互通的总体结构中的地位 ,然后讨论了原有移动智能网业务控制点的功能结构 ,在此基础上提出了对业务控制点的接口、智能网应用协议和SIB(业务独立构件 )这三个方面的增强方案。对于类似的工作的实施... 首先说明了业务控制点在IN/Internet互通的总体结构中的地位 ,然后讨论了原有移动智能网业务控制点的功能结构 ,在此基础上提出了对业务控制点的接口、智能网应用协议和SIB(业务独立构件 )这三个方面的增强方案。对于类似的工作的实施有一定的参考价值。 展开更多
关键词 移动智能网 internet 业务控制点 in/internet 互通
下载PDF
基于IN/Internet互通技术实现因特网呼叫等待业务
2
作者 范滢 方昉 孟旭东 《江苏通信》 2000年第5期1-5,8,共6页
智能网 (IN)是一个能快速灵活地引入各类新业务的智能化业务控制体系 ,已广泛应用于电信网 ,它与Inter net的互通已成为IT业界的热点研究课题。文中根据作者参与“八六三”课题研究的成果 ,介绍了基于IN/In ternet互通技术实现ICW (Inte... 智能网 (IN)是一个能快速灵活地引入各类新业务的智能化业务控制体系 ,已广泛应用于电信网 ,它与Inter net的互通已成为IT业界的热点研究课题。文中根据作者参与“八六三”课题研究的成果 ,介绍了基于IN/In ternet互通技术实现ICW (Internetcallwaiting)业务的网络结构 ,分析了ICW业务实现中的关键技术和智能网的支持功能 ,提出了ICW的两类业务提供方式和业务触发方式 ,给出了呼叫接受、呼叫等待、呼叫前转等典型呼叫流程。 展开更多
关键词 智能网 in/internet互通 呼叫等待 会话启动协议 会话描述协议
下载PDF
基于虚拟交换机的IN/Internet互通研究
3
作者 王田 曹长修 汪纪锋 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2001年第6期60-63,共4页
在分析IN与Internet互通接口的基础上 ,基于Softswitch的思想提出了用虚拟交换机实现IN Internet互通的方案 ;并对虚拟交换机的逻辑实体、信令功能、体系结构等问题进行了深入分析 ,利用虚拟交换机构筑虚拟SSP和虚拟SCP可以实现IN与Inte... 在分析IN与Internet互通接口的基础上 ,基于Softswitch的思想提出了用虚拟交换机实现IN Internet互通的方案 ;并对虚拟交换机的逻辑实体、信令功能、体系结构等问题进行了深入分析 ,利用虚拟交换机构筑虚拟SSP和虚拟SCP可以实现IN与Internet业务的互通。 展开更多
关键词 网络互通 互联网 软交换 IN internet 电信网 虚拟交换机
下载PDF
IN/Internet互通下用户拨号接入系统的研究和设计
4
作者 孙其博 杨放春 《高技术通讯》 EI CAS CSCD 2001年第9期44-47,共4页
从技术实现的角度针对ITU T智能网能力集 3草案定义的智能网与因特网的互通模型的呼叫承载网关功能实体进行了研究 ,并对ITU T的智能网与因特网的互通模型作出改进。
关键词 智能网 internet RADIUS 网络互通 用户拨号接入系统 IN ISP 设计方案 因特网
下载PDF
基于TMN的IN/Internet互通网络管理模型
5
作者 王晖 朱晓民 +1 位作者 廖建新 陈俊亮 《高技术通讯》 EI CAS CSCD 2001年第7期44-48,共5页
通过对于IN/Internet互通网络体系结构的分析 ,提出了一种基于TMN的IN/Internet互通网络的体系结构 ,分析了此体系结构的具体设计和各部分的功能需求。在此基础上 ,给出了其管理信息模型 ,从网络拓扑结构建模、物理实体管理建模、功能... 通过对于IN/Internet互通网络体系结构的分析 ,提出了一种基于TMN的IN/Internet互通网络的体系结构 ,分析了此体系结构的具体设计和各部分的功能需求。在此基础上 ,给出了其管理信息模型 ,从网络拓扑结构建模、物理实体管理建模、功能实体管理建模和业务管理建模 展开更多
关键词 智能网 电信管理网 互通网络 TMN IN internet SMS/MG互联系统
下载PDF
基于Soft Switch的IN/Internet互通研究
6
作者 王田 曹长修 汪纪锋 《重庆邮电学院学报(自然科学版)》 2001年第3期33-37,共5页
在分析IN与Internet互通接口的基础上.基于 Soft Switch的思想提出了用 Virtual Switch实现IN/Internet互通的方案;时Virtual Switch的逻辑实体、信令功能、体系结构和业... 在分析IN与Internet互通接口的基础上.基于 Soft Switch的思想提出了用 Virtual Switch实现IN/Internet互通的方案;时Virtual Switch的逻辑实体、信令功能、体系结构和业务特点等问题进行了深入分析.并利用Virtual Switch实现了Virtual SSP和Virtual SCP. 展开更多
关键词 智能网 因特网 软交换 网络互通
下载PDF
IN/Internet互通模型及网络技术 被引量:3
7
作者 黄慧芹 糜正琨 孟旭东 《南京邮电学院学报》 1999年第4期10-14,共5页
面临Internet的巨大挑战,传统电信业如何利用原有资源寻求新的业务增长点已成为当务之急。根据作者在ITUT研究组中的研究成果及IETF和ITUT的相关文献介绍了能支持IN/Internet互通的增强型智能网分布式功能平面结构,并针对典型互通业务... 面临Internet的巨大挑战,传统电信业如何利用原有资源寻求新的业务增长点已成为当务之急。根据作者在ITUT研究组中的研究成果及IETF和ITUT的相关文献介绍了能支持IN/Internet互通的增强型智能网分布式功能平面结构,并针对典型互通业务给出了业务实现信息流,探讨了IN侧和Internet侧所需的技术支持。 展开更多
关键词 智能网 网络互通 计算机网络 internet
下载PDF
IN/Internet互通安全技术研究
8
作者 金炳荣 陆长艳 糜正琨 《南京邮电学院学报(自然科学版)》 2002年第1期5-10,共6页
根据IN Internet互通系统一般网络结构 ,提出了互通安全机制的功能结构。基于此结构 ,深入研究了互通系统的信息安全技术和代理服务器技术及其实现。最后就入侵检测问题进行了探讨。
关键词 网络互通 智能网 因特网 安全技术
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
9
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
A credibility-aware swarm-federated deep learning framework in internet of vehicles 被引量:1
10
作者 Zhe Wang Xinhang Li +2 位作者 Tianhao Wu Chen Xu Lin Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第1期150-157,共8页
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead... Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations. 展开更多
关键词 Swarm learning Federated deep learning internet of vehicles PRIVACY EFFICIENCY
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet 被引量:1
11
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy internet Intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
12
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
13
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 internet of Things cyberattack intrusion detection internet security
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
14
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
15
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
16
《China Communications》 SCIE CSCD 2024年第1期I0006-I0006,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
Intelligent Internet of Things with Reliable Communication and Collaboration Technologies
17
作者 Zhao Junhui Wu Celimuge +4 位作者 Xu Wenjun Qi Chenhao Bu Shengrong Zhang Shuowen Zhang Qingmiao 《China Communications》 SCIE CSCD 2024年第8期I0002-I0006,共5页
The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is w... The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times. 展开更多
关键词 INTERACTION internet IOT
下载PDF
Assessing the effectiveness of internetbased interventions for mental health outcomes:an umbrella review
18
作者 Mi Zhang Chuan Fan +6 位作者 Lijun Ma Huixue Wang Zhenyue Zu Linxi Yang Fenglan Chen Wenzhuo Wei Xiaoming Li 《General Psychiatry》 CSCD 2024年第4期452-462,共11页
Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,... Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,the effectiveness and acceptability of IBIs for various mental health disorders continue to be subject to scholarly debate.We performed an umbrella review of meta-analyses(MAs),conducting literature searches in PubMed,Web of Science,Embase,Cochrane and Ovid Medline from their inception to 17 January 2023.A total of 87MAs,reporting on 1683 randomised controlled trials and 295589 patients,were included.The results indicated that IBIs had a moderate effect on anxiety disorder(standardised mean difference(SMD)=0.53,95%CI 0.44 to 0.62)and post-traumatic stress disorder(PTSD)(SMD=0.63,95%CI 0.38 to 0.89).In contrast,the efficacy on depression(SMD=0.45,95%CI 0.39 to 0.52),addiction(SMD=0.23,95%CI 0.16 to 0.31),suicidal ideation(SMD=0.23,95%CI 0.16 to 0.30),stress(SMD=0.41,95%CI 0.33 to 0.48)and obsessive-compulsive disorder(SMD=0.47,95%CI 0.22 to 0.73)was relatively small.However,no significant effects were observed for personality disorders(SMD=0.07,95%CI-0.13 to 0.26).Our findings suggest a significant association between IBIs and improved mental health outcomes,with particular effectiveness noted in treating anxiety disorders and PTSD.However,it is noteworthy that the effectiveness of IBIs was impacted by high dropout rates during treatment.Furthermore,our results indicated that guided IBIs proved to be more effective than unguided ones,playing a positive role in reducing dropout rates and enhancing patient adherence rates. 展开更多
关键词 internet UMBRELLA CONDUCTING
下载PDF
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
19
作者 Tao Huang Renchao Xie +7 位作者 Yuzheng Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng Yinan Li Tian Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期853-862,共10页
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are... In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness. 展开更多
关键词 Industrial internet NFT IPFS TRUST Identity resolution system
下载PDF
Internet of Things Authentication Protocols: Comparative Study
20
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY internet of Things SECURITY AUTHENTICATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部