The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d...The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.展开更多
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ...The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve it...Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods.展开更多
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi...Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.展开更多
Internet of Things(IoT)technology is widely used in various fields,and its application in elderly care services has been highlighted in recent years.This study aims to explore how IoT technology can improve the effici...Internet of Things(IoT)technology is widely used in various fields,and its application in elderly care services has been highlighted in recent years.This study aims to explore how IoT technology can improve the efficiency of group-based elderly care services.The concept,characteristics,and current application status of IoT technology in elderly care services were introduced.Secondly,the characteristics and needs of group elderly care services were analyzed,including advantages and challenges,as well as the expectations and needs of the elderly for elderly care services.The evaluation methods and future development directions of IoT technology in improving the efficiency of group elderly care services were discussed,including data collection and analysis methods,selection and measurement of efficiency evaluation indicators,challenges,and development directions.展开更多
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen...Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots.展开更多
Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such ...Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.展开更多
Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the...Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the education industry. This paper takes the intelligent teaching base on the basis of Internet of Things technology as the research object, introduces the connotation of the wisdom teaching base with reference to relevant literature materials, analyzes the research background of the wisdom teaching base on the basis of the Internet of Things technology, expounds the design method of smart teaching base on the basis of Internet of Things technology, and analyzes the function realization and application of intelligent teaching base on the basis of Internet of Things technology.展开更多
Marketing is a very important part of an enterprise.A rational and scientific marketing management can not only reduce the cost of enterprise sales,but also greatly improve the competitiveness of enterprises.The purpo...Marketing is a very important part of an enterprise.A rational and scientific marketing management can not only reduce the cost of enterprise sales,but also greatly improve the competitiveness of enterprises.The purpose of this paper is to study the innovative application of enterprise marketing management based on the Internet of Things technology.The most suitable competitive strategy of the company is put forward as the centralized strategy.And put forward the clear strategy implementation details,introduced the current situation and history of the Internet of things,and combined with the development status,put forward the necessity of the enterprise marketing management system based on the Internet of things technology.It provides a guiding direction for most enterprises to formulate business competition strategies.The theory and technology used in system development are introduced,including C/S structure,B/S structure,NET Framework,AJAX technology,and database technology.The system design process is introduced in detail,including business process design,architecture design and system operation planning.The functional test cases and test environment for system testing are introduced.The results show that when 200 people log in at the same time,the response time is 1.5 s.展开更多
Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge ...Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge decision-making of perishable pledges in the inventory pledge business,On the basis of considering the supervision of the Internet of Things technology to reduce the loss rate of quality goods,a decision model of the pledge rate of the bank is constructed in the case of not adopting the Internet of things technology and adopting the Internet of things technology.The pledge rate decision-making model in the two technical situations aims at maximizing the profit at the end of the pledge period.The factors in the model such as the pledge rate,end-of-period income,and IoT technology coverage rate are analyzed respectively,and finally the decision-making process is verified through calculation examples.Studies have shown that,when Internet of Things technology is not adopted,the income of bank pledge business first increases and then decreases with the growth of pledge rate.After the adoption of Internet of Things technology,the income of Banks is inversely proportional to the coverage rate of Internet of Things technology.However,within a certain coverage range,Banks can obtain greater income by using Internet of Things technology to supervise pledges.展开更多
After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also desc...After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection.展开更多
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha...In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions.展开更多
Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural se...Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.展开更多
The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sen...The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sensor devices(SD)try to send information to a single GW.This is mitigated by allotting various channels to adjoining GWs.Furthermore,SDs are permitted to associate with anyGWin a network,naturally choosing the one with a higher received signal strength indicator(RSSI),regardless of whether it is the ideal choice for network execution.Finding an appropriate GW to optimize the performance of IoT systems is a difficult task given the complicated conditions among GWs and SDs.Recently,in remote IoT networks,the utilization of machine learning(ML)strategies has arisen as a viable answer to determine the effect of various models in the system,and reinforcement learning(RL)is one of these ML techniques.Therefore,this paper proposes the use of an RL algorithm for GW determination and association in IoT networks.For this purpose,this study allows GWs and SDs with intelligence,through executing the multi-armed bandit(MAB)calculation,to investigate and determine the optimal GW with which to associate.In this paper,rigorous mathematical calculations are performed for this purpose and evaluate our proposed mechanism over randomly generated situations,which include different IoT network topologies.The evaluation results indicate that our intelligentMAB-based mechanism enhances the association as compared to state-of-the-art(RSSI-based)and related research approaches.展开更多
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ...Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score.展开更多
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver...The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.展开更多
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ...With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods.展开更多
The study investigated the impact of the Internet of Things in manufacturing management. Specifically, the study examined how IoT implementation and management affect organizational efficiency in Camanov Ltd.;and to w...The study investigated the impact of the Internet of Things in manufacturing management. Specifically, the study examined how IoT implementation and management affect organizational efficiency in Camanov Ltd.;and to what extent IoT implementation contributes to the saving of cost and time of the organization. The research design is a survey. The population of this study consisted of all 141 staff of Camanov Ltd. Port Harcourt. Since the population is not large, the researcher conducted a census of all, and 126 staff completed a structured questionnaire. The two research questions were analyzed using simple percentages and all two hypotheses were tested using sample proportion statistics (Z test) at a 0.05 level of significance. The result showed that the Internet of Things has a significant impact on organizational efficiency in Camanov Ltd. (Z = 4.73);and that the Internet of Things significantly contributes toward saving cost and time of the organization Camanov Ltd (Z = 4.95). It was recommended that organizations should encourage training of personnel in the improved limitless possibility of information gathered from the Internet of Things framework which supports planning, budgeting and monitoring approaches, providing more reliable information to support actions, in particular in the decision-making process, to enhance productivity.展开更多
This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agr...This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs.展开更多
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61872289 and 62172266in part by the Henan Key Laboratory of Network Cryptography Technology LNCT2020-A07the Guangxi Key Laboratory of Trusted Software under Grant No.KX202308.
文摘The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
基金supported in part by National Key Research and Development Program of China under Grant 2021YFB2900404.
文摘Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods.
文摘Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.
基金National Innovation and Entrepreneurship Training Project“Time Bay-A Group Elderly Care Service Platform Based on Internet of Things Technology”(S202013836008X)Chongqing Education Commission Science and Technology Research Program Youth Project 2021(KJQN202105501)。
文摘Internet of Things(IoT)technology is widely used in various fields,and its application in elderly care services has been highlighted in recent years.This study aims to explore how IoT technology can improve the efficiency of group-based elderly care services.The concept,characteristics,and current application status of IoT technology in elderly care services were introduced.Secondly,the characteristics and needs of group elderly care services were analyzed,including advantages and challenges,as well as the expectations and needs of the elderly for elderly care services.The evaluation methods and future development directions of IoT technology in improving the efficiency of group elderly care services were discussed,including data collection and analysis methods,selection and measurement of efficiency evaluation indicators,challenges,and development directions.
基金This research was supported by the Ministry of Higher Education,Malaysia(MoHE)through Fundamental Research Grant Scheme(FRGS/1/2021/TK0/UTAR/02/9)The work was also supported by the Universiti Tunku Abdul Rahman(UTAR),Malaysia,under UTAR Research Fund(UTARRF)(IPSR/RMC/UTARRF/2021C1/T05).
文摘Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots.
文摘Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.
文摘Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the education industry. This paper takes the intelligent teaching base on the basis of Internet of Things technology as the research object, introduces the connotation of the wisdom teaching base with reference to relevant literature materials, analyzes the research background of the wisdom teaching base on the basis of the Internet of Things technology, expounds the design method of smart teaching base on the basis of Internet of Things technology, and analyzes the function realization and application of intelligent teaching base on the basis of Internet of Things technology.
基金supported by the Fundamental Research Funds for the Central Universities(No.30921012203)“Marketing”School-level Brand Major Construction Project of Nanjing University of Finance&Economics(2020).
文摘Marketing is a very important part of an enterprise.A rational and scientific marketing management can not only reduce the cost of enterprise sales,but also greatly improve the competitiveness of enterprises.The purpose of this paper is to study the innovative application of enterprise marketing management based on the Internet of Things technology.The most suitable competitive strategy of the company is put forward as the centralized strategy.And put forward the clear strategy implementation details,introduced the current situation and history of the Internet of things,and combined with the development status,put forward the necessity of the enterprise marketing management system based on the Internet of things technology.It provides a guiding direction for most enterprises to formulate business competition strategies.The theory and technology used in system development are introduced,including C/S structure,B/S structure,NET Framework,AJAX technology,and database technology.The system design process is introduced in detail,including business process design,architecture design and system operation planning.The functional test cases and test environment for system testing are introduced.The results show that when 200 people log in at the same time,the response time is 1.5 s.
文摘Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge decision-making of perishable pledges in the inventory pledge business,On the basis of considering the supervision of the Internet of Things technology to reduce the loss rate of quality goods,a decision model of the pledge rate of the bank is constructed in the case of not adopting the Internet of things technology and adopting the Internet of things technology.The pledge rate decision-making model in the two technical situations aims at maximizing the profit at the end of the pledge period.The factors in the model such as the pledge rate,end-of-period income,and IoT technology coverage rate are analyzed respectively,and finally the decision-making process is verified through calculation examples.Studies have shown that,when Internet of Things technology is not adopted,the income of bank pledge business first increases and then decreases with the growth of pledge rate.After the adoption of Internet of Things technology,the income of Banks is inversely proportional to the coverage rate of Internet of Things technology.However,within a certain coverage range,Banks can obtain greater income by using Internet of Things technology to supervise pledges.
文摘After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection.
基金funded by the Research Management Centre(RMC),Universiti Malaysia Sabah,through the Journal Article Fund UMS/PPI-DPJ1.
文摘In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions.
基金supported by National Natural Science Foundation of China(62172155)The National Key Research and Development Program of China(2019YFB1405702)。
文摘Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.
基金Funded by Institutional Fund Projects underGrant No.RG-2-611-42 by Ministry of Education and King Abdulaziz University,Jeddah,Saudi Arabia(A.O.A.).
文摘The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sensor devices(SD)try to send information to a single GW.This is mitigated by allotting various channels to adjoining GWs.Furthermore,SDs are permitted to associate with anyGWin a network,naturally choosing the one with a higher received signal strength indicator(RSSI),regardless of whether it is the ideal choice for network execution.Finding an appropriate GW to optimize the performance of IoT systems is a difficult task given the complicated conditions among GWs and SDs.Recently,in remote IoT networks,the utilization of machine learning(ML)strategies has arisen as a viable answer to determine the effect of various models in the system,and reinforcement learning(RL)is one of these ML techniques.Therefore,this paper proposes the use of an RL algorithm for GW determination and association in IoT networks.For this purpose,this study allows GWs and SDs with intelligence,through executing the multi-armed bandit(MAB)calculation,to investigate and determine the optimal GW with which to associate.In this paper,rigorous mathematical calculations are performed for this purpose and evaluate our proposed mechanism over randomly generated situations,which include different IoT network topologies.The evaluation results indicate that our intelligentMAB-based mechanism enhances the association as compared to state-of-the-art(RSSI-based)and related research approaches.
基金supported by the Deanship of Scientific Research at the University of Tabuk through Research No.S-1443-0111.
文摘Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score.
文摘The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.
基金Supported by the National Key Research and Development Program of China(No.2020YFC1807903)the Natural Science Foundation of Beijing Municipality(No.L192002)。
文摘With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods.
文摘The study investigated the impact of the Internet of Things in manufacturing management. Specifically, the study examined how IoT implementation and management affect organizational efficiency in Camanov Ltd.;and to what extent IoT implementation contributes to the saving of cost and time of the organization. The research design is a survey. The population of this study consisted of all 141 staff of Camanov Ltd. Port Harcourt. Since the population is not large, the researcher conducted a census of all, and 126 staff completed a structured questionnaire. The two research questions were analyzed using simple percentages and all two hypotheses were tested using sample proportion statistics (Z test) at a 0.05 level of significance. The result showed that the Internet of Things has a significant impact on organizational efficiency in Camanov Ltd. (Z = 4.73);and that the Internet of Things significantly contributes toward saving cost and time of the organization Camanov Ltd (Z = 4.95). It was recommended that organizations should encourage training of personnel in the improved limitless possibility of information gathered from the Internet of Things framework which supports planning, budgeting and monitoring approaches, providing more reliable information to support actions, in particular in the decision-making process, to enhance productivity.
基金supported in part by the Research Start-Up Fund for Talent Researcher of Nanjing Agricultural University(77H0603)in part by the National Natural Science Foundation of China(62072248)。
文摘This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs.