期刊文献+
共找到2,015篇文章
< 1 2 101 >
每页显示 20 50 100
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
1
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUTHENTICITY security LOCATION communication
下载PDF
Ultra reliability and massive connectivity provision in integrated internet of military things(IoMT)based on tactical datalink
2
作者 Li Bing Yating Gu +4 位作者 Lanke Hu Li Bowen Yang Lihua Jue Wang Yue Yin 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期386-398,共13页
One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this pa... One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern. 展开更多
关键词 Satellite network Deep space communications internet of military things Non-orthogonal multiple access MIMO LINK-16 JITDS
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
3
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of things federated learning PRISMA framework of FL applications of FL data privacy communication
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
4
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 internet of things(iot) internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
5
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES internet of things(iot) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
6
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of things (iot) M2M Factors Obstacles Potential Benefits UNIVERSITIES
下载PDF
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
7
作者 Rahim Khan Abdullah Ghani +3 位作者 Samia Allaoua Chelloug Mohammed Amin Aamir Saeed Jason Teo 《Computers, Materials & Continua》 SCIE EI 2023年第8期1569-1584,共16页
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th... The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes. 展开更多
关键词 Machine learning internet of Medical things healthcare load balancing communication
下载PDF
ETM-IoT:Energy-Aware Threshold Model for Heterogeneous Communication in the Internet of Things 被引量:2
8
作者 A.Vijaya Krishna A.Anny Leema 《Computers, Materials & Continua》 SCIE EI 2022年第1期1815-1827,共13页
The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based ... The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms. 展开更多
关键词 internet of things communication energy THRESHOLD heterogeneous network
下载PDF
Traffic Control Based on Integrated Kalman Filtering and Adaptive Quantized Q-Learning Framework for Internet of Vehicles
9
作者 Othman S.Al-Heety Zahriladha Zakaria +4 位作者 Ahmed Abu-Khadrah Mahamod Ismail Sarmad Nozad Mahmood Mohammed Mudhafar Shakir Hussein Alsariera 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2103-2127,共25页
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled... Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data.The framework integrates Kalman filtering and Q-learning.Unlike smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error.Unlike traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction roads.For evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art approach.Hence,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system. 展开更多
关键词 Q-LEARNING intelligent transportation system(ITS) traffic control vehicular communication kalman filtering smart city internet of things
下载PDF
User Scheduling and Slicing Resource Allocation in Industrial Internet of Things 被引量:2
10
作者 Sisi Li Yong Zhang +1 位作者 Siyu Yuan Tengteng Ma 《China Communications》 SCIE CSCD 2023年第6期368-381,共14页
Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising te... Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines. 展开更多
关键词 wireless communication resource allocation reinforcement learning heterogeneous network network slicing internet of things
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions
11
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) internet of things(iot) internet of Robotic things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
12
作者 Ayman Khallel Al-Ani Shams Ul Arfeen Laghari +2 位作者 Hariprasath Manoharan Shitharth Selvarajan Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第8期2261-2279,共19页
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha... In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions. 展开更多
关键词 TRANSPORTATION Artificial Intelligence(AI) DATA-DRIVEN internet of things(iot)
下载PDF
Network Learning-Enabled Sensor Association for Massive Internet of Things
13
作者 Alaa Omran Almagrabi Rashid Ali +2 位作者 Daniyal Alghazzawi Bander A.Alzahrani Fahad M.Alotaibi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期843-853,共11页
The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sen... The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sensor devices(SD)try to send information to a single GW.This is mitigated by allotting various channels to adjoining GWs.Furthermore,SDs are permitted to associate with anyGWin a network,naturally choosing the one with a higher received signal strength indicator(RSSI),regardless of whether it is the ideal choice for network execution.Finding an appropriate GW to optimize the performance of IoT systems is a difficult task given the complicated conditions among GWs and SDs.Recently,in remote IoT networks,the utilization of machine learning(ML)strategies has arisen as a viable answer to determine the effect of various models in the system,and reinforcement learning(RL)is one of these ML techniques.Therefore,this paper proposes the use of an RL algorithm for GW determination and association in IoT networks.For this purpose,this study allows GWs and SDs with intelligence,through executing the multi-armed bandit(MAB)calculation,to investigate and determine the optimal GW with which to associate.In this paper,rigorous mathematical calculations are performed for this purpose and evaluate our proposed mechanism over randomly generated situations,which include different IoT network topologies.The evaluation results indicate that our intelligentMAB-based mechanism enhances the association as compared to state-of-the-art(RSSI-based)and related research approaches. 展开更多
关键词 Reinforcement learning ASSOCIATION internet of things massive iot sensors network
下载PDF
Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques
14
作者 Okba Taouali Sawcen Bacha +4 位作者 Khaoula Ben Abdellafou Ahamed Aljuhani Kamel Zidi Rehab Alanazi Mohamed Faouzi Harkat 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1593-1609,共17页
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ... Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score. 展开更多
关键词 Machine learning data-driven technique KPCA KPLS intrusion detection iot internet of Medical things(IoMT)
下载PDF
Anomaly Detection for Industrial Internet of Things Cyberattacks
15
作者 Rehab Alanazi Ahamed Aljuhani 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2361-2378,共18页
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver... The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%. 展开更多
关键词 Anomaly detection anomaly-based IDS Industrial internet of things(Iiot) iot industrial control systems(ICSs) X-IiotID
下载PDF
Joint optimization of serving node selection and wireless resources allocation for transactions data in mobile blockchain enhanced Internet of Things
16
作者 尹玉峰 WU Wenjun +3 位作者 GAO Yang JIN Kaiqi ZHANG Yanhua SUN Teng 《High Technology Letters》 EI CAS 2023年第2期181-193,共13页
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ... With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods. 展开更多
关键词 internet of things(iot) mobile edge computing(MEC) blockchain deep reinforcement learning(DRL)
下载PDF
The Impact of Internet of Things in Manufacturing Management
17
作者 Ukazu Noel Chinedu Eje Brendan 《Engineering(科研)》 2023年第9期533-560,共28页
The study investigated the impact of the Internet of Things in manufacturing management. Specifically, the study examined how IoT implementation and management affect organizational efficiency in Camanov Ltd.;and to w... The study investigated the impact of the Internet of Things in manufacturing management. Specifically, the study examined how IoT implementation and management affect organizational efficiency in Camanov Ltd.;and to what extent IoT implementation contributes to the saving of cost and time of the organization. The research design is a survey. The population of this study consisted of all 141 staff of Camanov Ltd. Port Harcourt. Since the population is not large, the researcher conducted a census of all, and 126 staff completed a structured questionnaire. The two research questions were analyzed using simple percentages and all two hypotheses were tested using sample proportion statistics (Z test) at a 0.05 level of significance. The result showed that the Internet of Things has a significant impact on organizational efficiency in Camanov Ltd. (Z = 4.73);and that the Internet of Things significantly contributes toward saving cost and time of the organization Camanov Ltd (Z = 4.95). It was recommended that organizations should encourage training of personnel in the improved limitless possibility of information gathered from the Internet of Things framework which supports planning, budgeting and monitoring approaches, providing more reliable information to support actions, in particular in the decision-making process, to enhance productivity. 展开更多
关键词 iot internet of things AUTOMATION Network of Physical Objects
下载PDF
A Green Paradigm for Internet of Things: Ambient Backscatter Communications 被引量:9
18
作者 Wei Zhang Yao Qin +4 位作者 Wenjing Zhao Minzheng Jia Qiang Liu Ruisi He Bo Ai 《China Communications》 SCIE CSCD 2019年第7期109-119,共11页
Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT gen... Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT generally faces the challenges from energy constraint and implementation cost. In this paper, we will introduce a new green communication paradigm, the ambient backscatter (AmBC), that could utilize the environmental wireless signals for both powering a tiny-cost device and backscattering the information symbols. Specifically, we will present the basic principles of AmBC, analyze its features and advantages, suggest its open problems, and predict its potential applications for our future IoT. 展开更多
关键词 AMBIENT backscatter (AmBC) RF-powered device internet of things (iot) battery-free TAG wire-less sensor
下载PDF
Design of Intelligent Pension Online Monitoring System Under the Environment of Internet of Things
19
作者 WANG Rong WANG Tianhu 《Instrumentation》 2023年第3期53-64,共12页
With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve... With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects. 展开更多
关键词 Smart Pension internet of things NB-iot communication Technology Ali Cloud Platform
下载PDF
Internet of Things (IoT): A Literature Review 被引量:11
20
作者 Somayya Madakam R. Ramaswamy Siddharth Tripathi 《Journal of Computer and Communications》 2015年第5期164-173,共10页
One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify eve... One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In Light of this, present study addresses IoT concepts through systematic review of scholarly research papers, corporate white papers, professional discussions with experts and online databases. Moreover this research article focuses on definitions, geneses, basic requirements, characteristics and aliases of Internet of Things. The main objective of this paper is to provide an overview of Internet of Things, architectures, and vital technologies and their usages in our daily life. However, this manuscript will give good comprehension for the new researchers, who want to do research in this field of Internet of Things (Technological GOD) and facilitate knowledge accumulation in efficiently. 展开更多
关键词 internet of things iot RFID IPv6 EPC BARCODE Wi-Fi BLUETOOTH NFC ZigBee Sensors Actuators
下载PDF
上一页 1 2 101 下一页 到第
使用帮助 返回顶部