Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption i...Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers.展开更多
NB-IoT(Narrow Band Internet of Things)是基于蜂窝窄带物联网的一种新兴技术,是物联网的一个重要分支。随着NB-IoT终端设备的规模不断增大,物联网安全面临数据泄露、中间人攻击等安全威胁。本论文针对NB-IoT技术的数据安全传输研究,...NB-IoT(Narrow Band Internet of Things)是基于蜂窝窄带物联网的一种新兴技术,是物联网的一个重要分支。随着NB-IoT终端设备的规模不断增大,物联网安全面临数据泄露、中间人攻击等安全威胁。本论文针对NB-IoT技术的数据安全传输研究,从物联网终端安全和应用服务安全两方面进行分析,结合密码技术给出了NB-IoT系统安全模型,提出了基于物联网应用层数据信源加密传输机制,给出了轻量级身份认证协议和数据加密传输协议,论证了该方案的安全性,通过实验验证了所提方案的可行性和适用性。展开更多
The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the ...The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the process of traditional intelligent transportation system,the paper proposed a promising model of IOT in transportation. The advantage of the information utilization model from information to function was confirmed through comparative study. Finally,the model presented that a real interconnection of transportation would be achieved based on the unified information collection. It can greatly save cost on technology transfer,exploit potential value of information,and promote the emergence of a sustainable information service market and the industrial upgrade.展开更多
The development of energy and cost efficient IoT nodes is very important for the successful deployment of IoT solutions across various application domains. This paper presents energy models, which will enable the esti...The development of energy and cost efficient IoT nodes is very important for the successful deployment of IoT solutions across various application domains. This paper presents energy models, which will enable the estimation of battery life, for both time-based and event-based low-cost IoT monitoring nodes. These nodes are based on the low-cost ESP8266 (ESP) modules which integrate both transceiver and microcontroller on a single small-size chip and only cost about $2. The active/sleep energy saving approach was used in the design of the IoT monitoring nodes because the power consumption of ESP modules is relatively high and often impacts negatively on the cost of operating the nodes. A low energy application layer protocol, that is, Message Queue Telemetry Transport (MQTT) was also employed for energy efficient wireless data transport. The finite automata theory was used to model the various states and behavior of the ESP modules used in IoT monitoring applications. The applicability of the models presented was tested in real life application scenarios and results are presented. In a temperature and humidity monitoring node, for example, the model shows a significant reduction in average current consumption from 70.89 mA to 0.58 mA for sleep durations of 0 and 30 minutes, respectively. The battery life of batteries rated in mAh can therefore be easily calculated from the current consumption figures.展开更多
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic...The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.展开更多
The Internet of Things(IoT)plays an essential role in the current and future generations of information,network,and communication development and applications.This research focuses on vocal tract visualization and mod...The Internet of Things(IoT)plays an essential role in the current and future generations of information,network,and communication development and applications.This research focuses on vocal tract visualization and modeling,which are critical issues in realizing inner vocal tract animation.That is applied in many fields,such as speech training,speech therapy,speech analysis and other speech production-related applications.This work constructed a geometric model by observation of Magnetic Resonance Imaging data,providing a new method to annotate and construct 3D vocal tract organs.The proposed method has two advantages compared with previous methods.Firstly it has a uniform construction protocol for all speech organs.Secondly,this method can build correspondent feature points between different speech organs.There are less than three control parameters can be used to describe every speech organ accurately,for which the accumulated contribution rate is more than 88%.By means of the reconfiguration,the model error is less than 1.0 mm.Regarding to the data from Chinese Magnetic resonance imaging(MRI),this is the first work of 3D vocal tract model.It will promote the theoretical research and development of the intelligent Internet of Things facing speech generation-related issues.展开更多
Cephalopods identification is a formidable task that involves hand inspection and close observation by a malacologist.Manual observation and iden-tification take time and are always contingent on the involvement of expe...Cephalopods identification is a formidable task that involves hand inspection and close observation by a malacologist.Manual observation and iden-tification take time and are always contingent on the involvement of experts.A system is proposed to alleviate this challenge that uses transfer learning techni-ques to classify the cephalopods automatically.In the proposed method,only the Lightweight pre-trained networks are chosen to enable IoT in the task of cephalopod recognition.First,the efficiency of the chosen models is determined by evaluating their performance and comparing thefindings.Second,the models arefine-tuned by adding dense layers and tweaking hyperparameters to improve the classification of accuracy.The models also employ a well-tuned Rectified Adam optimizer to increase the accuracy rates.Third,Adam with Gradient Cen-tralisation(RAdamGC)is proposed and used infine-tuned models to reduce the training time.The framework enables an Internet of Things(IoT)or embedded device to perform the classification tasks by embedding a suitable lightweight pre-trained network.Thefine-tuned models,MobileNetV2,InceptionV3,and NASNet Mobile have achieved a classification accuracy of 89.74%,87.12%,and 89.74%,respectively.Thefindings have indicated that thefine-tuned models can classify different kinds of cephalopods.The results have also demonstrated that there is a significant reduction in the training time with RAdamGC.展开更多
随着无线物联网(Internet of Things,IoT)业务的兴起,海量设备的接入,无线网络受攻击的可能性大大增加,无线IoT设备的安全问题越来越重要。提出了一个基于深度机器学习长短期记忆(Long Short-Term Memory,LSTM)模型的无线IoT设备识别方...随着无线物联网(Internet of Things,IoT)业务的兴起,海量设备的接入,无线网络受攻击的可能性大大增加,无线IoT设备的安全问题越来越重要。提出了一个基于深度机器学习长短期记忆(Long Short-Term Memory,LSTM)模型的无线IoT设备识别方法,用于甄别非法入侵的设备或者发现已经被入侵后通信异常的设备。所提方法的创新点在于通过深度机器学习对IoT设备公开传输的帧头信息进行分析识别,而不必深入分析承载信息,不依赖于易被修改和伪装的IP地址等身份信息,因此不受通信信息加密的影响,也不受各类伪装地址及其他入侵方法的影响。所提方法的应用可以自动快速地识别出非授权设备或者被入侵的授权设备,更好地保障网络安全。展开更多
This paper presents an approach to recursively estimate the simplest linear model that approximates the time-varying local behaviors from imperfect(noisy and incomplete) measurements in the internet of things(IoT) bas...This paper presents an approach to recursively estimate the simplest linear model that approximates the time-varying local behaviors from imperfect(noisy and incomplete) measurements in the internet of things(IoT) based distributed decision-making problems. We first show that the problem of finding the lowest order model for a multi-input single-output system is a cardinality(l0) optimization problem, known to be NP-hard.To solve the problem a simpler approach is proposed which uses the recently developed atomic norm concept and the modified Frank-Wolfe(mFW) algorithm is introduced. Further, the paper computes the minimum data-rate required for computing the models with imperfect measurements. The proposed approach is illustrated on a building heating, ventilation, and air-conditioning(HVAC) control system that aims at optimizing energy consumption in commercial buildings using IoT devices in a distributed manner. The HVAC control application requires recursive thermal dynamical model updates due to frequently changing conditions and non-linear dynamics. We show that the method proposed in this paper can approximate such complex dynamics on single-board computers interfaced to sensors using unreliable communication channels. Real-time experiments on HVAC systems and simulation studies are used to illustrate the proposed method.展开更多
With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the...With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things.展开更多
基金The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through the Project Number(PSAU/2023/01/27268).
文摘Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers.
文摘NB-IoT(Narrow Band Internet of Things)是基于蜂窝窄带物联网的一种新兴技术,是物联网的一个重要分支。随着NB-IoT终端设备的规模不断增大,物联网安全面临数据泄露、中间人攻击等安全威胁。本论文针对NB-IoT技术的数据安全传输研究,从物联网终端安全和应用服务安全两方面进行分析,结合密码技术给出了NB-IoT系统安全模型,提出了基于物联网应用层数据信源加密传输机制,给出了轻量级身份认证协议和数据加密传输协议,论证了该方案的安全性,通过实验验证了所提方案的可行性和适用性。
基金CAE Internet of Things and its Application Project in 2010National Basic Research Program of China"973"Program (No. 2012CB315805)
文摘The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the process of traditional intelligent transportation system,the paper proposed a promising model of IOT in transportation. The advantage of the information utilization model from information to function was confirmed through comparative study. Finally,the model presented that a real interconnection of transportation would be achieved based on the unified information collection. It can greatly save cost on technology transfer,exploit potential value of information,and promote the emergence of a sustainable information service market and the industrial upgrade.
文摘The development of energy and cost efficient IoT nodes is very important for the successful deployment of IoT solutions across various application domains. This paper presents energy models, which will enable the estimation of battery life, for both time-based and event-based low-cost IoT monitoring nodes. These nodes are based on the low-cost ESP8266 (ESP) modules which integrate both transceiver and microcontroller on a single small-size chip and only cost about $2. The active/sleep energy saving approach was used in the design of the IoT monitoring nodes because the power consumption of ESP modules is relatively high and often impacts negatively on the cost of operating the nodes. A low energy application layer protocol, that is, Message Queue Telemetry Transport (MQTT) was also employed for energy efficient wireless data transport. The finite automata theory was used to model the various states and behavior of the ESP modules used in IoT monitoring applications. The applicability of the models presented was tested in real life application scenarios and results are presented. In a temperature and humidity monitoring node, for example, the model shows a significant reduction in average current consumption from 70.89 mA to 0.58 mA for sleep durations of 0 and 30 minutes, respectively. The battery life of batteries rated in mAh can therefore be easily calculated from the current consumption figures.
基金supported by Joint Funds of the National Natural Science Foundation of China and Xinjiang under Project U1603261.
文摘The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
基金This work was supported by the Regional Innovation Cooperation Project of Sichuan Province(Grant No.2022YFQ0073).
文摘The Internet of Things(IoT)plays an essential role in the current and future generations of information,network,and communication development and applications.This research focuses on vocal tract visualization and modeling,which are critical issues in realizing inner vocal tract animation.That is applied in many fields,such as speech training,speech therapy,speech analysis and other speech production-related applications.This work constructed a geometric model by observation of Magnetic Resonance Imaging data,providing a new method to annotate and construct 3D vocal tract organs.The proposed method has two advantages compared with previous methods.Firstly it has a uniform construction protocol for all speech organs.Secondly,this method can build correspondent feature points between different speech organs.There are less than three control parameters can be used to describe every speech organ accurately,for which the accumulated contribution rate is more than 88%.By means of the reconfiguration,the model error is less than 1.0 mm.Regarding to the data from Chinese Magnetic resonance imaging(MRI),this is the first work of 3D vocal tract model.It will promote the theoretical research and development of the intelligent Internet of Things facing speech generation-related issues.
文摘Cephalopods identification is a formidable task that involves hand inspection and close observation by a malacologist.Manual observation and iden-tification take time and are always contingent on the involvement of experts.A system is proposed to alleviate this challenge that uses transfer learning techni-ques to classify the cephalopods automatically.In the proposed method,only the Lightweight pre-trained networks are chosen to enable IoT in the task of cephalopod recognition.First,the efficiency of the chosen models is determined by evaluating their performance and comparing thefindings.Second,the models arefine-tuned by adding dense layers and tweaking hyperparameters to improve the classification of accuracy.The models also employ a well-tuned Rectified Adam optimizer to increase the accuracy rates.Third,Adam with Gradient Cen-tralisation(RAdamGC)is proposed and used infine-tuned models to reduce the training time.The framework enables an Internet of Things(IoT)or embedded device to perform the classification tasks by embedding a suitable lightweight pre-trained network.Thefine-tuned models,MobileNetV2,InceptionV3,and NASNet Mobile have achieved a classification accuracy of 89.74%,87.12%,and 89.74%,respectively.Thefindings have indicated that thefine-tuned models can classify different kinds of cephalopods.The results have also demonstrated that there is a significant reduction in the training time with RAdamGC.
文摘随着无线物联网(Internet of Things,IoT)业务的兴起,海量设备的接入,无线网络受攻击的可能性大大增加,无线IoT设备的安全问题越来越重要。提出了一个基于深度机器学习长短期记忆(Long Short-Term Memory,LSTM)模型的无线IoT设备识别方法,用于甄别非法入侵的设备或者发现已经被入侵后通信异常的设备。所提方法的创新点在于通过深度机器学习对IoT设备公开传输的帧头信息进行分析识别,而不必深入分析承载信息,不依赖于易被修改和伪装的IP地址等身份信息,因此不受通信信息加密的影响,也不受各类伪装地址及其他入侵方法的影响。所提方法的应用可以自动快速地识别出非授权设备或者被入侵的授权设备,更好地保障网络安全。
基金supported by the Building and Construction Authority through the NRF GBIC Program(NRF2015ENC-GBICRD001-057)。
文摘This paper presents an approach to recursively estimate the simplest linear model that approximates the time-varying local behaviors from imperfect(noisy and incomplete) measurements in the internet of things(IoT) based distributed decision-making problems. We first show that the problem of finding the lowest order model for a multi-input single-output system is a cardinality(l0) optimization problem, known to be NP-hard.To solve the problem a simpler approach is proposed which uses the recently developed atomic norm concept and the modified Frank-Wolfe(mFW) algorithm is introduced. Further, the paper computes the minimum data-rate required for computing the models with imperfect measurements. The proposed approach is illustrated on a building heating, ventilation, and air-conditioning(HVAC) control system that aims at optimizing energy consumption in commercial buildings using IoT devices in a distributed manner. The HVAC control application requires recursive thermal dynamical model updates due to frequently changing conditions and non-linear dynamics. We show that the method proposed in this paper can approximate such complex dynamics on single-board computers interfaced to sensors using unreliable communication channels. Real-time experiments on HVAC systems and simulation studies are used to illustrate the proposed method.
基金supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things.