期刊文献+
共找到1,902篇文章
< 1 2 96 >
每页显示 20 50 100
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
1
作者 Samir M.Umran Songfeng Lu +1 位作者 Zaid Ameen Abduljabbar Xueming Tang 《Computers, Materials & Continua》 SCIE EI 2023年第3期5389-5416,共28页
There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new ... There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing. 展开更多
关键词 Smart grids industrial iots electric power system blockchain technology IoT applications industry 4.0 decentralization applications
下载PDF
Tourism Entropy as a Critical Factor for Destination Sustainability:Assessment of Carrying Capacity Through IoTs and Determination of Tourism Satisfaction
2
作者 Antonis Theocharous Spyridon Avdimiotis Apostolos Karakitsios 《Journal of Tourism and Hospitality Management》 2019年第2期61-71,共11页
This paper introduces a novel methodology to address the issue of destination carrying capacity assessment and monitoring,while,to develop a new tool to enable effective and optimized policy making in tourism sector.T... This paper introduces a novel methodology to address the issue of destination carrying capacity assessment and monitoring,while,to develop a new tool to enable effective and optimized policy making in tourism sector.Tourism fits together a chain value,where stakeholders are working as cogwheels targeting the sustainability.An inherent requirement towards the objectives of sustainability is the capacity of policy makers to sustain the available social,economic,and environmental resources.Given the facts that(i)carrying capacity is a complex,dynamic,multidimensional concept,apparently vague,as such it is quite difficult to assess and monitor and(ii)each destination has unique characteristics,varying the extent and intensity of tourism development,the research proposal refines and implements measures and establishes a state-of-the-art data collection network in order to monitor tourism development in terms of sustainability and to establish an integrated carrying capacity estimation framework.Since validity and reliability of input data is a critical issue,different kind of sensors for environmental data(IoTs)are used,as well as web mining methods and field surveys,statistical information and secondary research results.Also,specialized analysis methods are applied and integration of all sources is achieved,defining the characteristics of the tourism destination ecosystem from the perspective of entropy change,in order to provide planning,policy making,and decision support,as well as a set of intelligent tools. 展开更多
关键词 carrying capacity smart tourism tourism entropy SUSTAINABILITY tourism satisfaction environment protection policy making tourism destination INNOVATION iots
下载PDF
A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things(IoTs)
3
作者 Kanwal Imran Nasreen Anjum +3 位作者 Abdullah Alghamdi Asadullah Shaikh Mohammed Hamdi Saeed Mahfooz 《Computers, Materials & Continua》 SCIE EI 2022年第1期1033-1052,共20页
IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to ... IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard,thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network.The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES(Advanced Encryption Standard),but the 6LoWPANstandard lacks and has omitted the security and privacy requirements at higher layers.The sensor nodes in 6LoWPANcan join the network without requiring the authentication procedure.Therefore,from security perspectives,6LoWPAN is vulnerable to many attacks such as replay attack,Man-in-the-Middle attack,Impersonation attack,and Modification attack.This paper proposes a secure and efficient cluster-based authentication scheme(CBAS)for highly constrained sensor nodes in 6LoWPAN.In this approach,sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node.The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes.To ensure the low signaling overhead during the registration,authentication,and handover procedures,we also introduce lightweight and efficient registration,de-registration,initial authentication,and handover procedures,when a sensor node or group of sensor nodes join or leave a cluster.Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.Our simulation experiments show that CBAS has reduced the registration delay by 11%,handoff authentication delay by 32%,and signaling cost by 37%compared to the SGMS(Secure GroupMobility Scheme)and LAMS(Light-Wight Authentication&Mobility Scheme). 展开更多
关键词 IOT cyber security security attacks authentication delay handover delay signaling cost 6LoWPAN
下载PDF
IoTSAMS: A Novel Framework for Internet of Things (IoT) Based Smart Attendance Management System
4
作者 Farzana Akter Amatul Bushra Akhi +2 位作者 Nusrat Jahan Farin Md. Mohsin Khondoker Md. Golam Saklayen 《Intelligent Control and Automation》 2018年第3期74-84,共11页
Automated attendance management system will reduce complexity by eliminating plenty of manual processes involved in attendance system and calculating hours attended. This paper presents a simple technique of taking st... Automated attendance management system will reduce complexity by eliminating plenty of manual processes involved in attendance system and calculating hours attended. This paper presents a simple technique of taking student attendance in the form of an Internet of Things (IoT) based system that records the attendance using fingerprint-based system and stores them securely in a database. We use NodeMCUV3, RFID Module and Fingerprint sensor module in our system. The fingerprint module is responsible for authentication of the students. RFID Module is used to scan the RFID tag and sends data to the central server. By using this information, the system will generate an attendance report which can be accessed for further use. 展开更多
关键词 Automated ATTENDANCE Arduino FINGERPRINT Module IOT RFID TAG and READER
下载PDF
IoT安全课程的“实战化”教材建设
5
作者 王奕森 娄睿 +1 位作者 井靖 段坷 《计算机教育》 2024年第1期209-214,共6页
针对当前网络空间安全教学内容正向多逆向少、理论多实践少、案例旧复现难的现状,以IoT安全课程教材建设为例,提出采用理论知识加实践指导、传统纸质加视频教程、实践操作加硬件在环的方式打造新型立体化教材,以覆盖IoT安全中的固件安... 针对当前网络空间安全教学内容正向多逆向少、理论多实践少、案例旧复现难的现状,以IoT安全课程教材建设为例,提出采用理论知识加实践指导、传统纸质加视频教程、实践操作加硬件在环的方式打造新型立体化教材,以覆盖IoT安全中的固件安全、硬件安全以及无线电安全等全链条知识,并阐述物联网安全“实战化”教材规划和建设内容。 展开更多
关键词 实战化 立体化教材 IoT安全 硬件在环
下载PDF
Free-walking:Pedestrian inertial navigation based on dual foot-mounted IMU
6
作者 Qu Wang Meixia Fu +6 位作者 Jianquan Wang Lei Sun Rong Huang Xianda Li Zhuqing Jiang Yan Huang Changhui Jiang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期573-587,共15页
The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time perfor... The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance. 展开更多
关键词 Indoor positioning Inertial navigation system(INS) Zero-velocity update(ZUPT) Internet of things(iots) Location-based service(LBS)
下载PDF
小米智能家居平台的构建及发展策略——基于双边市场理论视角
7
作者 黄清娟 《企业科技与发展》 2024年第1期69-73,共5页
消费级IoT(Internet of Things)平台作为万物互联时代的智能家居平台的代表,一边连接着终端消费者,另一边连接着智能设备制造商,具有典型的双边平台特征,形成一种连接消费者和制造商的平台生态。研究表明:IoT平台表现出同边的集聚效应... 消费级IoT(Internet of Things)平台作为万物互联时代的智能家居平台的代表,一边连接着终端消费者,另一边连接着智能设备制造商,具有典型的双边平台特征,形成一种连接消费者和制造商的平台生态。研究表明:IoT平台表现出同边的集聚效应和跨边的网络效应,平台的运营经历了价值互动平台、价值共享平台和价值共创平台3个阶段。小米IoT平台属于单归属平台,平台之间的竞争绩效取决于平台差异化程度、敏感性系数,两边用户之间的交叉网络外部性系数。为此,IoT平台需要通过扩大差异化、提高户黏性和注重双边价值共创的策略实现平台的可持续发展。 展开更多
关键词 双边平台 智能家居 消费级IoT平台 平台生态
下载PDF
面向实时决策的物联网时效与失真性能研究
8
作者 王艳芳 王伟 董云泉 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2024年第4期664-673,771,共11页
在物联网中,传感器及时、准确地数据传输是决策单元获得有效数据决策(如估计、推断或控制)的保障.为了减小估计失真,决策单元同时使用多个数据包并利用最佳线性无偏估计量(BLUE)进行联合估计.以决策信息年龄(AuD)和均方误差(MSE)分别度... 在物联网中,传感器及时、准确地数据传输是决策单元获得有效数据决策(如估计、推断或控制)的保障.为了减小估计失真,决策单元同时使用多个数据包并利用最佳线性无偏估计量(BLUE)进行联合估计.以决策信息年龄(AuD)和均方误差(MSE)分别度量系统决策时刻信息的时效性和失真,提出2种决策方案,研究所提方案的信息时效性与失真性能.在固定数量数据包的决策方案中,监测中心每收到固定数量数据包后进行一次估计;在固定时间间隔的决策方案中,监测中心每隔固定时间间隔进行一次估计.通过调度系统的决策过程来最小化平均AuD和平均失真的加权和,实现系统的时效性和失真的关系平衡.仿真结果表明,通过优化系统决策过程,所提方案可以实现在提升系统时效性的同时减小估计失真. 展开更多
关键词 物联网(IoT) 更新决策系统 决策信息年龄(AuD) 估计失真 决策调度
下载PDF
IoT感知的业务微流程建模
9
作者 王潇璇 王桂玲 《郑州大学学报(理学版)》 CAS 北大核心 2024年第2期26-33,共8页
基于物联大数据赋能的业务流程能够更快更准地感知物理世界并及时做出响应的需求突现,提出一种物联网(Internet of Things,IoT)感知的业务微流程建模方法。首先,以单个IoT对象为中心建模,融合MAPE-K(monitor,analysis,plan,execution an... 基于物联大数据赋能的业务流程能够更快更准地感知物理世界并及时做出响应的需求突现,提出一种物联网(Internet of Things,IoT)感知的业务微流程建模方法。首先,以单个IoT对象为中心建模,融合MAPE-K(monitor,analysis,plan,execution and knowledge base,MAPE-K)模型思想,将IoT对象实例生命周期的行为状态与微流程实例状态一一映射,实现对单个IoT对象的环形自动监控和调节;其次,基于从IoT传感设备获取的数据,定义基于SASE+语言的业务规则,提取对业务流程有意义的业务事件,避免了无关事件对宏流程的干扰;最后,通过设计一个微流程建模工具原型系统,结合真实案例分析,验证了提出建模方法的有效性,实现了业务流程与IoT实时流式感知数据的结合,并显著减少了宏流程需要处理的业务事件数量。 展开更多
关键词 IoT流式感知数据 业务规则 环形自动监控调节 微流程
下载PDF
面向IoT安全的MITM攻击防御机制研究
10
作者 潘琛 周高超 张德喜 《许昌学院学报》 CAS 2024年第2期113-117,共5页
隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物... 隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物联设备指纹生成机制,以对抗型思维并行开展监测与防御方案研究,实现了对隐藏安全威胁的感知与过滤,通过相似度阈值分析测试与评估模型的建立完成了设备安全性验证,具有较好的效果与优势. 展开更多
关键词 IoT智能家居安全 MITM 上下文感知 安全威胁感知与过滤
下载PDF
基于边缘计算的施工大气污染感知技术
11
作者 沈淦 饶泽志 +3 位作者 冉寅赛 徐照 鲁昌伍 焦国民 《建筑技术开发》 2024年第1期6-8,共3页
当前建筑行业在倡导节能减排和绿色施工的背景下,施工现场的大气污染物快速感知系统建设不断推进,为提高施工建设过程中对于现场环境监测的管理力量,通过结合BIM与IoT的技术特点,提出了基于边缘计算的施工大气污染物快速感知系统,对边... 当前建筑行业在倡导节能减排和绿色施工的背景下,施工现场的大气污染物快速感知系统建设不断推进,为提高施工建设过程中对于现场环境监测的管理力量,通过结合BIM与IoT的技术特点,提出了基于边缘计算的施工大气污染物快速感知系统,对边缘计算功能进行了开发,实现了边缘网关多协议接入和转换、数据预处理与计算等功能,提升了系统快速感知能力。 展开更多
关键词 BIM技术 IoT技术 快速感知系统 大气污染
下载PDF
基于事件关联的IoT服务即时推荐方法研究
12
作者 巩会龙 王菁 +3 位作者 郭陈虹 郭浩浩 丁美至 杨诗怡 《计算机与数字工程》 2024年第1期28-34,共7页
由于用户需求及环境的不确定性,服务组合业务流程可能需要在运行时进行动态调整,因此为用户推荐更加满足即时需求的IoT服务成为当前亟待解决的关键问题之一。就如何提高业务流程中IoT服务推荐的即时性与准确率问题,提出了一种考虑时间... 由于用户需求及环境的不确定性,服务组合业务流程可能需要在运行时进行动态调整,因此为用户推荐更加满足即时需求的IoT服务成为当前亟待解决的关键问题之一。就如何提高业务流程中IoT服务推荐的即时性与准确率问题,提出了一种考虑时间延时性的IoT服务即时推荐方法,基于改进的CM-SPADE算法挖掘出带有延时属性的事件频繁关联模式,为用户更准确地推荐符合时间约束的IoT服务,以更好地适应业务流程的变化。实验结果表明,所提出的考虑时间约束的IoT服务推荐方法在提高服务推荐准确度方面表现出较好的性能。 展开更多
关键词 服务组合 时间约束 频繁关联模式 IoT服务推荐
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
13
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Overview of novel nanobiosensors for electrochemical and optical diagnosis of leukemia:Challenge and opportunity
14
作者 Ulya Farahdina Tahta Amrillah +3 位作者 Mashuri Mashuri Vannajan Sanghiran Lee Agus Rubiyanto Nasori Nasori 《Journal of Innovative Optical Health Sciences》 SCIE EI CSCD 2024年第4期116-138,共23页
Leukemia is one of the ten types of cancer that causes the biggest death in the world.Compared to other types of cancer,leukemia has a low life expectancy,so an early diagnosis of the cancer is necessary.A new strateg... Leukemia is one of the ten types of cancer that causes the biggest death in the world.Compared to other types of cancer,leukemia has a low life expectancy,so an early diagnosis of the cancer is necessary.A new strategy has been developed to identify various leukemia biomarkers by making blood cancer biosensors,especially by developing nanomaterial applications so that they can improve the performance of the biosensor.Although many biosensors have been developed,the detection of leukemia by using nanomaterials with electrochemical and optical methods is still less carried out compare to other types of cancer biosensors.Even the acoustic and calorimetric testing methods for the detection of leukemia by utilizing nanomaterials have not yet been carried out.Most of the reviewed works reported the use of gold nanoparticles and electrochemical characterization methods for leukemia detection with the object of study being conventional cancer cells.In order to be used clinically by the community,future research must be carried out with a lot of patient blood objects,develop non-invasive leukemia detection,and be able to detect all types of blood cancer specifically with one biosensor.This can lead to a fast and accurate diagnosis thus allowing for early treatment and easy periodic condition monitoring for various types of leukemia based on its biomarker and future design controlable via internet of things(IoT)so that why would be monitoring real times. 展开更多
关键词 BIOSENSOR detection LEUKEMIA NANOMATERIAL IoT
下载PDF
A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices
15
作者 Muhammad Saad Muhammad Raheel Bhutta +1 位作者 Jongik Kim Tae-Sun Chung 《Computers, Materials & Continua》 SCIE EI 2024年第3期4263-4282,共20页
With the increase in IoT(Internet of Things)devices comes an inherent challenge of security.In the world today,privacy is the prime concern of every individual.Preserving one’s privacy and keeping anonymity throughou... With the increase in IoT(Internet of Things)devices comes an inherent challenge of security.In the world today,privacy is the prime concern of every individual.Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage.The challenge is keeping confidentiality and continuing to make the person innominate throughout the system.To address this,we present our proposed architecture where we manage IoT devices using blockchain technology.Our proposed architecture works on and off blockchain integrated with the closed-circuit television(CCTV)security camera fixed at the rental property.In this framework,the CCTV security camera feed is redirected towards the owner and renter based on the smart contract conditions.One entity(owner or renter)can see the CCTV security camera feed at one time.There is no third-party dependence except for the CCTV security camera deployment phase.Our contributions include the proposition of framework architecture,a novel smart contract algorithm,and the modification to the ring signatures leveraging an existing cryptographic technique.Analyses are made based on different systems’security and key management areas.In an empirical study,our proposed algorithm performed better in key generation,proof generation,and verification times.By comparing similar existing schemes,we have shown the proposed architectures’advantages.Until now,we have developed this system for a specific area in the real world.However,this system is scalable and applicable to other areas like healthcare monitoring systems,which is part of our future work. 展开更多
关键词 PRIVACY ANONYMITY blockchain IOT smart contracts
下载PDF
Resilient Satellite Communication Networks Towards Highly Dynamic and Highly Reliable Transmission
16
《China Communications》 SCIE CSCD 2024年第2期I0002-I0004,共3页
As the key infrastructure of space-ground integrated information networks,satellite communication networks provide high-speed and reliable information transmission.In order to meet the burgeoning service demands of th... As the key infrastructure of space-ground integrated information networks,satellite communication networks provide high-speed and reliable information transmission.In order to meet the burgeoning service demands of the IoT and the Internet,the low-latency LEO satellite network has developed rapidly.However,LEO satellites face inherent problems such as small coverage,fast moving speed and short overhead time,which will be more severe when serving high-dynamic users,e.g.high-speed rails and airplanes.The heterogeneous network composed of GEO,MEO and LEO satellites can provide various services,whose network management and resource allocation are also more challenging. 展开更多
关键词 NETWORK IOT HIGHLY
下载PDF
The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption
17
作者 Amal Hkiri Hamzah Faraj +3 位作者 Omar Ben Bahri Mouna Karmani Sami Alqurashi MohsenMachhout 《Computers, Materials & Continua》 SCIE EI 2024年第5期1835-1854,共20页
The Internet of Things(IoT)has witnessed a significant surge in adoption,particularly through the utilization of Wireless Sensor Networks(WSNs),which comprise small internet-connected devices.These deployments span va... The Internet of Things(IoT)has witnessed a significant surge in adoption,particularly through the utilization of Wireless Sensor Networks(WSNs),which comprise small internet-connected devices.These deployments span various environments and offer a multitude of benefits.However,the widespread use of battery-powered devices introduces challenges due to their limited hardware resources and communication capabilities.In response to this,the Internet Engineering Task Force(IETF)has developed the IPv6 Routing Protocol for Low-power and Lossy Networks(RPL)to address the unique requirements of such networks.Recognizing the critical role of RPL in maintaining high performance,this paper proposes a novel approach to optimizing power consumption.Specifically,it introduces a developed sensor motes topology integrated with a Radio Duty Cycling(RDC)mechanism aimed at minimizing power usage.Through rigorous analysis,the paper evaluates the power efficiency of this approach through several simulations conducted across different network topologies,including random,linear,tree,and elliptical topologies.Additionally,three distinct RDC mechanisms—CXMAC,ContikiMAC,and NullRDC—are investigated to assess their impact on power consumption.The findings of the study,based on a comprehensive and deep analysis of the simulated results,highlight the efficiency of ContikiMAC in power conservation.This research contributes valuable insights into enhancing the energy efficiency of RPL-based IoT networks,ultimately facilitating their widespread deployment and usability in diverse environments. 展开更多
关键词 WSN IoT radio duty cycles TOPOLOGIES
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things
18
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
19
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
20
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
上一页 1 2 96 下一页 到第
使用帮助 返回顶部