The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we ...The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we propose an intelligent DHR architecture,which is more feasible by intelligently combining the random distribution based dynamic scheduling algorithm(RD-DS)and information weight and heterogeneity based arbitrament(IWHA)algorithm.In the proposed architecture,the random distribution function and information weight are employed to achieve the optimal selection of executors in the process of RD-DS,which avoids the case that some executors fail to be selected due to their stability difference in the conventional DHR architecture.Then,through introducing the heterogeneity to restrict the information weights in the procedure of the IWHA,the proposed architecture solves the common mode escape issue caused by the existence of multiple identical error output results of similar vulnerabilities.The experimental results characterize that the proposed architecture outperforms in heterogeneity,scheduling times,security,and stability over the conventional DHR architecture under the same conditions.展开更多
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo...The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.展开更多
Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation o...Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation of such IoT systems.However,developing these systems can often be a tedious task.To address this challenge,a proposed solution involves the implementation of a unified program or script that encompasses the entire system,including IoT devices functionality.This approach is based on an abstraction,integrating the control of the devices in a single program through a programmable object.Subsequently,the proposal processes the unified script to generate the centralized system code and a controller for each device.By adopting this approach,developers will be able to create IoT systems with significantly reduced implementation costs,surpassing current platforms by more than 10%.The results demonstrate that the single program approach can significantly accelerate the development of IoT systems relying on device communication.展开更多
The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable conne...The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.展开更多
As the agricultural internet of things(IoT)technology has evolved,smart agricultural robots needs to have both flexibility and adaptability when moving in complex field environments.In this paper,we propose the concep...As the agricultural internet of things(IoT)technology has evolved,smart agricultural robots needs to have both flexibility and adaptability when moving in complex field environments.In this paper,we propose the concept of a vision-based navigation system for the agricultural IoT and a binocular vision navigation algorithm for smart agricultural robots,which can fuse the edge contour and the height information of rows of crop in images to extract the navigation parameters.First,the speeded-up robust feature(SURF)extracting and matching algorithm is used to obtain featuring point pairs from the green crop row images observed by the binocular parallel vision system.Then the confidence density image is constructed by integrating the enhanced elevation image and the corresponding binarized crop row image,where the edge contour and the height information of crop row are fused to extract the navigation parameters(θ,d)based on the model of a smart agricultural robot.Finally,the five navigation network instruction sets are designed based on the navigation angleθand the lateral distance d,which represent the basic movements for a certain type of smart agricultural robot working in a field.Simulated experimental results in the laboratory show that the algorithm proposed in this study is effective with small turning errors and low standard deviations,and can provide a valuable reference for the further practical application of binocular vision navigation systems in smart agricultural robots in the agricultural IoT system.展开更多
Cloud computing has been exploited in managing large-scale IoT systems.IoT cloud servers usually handle a large number of requests from various IoT devices.Due to the fluctuant and heavy workload,the servers require t...Cloud computing has been exploited in managing large-scale IoT systems.IoT cloud servers usually handle a large number of requests from various IoT devices.Due to the fluctuant and heavy workload,the servers require the cloud to provide high scalability,stable performance,low price and necessary functionalities.However,traditional clouds usually offer computing service with the abstraction of virtual machine(VM),which can hardly meet these requirements.Meanwhile,different cloud vendors provide different performance stabilities and price models,which fluctuate according to the dynamic workload.A single cloud cannot satisfy all the requirements of the IoT scenario well.The JointCloud computing model empowers the cooperation among multiple public clouds.However,it is still difficult to dynamically schedule the workload on different clouds based on the VM abstraction.This paper introduces HCloud,a trusted JointCloud platform for IoT systems using serverless computing model.HCloud allows an IoT server to be implemented with multiple serverless functions and schedules these functions on different clouds based on a schedule policy.The policy is specified by the client and includes the required functionalities,execution resources,latency,price and so on.HCloud collects the status of each cloud and dispatches serverless functions to the most suitable cloud based on the schedule policy.By leveraging the blockchain technology,we further enforce that our system can neither fake the cloud status nor wrongly dispatch the target functions.We have implemented a prototype of HCloud and evaluated it by simulating multiple cloud providers.The evaluation results show that HCloud can greatly improve the performance of serverless workloads with negligible costs.展开更多
Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based appro...Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based approaches. Mashup approaches use existing services and are mainly suitable for less critical, personalized applications. Web development tools are widely used in mashup approaches. Model-based techniques describe a system on a higher level of abstraction, resulting in very expressive modelling of systems. The article uses Cisco packet tracer 7.2 version, which consists of four subcategories of smart things—home, smart city, industrial and power grid, to design an IoT based control system for a fertilizer manufacturing plant. The packet tracer also consists of boards—microcontrollers (MCU-PT), and single boarded computers (SBC-PT), as well as actuators and sensors. The model facilitates flexible communication opportunities among things—machines, databases, and Human Machine Interfaces (HMIs). Implementation of the IoT system brings finer process control as the operating conditions are monitored online and are broadcasted to all stakeholders in real-time for quicker action on deviations. The model developed focuses on three process plants;steam raising, nitric acid, and ammonium nitrate plants. Key process parameters are saturated steam temperature, fuel flowrates, CO and SO<sub>x</sub> emissions, converter head temperature, NO<sub>x</sub> emissions, neutralisation temperature, solution temperature, and evaporator steam pressure. The parameters need to be monitored in order to ensure quality, safety, and efficiency. Through the Cisco packet tracer platform, a use case, physical layout, network layout, IoT layout, configuration, and simulation interface were developed.展开更多
Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things(IoT)systems,much research has been done in using machine learning methods to recognize IoT sensors data.This is pa...Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things(IoT)systems,much research has been done in using machine learning methods to recognize IoT sensors data.This is particularly the case for optical character recognition of handwritten scripts.Recognizing text in images has several useful applications,including content-based image retrieval,searching and document archiving.The Arabic language is one of the mostly used tongues in the world.However,Arabic text recognition in imagery is still very much in the nascent stage,especially handwritten text.This is mainly due to the language complexities,different writing styles,variations in the shape of characters,diacritics,and connected nature of Arabic text.In this paper,two deep learning models were proposed.The first model was based on a sequence-to-sequence recognition,while the second model was based on a fully convolution network.To measure the performance of these models,a new dataset,called QTID(Quran Text Image Dataset)was devised.This is the first Arabic dataset that includes Arabic diacritics.It consists of 309,720 different 192×64 annotated Arabic word images,which comprise 2,494,428 characters in total taken from the Holy Quran.The annotated images in the dataset were randomly divided into 90%,5%,and 5%sets for training,validation,and testing purposes,respectively.Both models were set up to recognize the Arabic Othmani font in the QTID.Experimental results show that the proposed methods achieve state-of-the-art outcomes.Furthermore,the proposed models surpass expectations in terms of character recognition rate,F1-score,average precision,and recall values.They are superior to the best Arabic text recognition engines like Tesseract and ABBYY FineReader.展开更多
Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things(IoT)in healthcare(HIoT).Due to more and mor...Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things(IoT)in healthcare(HIoT).Due to more and more online security and data hijacking attacks,the confidentiality,integrity and availability of data are considered serious issues in HIoT applications.In this regard,lightweight block ciphers(LBCs)are promising in resourceconstrained environment where security is the primary consideration.The prevalent challenge while designing an LBC for the HIoT environment is how to ascertain platform performance,cost,and security.Most of the existing LBCs primarily focus on text data or grayscale images.The main focus of this paper is about securing color images in a cost-effective way.We emphasis high confidentiality of color images captured by cameras in resource-constrained smartphones,and high confidentiality of sensitive images transmitted by low-power sensors in IoT systems.In order to reduce computational complexity and simulation time,the proposed Lightweight Symmetric Block Cipher(LSBC)exploits chaos-based confusion-diffusion operations at the inter-block level using a single round.The strength of LSBC is assessed by cryptanalysis,while it is ranked by comparing it to other privacy-preserving schemes.Our results show that the proposed cipher produces promising results in terms of key sensitivity and differential attacks,which proves that our LSBC is a good candidate for image security in HIoT.展开更多
In the era of the Internet of Things(IoT),the ever-increasing number of devices connected to the IoT networks also increases the energy consumption on the edge.This is prohibitive since the devices living on the edge ...In the era of the Internet of Things(IoT),the ever-increasing number of devices connected to the IoT networks also increases the energy consumption on the edge.This is prohibitive since the devices living on the edge are generally resource constrained devices in terms of energy consumption and computational power.Thus,trying to tackle this issue,in this paper,a fully automated end-to-end IoT system for real time monitoring of the status of a moving vehicle is proposed.The IoT system consists mainly of three components:(1)the ultra-lowpower consumptionWireless SensorNode(WSN),(2)the IoT gateway and(3)the IoT platform.In this scope,a selfpoweredWSN having ultra-low energy consumption(less than 10 mJ),which can be produced by environmental harvesting systems,is developed.WSN is used for collecting sensors’measurements from the vehicle and transmitting them to the IoT gateway,by exploiting a low energy communication protocol(i.e.,BLE).A powerful IoT gateway gathers the sensors’measurements,harmonizes,stores temporary and transmits them wirelessly,to a backend server(i.e.,LTE).And finally,the IoT platform,which in essence is a web application user interface(UI),used mainly for almost real time visualization of sensors’measurements,but also for sending alerts and control signals to enable actuators,installed in the vehicle near to the sensors field.The proposed system is scalable and it can be adopted for monitoring a large number of vehicles,thus providing a fully automatic IoT solution for vehicle fleet management.Moreover,it can be extended for simultaneous monitoring of additional parameters,supporting other low energy communication protocols and producing various kinds of alerts and control signals.展开更多
Fire warning is vital to human life,economy and ecology.However,the development of effective warning systems faces great challenges of fast response,adjustable threshold and remote detecting.Here,we propose an intelli...Fire warning is vital to human life,economy and ecology.However,the development of effective warning systems faces great challenges of fast response,adjustable threshold and remote detecting.Here,we propose an intelligent self-powered remote IoT fire warning system,by employing single-walled carbon nanotube/titanium carbide thermoelectric composite films.The flexible films,prepared by a convenient solution mixing,display p-type characteristic with excellent high-temperature stability,flame retardancy and TE(power factor of 239.7±15.8μW m^(-1) K^(-2))performances.The comprehensive morphology and structural analyses shed light on the underlying mechanisms.And the assembled TE devices(TEDs)exhibit fast fire warning with adjustable warning threshold voltages(1–10 mV).Excitingly,an ultrafast fire warning response time of~0.1 s at 1 mV threshold voltage is achieved,rivaling many state-of-the-art systems.Furthermore,TE fire warning systems reveal outstanding stability after 50 repeated cycles and desired durability even undergoing 180 days of air exposure.Finally,a TED-based wireless intelligent fire warning system has been developed by coupling an amplifier,analogto-digital converter and Bluetooth module.By combining TE characteristics,high-temperature stability and flame retardancy with wireless IoT signal transmission,TE-based hybrid system developed here is promising for next-generation self-powered remote IoT fire warning applications.展开更多
Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption i...Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers.展开更多
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential...The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments.展开更多
In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averagi...In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averaging during global update and model training, where data is unevenly distributed among devices and there are variations in the number of data samples. Using a well-defined structure and updating the vector positions by local searching, vector combining, and updating rules, the EINFO algorithm maximizes the shared model parameters. In order to increase the exploration and exploitation capabilities, the model convergence rate is improved and new vectors are generated through the use of a weighted mean vector based on the inverse square law. To choose validators, miners, and to propagate new blocks, a delegated proof of stake based on the reliability of blockchain nodes is suggested. Federated learning is included into the blockchain to protect nodes from both external and internal threats. To determine how well the suggested system performs in relation to current models in the literature, extensive simulations are run. The simulation results show that the proposed system outperforms existing schemes in terms of accuracy, sensitivity and specificity.展开更多
Volatile organic compounds(VOC)gas detection devices based on semiconductor sensors have become a common method due to their low cost,simple principle,and small size.However,with the continuous development of material...Volatile organic compounds(VOC)gas detection devices based on semiconductor sensors have become a common method due to their low cost,simple principle,and small size.However,with the continuous development of materials science,various new materials have been applied in the fabrication of gas sensors,but these new materials have more stringent requirements for operating temperature,which cannot be met by existing sensor modules on the market.Therefore,this paper proposes a temperature-adjustable sensor module and designs an environmental monitoring system based on the STM32F103RET6 microprocessor.This system primarily utilizes multiple semiconductor gas sensors to monitor and record the concentrations of various harmful gases in different environments.It can also monitor real-time temperature,humidity,and latitude and longitude in the current environment,and upload the data to the Internet of Things via 4G communication.This system has the advantages of small size,portability,and low cost.Experimental results show that the sensor module can achieve precise control of operating temperature to a certain extent,with an average temperature error of approximately 3%.The monitoring system demonstrates a certain level of accuracy in detecting target gases and can promptly upload the data to a cloud platform for storage and processing.A comparison with professional testing equipment shows that the sensitivity curves of each sensor exhibit similarity.This study provides engineering and technical references for the application of VOC gas sensors.展开更多
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol...Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm.展开更多
基金supported by the National Key Research and Development Program of China(2020YFE0200600)the National Natural Science Foundation of China(U22B2026)。
文摘The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we propose an intelligent DHR architecture,which is more feasible by intelligently combining the random distribution based dynamic scheduling algorithm(RD-DS)and information weight and heterogeneity based arbitrament(IWHA)algorithm.In the proposed architecture,the random distribution function and information weight are employed to achieve the optimal selection of executors in the process of RD-DS,which avoids the case that some executors fail to be selected due to their stability difference in the conventional DHR architecture.Then,through introducing the heterogeneity to restrict the information weights in the procedure of the IWHA,the proposed architecture solves the common mode escape issue caused by the existence of multiple identical error output results of similar vulnerabilities.The experimental results characterize that the proposed architecture outperforms in heterogeneity,scheduling times,security,and stability over the conventional DHR architecture under the same conditions.
文摘The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
文摘Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation of such IoT systems.However,developing these systems can often be a tedious task.To address this challenge,a proposed solution involves the implementation of a unified program or script that encompasses the entire system,including IoT devices functionality.This approach is based on an abstraction,integrating the control of the devices in a single program through a programmable object.Subsequently,the proposal processes the unified script to generate the centralized system code and a controller for each device.By adopting this approach,developers will be able to create IoT systems with significantly reduced implementation costs,surpassing current platforms by more than 10%.The results demonstrate that the single program approach can significantly accelerate the development of IoT systems relying on device communication.
文摘The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.
基金the National Natural Science Foundationof China(No.31760345).
文摘As the agricultural internet of things(IoT)technology has evolved,smart agricultural robots needs to have both flexibility and adaptability when moving in complex field environments.In this paper,we propose the concept of a vision-based navigation system for the agricultural IoT and a binocular vision navigation algorithm for smart agricultural robots,which can fuse the edge contour and the height information of rows of crop in images to extract the navigation parameters.First,the speeded-up robust feature(SURF)extracting and matching algorithm is used to obtain featuring point pairs from the green crop row images observed by the binocular parallel vision system.Then the confidence density image is constructed by integrating the enhanced elevation image and the corresponding binarized crop row image,where the edge contour and the height information of crop row are fused to extract the navigation parameters(θ,d)based on the model of a smart agricultural robot.Finally,the five navigation network instruction sets are designed based on the navigation angleθand the lateral distance d,which represent the basic movements for a certain type of smart agricultural robot working in a field.Simulated experimental results in the laboratory show that the algorithm proposed in this study is effective with small turning errors and low standard deviations,and can provide a valuable reference for the further practical application of binocular vision navigation systems in smart agricultural robots in the agricultural IoT system.
基金supported by the National Key Research&Development Program(No.2016YFB1000104).
文摘Cloud computing has been exploited in managing large-scale IoT systems.IoT cloud servers usually handle a large number of requests from various IoT devices.Due to the fluctuant and heavy workload,the servers require the cloud to provide high scalability,stable performance,low price and necessary functionalities.However,traditional clouds usually offer computing service with the abstraction of virtual machine(VM),which can hardly meet these requirements.Meanwhile,different cloud vendors provide different performance stabilities and price models,which fluctuate according to the dynamic workload.A single cloud cannot satisfy all the requirements of the IoT scenario well.The JointCloud computing model empowers the cooperation among multiple public clouds.However,it is still difficult to dynamically schedule the workload on different clouds based on the VM abstraction.This paper introduces HCloud,a trusted JointCloud platform for IoT systems using serverless computing model.HCloud allows an IoT server to be implemented with multiple serverless functions and schedules these functions on different clouds based on a schedule policy.The policy is specified by the client and includes the required functionalities,execution resources,latency,price and so on.HCloud collects the status of each cloud and dispatches serverless functions to the most suitable cloud based on the schedule policy.By leveraging the blockchain technology,we further enforce that our system can neither fake the cloud status nor wrongly dispatch the target functions.We have implemented a prototype of HCloud and evaluated it by simulating multiple cloud providers.The evaluation results show that HCloud can greatly improve the performance of serverless workloads with negligible costs.
文摘Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based approaches. Mashup approaches use existing services and are mainly suitable for less critical, personalized applications. Web development tools are widely used in mashup approaches. Model-based techniques describe a system on a higher level of abstraction, resulting in very expressive modelling of systems. The article uses Cisco packet tracer 7.2 version, which consists of four subcategories of smart things—home, smart city, industrial and power grid, to design an IoT based control system for a fertilizer manufacturing plant. The packet tracer also consists of boards—microcontrollers (MCU-PT), and single boarded computers (SBC-PT), as well as actuators and sensors. The model facilitates flexible communication opportunities among things—machines, databases, and Human Machine Interfaces (HMIs). Implementation of the IoT system brings finer process control as the operating conditions are monitored online and are broadcasted to all stakeholders in real-time for quicker action on deviations. The model developed focuses on three process plants;steam raising, nitric acid, and ammonium nitrate plants. Key process parameters are saturated steam temperature, fuel flowrates, CO and SO<sub>x</sub> emissions, converter head temperature, NO<sub>x</sub> emissions, neutralisation temperature, solution temperature, and evaporator steam pressure. The parameters need to be monitored in order to ensure quality, safety, and efficiency. Through the Cisco packet tracer platform, a use case, physical layout, network layout, IoT layout, configuration, and simulation interface were developed.
基金funded by the Australian Research Data Common(ARDC),project code—RG192500 that will be used for paying the APC of this manuscript.
文摘Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things(IoT)systems,much research has been done in using machine learning methods to recognize IoT sensors data.This is particularly the case for optical character recognition of handwritten scripts.Recognizing text in images has several useful applications,including content-based image retrieval,searching and document archiving.The Arabic language is one of the mostly used tongues in the world.However,Arabic text recognition in imagery is still very much in the nascent stage,especially handwritten text.This is mainly due to the language complexities,different writing styles,variations in the shape of characters,diacritics,and connected nature of Arabic text.In this paper,two deep learning models were proposed.The first model was based on a sequence-to-sequence recognition,while the second model was based on a fully convolution network.To measure the performance of these models,a new dataset,called QTID(Quran Text Image Dataset)was devised.This is the first Arabic dataset that includes Arabic diacritics.It consists of 309,720 different 192×64 annotated Arabic word images,which comprise 2,494,428 characters in total taken from the Holy Quran.The annotated images in the dataset were randomly divided into 90%,5%,and 5%sets for training,validation,and testing purposes,respectively.Both models were set up to recognize the Arabic Othmani font in the QTID.Experimental results show that the proposed methods achieve state-of-the-art outcomes.Furthermore,the proposed models surpass expectations in terms of character recognition rate,F1-score,average precision,and recall values.They are superior to the best Arabic text recognition engines like Tesseract and ABBYY FineReader.
基金This work was supported by the King Saud University (in Riyadh, SaudiArabia) through the Researcher Supporting Project Number (RSP–2021/387).
文摘Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things(IoT)in healthcare(HIoT).Due to more and more online security and data hijacking attacks,the confidentiality,integrity and availability of data are considered serious issues in HIoT applications.In this regard,lightweight block ciphers(LBCs)are promising in resourceconstrained environment where security is the primary consideration.The prevalent challenge while designing an LBC for the HIoT environment is how to ascertain platform performance,cost,and security.Most of the existing LBCs primarily focus on text data or grayscale images.The main focus of this paper is about securing color images in a cost-effective way.We emphasis high confidentiality of color images captured by cameras in resource-constrained smartphones,and high confidentiality of sensitive images transmitted by low-power sensors in IoT systems.In order to reduce computational complexity and simulation time,the proposed Lightweight Symmetric Block Cipher(LSBC)exploits chaos-based confusion-diffusion operations at the inter-block level using a single round.The strength of LSBC is assessed by cryptanalysis,while it is ranked by comparing it to other privacy-preserving schemes.Our results show that the proposed cipher produces promising results in terms of key sensitivity and differential attacks,which proves that our LSBC is a good candidate for image security in HIoT.
基金support from the European Union’s Horizon 2020 Research and Innovation Programme for project InComEss under Grant Agreement Number 862597.
文摘In the era of the Internet of Things(IoT),the ever-increasing number of devices connected to the IoT networks also increases the energy consumption on the edge.This is prohibitive since the devices living on the edge are generally resource constrained devices in terms of energy consumption and computational power.Thus,trying to tackle this issue,in this paper,a fully automated end-to-end IoT system for real time monitoring of the status of a moving vehicle is proposed.The IoT system consists mainly of three components:(1)the ultra-lowpower consumptionWireless SensorNode(WSN),(2)the IoT gateway and(3)the IoT platform.In this scope,a selfpoweredWSN having ultra-low energy consumption(less than 10 mJ),which can be produced by environmental harvesting systems,is developed.WSN is used for collecting sensors’measurements from the vehicle and transmitting them to the IoT gateway,by exploiting a low energy communication protocol(i.e.,BLE).A powerful IoT gateway gathers the sensors’measurements,harmonizes,stores temporary and transmits them wirelessly,to a backend server(i.e.,LTE).And finally,the IoT platform,which in essence is a web application user interface(UI),used mainly for almost real time visualization of sensors’measurements,but also for sending alerts and control signals to enable actuators,installed in the vehicle near to the sensors field.The proposed system is scalable and it can be adopted for monitoring a large number of vehicles,thus providing a fully automatic IoT solution for vehicle fleet management.Moreover,it can be extended for simultaneous monitoring of additional parameters,supporting other low energy communication protocols and producing various kinds of alerts and control signals.
基金supported by the Guangdong Basic and Applied Basic Research Foundation(2022A1515110296,2022A1515110432)the Shenzhen Science and Technology Program(No.20231120171032001,20231122125728001).
文摘Fire warning is vital to human life,economy and ecology.However,the development of effective warning systems faces great challenges of fast response,adjustable threshold and remote detecting.Here,we propose an intelligent self-powered remote IoT fire warning system,by employing single-walled carbon nanotube/titanium carbide thermoelectric composite films.The flexible films,prepared by a convenient solution mixing,display p-type characteristic with excellent high-temperature stability,flame retardancy and TE(power factor of 239.7±15.8μW m^(-1) K^(-2))performances.The comprehensive morphology and structural analyses shed light on the underlying mechanisms.And the assembled TE devices(TEDs)exhibit fast fire warning with adjustable warning threshold voltages(1–10 mV).Excitingly,an ultrafast fire warning response time of~0.1 s at 1 mV threshold voltage is achieved,rivaling many state-of-the-art systems.Furthermore,TE fire warning systems reveal outstanding stability after 50 repeated cycles and desired durability even undergoing 180 days of air exposure.Finally,a TED-based wireless intelligent fire warning system has been developed by coupling an amplifier,analogto-digital converter and Bluetooth module.By combining TE characteristics,high-temperature stability and flame retardancy with wireless IoT signal transmission,TE-based hybrid system developed here is promising for next-generation self-powered remote IoT fire warning applications.
基金The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through the Project Number(PSAU/2023/01/27268).
文摘Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers.
文摘The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments.
文摘In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averaging during global update and model training, where data is unevenly distributed among devices and there are variations in the number of data samples. Using a well-defined structure and updating the vector positions by local searching, vector combining, and updating rules, the EINFO algorithm maximizes the shared model parameters. In order to increase the exploration and exploitation capabilities, the model convergence rate is improved and new vectors are generated through the use of a weighted mean vector based on the inverse square law. To choose validators, miners, and to propagate new blocks, a delegated proof of stake based on the reliability of blockchain nodes is suggested. Federated learning is included into the blockchain to protect nodes from both external and internal threats. To determine how well the suggested system performs in relation to current models in the literature, extensive simulations are run. The simulation results show that the proposed system outperforms existing schemes in terms of accuracy, sensitivity and specificity.
文摘Volatile organic compounds(VOC)gas detection devices based on semiconductor sensors have become a common method due to their low cost,simple principle,and small size.However,with the continuous development of materials science,various new materials have been applied in the fabrication of gas sensors,but these new materials have more stringent requirements for operating temperature,which cannot be met by existing sensor modules on the market.Therefore,this paper proposes a temperature-adjustable sensor module and designs an environmental monitoring system based on the STM32F103RET6 microprocessor.This system primarily utilizes multiple semiconductor gas sensors to monitor and record the concentrations of various harmful gases in different environments.It can also monitor real-time temperature,humidity,and latitude and longitude in the current environment,and upload the data to the Internet of Things via 4G communication.This system has the advantages of small size,portability,and low cost.Experimental results show that the sensor module can achieve precise control of operating temperature to a certain extent,with an average temperature error of approximately 3%.The monitoring system demonstrates a certain level of accuracy in detecting target gases and can promptly upload the data to a cloud platform for storage and processing.A comparison with professional testing equipment shows that the sensitivity curves of each sensor exhibit similarity.This study provides engineering and technical references for the application of VOC gas sensors.
文摘Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm.