In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online ...In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online credit,within the realm of Internet finance,presents numerous advantages over traditional lending,it concurrently exposes a plethora of credit risk issues.This study aims to facilitate the effective utilization of online credit tools by the young generation within the context of Internet finance.Additionally,it seeks to ensure the overall stability of the Internet finance environment and mitigate risks for the youth.Given the significance of understanding credit risk management for college students in the age of internet finance,this paper adopts the logistic model to evaluate credit risk in internet consumer finance and provides pertinent recommendations from the perspective of the young generation.展开更多
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ...Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.展开更多
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g...The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches.展开更多
The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational pur...The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers.展开更多
Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China ...Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China Next Generation Internet (CNGI). This article introduces the birth of IPv6 and CNGI, then discusses ZTE's solution to CNGI in detail.展开更多
To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G ...To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation(PLKG)tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square(TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validated by observing the relation between signalto-noise ratio(SNR)and the correlation coefficient of the corresponding channel measurements between communicating parties.展开更多
The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality...The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres.To ensure the trapping of the available power and the efficient transfer of Distributed Generation(DG)power to the grid Distribution Active Control(DAC)strategy is used.Synchronized optimization of DG parameter which includes DG size,location and type are adopted using Dispatch strategy.The case studies are optimized by rescheduling the generation and with load curtailment.Maximized Customer Benefit(MCB)is taken as an objective function and a straight forward solution is given by heuristic search techniques.This method was vindicated in a practical Indian Utility system.This control proposes better performances,ensures reliability and efficiency even under parameter variations along with disturbances which is justified using IEEE 118 bus system and real time Indian utility 63 bus system.Results reveal that the proposed technique proves advantages of low computational intricacy.展开更多
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric...Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.展开更多
Nanotechnology-inspired small-sized water-enabled electricity generation(WEG)has sparked widespread research interest,especially when applied as an electricity source for off-grid low-power electronic equipment and sy...Nanotechnology-inspired small-sized water-enabled electricity generation(WEG)has sparked widespread research interest,especially when applied as an electricity source for off-grid low-power electronic equipment and systems.Currently,WEG encompasses a wide range of physical phenomena,generator structures,and power generation environments.However,a systematic framework to clearly describe the connections and differences between these technologies is unavailable.In this review,a comprehensive overview of generator technologies and the typical mechanisms for harvesting water energy is provided.Considering the different roles of water inWEG processes,the related technologies are presented as two different scenarios.Moreover,a detailed analysis of the electrical potential formation in each WEG process is presented,and their similarities and differences are elucidated.Furthermore,a comprehensive compilation of advanced generator architectures and system designs based on hydrological cycle processes is presented,along with their respective energy efficiencies.These nanotechnology-inspired small-sized WEG devices show considerable potential for applications in the Internet of Things ecosystem(i.e.,microelectronic devices,integrated circuits,and smart clothing).Finally,the prospects and future challenges of WEG devices are also summarized.展开更多
The quickening propensity of growth within the areas of information and communications technology and en-ergy networks has triggered the emergence of a central idea termed as Internet of Energy(IoE).Such a concept rel...The quickening propensity of growth within the areas of information and communications technology and en-ergy networks has triggered the emergence of a central idea termed as Internet of Energy(IoE).Such a concept relates the internet of things,which is the term used in describing the usage of sophisticated digital control devices with the capability of transmitting data via IT systems.The concept of an interconnected energy network is being formed in the upcoming days through upgrades in the field of intelligent energy systems to control real-time energy optimization and management.The energy industry has had a sustained expansion,reaching the IoE milestone and continuing to this cutting-edge power system,which is the next generation of IoE.A directional pathway from the traditional power system to the IoE has been conducted in this research work by addressing the importance of integrating the smart transmission and communication infrastructure,smart metering,pricing and energy management scheme.A detailed investigation of the IoE with respect to technical angles,such as communication architecture,IoE on the supply&demand side,and IoE protocol based on fundamental elements and essential technologies has been carried out to indicate the blueprint and jurisdiction complexity.The inte-gration,security and energy management challenges may deviate the performance of the IoE technology that has been focused with proper control issues and solutions.Finally,a directional framework to establish the next-generation IoE system has been constructed with future scopes to insure higher resiliency,cyber-security and stability.展开更多
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.展开更多
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a ...Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.展开更多
The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices ...The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings.In IoT,an object can offer multiple services and different objects can offer the same services with different parameters and interest factors.The proliferation of offered services led to difficulties during service customization and service filtering.This problem is known as service explosion.The selection of suitable service that fits the requirements of applications and objects is a challenging task.To address these issues,we propose an efficient automated query-based service search model based on the local network navigability concept for the SIoT.In the proposed model,objects can use information from their friends or friends of their friends while searching for the desired services,rather than exploring a global network.We employ a centrality metric that computes the degree of importance for each object in the social IoT that helps in selecting neighboring objects with high centrality scores.The distributed nature of our navigation model results in high scalability and short navigation times.We verified the efficacy of our model on a real-world SIoT-related dataset.The experimental results confirm the validity of our model in terms of scalability,navigability,and the desired objects that provide services are determined quickly via the shortest path,which in return improves the service search process in the SIoT.展开更多
Nowadays,influenced by the spreading Internet wave,a mass of Internet catchwords are emerging and coming into fashion.This paper,in the perspective of sociolinguistics,describes the formation features of Internet catc...Nowadays,influenced by the spreading Internet wave,a mass of Internet catchwords are emerging and coming into fashion.This paper,in the perspective of sociolinguistics,describes the formation features of Internet catchwords with exemplars of沙雕(傻屌),表脸,尬聊,厉害了Word哥,盘他…and analyzes the generation causes of them to help readers have a better understand of Internet catchwords.Through analyzing these words,we can conclude that there are more and more Internet catchwords emerging with netizens'increasing language demands.展开更多
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based o...Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.展开更多
With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficien...With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficient energy trading in the centralized management mode, this deeply affecting the complementary ability of heterogeneous energy, resulting in the islanded energy phenomenon. In this model, the same energy on the chain is traded within the chain, and the heterogeneous energy on different chains is traded across chains. To trade energy between heterogeneous energy networks more efficiently, the blockchain-based cross-chain model is proposed based on the existing infrastructure. Heterogeneous energy nodes are assigned to different energy sub-chains and cross-chain energy transactions are performed through a relay-chain, which utilizes the improved Boneh–Lynn–Shacham signature scheme consensus algorithm based on the proof-of-stake and practical Byzantine fault tolerance. The experimental simulations on energy trading efficiency, throughput, and security, show its superiority over existing systems. Further, the simulation results provide a reference for the application of cross-chain technology in energy interconnection.展开更多
In the past decade or so,AI(artificial intelligence)technology has been growing with such a mesmerizing speed that today its presence in almost any industry that deals with any huge sheer volume of data is taking adva...In the past decade or so,AI(artificial intelligence)technology has been growing with such a mesmerizing speed that today its presence in almost any industry that deals with any huge sheer volume of data is taking advantage of AI by integrating it into their day-to-day operation.Meanwhile,seven billion people worldwide shape the world’s energy system and directly impact the fundamental drivers of energy,both renewable and non-renewable sources,to meet the demand for electricity from them.These energy sources can be reached from nature such as solar,wind,etc.,and human-made such as NPPs(nuclear power plants)in the form of either fission as an old technology since the Manhattan project and in the near future as fusion in the form of magnetic or inertial confinements.Meanwhile,AI controlling nuclear reactors are about to happen.The basic idea is to apply AI with its two subset components as ML(machine learning),and DL(deep learning)techniques to go through the mountains of data that come from a reactor,spot patterns in it,and calling them to the unit’s human attention operators is not invadable either.Designers of such nuclear reactors will combine simulation and real-world data,comparing scenarios from each to develop“confidence[in]what they can predict and what is the range of uncertainty of their prediction”.Adding that,in the end,the operator will make the final decisions in order to keep these power plants safe while they are in operation and how to secure them against cyber-attack natural or human-made disasters.In this short communication article,we would like to see how we can prove some of these concepts;then a NPP manufacturer can pick it up and use it in their designs of a new generation of these reactors.展开更多
文摘In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online credit,within the realm of Internet finance,presents numerous advantages over traditional lending,it concurrently exposes a plethora of credit risk issues.This study aims to facilitate the effective utilization of online credit tools by the young generation within the context of Internet finance.Additionally,it seeks to ensure the overall stability of the Internet finance environment and mitigate risks for the youth.Given the significance of understanding credit risk management for college students in the age of internet finance,this paper adopts the logistic model to evaluate credit risk in internet consumer finance and provides pertinent recommendations from the perspective of the young generation.
基金supported by Henan University Science and Technology Innovation Talent Support Program(23HASTIT029)the National Natural Science Foundation of China(61902447)+3 种基金Tianjin Natural Science Foundation Key Project(22JCZDJC00600)Research Project of Humanities and Social Sciences in Universities of Henan Province(2024-ZDJH-061)Key Scientific Research Projects of Colleges and Universities in Henan Province(23A520054)Henan Science and Technology Research Project(232102210124).
文摘Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R319)PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR48).
文摘The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches.
文摘The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers.
文摘Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China Next Generation Internet (CNGI). This article introduces the birth of IPv6 and CNGI, then discusses ZTE's solution to CNGI in detail.
文摘To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation(PLKG)tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square(TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validated by observing the relation between signalto-noise ratio(SNR)and the correlation coefficient of the corresponding channel measurements between communicating parties.
文摘The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres.To ensure the trapping of the available power and the efficient transfer of Distributed Generation(DG)power to the grid Distribution Active Control(DAC)strategy is used.Synchronized optimization of DG parameter which includes DG size,location and type are adopted using Dispatch strategy.The case studies are optimized by rescheduling the generation and with load curtailment.Maximized Customer Benefit(MCB)is taken as an objective function and a straight forward solution is given by heuristic search techniques.This method was vindicated in a practical Indian Utility system.This control proposes better performances,ensures reliability and efficiency even under parameter variations along with disturbances which is justified using IEEE 118 bus system and real time Indian utility 63 bus system.Results reveal that the proposed technique proves advantages of low computational intricacy.
基金funded by Dirección General de Investigaciones of Universidad Santiago de Cali under call No.01-2021.
文摘Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.
基金supported by the Fundamental Research Funds for Central Universities of Hohai University(B220203014)Postgraduate Research&Innovation Program of Jiangsu Province(4200261601)+3 种基金National Natural Science Foundation of China(51909066)the Zhejiang Ocean University Talent Introduction Research Fund(No.JX6311103723)the ES Program(via Nagoya University)the JST-ERATO Yamauchi Materials Space Tectonics Project(JPMJER2003).
文摘Nanotechnology-inspired small-sized water-enabled electricity generation(WEG)has sparked widespread research interest,especially when applied as an electricity source for off-grid low-power electronic equipment and systems.Currently,WEG encompasses a wide range of physical phenomena,generator structures,and power generation environments.However,a systematic framework to clearly describe the connections and differences between these technologies is unavailable.In this review,a comprehensive overview of generator technologies and the typical mechanisms for harvesting water energy is provided.Considering the different roles of water inWEG processes,the related technologies are presented as two different scenarios.Moreover,a detailed analysis of the electrical potential formation in each WEG process is presented,and their similarities and differences are elucidated.Furthermore,a comprehensive compilation of advanced generator architectures and system designs based on hydrological cycle processes is presented,along with their respective energy efficiencies.These nanotechnology-inspired small-sized WEG devices show considerable potential for applications in the Internet of Things ecosystem(i.e.,microelectronic devices,integrated circuits,and smart clothing).Finally,the prospects and future challenges of WEG devices are also summarized.
文摘The quickening propensity of growth within the areas of information and communications technology and en-ergy networks has triggered the emergence of a central idea termed as Internet of Energy(IoE).Such a concept relates the internet of things,which is the term used in describing the usage of sophisticated digital control devices with the capability of transmitting data via IT systems.The concept of an interconnected energy network is being formed in the upcoming days through upgrades in the field of intelligent energy systems to control real-time energy optimization and management.The energy industry has had a sustained expansion,reaching the IoE milestone and continuing to this cutting-edge power system,which is the next generation of IoE.A directional pathway from the traditional power system to the IoE has been conducted in this research work by addressing the importance of integrating the smart transmission and communication infrastructure,smart metering,pricing and energy management scheme.A detailed investigation of the IoE with respect to technical angles,such as communication architecture,IoE on the supply&demand side,and IoE protocol based on fundamental elements and essential technologies has been carried out to indicate the blueprint and jurisdiction complexity.The inte-gration,security and energy management challenges may deviate the performance of the IoE technology that has been focused with proper control issues and solutions.Finally,a directional framework to establish the next-generation IoE system has been constructed with future scopes to insure higher resiliency,cyber-security and stability.
基金This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
文摘Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(2020R1A2B5B01002145).
文摘The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings.In IoT,an object can offer multiple services and different objects can offer the same services with different parameters and interest factors.The proliferation of offered services led to difficulties during service customization and service filtering.This problem is known as service explosion.The selection of suitable service that fits the requirements of applications and objects is a challenging task.To address these issues,we propose an efficient automated query-based service search model based on the local network navigability concept for the SIoT.In the proposed model,objects can use information from their friends or friends of their friends while searching for the desired services,rather than exploring a global network.We employ a centrality metric that computes the degree of importance for each object in the social IoT that helps in selecting neighboring objects with high centrality scores.The distributed nature of our navigation model results in high scalability and short navigation times.We verified the efficacy of our model on a real-world SIoT-related dataset.The experimental results confirm the validity of our model in terms of scalability,navigability,and the desired objects that provide services are determined quickly via the shortest path,which in return improves the service search process in the SIoT.
文摘Nowadays,influenced by the spreading Internet wave,a mass of Internet catchwords are emerging and coming into fashion.This paper,in the perspective of sociolinguistics,describes the formation features of Internet catchwords with exemplars of沙雕(傻屌),表脸,尬聊,厉害了Word哥,盘他…and analyzes the generation causes of them to help readers have a better understand of Internet catchwords.Through analyzing these words,we can conclude that there are more and more Internet catchwords emerging with netizens'increasing language demands.
基金This work was supported by the Humanities and Social Science Youth Fund of Ministry of Education of China(19YJCZH254)the Innovation driven plan project of Hunan University of Technology and Business in 2020,the Scientific Research Fund of Hunan Provincial Education Department(19B315)this work was funded by the Researchers Supporting Project No.(RSP-2021/102)King Saud University,Riyadh,Saudi Arabia.
文摘Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
文摘随着我军现代化进程的不断推进,靶场信息化水平大力提升,各个网络正在逐步有机融合。通过分析下一代网络(next generation network,NGN)的4层体系结构及其关键技术,结合我军网络的特点,论证靶场网络转向NGN体系的必然性及其可行性;给出了一种基于NGN的网络融合体系结构,并在此之上介绍了其可提供的业务功能及QoS(quality of service)部署。
基金supported by the Fundamental Research Funds for the Central Universities of Ministry of Education (2018 ZD06)。
文摘With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficient energy trading in the centralized management mode, this deeply affecting the complementary ability of heterogeneous energy, resulting in the islanded energy phenomenon. In this model, the same energy on the chain is traded within the chain, and the heterogeneous energy on different chains is traded across chains. To trade energy between heterogeneous energy networks more efficiently, the blockchain-based cross-chain model is proposed based on the existing infrastructure. Heterogeneous energy nodes are assigned to different energy sub-chains and cross-chain energy transactions are performed through a relay-chain, which utilizes the improved Boneh–Lynn–Shacham signature scheme consensus algorithm based on the proof-of-stake and practical Byzantine fault tolerance. The experimental simulations on energy trading efficiency, throughput, and security, show its superiority over existing systems. Further, the simulation results provide a reference for the application of cross-chain technology in energy interconnection.
文摘In the past decade or so,AI(artificial intelligence)technology has been growing with such a mesmerizing speed that today its presence in almost any industry that deals with any huge sheer volume of data is taking advantage of AI by integrating it into their day-to-day operation.Meanwhile,seven billion people worldwide shape the world’s energy system and directly impact the fundamental drivers of energy,both renewable and non-renewable sources,to meet the demand for electricity from them.These energy sources can be reached from nature such as solar,wind,etc.,and human-made such as NPPs(nuclear power plants)in the form of either fission as an old technology since the Manhattan project and in the near future as fusion in the form of magnetic or inertial confinements.Meanwhile,AI controlling nuclear reactors are about to happen.The basic idea is to apply AI with its two subset components as ML(machine learning),and DL(deep learning)techniques to go through the mountains of data that come from a reactor,spot patterns in it,and calling them to the unit’s human attention operators is not invadable either.Designers of such nuclear reactors will combine simulation and real-world data,comparing scenarios from each to develop“confidence[in]what they can predict and what is the range of uncertainty of their prediction”.Adding that,in the end,the operator will make the final decisions in order to keep these power plants safe while they are in operation and how to secure them against cyber-attack natural or human-made disasters.In this short communication article,we would like to see how we can prove some of these concepts;then a NPP manufacturer can pick it up and use it in their designs of a new generation of these reactors.