期刊文献+
共找到3,443篇文章
< 1 2 173 >
每页显示 20 50 100
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
1
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of things(Iiot)network Iiot service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
一种基于NB-IoT的智能井盖监测系统设计 被引量:1
2
作者 彭勇 陈俞强 +2 位作者 王石 郑俊杰 胡文德 《微型电脑应用》 2024年第3期26-28,36,共4页
针对城市井盖保有量大、安全事故频发、人工巡检困难、管理组织混乱等问题,提出一种基于窄带物联网(NB-IoT)技术的窨井盖自动监测系统。该系统以STM32作为主控模块,包含倾角、水位等传感器,实现对井盖状态以及井内重点数据的采集,配合... 针对城市井盖保有量大、安全事故频发、人工巡检困难、管理组织混乱等问题,提出一种基于窄带物联网(NB-IoT)技术的窨井盖自动监测系统。该系统以STM32作为主控模块,包含倾角、水位等传感器,实现对井盖状态以及井内重点数据的采集,配合云端服务器和客户端完成井盖数据远程可视化显示。结果表明,所提系统可以实现故障井盖自动报警、精确定位,降低人工巡检的难度,让城市井盖管理更加智能化,让故障检修更加便捷化,提高城市管理的智能化水平。 展开更多
关键词 物联网 低功耗 窄带物联网 STM32单片机
下载PDF
CARINA:一种高效的解决IoT互操作性的应用层协议转换方案 被引量:1
3
作者 王丽娜 赖坤豪 杨康 《计算机科学》 CSCD 北大核心 2024年第2期278-285,共8页
为了解决物联网设备众多、协议众多,以及协议架构和应用场景不同引发的物联网设备互操作性问题,针对应用层使用广泛的HTTP等4种协议,提出了一种基于协议包解析和关键方法映射的高效可扩展的应用层协议转换方案。考虑到4种协议的基础架... 为了解决物联网设备众多、协议众多,以及协议架构和应用场景不同引发的物联网设备互操作性问题,针对应用层使用广泛的HTTP等4种协议,提出了一种基于协议包解析和关键方法映射的高效可扩展的应用层协议转换方案。考虑到4种协议的基础架构、消息格式、通信模式以及应用场景具有较大差异,该方案通过对协议原始数据包进行解析和关键信息提取,然后统一以键值对的形式进行信息存储,解决了不同协议信息存储的统一性问题。通过构造关键方法映射表,将不同协议的方法进行映射,实现了不同协议之间的互联。实验结果表明,基于所提方案实现的协议转换系统能很好地完成4种协议之间的消息转换。相比同类型的Ponte方法,在相同实验条件下,所提方案的转换速度都优于Ponte,甚至在某些情况下表现出了将近10倍的速度差距,同时支持多出一倍的转换类型。实验结果验证了所提方法在可扩展性和转换时间等效率方面相比同类型的协议转换算法具有显著提升。 展开更多
关键词 物联网 应用层协议 协议转换 互操作性
下载PDF
面向物联网的NB-IoT信号优化方法研究
4
作者 吴坤芳 贾怡婧 《通信电源技术》 2024年第11期194-196,共3页
随着物联网技术的飞速发展,窄带物联网(Narrow Band Internet of Things,NB-IoT)作为一种低功耗、广覆盖、大连接的无线通信技术,逐渐成为连接物理世界与数字世界的桥梁。然而,在实际应用中,NB-IoT信号面临着诸如信号衰减、干扰、覆盖... 随着物联网技术的飞速发展,窄带物联网(Narrow Band Internet of Things,NB-IoT)作为一种低功耗、广覆盖、大连接的无线通信技术,逐渐成为连接物理世界与数字世界的桥梁。然而,在实际应用中,NB-IoT信号面临着诸如信号衰减、干扰、覆盖不均等挑战。这些挑战不仅影响用户体验,还限制了物联网应用的进一步发展。因此,研究面向物联网的NB-IoT信号优化方法具有重要意义。文章深入研究面向物联网的NB-IoT信号优化方法,提出多种有效的优化策略和技术手段。 展开更多
关键词 物联网 窄带物联网(NB-iot) 信号优化
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions 被引量:1
5
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) Internet of things(iot) Internet of Robotic things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Secure ticket-based authentication method for IoT applications
6
作者 Mojtaba Alizadeh Mohammad Hesam Tadayon Alireza Jolfaei 《Digital Communications and Networks》 SCIE CSCD 2023年第3期710-716,共7页
The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model u... The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model used in the Internet of Things(IoT),and it protects data communications from various attacks,such as impersonation and denial of service,by verifying and allowing legitimate users to access the IoT resources.However,recent authentication literature has not addressed the need for developing a scalable and efficient authentication method in this field.This paper proposes a secure and anonymous ticket-based authentication method for the IoT.The proposed method protects the network from various security and privacy threats such as data alternation and denial of service while also offering mutual authentication and sensor anonymity.Our security and performance evaluations confirm the improvement. 展开更多
关键词 iot Internet of things AUTHENTICATION PRIVACY Security
下载PDF
Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications
7
作者 Abdulaziz Aldribi Aman Singh Jose Brensa 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3865-3881,共17页
Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge ... Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge of things are the spine of all real-time and scalable applications.Conspicuously,this study proposed a novel framework for a real-time and scalable application that changes dynamically with time.In this study,IoT deployment is recommended for data acquisition.The Pre-Processing of data with local edge and fog nodes is implemented in this study.The thresholdoriented data classification method is deployed to improve the intrusion detection mechanism’s performance.The employment of machine learningempowered intelligent algorithms in a distributed manner is implemented to enhance the overall response rate of the layered framework.The placement of respondent nodes near the framework’s IoT layer minimizes the network’s latency.For economic evaluation of the proposed framework with minimal efforts,EdgeCloudSim and FogNetSim++simulation environments are deployed in this study.The experimental results confirm the robustness of the proposed system by its improvised threshold-oriented data classification and intrusion detection approach,improved response rate,and prediction mechanism.Moreover,the proposed layered framework provides a robust solution for real-time and scalable applications that changes dynamically with time. 展开更多
关键词 Internet of things(iot) Edge of things(EoT) fog computing cloud computing SCALABLE DECENTRALIZED
下载PDF
Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities
8
作者 Mohammad Aldossary 《Computers, Materials & Continua》 SCIE EI 2023年第4期633-649,共17页
In the smart city paradigm, the deployment of Internet of Things(IoT) services and solutions requires extensive communication and computingresources to place and process IoT applications in real time, which consumesa ... In the smart city paradigm, the deployment of Internet of Things(IoT) services and solutions requires extensive communication and computingresources to place and process IoT applications in real time, which consumesa lot of energy and increases operational costs. Usually, IoT applications areplaced in the cloud to provide high-quality services and scalable resources.However, the existing cloud-based approach should consider the above constraintsto efficiently place and process IoT applications. In this paper, anefficient optimization approach for placing IoT applications in a multi-layerfog-cloud environment is proposed using a mathematical model (Mixed-Integer Linear Programming (MILP)). This approach takes into accountIoT application requirements, available resource capacities, and geographicallocations of servers, which would help optimize IoT application placementdecisions, considering multiple objectives such as data transmission, powerconsumption, and cost. Simulation experiments were conducted with variousIoT applications (e.g., augmented reality, infotainment, healthcare, andcompute-intensive) to simulate realistic scenarios. The results showed thatthe proposed approach outperformed the existing cloud-based approach interms of reducing data transmission by 64% and the associated processingand networking power consumption costs by up to 78%. Finally, a heuristicapproach was developed to validate and imitate the presented approach. Itshowed comparable outcomes to the proposed model, with the gap betweenthem reach to a maximum of 5.4% of the total power consumption. 展开更多
关键词 iot application placement fog-cloud computing power consumption data transmission optimization smart cities
下载PDF
基于NB-IoT的应用层数据安全传输机制 被引量:1
9
作者 李克见 解建国 史瑞 《北京电子科技学院学报》 2024年第1期40-49,共10页
NB-IoT(Narrow Band Internet of Things)是基于蜂窝窄带物联网的一种新兴技术,是物联网的一个重要分支。随着NB-IoT终端设备的规模不断增大,物联网安全面临数据泄露、中间人攻击等安全威胁。本论文针对NB-IoT技术的数据安全传输研究,... NB-IoT(Narrow Band Internet of Things)是基于蜂窝窄带物联网的一种新兴技术,是物联网的一个重要分支。随着NB-IoT终端设备的规模不断增大,物联网安全面临数据泄露、中间人攻击等安全威胁。本论文针对NB-IoT技术的数据安全传输研究,从物联网终端安全和应用服务安全两方面进行分析,结合密码技术给出了NB-IoT系统安全模型,提出了基于物联网应用层数据信源加密传输机制,给出了轻量级身份认证协议和数据加密传输协议,论证了该方案的安全性,通过实验验证了所提方案的可行性和适用性。 展开更多
关键词 NB-iot 密码技术 物联网应用层 安全模型 信源加密
下载PDF
基于双模式端址跳变SD-IoT主动防御方法
10
作者 张兵 李辉 王欢 《吉林大学学报(信息科学版)》 CAS 2024年第3期421-429,共9页
由于地址跳变是物联网主动防御的一种有效手段,但因跳变资源匮乏、可预见性以及数据包混淆度低已经成为制约物联网地址跳变的主要问题。为此,提出一种基于双模式端址跳变的主动防御方法。该方法设计了双模式端址选择算法,通过动态确定... 由于地址跳变是物联网主动防御的一种有效手段,但因跳变资源匮乏、可预见性以及数据包混淆度低已经成为制约物联网地址跳变的主要问题。为此,提出一种基于双模式端址跳变的主动防御方法。该方法设计了双模式端址选择算法,通过动态确定虚拟端址生成策略,以通信时间为阈值,扩大端址跳变空间,从而解决地址池资源受限问题。同时,还构建了双虚拟端址跳变方法,通过动态分配和同步虚拟接收和发送地址,提升数据包混淆度,增强跳变的不可预见性。并且基于SDN(Software Defined Network)设计了流表双向同步机制,实现流表的动态下发和同步,以保证端址跳变的一致性。实验结果表明,该方法能有效提升地址跳变的多样性和不可预测性,显著增强抵御嗅探攻击的能力。 展开更多
关键词 物联网安全 主动防御 地址跳变 软件定义物联网
下载PDF
An improved pulse coupled neural networks model for semantic IoT
11
作者 Rong Ma Zhen Zhang +3 位作者 Yide Ma Xiping Hu Edith C.H.Ngai Victor C.M.Leung 《Digital Communications and Networks》 SCIE CSCD 2024年第3期557-567,共11页
In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the... In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the rapid development of artificial intelligence,semantic communication has attracted great attention as a new communication paradigm.However,for IoT devices,however,processing image information efficiently in real time is an essential task for the rapid transmission of semantic information.With the increase of model parameters in deep learning methods,the model inference time in sensor devices continues to increase.In contrast,the Pulse Coupled Neural Network(PCNN)has fewer parameters,making it more suitable for processing real-time scene tasks such as image segmentation,which lays the foundation for real-time,effective,and accurate image transmission.However,the parameters of PCNN are determined by trial and error,which limits its application.To overcome this limitation,an Improved Pulse Coupled Neural Networks(IPCNN)model is proposed in this work.The IPCNN constructs the connection between the static properties of the input image and the dynamic properties of the neurons,and all its parameters are set adaptively,which avoids the inconvenience of manual setting in traditional methods and improves the adaptability of parameters to different types of images.Experimental segmentation results demonstrate the validity and efficiency of the proposed self-adaptive parameter setting method of IPCNN on the gray images and natural images from the Matlab and Berkeley Segmentation Datasets.The IPCNN method achieves a better segmentation result without training,providing a new solution for the real-time transmission of image semantic information. 展开更多
关键词 Internet of things(iot) Semantic information Real-time application Improved pulse coupled neural network Image segmentation
下载PDF
Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing
12
作者 Huixiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第2期2309-2335,共27页
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to... The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time. 展开更多
关键词 Internet of things(iot) edge computing traffic data SELF-LEARNING fuzzy-learning
下载PDF
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
13
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of things(iot) smart home automation CYBERSECURITY
下载PDF
Exploring Multi-Task Learning for Forecasting Energy-Cost Resource Allocation in IoT-Cloud Systems
14
作者 Mohammad Aldossary Hatem A.Alharbi Nasir Ayub 《Computers, Materials & Continua》 SCIE EI 2024年第6期4603-4620,共18页
Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption i... Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers. 展开更多
关键词 Cloud computing energy efficiency data center optimization internet of things(iot) hybrid models
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
15
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of things(iot) Internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
16
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of things(iot) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
17
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 Internet of things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
A Few-Shot Learning-Based Automatic Modulation Classification Method for Internet of Things
18
作者 Aer Sileng Qi Chenhao 《China Communications》 SCIE CSCD 2024年第8期18-29,共12页
Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve it... Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods. 展开更多
关键词 automatic modulation classification(AMC) deep learning(DL) few-shot learning Internet of things(iot)
下载PDF
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
19
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq 《Computers, Materials & Continua》 SCIE EI 2024年第9期3655-3683,共29页
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential... The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments. 展开更多
关键词 Machine learning Internet of things(iot) DoS DDoS CYBERSECURITY intrusion prevention network security feature optimization sustainability
下载PDF
基于自适应控制算法的NB-IoT网络性能优化研究 被引量:1
20
作者 覃志华 廖志远 王渊 《通信电源技术》 2024年第1期246-248,共3页
随着物联网技术的快速发展,窄带物联网(Narrow Band Internet of Things,NB-IoT)技术因其低功耗、广覆盖、大容量等特性,成为物联网的重要连接方式。针对NB-IoT网络性能优化问题,提出基于自适应控制算法的优化方案,提高其可靠性、容量... 随着物联网技术的快速发展,窄带物联网(Narrow Band Internet of Things,NB-IoT)技术因其低功耗、广覆盖、大容量等特性,成为物联网的重要连接方式。针对NB-IoT网络性能优化问题,提出基于自适应控制算法的优化方案,提高其可靠性、容量及能效。通过仿真实验,验证该方案的有效性和性能优势。此外,基于该算法,采用终端感知、网络通信、数据处理以及应用表现4层系统设计架构,设计基于自适应控制算法的NB-IoT物联网系统,满足不断增长的物联网应用需求。 展开更多
关键词 窄带物联网(NB-iot) 自适应 控制算法 网络优化
下载PDF
上一页 1 2 173 下一页 到第
使用帮助 返回顶部