期刊文献+
共找到32,443篇文章
< 1 2 250 >
每页显示 20 50 100
IoT-CDS:Internet of Things Cyberattack Detecting System Based on Deep Learning Models
1
作者 Monir Abdullah 《Computers, Materials & Continua》 SCIE EI 2024年第12期4265-4283,共19页
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)h... The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT environments.To rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT networks.The DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT attacks.The BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal packets.The experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy rates.LSTMs are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack detection.This method,without feature selection,demonstrates advantages in training time and detection accuracy.Consequently,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security. 展开更多
关键词 Cyberattacks intrusion detection system deep learning internet of things
下载PDF
基于NB-IoT的污水管道监测系统设计
2
作者 沈莉丽 王素青 《工业控制计算机》 2025年第1期49-50,共2页
针对污水管道监测操作难度大的问题,利用NB-IoT无线通信技术的低功耗、广覆盖和低成本的优势,设计了一种基于NB-IoT的污水管道监测系统,对污水管道内部的甲烷浓度、液位以及温度等数据进行实时采集,并将采集数据通过NB-IOT组网传送至云... 针对污水管道监测操作难度大的问题,利用NB-IoT无线通信技术的低功耗、广覆盖和低成本的优势,设计了一种基于NB-IoT的污水管道监测系统,对污水管道内部的甲烷浓度、液位以及温度等数据进行实时采集,并将采集数据通过NB-IOT组网传送至云管理平台,实现数据实时监测。 展开更多
关键词 NB-iot 污水管道 实时监测 STM32
下载PDF
NB-IoT环境下基于区块链技术的智慧停车诱导系统信任评估研究
3
作者 黄宇达 张矿伟 +1 位作者 赵红专 李学威 《科学技术创新》 2025年第2期72-77,共6页
为解决智慧停车诱导系统中停车场、车辆、RSU设备之间存在的信息交互不可信及交易不可靠等问题,提出了一种基于区块链技术的信任评估机制。首先,通过对比各种通信方案优缺点,选择窄带物联网作为网络环境,搭建基于区块链技术的智慧停车... 为解决智慧停车诱导系统中停车场、车辆、RSU设备之间存在的信息交互不可信及交易不可靠等问题,提出了一种基于区块链技术的信任评估机制。首先,通过对比各种通信方案优缺点,选择窄带物联网作为网络环境,搭建基于区块链技术的智慧停车诱导系统整体框架。其次,基于物联网节点行为考虑选择数据分组转发量、传输数据分组的重复率以及传输数据传输时延作为信任评估指标,引入分段线性函数,建立有等级划分的信任评估模型,结合智能合约形成可靠的交易凭证。最后,对基于区块链技术的停车信息交互过程进行优化,保证了信息交互的安全性。本文为智慧停车诱导系统的信任评估机制研究提供可靠理论基础。 展开更多
关键词 NB-iot 智慧停车 区块链 信任评估 节点行为 交易凭证
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
4
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain iot access control Hyperledger Fabric
下载PDF
Internet of Things (IoT): A Literature Review 被引量:20
5
作者 Somayya Madakam R. Ramaswamy Siddharth Tripathi 《Journal of Computer and Communications》 2015年第5期164-173,共10页
One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify eve... One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In Light of this, present study addresses IoT concepts through systematic review of scholarly research papers, corporate white papers, professional discussions with experts and online databases. Moreover this research article focuses on definitions, geneses, basic requirements, characteristics and aliases of Internet of Things. The main objective of this paper is to provide an overview of Internet of Things, architectures, and vital technologies and their usages in our daily life. However, this manuscript will give good comprehension for the new researchers, who want to do research in this field of Internet of Things (Technological GOD) and facilitate knowledge accumulation in efficiently. 展开更多
关键词 Internet of things iot RFID IPv6 EPC BARCODE Wi-Fi BLUETOOTH NFC ZigBee Sensors Actuators
下载PDF
NB-IoT环境下智慧停车诱导系统停车位选择及诱导方案研究
6
作者 黄宇达 张矿伟 +1 位作者 赵红专 李学威 《科学技术创新》 2025年第1期222-228,共7页
随着城市化进程的不断加速与机动车数量的持续增长,停车难如今已成为城市可持续健康发展的一个亟待解决的问题。传统停车管理方式效率低下,无法满足现代城市实际停车需求。基于NB-IoT的智慧停车诱导系统通过集成物联网、大数据、云计算... 随着城市化进程的不断加速与机动车数量的持续增长,停车难如今已成为城市可持续健康发展的一个亟待解决的问题。传统停车管理方式效率低下,无法满足现代城市实际停车需求。基于NB-IoT的智慧停车诱导系统通过集成物联网、大数据、云计算和人工智能等现代信息技术,实现了对停车资源的智能化管理和优化配置。本文讨论了NB-IoT技术在智慧停车诱导系统中的应用,并提出一套完整的技术解决方案,并对其进行了相关实证研究和分析。研究结果表明,该系统能够有效提高停车效率,改善用户体验,缓解交通压力,并为未来城市发展与规划提供了价值参考依据。 展开更多
关键词 NB-iot技术 智慧停车诱导系统 系统架构 车位选择算法 导航定位 停车资源管理
下载PDF
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning 被引量:1
7
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network Internet of Medical things(IoMT) multi-access edge computing(MEC)
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
8
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of things(iot) Internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
9
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of things(iot) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Implementation of Machine-to-Machine Solutions Using MQTT Protocol in Internet of Things (IoT) Environment to Improve Automation Process for Electrical Distribution Substations in Colombia 被引量:2
10
作者 Hermes Eslava Luis Alejandro Rojas Ramón Pereira 《Journal of Power and Energy Engineering》 2015年第4期92-96,共5页
In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost e... In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost electrical fault location, which contributes to improving quality of service, particularly by shortening interruption time spans in mid-voltage grids. The implementation makes use of MQTT protocol with an intensive use of Internet of things (IoT) environment which guarantees the following properties within the automation process: Advanced reports and statistics, remote command execution on one or more units (groups of units), detailed monitoring of remote units and custom alarm mechanism and firmware upgrade on one or more units (groups of units). This kind of implementation is the first one in Colombia and it is able to automatically recover from an N-1 fault. 展开更多
关键词 MACHINE to MACHINE Quality of Service Distribution Grids MQTT PROTOCOL Internet of things (iot) ENVIRONMENT ELECTRICAL Energy
下载PDF
A Few-Shot Learning-Based Automatic Modulation Classification Method for Internet of Things
11
作者 Aer Sileng Qi Chenhao 《China Communications》 SCIE CSCD 2024年第8期18-29,共12页
Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve it... Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods. 展开更多
关键词 automatic modulation classification(AMC) deep learning(DL) few-shot learning Internet of things(iot)
下载PDF
Editorial for Internet of Things (IoT) and Artificial Intelligence (AI) in geotechnical engineering 被引量:5
12
作者 Honghu Zhu Ankit Garg +1 位作者 Xiong(Bill)Yu Hannah Wanhuan Zhou 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2022年第4期1025-1027,共3页
We are privileged to be invited by the Honorary Editor-in-Chief,Professor Qihu Qian,Editor-in-Chief,Professor Xia-Ting Feng,and the editorial staff of the Journal of Rock Mechanics and Geotechnical Engineering(JRMGE),... We are privileged to be invited by the Honorary Editor-in-Chief,Professor Qihu Qian,Editor-in-Chief,Professor Xia-Ting Feng,and the editorial staff of the Journal of Rock Mechanics and Geotechnical Engineering(JRMGE),to serve as Guest Editors for this Special Issue(SI).Over the last decade,the application of the Internet of Things(IoT)and Artificial Intelligence(AI)has increased rapidly to enhance automation in various industries.For efficient construction and maintenance of geotechnical infrastructures(slopes,tunnels,pipelines,and other ground infrastructures),there is a need to access and examine measured data in real-time.Variations in data type due to the usage of unmanned aerial vehicle(UAV)photogrammetric sensors,LiDAR,and fiber optic sensing techniques make data management and analysis more complicated.Advanced artificial intelligence,metaheuristic optimization,and data science can be reliable methods in geotechnical engineering for site investigation,risk assessment,design,construction,and maintenance at a higher level. 展开更多
关键词 artificial iot gramme
下载PDF
Enabling Industrial Internet of Things(IIoT) towards an emerging smart energy system 被引量:10
13
作者 Ding Zhang Ching Chuen Chan George You Zhou 《Global Energy Interconnection》 2018年第1期39-47,共9页
The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balanci... The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balancing generation and load. Thus, creating an environment where power and information flow seamlessly in real time to enable reliable and economically viable energy delivery, the advent of Internet of Energy(IoE) as well as the rising of Internet of Things(IoT) based smart systems.The evolution of IT to Io T has shown that an information network can be connected in an autonomous way via routers from operating system(OS) based computers and devices to build a highly intelligent eco-system. Conceptually, we are applying the same methodology to the Io E concept so that Energy Operating System(EOS) based assets and devices can be developed into a distributed energy network via energy gateway and self-organized into a smart energy eco-system.This paper introduces a laboratory based IIo T driven software and controls platform developed on the NICE Nano-grid as part of a NICE smart system Initiative for Shenhua group. The goal of this effort is to develop an open architecture based Industrial Smart Energy Consortium(ISEC) to attract industrial partners, academic universities, module supplies, equipment vendors and related stakeholder to explore and contribute into a test-bed centric open laboratory template and platform for next generation energy-oriented smart industry applications.In the meanwhile, ISEC will play an important role to drive interoperability standards for the mining industry so that the era of un-manned underground mining operation can become the reality as well as increasing safety regulation enforcement. 展开更多
关键词 Internet of energy Industrial iot FRACTAL
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
14
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Intelligent Internet of Things with Reliable Communication and Collaboration Technologies
15
作者 Zhao Junhui Wu Celimuge +4 位作者 Xu Wenjun Qi Chenhao Bu Shengrong Zhang Shuowen Zhang Qingmiao 《China Communications》 SCIE CSCD 2024年第8期I0002-I0006,共5页
The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is w... The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times. 展开更多
关键词 INTERACTION INTERNET iot
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
16
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 Internet of things AUTHENTICITY security LOCATION communication
下载PDF
Internet of Things Authentication Protocols: Comparative Study
17
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY Internet of things SECURITY AUTHENTICATION
下载PDF
PARE:Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things
18
作者 Peicong He Yang Xin Yixian Yang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3067-3084,共18页
The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters... The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters may be concerned about the validity of the collected data.Hence,it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing(SC)data collection tasks with IoT.To this end,this paper proposes a privacy-preserving data reliability evaluation for SC in IoT,named PARE.First,we design a data uploading format using blockchain and Paillier homomorphic cryptosystem,providing unchangeable and traceable data while overcoming privacy concerns.Secondly,based on the uploaded data,we propose a method to determine the approximate correct value region without knowing the exact value.Finally,we offer a data filtering mechanism based on the Paillier cryptosystem using this value region.The evaluation and analysis results show that PARE outperforms the existing solution in terms of performance and privacy protection. 展开更多
关键词 Spatial crowdsourcing PRIVACY-PRESERVING data evaluation iot blockchain
下载PDF
Convergence Platform of Cloud Computing and Internet of Things (IoT) for Smart Healthcare Application 被引量:2
19
作者 M. Mamun-Ibn-Abdullah M. Shahinuzzaman +1 位作者 S. M. Abdur Rahim M. Humayun Kabir 《Journal of Computer and Communications》 2020年第8期1-11,共11页
Internet of Things (IoT) is a widely distributed network which requires small amount of power supply having limited storage and processing capacity. On the other hand, Cloud computing has virtually unlimited storage a... Internet of Things (IoT) is a widely distributed network which requires small amount of power supply having limited storage and processing capacity. On the other hand, Cloud computing has virtually unlimited storage and processing capabilities and is a much more mature technology. Therefore, combination of Cloud computing and IoT can provide the best performance for users. Cloud computing nowadays provides lifesaving healthcare application by collecting data from bedside devices, viewing patient information and diagnose in real time. There may some concerns about security and other issues of the patient’s data but utilization of IoT and Cloud technologies in healthcare industry would open a new era in the field of healthcare. To ensure basic healthcare needs of the people in the rural areas, we have proposed Cloud-IoT based smart healthcare system. In this system various types of sensors (Temperature, Heart bit, ECG, etc.) are equipped in the patient side to sense the patient’s physiological data. For securing data RSA based authentication algorithm and mitigation of several security threats have been used. The sensed data will process and store in the Cloud server. Stored data can be used by the authorized and/or concerned medical practitioner upon approved by the user for patient caring. 展开更多
关键词 Cloud Computing Embedded Hardware and Software iot Smart Healthcare System
下载PDF
Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence
20
作者 Shachar Bar P.W.C.Prasad Md Shohel Sayeed 《Computers, Materials & Continua》 SCIE EI 2024年第10期1-23,共23页
Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate protection.The aim of Intrusion Detection Systems(I... Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate protection.The aim of Intrusion Detection Systems(IDS)is to prevent malicious attacks that corrupt operations and interrupt data flow,which might have significant impact on critical industries and infrastructure.This research examines existing IDS,based on Artificial Intelligence(AI)for IoT devices,methods,and techniques.The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy,precision,recall and F1-score;this research also considers training time.Results demonstrate that Graph Neural Networks(GNN)have several benefits over other traditional AI frameworks through their ability to achieve in excess of 99%accuracy in a relatively short training time,while also capable of learning from network traffic the inherent characteristics of different cyber-attacks.These findings identify the GNN(a Deep Learning AI method)as the most efficient IDS system.The novelty of this research lies also in the linking between high yielding AI-based IDS algorithms and the AI-based learning approach for data privacy protection.This research recommends Federated Learning(FL)as the AI training model,which increases data privacy protection and reduces network data flow,resulting in a more secure and efficient IDS solution. 展开更多
关键词 Anomaly detection artificial intelligence cyber security data privacy deep learning federated learning industrial internet of things internet of things intrusion detection system machine learning
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部