您现在的位置: 首页> 研究主题> IoT

IoT

IoT的相关文献在1994年到2023年内共计4976篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、建筑科学 等领域,其中期刊论文675篇、专利文献4301篇;相关期刊267种,包括今日电子、通信世界、中国集成电路等; IoT的相关文献由9170位作者贡献,包括程卓、袁泉、黄田野等。

IoT—发文量

期刊论文>

论文:675 占比:13.57%

专利文献>

论文:4301 占比:86.43%

总计:4976篇

IoT—发文趋势图

IoT

-研究学者

  • 程卓
  • 袁泉
  • 黄田野
  • 陈爽
  • 徐宝刚
  • 徐连法
  • 张建清
  • A·戈尔
  • B·吉普塔
  • M·A·R·舒曼
  • 期刊论文
  • 专利文献

搜索

排序:

年份

作者

关键词

    • Yifei Xiao; Shijie Zhou
    • 摘要: To achieve the high availability of health data in erasure-coded cloud storage systems,the data update performance in erasure coding should be continuously optimized.However,the data update performance is often bottlenecked by the constrained cross-rack bandwidth.Various techniques have been proposed in the literature to improve network bandwidth efficiency,including delta transmission,relay,and batch update.These techniques were largely proposed individually previously,and in this work,we seek to use them jointly.To mitigate the cross-rack update traffic,we propose DXR-DU which builds on four valuable techniques:(i)delta transmission,(ii)XOR-based data update,(iii)relay,and(iv)batch update.Meanwhile,we offer two selective update approaches:1)data-deltabased update,and 2)parity-delta-based update.The proposed DXR-DU is evaluated via trace-driven local testbed experiments.Comprehensive experiments show that DXR-DU can significantly improve data update throughput while mitigating the cross-rack update traffic.
    • Lei Yan; Maode Ma; Dandan Li; Xiaohong Huang; Yan Ma; Kun Xie
    • 摘要: The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
    • Tsu-Yang Wu; Qian Meng; Lei Yang; Saru Kumari; Matin Pirouz
    • 摘要: The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owing to the scarcity of medical and health care resources in some areas,the demand for remote surgery has gradually increased.In this paper,we investigate remote surgery in the healthcare environment.Surgeons can operate robotic arms to perform remote surgery for patients,which substantially facilitates successful surgeries and saves lives.Recently,Kamil et al.proposed a secure protocol for surgery in the healthcare environment.However,after cryptanalyzing their protocol,we deduced that their protocols are vulnerable to temporary value disclosure and insider attacks.Therefore,we design an improved authentication and key agreement protocol for remote surgeries in the healthcare environment.Accordingly,we adopt the real or random(ROR)model and an automatic verification tool Proverif to verify the security of our protocol.Via security analysis and performance comparison,it is confirmed that our protocol is a relatively secure protocol.
    • Passent El-kafrawy; Maie Aboghazalah; Abdelmoty M.Ahmed; Hanaa Torkey; Ayman El-Sayed
    • 摘要: Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice.Encryption ofmedical images is very important to secure patient information.Encrypting these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a problem.In this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the network.On the other hand,a decoder was used to reproduce the original image back after the vector was received and decrypted.Two convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and decoding.Different hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding resolution.In this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in detail.The first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification algorithm.The second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 epochs.The third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
    • Siguo Bi; Cong Wang; Jiajie Shen; Wang Xiang; Wei Ni; Xin Wang; Bochun Wu; Yi Gong
    • 摘要: The misreading problem of a passive ultra-high-frequency(UHF)radio frequency identification(RFID)tag is a frequent problem arising in the field of librarianship.Unfortunately,existing solutions are something inefficient,e.g.,extra resource requirement,inaccuracy,and empiricism.To this end,under comprehensive analysis on the passive UHF RFID application in the librarianship scenario,a novel and judicious approach based on RFID localization is proposed to address such a misreading problem.Extensive simulation results show that the proposed approach can outperform the existing ones and can be an attractive candidate in practice.
    • Xuanang Li; Shuangshuang Liu; Saru Kumari; Chien-Ming Chen
    • 摘要: Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and widespread connections.Wireless sensor networks(WSNs),which comprise various sensors,are crucial components of IoT.The main functions of WSN include providing users with real-time monitoring information,deploying regional information collection,and synchronizing with the Internet.Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields.Recently,Yu et al.proposed a user authentication protocol forWSN.However,their design is vulnerable to sensor capture and temporary information disclosure attacks.Thus,in this study,an improved protocol called PSAP-WSNis proposed.The security of PSAP-WSN is demonstrated by employing the ROR model,BAN logic,and ProVerif tool for the analysis.The experimental evaluation shows that our design is more efficient and suitable forWSN environments.
    • Xinglu Li; Kaizhi Huang; Shaoyu Wang; Xiaoming Xu
    • 摘要: When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to manage and distribute keys,thus limiting the application of traditional high-level authentication schemes.Compared with the high-level authentication scheme,the physical layer authentication scheme realizes the lightweight authentication of users by comparing the wireless channel characteristics of adjacent packets.However,traditional physical layer authentication schemes still adopt the one-to-one authentication method,which will consume numerous network resources in the face of large-scale IoT node access authentication.In order to realize the secure access authentication of IoT nodes and regional intrusion detection with low resource consumption,we propose a physical layer authentication mechanism based on convolution neural network(CNN),which uses the deep characteristics of channel state information(CSI)to identify sending nodes in different locations.Specifically,we obtain the instantaneous CSI data of IoT sending nodes at different locations in the pre-set area,and then feed them into CNN for training to procure a model for IoT node authentication.With its powerful ability of data analysis and feature extraction,CNN can extract deep Spatio-temporal environment features of CSI data and bind them with node identities.Accordingly,an authentication mechanism which can distinguish the identity types of IoT nodes located in different positions is established to authenticate the identity of unknown nodes when they break into the pre-set area.Experimental results show that this authentication mechanism can still achieve 94.7%authentication accuracy in the case of a low signalto-noise ratio(SNR)of 0 dB,which means a significant improvement in authentication accuracy and robustness.
    • 卫慧
    • 摘要: 海上风电场工程庞大复杂,该文针对重大工程数字资产建设和管理的需要及工程特点,运用BIM、IoT、大数据等技术,设计开发了海上风电工程资产数字化平台,运用于工程全生命周期的规划、设计、施工、运维等各个阶段,为海上风电工程数字化技术资产的创建、存储、利用提供了有力的工具,为海上风电大规模、低成本开发和快速可持续发展提供了技术支撑。
    • Nazrul Islam; Md. Iqbal Hossain; Anisur Rahman
    • 摘要: The standard specification of IEEE 802.15.4 is called ZigBee Propocol. ZigBee protocol required security, low data transfer rate, power efficient network. In addition, the ZigBee mobility function makes the ZigBee network more interactive and multi-purpose. The ZigBee mobile node has a significant effect on network parameters, namely MAC delay, end-to-end delay, MAC throughput and network load. However, a particular significant ZigBee node affects network data traffic and reduces the strength of the Quality of Service (QoS). The key issues are to analyze the QoS in order to increase overall performance of the network. The study proposes a ZigBee network with the mobile node and fixed node based on a variety of MAC layer settings. The Riverbed Network Simulator (Academic Modeler Release 17.5) is used for configuring and simulating the ZigBee network in a variety of conditions. The simulation results show that ZigBee with a fixed node performs better than the ZigBee mobile node. The ZigBee network with fixed node produces a lower network load and a high ratio of successfully transmitted data. The analysis of this study allows the ZigBee network to be better designed.
    • 孔祥平
    • 摘要: 文章面向城市地下空间(人防工程)运营维护实际需求,应用BIM、IoT、智能感知等信息技术,搭建智能感知系统和基于BIM+IoT的地下工程智能运维平台,实现地下空间的信息化、精细化、智能化管理,为智慧地下空间提供有效的解决途径。
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号