期刊文献+
共找到144篇文章
< 1 2 8 >
每页显示 20 50 100
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
1
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES internet of things(iot) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
2
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of things (iot) M2M Factors Obstacles Potential Benefits UNIVERSITIES
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions
3
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) internet of things(iot) internet of Robotic things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
4
作者 Ayman Khallel Al-Ani Shams Ul Arfeen Laghari +2 位作者 Hariprasath Manoharan Shitharth Selvarajan Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第8期2261-2279,共19页
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha... In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions. 展开更多
关键词 TRANSPORTATION Artificial Intelligence(AI) DATA-DRIVEN internet of things(iot)
下载PDF
Joint optimization of serving node selection and wireless resources allocation for transactions data in mobile blockchain enhanced Internet of Things
5
作者 尹玉峰 WU Wenjun +3 位作者 GAO Yang JIN Kaiqi ZHANG Yanhua SUN Teng 《High Technology Letters》 EI CAS 2023年第2期181-193,共13页
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ... With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods. 展开更多
关键词 internet of things(iot) mobile edge computing(MEC) blockchain deep reinforcement learning(DRL)
下载PDF
Internet of Things (IoT)
6
作者 Radouan Ait Mouha 《Journal of Data Analysis and Information Processing》 2021年第2期77-101,共25页
the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objec... the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world. 展开更多
关键词 internet of things (iot) Smart Communication SENSORS Actuators System integration Smart house/city Network interface
下载PDF
A Healthcare System for Internet of Things (IoT) Application: Machine Learning Based Approach
7
作者 M. Mamun-Ibn-Abdullah M. Humayun Kabir 《Journal of Computer and Communications》 2021年第7期21-30,共10页
Internet of things (IoT) has become an interesting topic in the field of technological research. It is basically interconnecting of devices with each other over the internet. Beside its general use in terms of autonom... Internet of things (IoT) has become an interesting topic in the field of technological research. It is basically interconnecting of devices with each other over the internet. Beside its general use in terms of autonomous cars and smart homes, but some of the best applications of IoT technology in fields of health care monitoring is worth mentioning. The main purpose of this research work is to provide comport services for patients. It can be used to promote basic nursing care by improving the quality of care and patient safety from patient home environment. Rural area of a country lacks behind the proper patient monitoring system. So, remote monitoring and prescribing by sharing medical information in an authenticated manner is very effective for betterment of medical facilities in rural area. We have proposed a healthcare system which can analyze ECG report using supervise machine learning techniques. Analyzing report can be stored in cloud platform which can be further used to prescribe by the experienced medical practitioner. For performance evaluation, ECG data is analyzed using six supervised machine learning algorithms. Data sets are divided into two groups: 75 percent data for training the model and rest 25 percent data for testing. To avoid any kind of anomalies or repetitions, cross validation and random train-test split was used to obtain the result as accurate as possible. 展开更多
关键词 internet of things (iot) Healthcare ECG Signal Right Bundle Branch Block (RBBB)
下载PDF
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies 被引量:15
8
作者 Othmane Friha Mohamed Amine Ferrag +2 位作者 Lei Shu Leandros Maglaras Xiaochan Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期718-752,共35页
This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agr... This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs. 展开更多
关键词 Agricultural internet of things(iot) internet of things(iot) smart agriculture smart farming sustainable agriculture
下载PDF
Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications
9
作者 Abdulaziz Aldribi Aman Singh Jose Brensa 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3865-3881,共17页
Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge ... Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge of things are the spine of all real-time and scalable applications.Conspicuously,this study proposed a novel framework for a real-time and scalable application that changes dynamically with time.In this study,IoT deployment is recommended for data acquisition.The Pre-Processing of data with local edge and fog nodes is implemented in this study.The thresholdoriented data classification method is deployed to improve the intrusion detection mechanism’s performance.The employment of machine learningempowered intelligent algorithms in a distributed manner is implemented to enhance the overall response rate of the layered framework.The placement of respondent nodes near the framework’s IoT layer minimizes the network’s latency.For economic evaluation of the proposed framework with minimal efforts,EdgeCloudSim and FogNetSim++simulation environments are deployed in this study.The experimental results confirm the robustness of the proposed system by its improvised threshold-oriented data classification and intrusion detection approach,improved response rate,and prediction mechanism.Moreover,the proposed layered framework provides a robust solution for real-time and scalable applications that changes dynamically with time. 展开更多
关键词 internet of things(iot) Edge of things(EoT) fog computing cloud computing SCALABLE DECENTRALIZED
下载PDF
Towards asynchronous federated learning for heterogeneous edge-powered internet of things 被引量:2
10
作者 Zheyi Chen Weixian Liao +2 位作者 Kun Hua Chao Lu Wei Yu 《Digital Communications and Networks》 SCIE CSCD 2021年第3期317-326,共10页
The advancement of the Internet of Things(IoT)brings new opportunities for collecting real-time data and deploying machine learning models.Nonetheless,an individual IoT device may not have adequate computing resources... The advancement of the Internet of Things(IoT)brings new opportunities for collecting real-time data and deploying machine learning models.Nonetheless,an individual IoT device may not have adequate computing resources to train and deploy an entire learning model.At the same time,transmitting continuous real-time data to a central server with high computing resource incurs enormous communication costs and raises issues in data security and privacy.Federated learning,a distributed machine learning framework,is a promising solution to train machine learning models with resource-limited devices and edge servers.Yet,the majority of existing works assume an impractically synchronous parameter update manner with homogeneous IoT nodes under stable communication connections.In this paper,we develop an asynchronous federated learning scheme to improve training efficiency for heterogeneous IoT devices under unstable communication network.Particularly,we formulate an asynchronous federated learning model and develop a lightweight node selection algorithm to carry out learning tasks effectively.The proposed algorithm iteratively selects heterogeneous IoT nodes to participate in the global learning aggregation while considering their local computing resource and communication condition.Extensive experimental results demonstrate that our proposed asynchronous federated learning scheme outperforms the state-of-the-art schemes in various settings on independent and identically distributed(i.i.d.)and non-i.i.d.data distribution. 展开更多
关键词 Asynchronous federated learning internet of things(iot) Mobile edge computing
下载PDF
Catalyzing Random Access at Physical Layer for Internet of Things:An Intelligence Enabled User Signature Code Acquisition Approach 被引量:1
11
作者 Xiaojie Fang Xinyu Yin +2 位作者 Xuejun Sha Jinghui Qiu Hongli Zhang 《China Communications》 SCIE CSCD 2021年第10期181-192,共12页
Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access atte... Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity. 展开更多
关键词 internet of things(iot) artificial intelligence physical layer CROSS-ENTROPY random access
下载PDF
DDoS Detection for 6G Internet of Things: Spatial-Temporal Trust Model and New Architecture 被引量:1
12
作者 Yinglun Ma Xu Chen +1 位作者 Wei Feng Ning Ge 《China Communications》 SCIE CSCD 2022年第5期141-149,共9页
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows. 展开更多
关键词 sixth generation(6G)network internet of things(iot) trust model distributed denial of service(DDoS)
下载PDF
A Novel IoT Architecture, Assessment of Threats and Their Classification withMachine Learning Solutions
13
作者 Oliva Debnath Saptarshi Debnath +2 位作者 Sreyashi Karmakar MD TausifMallick Himadri Nath Saha 《Journal on Internet of Things》 2023年第1期13-43,共31页
The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave ind... The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers. 展开更多
关键词 internet of things(iot) layered architecture threat assessment security machine learning attack detection attack mitigation
下载PDF
A load balance optimization framework for sharded-blockchain enabled Internet of Things 被引量:1
14
作者 杨兆鑫 YANG Ruizhe +2 位作者 LI Meng YU Richard Fei ZHANG Yanhua 《High Technology Letters》 EI CAS 2022年第1期10-20,共11页
Recently,sharded-blockchain has attracted more and more attention.Its inherited immutabili-ty,decentralization,and promoted scalability effectively address the trust issue of the data sharing in the Internet of Things... Recently,sharded-blockchain has attracted more and more attention.Its inherited immutabili-ty,decentralization,and promoted scalability effectively address the trust issue of the data sharing in the Internet of Things(IoT).Nevertheless,the traditional random allocation between validator groups and transaction pools ignores the differences of shards,which reduces the overall system per-formance due to the unbalance between computing capacity and transaction load.To solve this prob-lem,a load balance optimization framework for sharded-blockchain enabled IoT is proposed,where the allocation between the validator groups and transaction pools is implemented reasonably by deep reinforcement learning(DRL).Specifically,based on the theoretical analysis of the intra-shard consensus and the final system consensus,the optimization of system performance is formed as a Markov decision process(MDP),and the allocation of the transaction pools,the block size,and the block interval are jointly trained in the DRL agent.The simulation results show that the proposed scheme improves the scalability of the sharded blockchain system for IoT. 展开更多
关键词 internet of things(iot) blockchain sharding load balance deep reinforcement learning(DRL)
下载PDF
Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing
15
作者 Huixiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第2期2309-2335,共27页
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to... The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time. 展开更多
关键词 internet of things(iot) edge computing traffic data SELF-LEARNING fuzzy-learning
下载PDF
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
16
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain internet of things(iot) smart home automation CYBERSECURITY
下载PDF
High Performance Electrically Small Huygens Rectennas Enable Wirelessly Powered Internet of Things Sensing Applications:A Review
17
作者 Wei Lin Richard W.Ziolkowski 《Engineering》 SCIE EI 2022年第4期42-59,共18页
Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),a... Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),and beyond wireless ecosystems.Rectennas,which are the combination of rectifying circuits and antennas,are the most critical components in far-field WPT systems.However,compact application devices require even smaller integrated rectennas that simultaneously have large electromagnetic wave capture capabilities,high alternating current(AC)-to-direct current(DC)(AC-to-DC)conversion efficiencies,and facilitate a multifunctional wireless performance.This paper reviews various rectenna miniaturization techniques such as meandered planar inverted-F antenna(PIFA)rectennas;miniaturized monopole-and dipole-based rectennas;fractal loop and patch rectennas;dielectric-loaded rectennas;and electrically small near-field resonant parasitic rectennas.Their performance characteristics are summarized and then compared with our previously developed electrically small Huygens rectennas that are proven to be more suitable for IoT applications.They have been tailored,for example,to achieve batteryfree IoT sensors as is demonstrated in this paper.Battery-free,wirelessly powered devices are smaller and lighter in weight in comparison to battery-powered devices.Moreover,they are environmentally friendly and,hence,have a significant societal benefit.A series of high-performance electrically small Huygens rectennas are presented including Huygens linearly-polarized(HLP)and circularly-polarized(HCP)rectennas;wirelessly powered IoT sensors based on these designs;and a dual-functional HLP rectenna and antenna system.Finally,two linear uniform HLP rectenna array systems are considered for significantly larger wireless power capture.Example arrays illustrate how they can be integrated advantageously with DC or radio frequency(RF)power-combining schemes for practical IoT applications. 展开更多
关键词 ANTENNA ARRAY Cardioid pattern Electrically small antenna Huygens dipole antenna internet of things(iot) RECTENNA Rectifier circuit Wireless power transfer
下载PDF
Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things
18
作者 Tahani Alatawi Ahamed Aljuhani 《Computers, Materials & Continua》 SCIE EI 2022年第10期1067-1086,共20页
The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the... The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques. 展开更多
关键词 Anomaly detection anomaly-based IDS fog computing internet of things(iot) Industrial internet of things(Iiot) IDS Industrial Control Systems(ICSs)
下载PDF
Anomaly Detection for Internet of Things Cyberattacks
19
作者 Manal Alanazi Ahamed Aljuhani 《Computers, Materials & Continua》 SCIE EI 2022年第7期261-279,共19页
The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains... The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains by improving efficiency,productivity,and cost-effectiveness.Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’operation;however,IoT security issues remain a significant challenge.To minimize the risk of cyberattacks on IoT networks,anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks.Although various detection techniques have been proposed in the literature,existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations.In this paper,we propose an intelligent,effective,and lightweight detection approach to detect several IoT attacks.Our proposed model includes a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model.In the detection phase,we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks.The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%,a precision rate of 99.982%,a recall rate of 99.984%,and an F1-score of 99.983%. 展开更多
关键词 Anomaly detection anomaly-based IDS CYBERSECURITY feature selection internet of things(iot) intrusion detection
下载PDF
Internet of Things Cloud Framework for Smart Homes
20
作者 RaafatAburukba A.R.Al-Ali +1 位作者 Mohammed Rashid Rizwan Hassan 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期319-327,共9页
Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network ... Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances. 展开更多
关键词 internet of things(iot) internet of things(Io T) cloud framework smart homes smart appliances
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部