Zero-day attacks present a critical cybersecurity challenge for Internet of things(IoT)infrastructures,where the inability of signature-based intrusion detection systems(IDSs)to recognize novel threat behaviors compro...Zero-day attacks present a critical cybersecurity challenge for Internet of things(IoT)infrastructures,where the inability of signature-based intrusion detection systems(IDSs)to recognize novel threat behaviors compromises both system reliability and operational continuity.Existing hybrid IDS solutions often struggle to balance accurate classification of known attacks with reliable anomaly detection,particularly under the computational constraints of IoT environments.To address this gap,we introduce ZeroDefense,an adaptive fusion-based IDS designed for simultaneous detection of known intrusions and emerging zero-day threats.The framework employs a four-layer architecture consisting of i)feature standardization and class balancing,ii)anomaly detection using isolation forest,autoencoder,and local outlier factor,iii)fine-grained attack classification via random forest,extreme gradient boosting(XGBoost),light gradient boosting machine(LightGBM),and attentive interpretable tabular learning(TabNet),and iv)a confidence-aware fusion engine that adaptively selects the most reliable decision path.Suspicious or previously unseen traffic is isolated early through fused anomaly scoring,while benign and known-malicious flows are processed through supervised classification for precise attack labeling.With an anomaly cascaded decision pipeline,a dynamic confidence-driven fusion mechanism,and a deploymentconscious design,ZeroDefense enables real-time inference on IoT edge gateways.Evaluation on the CICIoT2023 benchmark demonstrates 99.94% overall accuracy and 95.64%macro-average F1-score for known attacks,while 5.76% of traffic is successfully flagged as potential zero-day activity,with inference latency maintained below 100 ms/flow.These results indicate that ZeroDefense offers a scalable,resilient,and practically deployable defense capability for modern IoT infrastructures.展开更多
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi...This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.展开更多
为解决传统电平交叉模数转换器(LC ADC)精度较低和噪声整形逐次逼近寄存器(NS SAR)ADC功耗较大的问题,提出了一种应用于移动物联网(IoT)随机稀疏信号采集的LC-NS SAR ADC。在NS SAR ADC前端插入8 bit的LC ADC作为输入信号活跃度的预检...为解决传统电平交叉模数转换器(LC ADC)精度较低和噪声整形逐次逼近寄存器(NS SAR)ADC功耗较大的问题,提出了一种应用于移动物联网(IoT)随机稀疏信号采集的LC-NS SAR ADC。在NS SAR ADC前端插入8 bit的LC ADC作为输入信号活跃度的预检测电路,在电平交叉发生后开启NS SAR ADC的转换。二阶无源噪声整形电路积分过程只在事件触发后发生,从而能够根据输入信号的活跃度动态调节整体功耗。在1.8 V 180 nm CMOS工艺、采样率为40 kS/s、过采样率(OSR)为20、带宽为1 kHz下对该ADC进行仿真验证,结果表明信噪失真比(SNDR)达到87 dB,电路功耗为2.70μW,心电图信号输入时功耗仅为0.79μW,相较于传统等间隔奈奎斯特采样ADC,采样点减少了73%,在处理生物医学信号时实现了约5∶1的数据压缩比,Schreier品质因数(FoMs)和Walden品质因数(FoMw)分别为172.6 dB和67.0 fJ/conv.step。展开更多
针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS...针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS需求、不同QoS业务队列状态以及切片大小的动态划分,构建了资源切片动态管理的资源调度优化问题。基于Lyapunov优化理论将非凸的多时隙动态资源切片划分问题转化为单时隙多QoS业务资源切片配置问题,从而在动态业务场景下实现资源切片与多QoS业务队列之间的动态适配。仿真结果表明,与传统NB-IoT上行资源调度方法相比,所提方法在低轨高动态场景下能够显著提升时延确定性业务的QoS保障和吞吐量。展开更多
Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues...Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.展开更多
Spectrum sensing is an indispensable core part of cognitive radio dynamic spectrum access(DSA)and a key approach to alleviating spectrum scarcity in the Internet of Things(IoT).The key issue in practical IoT networks ...Spectrum sensing is an indispensable core part of cognitive radio dynamic spectrum access(DSA)and a key approach to alleviating spectrum scarcity in the Internet of Things(IoT).The key issue in practical IoT networks is robust sensing under the coexistence of low signal-to-noise ratios(SNRs)and non-Gaussian impulsive noise,where observations may be distorted differently across feature modalities,making conventional fusion unstable and degrading detection reliability.To address this challenge,the generalized Gaussian distribution(GGD)is adopted as the noise model,and a multimodal fusion framework termed BCAM-Net(bidirectional cross-attention multimodal network)is proposed.BCAM-Net adopts a parallel dual-branch architecture:a time-frequency branch that leverages the continuous wavelet transform(CWT)to extract time-frequency representations,and a temporal branch that learns long-range dependencies from raw signals.BCAM-Net utilizes a bidirectional cross-attention mechanism to achieve deep alignment and mutual calibration of temporal and time-frequency features,generating a fused representation that is highly robust to complex noise.Simulation results show that,under GGD noise with shape parameterβ=0.5,BCAM-Net achieves high detection probabilities in the low-SNR regime and outperforms representative baselines.At a false alarm probability Pf=0.1 and SNR of−14 dB,it attains a detection probability of 0.9020,exceeding the CNN-Transformer,WT-ResNet,TFCFN,and conventional CNN benchmarks by 5.75%,6.98%,33.3%,and 21.1%,respectively.These results indicate that BCAM-Net can effectively improve spectrum sensing performance in low-SNR impulsive-noise scenarios,and provides a lightweight,high-performance solution for practical cognitive radio spectrum sensing.展开更多
建筑信息模型(Building Information Modeling,BIM)、地理信息系统(Geographic Information System,GIS)与物联网(Internet of Things,IoT)技术的发展,为构建面向智慧城市的一体化运维管理平台提供了技术基础。文章围绕智慧城市治理需求...建筑信息模型(Building Information Modeling,BIM)、地理信息系统(Geographic Information System,GIS)与物联网(Internet of Things,IoT)技术的发展,为构建面向智慧城市的一体化运维管理平台提供了技术基础。文章围绕智慧城市治理需求,提出BIM-GIS-IoT三维融合的运维管理平台架构,重点研究多源异构数据集成与模型融合、IoT实时监测、三维可视化展示、设施健康诊断与预测性运维等关键技术,以提升城市基础设施的运维效率、风险预警能力与决策科学性,为智慧城市建设提供新的技术路径与管理模式。展开更多
The challenge of wastewater treatment facilities is growing as they strive to enhance compliance strength and minimize energy consumption,chemical usage,downtime,and labor requirements in the face of increasingly vari...The challenge of wastewater treatment facilities is growing as they strive to enhance compliance strength and minimize energy consumption,chemical usage,downtime,and labor requirements in the face of increasingly variable influent and climate-related disruptions.The use of recent developments in Internet of Things(IoT),artificial intelligence,and robotics enables a transition to a less reactive mode of operation and more closed-loop automation.This review leads to an understanding of the demonstrations of networked sensing and edge data architecture to enhance observability,transform heterogeneous time-series and multimodal data into monitoring,forecasting,and risk intelligent decision knowledge,and extends robotics ability to measure and intervene in hazardous,distributed,or intermittently observed plant environments.We structure the literature on a deployable sense-think-act structure between unit processes,sensing strategies,Artificial Intelligence(AI)tasks,and execution pathways based on supervisory control and robotic operations.The applications of high leverage are evaluated,such as aeration and nutrient removal optimization,chemical dosing and disinfection control,prediction of membrane fouling and cleaning schedules,solids line stabilization,and predictive maintenance of the important assets.In these areas,we highlight aspects of quality of evidence,benchmarking issues,and operational circumstances that will define persistence of reported efficiency improvements after pilots,such as sensor drift and biofouling control,constraint-based control in service of Supervisory Control and Data Acquisition(SCADA)/Programmable Logic Controller(PLC)systems,cybersecurity-by-design,and model life cycle governance.We bring it to the maturity perspective of resilient,interoperable,and conscientiously independent Wastewater Treatment Plants(WWTPs)with a research requirement of standardized datasets,hybrid digital twins,uncertainty intentional optimization,and adaptive sampling and inspection by robotized techniques.展开更多
The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These system...The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These systems,particularly in IoT networks,rely on numerous interconnected devices that handle time-sensitive data for critical applications.In related approaches,trusted communication and reliable device interaction have been overlooked,thereby lowering security when sharing sensitive IoT data.Moreover,it incurs additional energy consumption and overhead while addressing potential threats in the dynamic environment.In this research,an Artificial Intelligence(AI)recommended fault-tolerant framework is proposed that leverages blockchain technology,aiming to enhance device trustworthiness and ensure data privacy.In addition,the intelligence of the proposed framework enables more authentic and authorized device involvement in data routing,thereby enabling seamless transmission in smart cities integrated with lightweight computing.To evaluate dynamic network conditions,the proposed framework offers a timely decision-making system to ensure robust delivery of IoT-assisted services.Using simulations,the efficacy of the proposed framework is validated by comparing it with existing approaches across various network metrics,demonstrating remarkable performance while achieving energy efficiency and optimizing network resources.展开更多
The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data ...The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data networks(NDNs)reduces network complexity and provides practical directions for content-oriented network design.However,ensuring data integrity in NDN-IoT applications remains a challenging issue.Very recently,Wang et al.(Entropy,27(5),471(2025))designed a certificateless aggregate signature(CLAS)scheme for NDN-IoT environments.Wang et al.stated that their construction was provably secure under various types of security attacks.Using theoretical analysis methods,in this work,we reveal that their CLAS design fails to meet unforgeability,a core security requirement for CLAS schemes.In particular,we demonstrate that their scheme is vulnerable to amalicious public-key replacement attack,enabling an adversary to produce authentic signatures for arbitrary fraudulent messages.Therefore,Wang et al.’s design cannot achieve its goal.To address the issue,we systematically examine the root causes behind the vulnerability and propose a security-enhanced CLAS construction for NDN-IoT environments.We prove the security ofour improveddesignunder the standard security assumptionandalsoanalyze its practicalperformanceby comparing the computational and communication costs with several related works.The comparison results show the practicality of our design.展开更多
The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attentio...The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attention in the last few years,and its effects on diverse applications.This review article covers the various methods and tools developed to perform the task efficiently and automatically in a smart city.In this work,we present a comprehensive literature review(2011 onwards)of three major types of anomalies:network anomalies,sensor anomalies,and videobased anomalies,along with their methods and software tools.Furthermore,anomaly detection methods such as machine learning and deep learning are presented in this work,highlighting their detection strategy techniques,features,applications,issues,and challenges.Moreover,a generic algorithmis also developed to ease the user achieve the taskmore specifically by targeting a specific domain aswell as approach.Comparative studies of three anomalymethods and their analysis identify research discovery areas with their applications.As a result,researchers and practitioners can familiarize themselves with the existing methods for solving real problems,improving methods,and developing new optimum methods for anomaly detection in diverse applications.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi...The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.展开更多
With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random dom...With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random domain names,hiding the real IP of Command and Control(C&C)servers to build botnets.Due to the randomness and dynamics of DGA,traditional methods struggle to detect them accurately,increasing the difficulty of network defense.This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments.Specifically,a teacher model combining CharacterBERT,a bidirectional long short-term memory(BiLSTM)network,and attention mechanism(ATT)is constructed:it extracts character-level semantic features viaCharacterBERT,captures sequence dependencieswith the BiLSTM,and integrates theATT for key feature weighting,formingmulti-granularity feature fusion.An improved knowledge distillation approach transfers the teacher model’s learned knowledge to the simplified DistilBERT student model.Experimental results show the teacher model achieves 98.68%detection accuracy.The student modelmaintains slightly improved accuracy while significantly compressing parameters to approximately 38.4%of the teacher model’s scale,greatly reducing computational overhead for IoT deployment.展开更多
文摘Zero-day attacks present a critical cybersecurity challenge for Internet of things(IoT)infrastructures,where the inability of signature-based intrusion detection systems(IDSs)to recognize novel threat behaviors compromises both system reliability and operational continuity.Existing hybrid IDS solutions often struggle to balance accurate classification of known attacks with reliable anomaly detection,particularly under the computational constraints of IoT environments.To address this gap,we introduce ZeroDefense,an adaptive fusion-based IDS designed for simultaneous detection of known intrusions and emerging zero-day threats.The framework employs a four-layer architecture consisting of i)feature standardization and class balancing,ii)anomaly detection using isolation forest,autoencoder,and local outlier factor,iii)fine-grained attack classification via random forest,extreme gradient boosting(XGBoost),light gradient boosting machine(LightGBM),and attentive interpretable tabular learning(TabNet),and iv)a confidence-aware fusion engine that adaptively selects the most reliable decision path.Suspicious or previously unseen traffic is isolated early through fused anomaly scoring,while benign and known-malicious flows are processed through supervised classification for precise attack labeling.With an anomaly cascaded decision pipeline,a dynamic confidence-driven fusion mechanism,and a deploymentconscious design,ZeroDefense enables real-time inference on IoT edge gateways.Evaluation on the CICIoT2023 benchmark demonstrates 99.94% overall accuracy and 95.64%macro-average F1-score for known attacks,while 5.76% of traffic is successfully flagged as potential zero-day activity,with inference latency maintained below 100 ms/flow.These results indicate that ZeroDefense offers a scalable,resilient,and practically deployable defense capability for modern IoT infrastructures.
基金This work is part of the‘Intelligent and Cyber-Secure Platform for Adaptive Optimization in the Simultaneous Operation of Heterogeneous Autonomous Robots(PICRAH4.0)’with reference MIG-20232082,funded by MCIN/AEI/10.13039/501100011033supported by the Universidad Internacional de La Rioja(UNIR)through the Precompetitive Research Project entitled“Nuevos Horizontes en Internet de las Cosas y NewSpace(NEWIOT)”,reference PP-2024-13,funded under the 2024 Call for Research Projects.
文摘This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
文摘为解决传统电平交叉模数转换器(LC ADC)精度较低和噪声整形逐次逼近寄存器(NS SAR)ADC功耗较大的问题,提出了一种应用于移动物联网(IoT)随机稀疏信号采集的LC-NS SAR ADC。在NS SAR ADC前端插入8 bit的LC ADC作为输入信号活跃度的预检测电路,在电平交叉发生后开启NS SAR ADC的转换。二阶无源噪声整形电路积分过程只在事件触发后发生,从而能够根据输入信号的活跃度动态调节整体功耗。在1.8 V 180 nm CMOS工艺、采样率为40 kS/s、过采样率(OSR)为20、带宽为1 kHz下对该ADC进行仿真验证,结果表明信噪失真比(SNDR)达到87 dB,电路功耗为2.70μW,心电图信号输入时功耗仅为0.79μW,相较于传统等间隔奈奎斯特采样ADC,采样点减少了73%,在处理生物医学信号时实现了约5∶1的数据压缩比,Schreier品质因数(FoMs)和Walden品质因数(FoMw)分别为172.6 dB和67.0 fJ/conv.step。
文摘针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS需求、不同QoS业务队列状态以及切片大小的动态划分,构建了资源切片动态管理的资源调度优化问题。基于Lyapunov优化理论将非凸的多时隙动态资源切片划分问题转化为单时隙多QoS业务资源切片配置问题,从而在动态业务场景下实现资源切片与多QoS业务队列之间的动态适配。仿真结果表明,与传统NB-IoT上行资源调度方法相比,所提方法在低轨高动态场景下能够显著提升时延确定性业务的QoS保障和吞吐量。
文摘Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.
基金supported in part by JSPS Grants-in-Aid for Scientific Research 25K07742 and 25K23457.
文摘Spectrum sensing is an indispensable core part of cognitive radio dynamic spectrum access(DSA)and a key approach to alleviating spectrum scarcity in the Internet of Things(IoT).The key issue in practical IoT networks is robust sensing under the coexistence of low signal-to-noise ratios(SNRs)and non-Gaussian impulsive noise,where observations may be distorted differently across feature modalities,making conventional fusion unstable and degrading detection reliability.To address this challenge,the generalized Gaussian distribution(GGD)is adopted as the noise model,and a multimodal fusion framework termed BCAM-Net(bidirectional cross-attention multimodal network)is proposed.BCAM-Net adopts a parallel dual-branch architecture:a time-frequency branch that leverages the continuous wavelet transform(CWT)to extract time-frequency representations,and a temporal branch that learns long-range dependencies from raw signals.BCAM-Net utilizes a bidirectional cross-attention mechanism to achieve deep alignment and mutual calibration of temporal and time-frequency features,generating a fused representation that is highly robust to complex noise.Simulation results show that,under GGD noise with shape parameterβ=0.5,BCAM-Net achieves high detection probabilities in the low-SNR regime and outperforms representative baselines.At a false alarm probability Pf=0.1 and SNR of−14 dB,it attains a detection probability of 0.9020,exceeding the CNN-Transformer,WT-ResNet,TFCFN,and conventional CNN benchmarks by 5.75%,6.98%,33.3%,and 21.1%,respectively.These results indicate that BCAM-Net can effectively improve spectrum sensing performance in low-SNR impulsive-noise scenarios,and provides a lightweight,high-performance solution for practical cognitive radio spectrum sensing.
文摘建筑信息模型(Building Information Modeling,BIM)、地理信息系统(Geographic Information System,GIS)与物联网(Internet of Things,IoT)技术的发展,为构建面向智慧城市的一体化运维管理平台提供了技术基础。文章围绕智慧城市治理需求,提出BIM-GIS-IoT三维融合的运维管理平台架构,重点研究多源异构数据集成与模型融合、IoT实时监测、三维可视化展示、设施健康诊断与预测性运维等关键技术,以提升城市基础设施的运维效率、风险预警能力与决策科学性,为智慧城市建设提供新的技术路径与管理模式。
文摘The challenge of wastewater treatment facilities is growing as they strive to enhance compliance strength and minimize energy consumption,chemical usage,downtime,and labor requirements in the face of increasingly variable influent and climate-related disruptions.The use of recent developments in Internet of Things(IoT),artificial intelligence,and robotics enables a transition to a less reactive mode of operation and more closed-loop automation.This review leads to an understanding of the demonstrations of networked sensing and edge data architecture to enhance observability,transform heterogeneous time-series and multimodal data into monitoring,forecasting,and risk intelligent decision knowledge,and extends robotics ability to measure and intervene in hazardous,distributed,or intermittently observed plant environments.We structure the literature on a deployable sense-think-act structure between unit processes,sensing strategies,Artificial Intelligence(AI)tasks,and execution pathways based on supervisory control and robotic operations.The applications of high leverage are evaluated,such as aeration and nutrient removal optimization,chemical dosing and disinfection control,prediction of membrane fouling and cleaning schedules,solids line stabilization,and predictive maintenance of the important assets.In these areas,we highlight aspects of quality of evidence,benchmarking issues,and operational circumstances that will define persistence of reported efficiency improvements after pilots,such as sensor drift and biofouling control,constraint-based control in service of Supervisory Control and Data Acquisition(SCADA)/Programmable Logic Controller(PLC)systems,cybersecurity-by-design,and model life cycle governance.We bring it to the maturity perspective of resilient,interoperable,and conscientiously independent Wastewater Treatment Plants(WWTPs)with a research requirement of standardized datasets,hybrid digital twins,uncertainty intentional optimization,and adaptive sampling and inspection by robotized techniques.
基金funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2024-02-02152).
文摘The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These systems,particularly in IoT networks,rely on numerous interconnected devices that handle time-sensitive data for critical applications.In related approaches,trusted communication and reliable device interaction have been overlooked,thereby lowering security when sharing sensitive IoT data.Moreover,it incurs additional energy consumption and overhead while addressing potential threats in the dynamic environment.In this research,an Artificial Intelligence(AI)recommended fault-tolerant framework is proposed that leverages blockchain technology,aiming to enhance device trustworthiness and ensure data privacy.In addition,the intelligence of the proposed framework enables more authentic and authorized device involvement in data routing,thereby enabling seamless transmission in smart cities integrated with lightweight computing.To evaluate dynamic network conditions,the proposed framework offers a timely decision-making system to ensure robust delivery of IoT-assisted services.Using simulations,the efficacy of the proposed framework is validated by comparing it with existing approaches across various network metrics,demonstrating remarkable performance while achieving energy efficiency and optimizing network resources.
基金supported in part by theHubei Engineering Research Center for BDS-CloudHigh-Precision Deformation Monitoring Open Funding(No.HBBDGJ202507Y)the National Natural Science Foundation of China(No.62377037).
文摘The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data networks(NDNs)reduces network complexity and provides practical directions for content-oriented network design.However,ensuring data integrity in NDN-IoT applications remains a challenging issue.Very recently,Wang et al.(Entropy,27(5),471(2025))designed a certificateless aggregate signature(CLAS)scheme for NDN-IoT environments.Wang et al.stated that their construction was provably secure under various types of security attacks.Using theoretical analysis methods,in this work,we reveal that their CLAS design fails to meet unforgeability,a core security requirement for CLAS schemes.In particular,we demonstrate that their scheme is vulnerable to amalicious public-key replacement attack,enabling an adversary to produce authentic signatures for arbitrary fraudulent messages.Therefore,Wang et al.’s design cannot achieve its goal.To address the issue,we systematically examine the root causes behind the vulnerability and propose a security-enhanced CLAS construction for NDN-IoT environments.We prove the security ofour improveddesignunder the standard security assumptionandalsoanalyze its practicalperformanceby comparing the computational and communication costs with several related works.The comparison results show the practicality of our design.
文摘The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attention in the last few years,and its effects on diverse applications.This review article covers the various methods and tools developed to perform the task efficiently and automatically in a smart city.In this work,we present a comprehensive literature review(2011 onwards)of three major types of anomalies:network anomalies,sensor anomalies,and videobased anomalies,along with their methods and software tools.Furthermore,anomaly detection methods such as machine learning and deep learning are presented in this work,highlighting their detection strategy techniques,features,applications,issues,and challenges.Moreover,a generic algorithmis also developed to ease the user achieve the taskmore specifically by targeting a specific domain aswell as approach.Comparative studies of three anomalymethods and their analysis identify research discovery areas with their applications.As a result,researchers and practitioners can familiarize themselves with the existing methods for solving real problems,improving methods,and developing new optimum methods for anomaly detection in diverse applications.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2025-02-01276).
文摘The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.
基金supported by the following projects:National Natural Science Foundation of China(62461041)Natural Science Foundation of Jiangxi Province China(20242BAB25068).
文摘With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random domain names,hiding the real IP of Command and Control(C&C)servers to build botnets.Due to the randomness and dynamics of DGA,traditional methods struggle to detect them accurately,increasing the difficulty of network defense.This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments.Specifically,a teacher model combining CharacterBERT,a bidirectional long short-term memory(BiLSTM)network,and attention mechanism(ATT)is constructed:it extracts character-level semantic features viaCharacterBERT,captures sequence dependencieswith the BiLSTM,and integrates theATT for key feature weighting,formingmulti-granularity feature fusion.An improved knowledge distillation approach transfers the teacher model’s learned knowledge to the simplified DistilBERT student model.Experimental results show the teacher model achieves 98.68%detection accuracy.The student modelmaintains slightly improved accuracy while significantly compressing parameters to approximately 38.4%of the teacher model’s scale,greatly reducing computational overhead for IoT deployment.