Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent object...Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications.展开更多
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices...IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems.展开更多
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater objects.Therefore,in t...Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater objects.Therefore,in this paper,we propose a hybrid Bayesian multidimensional scaling(BMDS)based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical,magnetic induction,and acoustic technologies.These communication technologies are already used for communication in the underwater environment;however,lacking localization solutions.Optical and magnetic induction communication achieves higher data rates for short communication.On the contrary,acoustic waves provide a low data rate for long-range underwater communication.The proposed method collectively uses optical,magnetic induction,and acoustic communication-based ranging to estimate the underwater sensor nodes’final locations.Moreover,we also analyze the proposed scheme by deriving the hybrid Cramer-Rao lower bound(H-CRLB).Simulation results provide a complete comparative analysis of the proposed method with the literature.展开更多
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traff...Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks.This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis techniques.This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.Specifically,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement methods.The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment.Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities.So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment.The main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these networks.So it is very crucial to design an IDS specifically to target on the wireless networks.展开更多
Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulner...Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things(IoT).Previous research on vulnerability has no congestion effect on the peak time of urban road network.The cascading failure of links or nodes is presented by IoT monitoring system,which can collect data from a wireless sensor network in the transport environment.The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure(V2I)channels to simulate key segments and their failure probability.Finally,the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors.The two indices are standardized by calculating the relative change rate,and the comprehensive index of the consequence after road network unit is in a failure state.Therefore,by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state,the comprehensive vulnerability of road network can be evaluated by a risk calculation formula.In short,the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals.展开更多
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted...IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.展开更多
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi...By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.展开更多
According to city public transit problem characteristic, the main body of a paper has been submitted and has worked out one kind of based on the Internet of things frame Intelligent transportation system. That system ...According to city public transit problem characteristic, the main body of a paper has been submitted and has worked out one kind of based on the Internet of things frame Intelligent transportation system. That system collects data by vehicle terminal and uploads data to the server through the network and makes data visible to the consumer passing an algorithm in the server. One aspect, the consumer may inquire about public transit vehicle information by Web. On another aspect, the consumer can know public transit vehicle information by station terminal. The experiments have tested that the Intelligent transportation system can offer public transit vehicle information to many consumers with convenient way thereby this system can solve the city mass transit problem.展开更多
Initiatives to minimise battery use,address sustainability,and reduce regular maintenance have driven the challenge to use alternative power sources to supply energy to devices deployed in Internet of Things(IoT)netwo...Initiatives to minimise battery use,address sustainability,and reduce regular maintenance have driven the challenge to use alternative power sources to supply energy to devices deployed in Internet of Things(IoT)networks.As a key pillar of fifth generation(5G)and beyond 5G networks,IoT is estimated to reach 42 billion devices by the year 2025.Thermoelectric generators(TEGs)are solid state energy harvesters which reliably and renewably convert thermal energy into electrical energy.These devices are able to recover lost thermal energy,produce energy in extreme environments,generate electric power in remote areas,and power micro‐sensors.Applying the state of the art,the authorspresent a comprehensive review of machine learning(ML)approaches applied in combination with TEG‐powered IoT devices to manage and predict available energy.The application areas of TEG‐driven IoT devices that exploit as a heat source the temperature differences found in the environment,biological structures,machines,and other technologies are summarised.Based on detailed research of the state of the art in TEG‐powered devices,the authors investigated the research challenges,applied algorithms and application areas of this technology.The aims of the research were to devise new energy prediction and energy management systems based on ML methods,create supervised algorithms which better estimate incoming energy,and develop unsupervised and semi‐supervised ap-proaches which provide adaptive and dynamic operation.The review results indicate that TEGs are a suitable energy harvesting technology for low‐power applications through their scalability,usability in ubiquitous temperature difference scenarios,and long oper-ating lifetime.However,TEGs also have low energy efficiency(around 10%)and require a relatively constant heat source.展开更多
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver...The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.展开更多
The Intelligent Transportation System(ITS),as a vital means to alleviate traffic congestion and reduce traffic accidents,demonstrates immense potential in improving traffic safety and efficiency through the integratio...The Intelligent Transportation System(ITS),as a vital means to alleviate traffic congestion and reduce traffic accidents,demonstrates immense potential in improving traffic safety and efficiency through the integration of Internet of Things(IoT)technologies.The enhancement of its performance largely depends on breakthrough advancements in object detection technology.However,current object detection technology still faces numerous challenges,such as accuracy,robustness,and data privacy issues.These challenges are particularly critical in the application of ITS and require in-depth analysis and exploration of future improvement directions.This study provides a comprehensive review of the development of object detection technology and analyzes its specific applications in ITS,aiming to thoroughly explore the use and advancement of object detection technologies in IoT-based intelligent transportation systems.To achieve this objective,we adopted the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)approach to search,screen,and assess the eligibility of relevant literature,ultimately including 88 studies.Through an analysis of these studies,we summarized the characteristics,advantages,and limitations of object detection technology across the traditional methods stage and the deep learning-based methods stage.Additionally,we examined its applications in ITS from three perspectives:vehicle detection,pedestrian detection,and traffic sign detection.We also identified the major challenges currently faced by these technologies and proposed future directions for addressing these issues.This review offers researchers a comprehensive perspective,identifying potential improvement directions for object detection technology in ITS,including accuracy,robustness,real-time performance,data annotation cost,and data privacy.In doing so,it provides significant guidance for the further development of IoT-based intelligent transportation systems.展开更多
As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial c...As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements.展开更多
the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objec...the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.展开更多
The interaction between human and physical devices and devices in the real world is gaining more attention, and requires a natural and intuitive methodology to employ. According to this idea and living well, life has ...The interaction between human and physical devices and devices in the real world is gaining more attention, and requires a natural and intuitive methodology to employ. According to this idea and living well, life has been a growing demand. Thus, how to raise pets in an easy way has been the main issue recently. This study examines the ability of computation, communication, and control technologies to improve human interaction with pets by the technology of the Internet of Things. This work addresses the improvement through the pet application of the ability of location-awareness, and to help the pet owners raise their pet on the activity and eating control easily. Extensive experiment results demonstrate that our proposed system performs significantly help on the kidney disease and reduce the symptoms. Our study not only presents the key improvement of the pet monitor system involved in the ideas of the Internet of Things, but also meets the demands of pet owners, who are out for works without any trouble.展开更多
This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet...This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet of things technology, and discussed the demand of urban waterlogging prevention management system in combination with the key technology of Internet of things technology, to do the overall design and functional design well during designing of urban waterlogging prevention management system. Finally, the application process of the Internet of things technology in Chongqing waterlogging prevention management system is summarized. The application result shows that the flood control and drainage function of Chongqing is gradually improved with smooth drainage facilities;the inspection and maintenance management is gradually standardized;operation monitoring and early warning management is fully strengthened. There is visual management for emergency command and dispatch, and at the same time, the drainage pipe network assessment management can be conducted correctly.展开更多
The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the...The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.展开更多
Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly...Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly design sampling and non-slot based scheduling policies to minimize the maximum time-average age of information(MAoI)among sensors with the constraints of average energy cost and finite queue stability.To overcome the intractability involving high couplings of such a complex stochastic process,we first focus on the single-sensor time-average AoI optimization problem and convert the constrained Markov decision process(CMDP)into an unconstrained Markov decision process(MDP)by the Lagrangian method.With the infinite-time average energy and AoI expression expended as the Bellman equation,the singlesensor time-average AoI optimization problem can be approached through the steady-state distribution probability.Further,we propose a low-complexity sub-optimal sampling and semi-distributed scheduling scheme for the multi-sensor scenario.The simulation results show that the proposed scheme reduces the MAoI significantly while achieving a balance between the sampling rate and service rate for multiple sensors.展开更多
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of en...COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.展开更多
文摘Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications.
文摘IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems.
文摘Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater objects.Therefore,in this paper,we propose a hybrid Bayesian multidimensional scaling(BMDS)based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical,magnetic induction,and acoustic technologies.These communication technologies are already used for communication in the underwater environment;however,lacking localization solutions.Optical and magnetic induction communication achieves higher data rates for short communication.On the contrary,acoustic waves provide a low data rate for long-range underwater communication.The proposed method collectively uses optical,magnetic induction,and acoustic communication-based ranging to estimate the underwater sensor nodes’final locations.Moreover,we also analyze the proposed scheme by deriving the hybrid Cramer-Rao lower bound(H-CRLB).Simulation results provide a complete comparative analysis of the proposed method with the literature.
基金The authors acknowledge Jouf University,Saudi Arabia for his funding support.
文摘Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks.This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis techniques.This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.Specifically,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement methods.The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment.Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities.So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment.The main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these networks.So it is very crucial to design an IDS specifically to target on the wireless networks.
基金supported by the Shanghai philosophy and social science planning project(2017ECK004).
文摘Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things(IoT).Previous research on vulnerability has no congestion effect on the peak time of urban road network.The cascading failure of links or nodes is presented by IoT monitoring system,which can collect data from a wireless sensor network in the transport environment.The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure(V2I)channels to simulate key segments and their failure probability.Finally,the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors.The two indices are standardized by calculating the relative change rate,and the comprehensive index of the consequence after road network unit is in a failure state.Therefore,by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state,the comprehensive vulnerability of road network can be evaluated by a risk calculation formula.In short,the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals.
文摘IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.
基金supported by the 863 Program under Grant No. 2008AA04A107
文摘By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.
文摘According to city public transit problem characteristic, the main body of a paper has been submitted and has worked out one kind of based on the Internet of things frame Intelligent transportation system. That system collects data by vehicle terminal and uploads data to the server through the network and makes data visible to the consumer passing an algorithm in the server. One aspect, the consumer may inquire about public transit vehicle information by Web. On another aspect, the consumer can know public transit vehicle information by station terminal. The experiments have tested that the Intelligent transportation system can offer public transit vehicle information to many consumers with convenient way thereby this system can solve the city mass transit problem.
基金supported by the project SP2023/009“Development of algorithms and systems for control,mea-surement and safety applications IX”of the Student Grant System,VSB‐TU Ostrava.This work was also supproted by the project FW03010194“Development of a System for Monitoring and Evaluation of Selected Risk Factors of Physical Workload in the Context of Industry 4.0″of the Technology Agency of the Czech Republicfunding from the European Union's Horizon 2020 research and innovation programme under grant agreement No.856670.This research received no external funding.
文摘Initiatives to minimise battery use,address sustainability,and reduce regular maintenance have driven the challenge to use alternative power sources to supply energy to devices deployed in Internet of Things(IoT)networks.As a key pillar of fifth generation(5G)and beyond 5G networks,IoT is estimated to reach 42 billion devices by the year 2025.Thermoelectric generators(TEGs)are solid state energy harvesters which reliably and renewably convert thermal energy into electrical energy.These devices are able to recover lost thermal energy,produce energy in extreme environments,generate electric power in remote areas,and power micro‐sensors.Applying the state of the art,the authorspresent a comprehensive review of machine learning(ML)approaches applied in combination with TEG‐powered IoT devices to manage and predict available energy.The application areas of TEG‐driven IoT devices that exploit as a heat source the temperature differences found in the environment,biological structures,machines,and other technologies are summarised.Based on detailed research of the state of the art in TEG‐powered devices,the authors investigated the research challenges,applied algorithms and application areas of this technology.The aims of the research were to devise new energy prediction and energy management systems based on ML methods,create supervised algorithms which better estimate incoming energy,and develop unsupervised and semi‐supervised ap-proaches which provide adaptive and dynamic operation.The review results indicate that TEGs are a suitable energy harvesting technology for low‐power applications through their scalability,usability in ubiquitous temperature difference scenarios,and long oper-ating lifetime.However,TEGs also have low energy efficiency(around 10%)and require a relatively constant heat source.
基金supported in part by the National Natural Science Foundation of China under Grant 62371181in part by the Changzhou Science and Technology International Cooperation Program under Grant CZ20230029+1 种基金supported by a National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2021R1A2B5B02087169)supported under the framework of international cooperation program managed by the National Research Foundation of Korea(2022K2A9A1A01098051)。
文摘The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.
文摘The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.
文摘The Intelligent Transportation System(ITS),as a vital means to alleviate traffic congestion and reduce traffic accidents,demonstrates immense potential in improving traffic safety and efficiency through the integration of Internet of Things(IoT)technologies.The enhancement of its performance largely depends on breakthrough advancements in object detection technology.However,current object detection technology still faces numerous challenges,such as accuracy,robustness,and data privacy issues.These challenges are particularly critical in the application of ITS and require in-depth analysis and exploration of future improvement directions.This study provides a comprehensive review of the development of object detection technology and analyzes its specific applications in ITS,aiming to thoroughly explore the use and advancement of object detection technologies in IoT-based intelligent transportation systems.To achieve this objective,we adopted the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)approach to search,screen,and assess the eligibility of relevant literature,ultimately including 88 studies.Through an analysis of these studies,we summarized the characteristics,advantages,and limitations of object detection technology across the traditional methods stage and the deep learning-based methods stage.Additionally,we examined its applications in ITS from three perspectives:vehicle detection,pedestrian detection,and traffic sign detection.We also identified the major challenges currently faced by these technologies and proposed future directions for addressing these issues.This review offers researchers a comprehensive perspective,identifying potential improvement directions for object detection technology in ITS,including accuracy,robustness,real-time performance,data annotation cost,and data privacy.In doing so,it provides significant guidance for the further development of IoT-based intelligent transportation systems.
文摘As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements.
文摘the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.
文摘The interaction between human and physical devices and devices in the real world is gaining more attention, and requires a natural and intuitive methodology to employ. According to this idea and living well, life has been a growing demand. Thus, how to raise pets in an easy way has been the main issue recently. This study examines the ability of computation, communication, and control technologies to improve human interaction with pets by the technology of the Internet of Things. This work addresses the improvement through the pet application of the ability of location-awareness, and to help the pet owners raise their pet on the activity and eating control easily. Extensive experiment results demonstrate that our proposed system performs significantly help on the kidney disease and reduce the symptoms. Our study not only presents the key improvement of the pet monitor system involved in the ideas of the Internet of Things, but also meets the demands of pet owners, who are out for works without any trouble.
文摘This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet of things technology, and discussed the demand of urban waterlogging prevention management system in combination with the key technology of Internet of things technology, to do the overall design and functional design well during designing of urban waterlogging prevention management system. Finally, the application process of the Internet of things technology in Chongqing waterlogging prevention management system is summarized. The application result shows that the flood control and drainage function of Chongqing is gradually improved with smooth drainage facilities;the inspection and maintenance management is gradually standardized;operation monitoring and early warning management is fully strengthened. There is visual management for emergency command and dispatch, and at the same time, the drainage pipe network assessment management can be conducted correctly.
文摘The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.
基金supported in part by the National Key R&D Program of China(No.2021YFB3300100)the National Natural Science Foundation of China(No.62171062)。
文摘Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly design sampling and non-slot based scheduling policies to minimize the maximum time-average age of information(MAoI)among sensors with the constraints of average energy cost and finite queue stability.To overcome the intractability involving high couplings of such a complex stochastic process,we first focus on the single-sensor time-average AoI optimization problem and convert the constrained Markov decision process(CMDP)into an unconstrained Markov decision process(MDP)by the Lagrangian method.With the infinite-time average energy and AoI expression expended as the Bellman equation,the singlesensor time-average AoI optimization problem can be approached through the steady-state distribution probability.Further,we propose a low-complexity sub-optimal sampling and semi-distributed scheduling scheme for the multi-sensor scenario.The simulation results show that the proposed scheme reduces the MAoI significantly while achieving a balance between the sampling rate and service rate for multiple sensors.
文摘COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.