期刊文献+
共找到29,717篇文章
< 1 2 250 >
每页显示 20 50 100
Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things
1
作者 Chia-Hui Liu 《Computers, Materials & Continua》 2026年第2期1041-1058,共18页
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th... TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection. 展开更多
关键词 Industrial Internet of things(iiot) post-quantum cryptography hash-based signatures SPHINCS+
在线阅读 下载PDF
IIoT驱动下的现代建筑智能照明架构
2
作者 李乐乐 任秀秀 +1 位作者 宗轩泽 刘柯泉 《光源与照明》 2026年第1期59-61,共3页
为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系... 为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系统与人员活动、自然光照、建筑环境的动态适配。研究结果表明:相比传统荧光灯照明,IIoT智能照明架构可降低65%~70%的能耗;对比普通LED照明(仅灯具升级,无智能管控),其额外节能率达35%~40%;全生命周期(按15 a计)成本节约率稳定在28%~35%,且人员感知响应速度≤0.5 s、照度达标率超98%。研究证实,IIoT技术能有效打通照明“技术-节能-经济”的联动壁垒,为现代绿色建筑照明的升级提供可落地的技术路径与经济论证。 展开更多
关键词 iiot 智能照明 节能效率 全生命周期成本 节能机制 经济性分析
在线阅读 下载PDF
MWaOA:A Bio-Inspired Metaheuristic Algorithm for Resource Allocation in Internet of Things
3
作者 Rekha Phadke Abdul Lateef Haroon Phulara Shaik +3 位作者 Dayanidhi Mohapatra Doaa Sami Khafaga Eman Abdullah Aldakheel N.Sathyanarayana 《Computers, Materials & Continua》 2026年第2期1285-1310,共26页
Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart ... Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters. 展开更多
关键词 Delay GATEWAY internet of things resource allocation resource management walrus optimization algorithm
在线阅读 下载PDF
LEAF:A Lightweight Edge Agent Framework with Expert SLMs for the Industrial Internet of Things
4
作者 Qingwen Yang Zhi Li +3 位作者 Jiawei Tang Yanyi Liu Tiezheng Guo Yingyou Wen 《Computers, Materials & Continua》 2026年第5期716-730,共15页
Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of depl... Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of deploying monolithic models on resource-constrained edge devices.While smaller models(SLMs)are suitable for edge deployment,they often lack the reasoning power for complex,multi-step tasks.To address these issues,this paper introduces LEAF,a Lightweight Edge Agent Framework designed for efficiently executing complex tasks at the edge.LEAF employs a novel architecture where multiple expert SLMs—specialized for planning,execution,and interaction—work in concert,decomposing complex problems into manageable sub-tasks.To mitigate the resource overhead of this multi-model approach,LEAF implements an efficient parameter-sharing scheme based on Scalable Low-Rank Adaptation(S-LoRA).We introduce a two-stage training strategy combining Supervised Fine-Tuning(SFT)and Group Relative Policy Optimization(GRPO)to significantly enhance each expert’s capabilities.Furthermore,a Finite StateMachine(FSM)-based decision engine orchestrates the workflow,uniquely balancing deterministic control with intelligent flexibility,making it ideal for industrial environments that demand both reliability and adaptability.Experiments across diverse IIoT scenarios demonstrate that LEAF significantly outperforms baseline methods in both task success rate and user satisfaction.Notably,our fine-tuned 4-billion-parameter model achieves a task success rate over 90%in complex IIoT scenarios,demonstrating LEAF’s ability to deliver powerful and efficient autonomy at the industrial edge. 展开更多
关键词 Industrial internet of things edge computing LLM-based agents small language models
在线阅读 下载PDF
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
5
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of things zero trust
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
6
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
基于信任感知元启发式的IIoT安全路由优化研究
7
作者 刘晶 《微型电脑应用》 2026年第1期68-71,共4页
对于工业物联网(IIoT)环境中的能量效率和安全性,提出一种基于信任感知多目标元启发式优化的安全聚类与路由规划(TAMOMO-SCRP)模型。所提出的模型采用秃鹰搜索(BES)优化算法进行聚类和路由优化,结合信任级别、通信成本、剩余能量和节点... 对于工业物联网(IIoT)环境中的能量效率和安全性,提出一种基于信任感知多目标元启发式优化的安全聚类与路由规划(TAMOMO-SCRP)模型。所提出的模型采用秃鹰搜索(BES)优化算法进行聚类和路由优化,结合信任级别、通信成本、剩余能量和节点密度等参数设计聚类目标函数,并基于队列长度和链路质量进行路由选择。通过与现有方法的比较实验,TAMOMO-SCRP在网络生命周期、半网络死亡时间、稳定期等指标上均优于其他方法。具体而言,TAMOMO-SCRP的网络生命周期达到39 451轮,半网络死亡时间为25 950轮,稳定期为8000轮,显著提高了IIoT环境的能量效率和安全性。 展开更多
关键词 工业物联网 聚类 秃鹰搜索优化算法 信任感知协议 路由规划
在线阅读 下载PDF
Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things
8
作者 Maha Abdelhaq Ahmad Sami Al-Shamayleh +2 位作者 Adnan Akhunzada Nikola Ivkovi´c Toobah Hasan 《Computers, Materials & Continua》 2026年第4期1307-1321,共15页
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo... The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems. 展开更多
关键词 AI-driven malware analysis advanced persistent malware(APM) AI-poweredmalware detection deep learning(DL) malware-driven botnets software-defined internet of things(SD-IoT)
在线阅读 下载PDF
IIoT环境下基于蜣螂优化的雾工作流调度算法 被引量:1
9
作者 吴宏伟 江凌云 《计算机工程与应用》 北大核心 2025年第10期341-349,共9页
为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用... 为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。 展开更多
关键词 工作流调度 蜣螂优化算法 HEFT算法 反向学习 调度算法 雾计算 工业物联网(iiot)
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
10
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of things(iiot)network iiot service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
IIoT环境下基于聚类的工作流多雾协同调度算法 被引量:2
11
作者 吴宏伟 江凌云 陈海峰 《计算机工程与设计》 北大核心 2025年第1期52-59,共8页
为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中... 为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中的任务进行聚类,基于聚类结果,在多个雾服务器之间使用改进的免疫粒子群优化算法进行任务调度。实验结果表明,该算法相比其它一些传统的调度算法在完工时间、成本、负载均衡方面都有一定提升。 展开更多
关键词 工业物联网 聚类 工作流 二分K均值算法 多雾 免疫粒子群优化算法 调度算法
在线阅读 下载PDF
The Internet of Things under Federated Learning:A Review of the Latest Advances and Applications 被引量:1
12
作者 Jinlong Wang Zhenyu Liu +2 位作者 Xingtao Yang Min Li Zhihan Lyu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1-39,共39页
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge... With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions. 展开更多
关键词 Federated learning Internet of things SENSORS machine learning privacy security
在线阅读 下载PDF
Unveiling CyberFortis:A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer
13
作者 Kuncham Sreenivasa Rao Rajitha Kotoju +4 位作者 B.Ramana Reddy Taher Al-Shehari Nasser A.Alsadhan Subhav Singh Shitharth Selvarajan 《Computers, Materials & Continua》 2025年第10期1899-1916,共18页
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe... Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments. 展开更多
关键词 Industrial Internet of things(iiot) SCADA systems SECURITY intrusion detection system(IDS) optimization deep learning
在线阅读 下载PDF
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:4
14
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital Communications and Networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 Data science Internet of things(IoT) Big data Communication systems Networks Security Data science analytics
在线阅读 下载PDF
Domain⁃Level Anonymous Cross⁃Domain Authentication Scheme for IIoT Based on Blockchain
15
作者 LIANG Yufeng SUN Lu 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第S1期180-194,共15页
The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooper... The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooperate with each other to produce better products for greater profits.Therefore,in order to protect the security and privacy of IIoT devices in cross-domain communication,lots of cross-domain authentication schemes have been proposed.However,most schemes expose the domain to which the IIoT device belongs,or introduce a single point of failure in multi-domain cooperation,thus introducing unpredictable risks to each domain.We propose a more secure and efficient domain-level anonymous cross-domain authentication(DLCA)scheme based on alliance blockchain.The proposed scheme uses group signatures with decentralized tracing technology to provide domain-level anonymity to each IIoT device and allow the public to trace the real identity of the malicious pseudonym.In addition,DLCA takes into account the limited resource characteristics of IIoT devices to design an efficient cross-domain authentication protocol.Security analysis and performance evaluation show that the proposed scheme can be effectively used in the cross-domain authentication scenario of industrial internet of things. 展开更多
关键词 industrial internet of things(iiot) domain⁃level anonymity cross⁃domain authentication group signature
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
16
作者 Somia Sahraoui Abdelmalik Bachir 《Digital Communications and Networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 Blockchain Internet of things Lightweight consensus
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
17
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor Networks Internet of things Key technologies Application fields
在线阅读 下载PDF
IIoT中基于GCN的无线区块链节点传输功率优化
18
作者 王维一 宋绯 +3 位作者 郑学强 焦雨涛 巨玉聪 黄世龙 《陆军工程大学学报》 2025年第6期81-87,共7页
区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署... 区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署优化面临网络拓扑动态复杂和无线节点能量受限等问题,提出了一种利用图卷积神经网络(graph convolutional neural network,GCN)的无线节点传输功率计算框架。通过拟合大量实验数据得到传输功率和时延之间的关系函数,引入能耗、分叉率、时延、算力等因素构建关于节点传输功率的系统效用最优化问题。经过训练后,GCN基于节点哈希算力、网络拓扑图、区块链出块间隔和区块大小等信息,可快速确定无线区块链节点最优传输功率,以提高IIoT区块链的系统能效和部署时效。实验结果表明,在复杂无线IoT环境下,所提方法能高效得到理想的无线区块链节点传输功率值,与最优值之间的平均相对偏差小于1.81%。 展开更多
关键词 工业物联网 异构网络 无线通信 无线区块链 图卷积神经网络
在线阅读 下载PDF
High-Throughput and Energy-Saving Blockchain for Untrusted IIoT Device Participation in Edge-to-End Collaborative Computing
19
作者 Zhang Zhen Huang Xiaowei +2 位作者 Li Chengjie Li Aihua Xiao Liqun 《China Communications》 2025年第11期132-143,共12页
The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockcha... The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockchain to edge-to-end collaborative computing remains a significant challenge.To tackle this,this paper proposes an innovative task-oriented blockchain architecture.The architecture comprises trusted Edge Computing(EC)servers and untrusted Industrial Internet of Things(IIoT)devices.We organize untrusted IIoT devices into several clusters,each executing a task in the form of smart contracts,and package the work logs of a task into a block.Executing a task with smart contracts within a cluster ensures the reliability of the task result.Reducing the scope of nodes involved in block consensus increases the overall throughput of the blockchain.Packaging task logs into blocks,storing and propagating blocks through corresponding Edge Computing(EC)servers reduces network load and avoids computing power competition.The paper also presents the proposed architecture’s theoretical TPS(Transactions Per Second)and failure probability calculations.Experimental results demonstrate that this architecture ensures computational security,improves TPS,and reduces resource consumption. 展开更多
关键词 blockchain technology consensus mechanism edge-to-end collaborative computing untrusted iiot devices
在线阅读 下载PDF
An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things
20
作者 Gang Xu Xinyu Fan +4 位作者 Xiu-Bo Chen Xin Liu Zongpeng Li Yanhui Mao Kejia Zhang 《Computers, Materials & Continua》 2025年第2期2293-2309,共17页
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern... Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes. 展开更多
关键词 Internet of things blockchain forward-secure blind signature
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部