期刊文献+
共找到29,357篇文章
< 1 2 250 >
每页显示 20 50 100
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
1
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of things zero trust
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
2
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
基于信任感知元启发式的IIoT安全路由优化研究
3
作者 刘晶 《微型电脑应用》 2026年第1期68-71,共4页
对于工业物联网(IIoT)环境中的能量效率和安全性,提出一种基于信任感知多目标元启发式优化的安全聚类与路由规划(TAMOMO-SCRP)模型。所提出的模型采用秃鹰搜索(BES)优化算法进行聚类和路由优化,结合信任级别、通信成本、剩余能量和节点... 对于工业物联网(IIoT)环境中的能量效率和安全性,提出一种基于信任感知多目标元启发式优化的安全聚类与路由规划(TAMOMO-SCRP)模型。所提出的模型采用秃鹰搜索(BES)优化算法进行聚类和路由优化,结合信任级别、通信成本、剩余能量和节点密度等参数设计聚类目标函数,并基于队列长度和链路质量进行路由选择。通过与现有方法的比较实验,TAMOMO-SCRP在网络生命周期、半网络死亡时间、稳定期等指标上均优于其他方法。具体而言,TAMOMO-SCRP的网络生命周期达到39 451轮,半网络死亡时间为25 950轮,稳定期为8000轮,显著提高了IIoT环境的能量效率和安全性。 展开更多
关键词 工业物联网 聚类 秃鹰搜索优化算法 信任感知协议 路由规划
在线阅读 下载PDF
Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things
4
作者 Maha Abdelhaq Ahmad Sami Al-Shamayleh +2 位作者 Adnan Akhunzada Nikola Ivkovi´c Toobah Hasan 《Computers, Materials & Continua》 2026年第4期1307-1321,共15页
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo... The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems. 展开更多
关键词 AI-driven malware analysis advanced persistent malware(APM) AI-poweredmalware detection deep learning(DL) malware-driven botnets software-defined internet of things(SD-IoT)
在线阅读 下载PDF
一种适用于IIOS型光伏直流汇集系统的新型短路故障容错拓扑
5
作者 郭珂 刘朋超 +3 位作者 莫智荣 禄子昂 杨小林 李淞轩 《中国电机工程学报》 北大核心 2025年第17期6752-6763,I0012,共13页
独立输入串联输出(input-independent output-series,IIOS)的光伏直流升压汇集系统存在易发生直流侧短路故障的问题,其会严重影响汇集系统稳定运行,极端情况下可能会使系统内开关器件大量损坏。为解决该问题,该文提出一种新型短路故障... 独立输入串联输出(input-independent output-series,IIOS)的光伏直流升压汇集系统存在易发生直流侧短路故障的问题,其会严重影响汇集系统稳定运行,极端情况下可能会使系统内开关器件大量损坏。为解决该问题,该文提出一种新型短路故障容错拓扑结构,在低压侧短路故障时仍能保障汇集系统正常运行,在中压侧短路故障时则能快速清除故障电流。与现有方案对比,所提拓扑显著减少了开关器件的使用数量,降低了器件应力,提高了低压侧短路故障容错能力,并实现部分半导体器件的软开关,有效提高了汇集系统的运行效率和可靠性。详细分析所提拓扑的工作原理和控制策略,并通过仿真和实验验证其有效性。 展开更多
关键词 独立输入串联输出 光伏 直流汇集 短路故障
原文传递
The Internet of Things under Federated Learning:A Review of the Latest Advances and Applications 被引量:1
6
作者 Jinlong Wang Zhenyu Liu +2 位作者 Xingtao Yang Min Li Zhihan Lyu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1-39,共39页
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge... With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions. 展开更多
关键词 Federated learning Internet of things SENSORS machine learning privacy security
在线阅读 下载PDF
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:4
7
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital Communications and Networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 Data science Internet of things(IoT) Big data Communication systems Networks Security Data science analytics
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
8
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of things(iioT)network iioT service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
初中英语大单元教学视角下运用IIO模式提高学生交际能力的探究 被引量:1
9
作者 张明亮 《新课程研究》 2025年第3期70-72,共3页
《义务教育英语课程标准(2022年版)》明确指出,英语课程应注重培养学生的语言能力、文化意识、思维品质和学习能力,特别强调在真实情景中提高学生的英语交际能力。然而,当前初中英语教学中仍存在教学内容碎片化、交际能力培养不足、教... 《义务教育英语课程标准(2022年版)》明确指出,英语课程应注重培养学生的语言能力、文化意识、思维品质和学习能力,特别强调在真实情景中提高学生的英语交际能力。然而,当前初中英语教学中仍存在教学内容碎片化、交际能力培养不足、教学方法单一等问题,导致学生的英语交际能力未能得到有效提升。为解决这些问题,本研究将大单元教学理念与二语习得IIO模式相结合,探讨在初中英语教学中提升学生英语交际能力的有效途径,以期促进学生在真实情景中进行准确、得体的交际。 展开更多
关键词 大单元教学 iio模式 英语交际能力 初中英语教学
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
10
作者 Somia Sahraoui Abdelmalik Bachir 《Digital Communications and Networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 Blockchain Internet of things Lightweight consensus
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
11
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor Networks Internet of things Key technologies Application fields
在线阅读 下载PDF
IIoT环境下基于蜣螂优化的雾工作流调度算法 被引量:1
12
作者 吴宏伟 江凌云 《计算机工程与应用》 北大核心 2025年第10期341-349,共9页
为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用... 为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。 展开更多
关键词 工作流调度 蜣螂优化算法 HEFT算法 反向学习 调度算法 雾计算 工业物联网(iioT)
在线阅读 下载PDF
运用“IIO理论”优化高中英语读写结合教学研究
13
作者 朱翠林 《英语教师》 2025年第3期17-21,27,共6页
“IIO理论”认为,通过有效的语言输入、语言内化和语言输出,能达到读写结合、以读促写的目的,提高写作能力。该理论强调将语言输入和输出高效地结合,通过一系列活动解读文本、内化语言、提高语言输出的质量,从而提高读写结合教学的实效... “IIO理论”认为,通过有效的语言输入、语言内化和语言输出,能达到读写结合、以读促写的目的,提高写作能力。该理论强调将语言输入和输出高效地结合,通过一系列活动解读文本、内化语言、提高语言输出的质量,从而提高读写结合教学的实效性。“IIO理论”是读写教学的应然选择,实施过程中要注意客观分析学情、创设真实语境、搭建写作支架、运用输出功能。本文将该理论与“输出—驱动假设”理论相结合指导读写结合教学实践,并通过实例评析,对读写结合教学进行调控和反思。 展开更多
关键词 高中英语 输入 内化 输出 读写结合 iio理论
在线阅读 下载PDF
An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things
14
作者 Gang Xu Xinyu Fan +4 位作者 Xiu-Bo Chen Xin Liu Zongpeng Li Yanhui Mao Kejia Zhang 《Computers, Materials & Continua》 2025年第2期2293-2309,共17页
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern... Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes. 展开更多
关键词 Internet of things blockchain forward-secure blind signature
在线阅读 下载PDF
A blockchain and internet of things‑based information infrastructure for the Chinese automotive sector carbon‑credit market
15
作者 Yanchu Liu Yu Zhang Duosi Zheng 《Financial Innovation》 2025年第1期822-864,共43页
In 2021,12 fraudulent cases were identified in the Chinese carbon market.As a critical component of this emerging market,China’s carbon-credit scheme in the automotive sector faces several shortcomings,including info... In 2021,12 fraudulent cases were identified in the Chinese carbon market.As a critical component of this emerging market,China’s carbon-credit scheme in the automotive sector faces several shortcomings,including informational opacity and operational inefficiency,which affect market functionality and fairness.This study develops an information system that integrates blockchain technology and the Internet of Things to manage a carbon-credit scheme.Specifically,we attached carbon credits to each vehicle with radio frequency identification electronic tags and a chained data structure to ensure the traceability and reliability of information flow.We use the distributed ledger technology and establish five distinct types of smart contracts for decentralized operations to ensure that all procedures of the Chinese carboncredit scheme are standardized and under public scrutiny.The proposed infrastructure has the potential to significantly enhance the transparency and efficiency of China’s carbon-credit schemes. 展开更多
关键词 Carbon credit Blockchain Internet of things Information system
在线阅读 下载PDF
Real-time Meteorological Data Collection Emergency System of Internet of Things Platform
16
作者 Tianwen SONG Zhi LI Hui LIANG 《Meteorological and Environmental Research》 2025年第1期1-5,共5页
With the development of Internet of things technology,the real-time collection and transmission of meteorological data has become particularly important.Especially in response to emergencies such as natural disasters,... With the development of Internet of things technology,the real-time collection and transmission of meteorological data has become particularly important.Especially in response to emergencies such as natural disasters,it is very important to improve the efficiency of decision-making by quickly obtaining accurate meteorological observation data.However,the traditional method of meteorological data collection and transmission has a large delay in data acquisition due to the conversion of public network and internal network,which affects the timeliness of emergency decision-making.This paper proposes a solution based on the Internet of things platform combined with MQTT protocol,which aims to realize the efficient and reliable real-time collection and transmission of meteorological data,shorten the data acquisition time,improve the emergency response speed,and meet the needs of temporary observation. 展开更多
关键词 Internet of things Meteorological data MQTT
在线阅读 下载PDF
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT
17
作者 Fengqi Li Yingjie Zhao +3 位作者 Kaiyang Zhang Hui Xu Yanjuan Wang Deguang Wang 《Digital Communications and Networks》 2025年第4期1191-1203,共13页
To facilitate cross-domain data interaction in the Industrial Internet of Things(IIoT),establishing trust between multiple administrative domains is essential.Although blockchain technology has been proposed as a solu... To facilitate cross-domain data interaction in the Industrial Internet of Things(IIoT),establishing trust between multiple administrative domains is essential.Although blockchain technology has been proposed as a solution,current techniques still suffer from issues related to efficiency,security,and privacy.Our research aims to address these challenges by proposing a lightweight,trusted data interaction scheme based on blockchain,which reduces redundant interactions among entities.We enhance the traditional Practical Byzantine Fault Tolerance(PBFT)algorithm to support lightweight distributed consensus in large-scale IIoT scenarios.Introducing a composite digital signature algorithm and incorporating veto power minimizes resource consumption and eliminates ineffective consensus operations.The experimental results show that,compared with PBFT,our scheme reduces latency by 27.2%,thereby improving communication efficiency and resource utilization.Furthermore,we develop a lightweight authentication technique specifically for cross-domain IIoT,leveraging blockchain technology to achieve distributed collaborative authentication.The performance comparisons indicate that our method significantly outperforms traditional schemes,with an average authentication latency of approximately 151 milliseconds.Additionally,we introduce a trusted federated learning(FL)algorithm that ensures comprehensive trust assessments for devices across different domains while protecting data privacy.Extensive simulations and experiments validate the reliability of our approach. 展开更多
关键词 Blockchain Industrial internet of things Federated learning Cross-domain AUTHENTICATION
在线阅读 下载PDF
Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things
18
作者 Amal Al-Rasheed Rahim Khan +1 位作者 Fahad Alturise Salem Alkhalaf 《Computers, Materials & Continua》 2025年第7期957-973,共17页
The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these netwo... The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these networks,as shared channels are used to transmit packets.In this paper,a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT.Initially,every device works collaboratively to form a distributed network.In this model,if a device is deployed outside the coverage area of the nearest server,it communicates indirectly through the neighboring devices.For this purpose,every device collects data from the respective neighboring devices,such as hop count,average packet transmission delay,criticality factor,link reliability,and RSSI value,etc.These parameters are used to find an optimal route from the source to the destination.Secondly,the proposed approach has enabled devices to learn from the environment and adjust the optimal route-finding formula accordingly.Moreover,these devices and server modules must ensure that every packet is transmitted securely,which is possible only if it is encrypted with an encryption algorithm.For this purpose,a decision tree-enabled device-to-server authentication algorithm is presented where every device and server must take part in the offline phase.Simulation results have verified that the proposed distributed communication approach has the potential to ensure the integrity and confidentiality of data during transmission.Moreover,the proposed approach has outperformed the existing approaches in terms of communication cost,processing overhead,end-to-end delay,packet loss ratio,and throughput.Finally,the proposed approach is adoptable in different networking infrastructures. 展开更多
关键词 Internet of things distributed communication SECURITY AUTHENTICATION decision tree
在线阅读 下载PDF
Security Challenges and Analysis Tools in Internet of Health Things:A Comprehensive Review
19
作者 Enas W.Abood Ali A.Yassin +4 位作者 Zaid Ameen Abduljabbar Vincent Omollo Nyangaresi Iman Qays Abduljaleel Abdulla J.Y.Aldarwish Husam A.Neamah 《Computers, Materials & Continua》 2025年第11期2305-2345,共41页
The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based ... The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field. 展开更多
关键词 Internet of health things AUTHENTICATION PRIVACY fog-computing blockchain AI
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部