期刊文献+
共找到33,088篇文章
< 1 2 250 >
每页显示 20 50 100
The Internet of Things under Federated Learning:A Review of the Latest Advances and Applications
1
作者 Jinlong Wang Zhenyu Liu +2 位作者 Xingtao Yang Min Li Zhihan Lyu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1-39,共39页
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge... With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions. 展开更多
关键词 Federated learning Internet of things SENSORS machine learning privacy security
在线阅读 下载PDF
PLAP-PCPE:Physical-Layer Authentication Protocol Based on PUF and Channel Pre-Equalization for the Internet of Things
2
作者 Guo Dengke Gao Yuwei +2 位作者 Cao Kuo Xiong Jun Ma Dongtang 《China Communications》 2025年第3期234-253,共20页
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with ... How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes. 展开更多
关键词 IoT physical-layer authentication preequalization PUF wireless channel
在线阅读 下载PDF
An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things
3
作者 Gang Xu Xinyu Fan +4 位作者 Xiu-Bo Chen Xin Liu Zongpeng Li Yanhui Mao Kejia Zhang 《Computers, Materials & Continua》 2025年第2期2293-2309,共17页
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern... Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes. 展开更多
关键词 Internet of things blockchain forward-secure blind signature
在线阅读 下载PDF
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment
4
作者 Tarak Dhaouadi Hichem Mrabet +1 位作者 Adeeb Alhomoud Abderrazak Jemai 《Computers, Materials & Continua》 2025年第3期4535-4554,共20页
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How... The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.However,existing datasets for IDS training often lack relevance to modern IIoT environments,limiting their applicability for research and development.To address the latter gap,this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems.As a consequence,that can be used by an IDS to detect imminent threats.Likewise,HiTar-2024 was generated using the AREZZO simulator,which replicates realistic smart manufacturing scenarios.The generated dataset includes five distinct classes:Normal,Probing,Remote to Local(R2L),User to Root(U2R),and Denial of Service(DoS).Furthermore,comprehensive experiments with popular Machine Learning(ML)models using various classifiers,including BayesNet,Logistic,IBK,Multiclass,PART,and J48 demonstrate high accuracy,precision,recall,and F1-scores,exceeding 0.99 across all ML metrics.The latter result is reached thanks to the rigorous applied process to achieve this quite good result,including data pre-processing,features extraction,fixing the class imbalance problem,and using a test option for model robustness.This comprehensive approach emphasizes meticulous dataset construction through a complete dataset generation process,a careful labelling algorithm,and a sophisticated evaluation method,providing valuable insights to reinforce IIoT system security.Finally,the HiTar-2024 dataset is compared with other similar datasets in the literature,considering several factors such as data format,feature extraction tools,number of features,attack categories,number of instances,and ML metrics. 展开更多
关键词 Intrusion detection system industrial IoT machine learning security cyber-attacks DATASET
在线阅读 下载PDF
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things
5
作者 Amjad Khan Rahim Khan +1 位作者 Fahad Alturise Tamim Alkhalifah 《Computers, Materials & Continua》 2025年第2期3161-3178,共18页
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in... The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT. 展开更多
关键词 Internet of things information security AUTHENTICATION hidden Markov model MULTIMEDIA
在线阅读 下载PDF
Analysis of Internet of Things Intrusion Detection Technology Based on Deep Learning
6
作者 Huijuan Zheng Yongzhou Wang 《Journal of Electronic Research and Application》 2025年第2期233-239,共7页
With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connectio... With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives. 展开更多
关键词 Deep learning Internet of things Intrusion detection technology
在线阅读 下载PDF
SNN-IoMT:A Novel AI-Driven Model for Intrusion Detection in Internet of Medical Things
7
作者 Mourad Benmalek Abdessamed Seddiki Kamel-Dine Haouam 《Computer Modeling in Engineering & Sciences》 2025年第4期1157-1184,共28页
The Internet of MedicalThings(IoMT)connects healthcare devices and sensors to the Internet,driving transformative advancements in healthcare delivery.However,expanding IoMT infrastructures face growing security threat... The Internet of MedicalThings(IoMT)connects healthcare devices and sensors to the Internet,driving transformative advancements in healthcare delivery.However,expanding IoMT infrastructures face growing security threats,necessitating robust IntrusionDetection Systems(IDS).Maintaining the confidentiality of patient data is critical in AI-driven healthcare systems,especially when securing interconnected medical devices.This paper introduces SNN-IoMT(Stacked Neural Network Ensemble for IoMT Security),an AI-driven IDS framework designed to secure dynamic IoMT environments.Leveraging a stacked deep learning architecture combining Multi-Layer Perceptron(MLP),Convolutional Neural Networks(CNN),and Long Short-Term Memory(LSTM),the model optimizes data management and integration while ensuring system scalability and interoperability.Trained on the WUSTL-EHMS-2020 and IoT-Healthcare-Security datasets,SNN-IoMT surpasses existing IDS frameworks in accuracy,precision,and detecting novel threats.By addressing the primary challenges in AI-driven healthcare systems,including privacy,reliability,and ethical data management,our approach exemplifies the importance of AI to enhance security and trust in IoMT-enabled healthcare. 展开更多
关键词 Healthcare Internet of Medical things artificial intelligence deep learning intrusion detection system
在线阅读 下载PDF
Construction of a Teaching System Through School-enterprise Collaboration in an Integration and Innovation Framework:A Case Study of the Internet of Things Specialization in the Software Engineering Program
8
作者 Jing Tang Donglai Fu +2 位作者 Jun Hong Guoyu Qi Yan Qiang 《计算机教育》 2025年第3期41-47,共7页
The advancement of Internet of Things(IoT)technology is driving industries toward intelligent digital transformation,highlighting the crucial role of software engineering.Despite this,the integration of software engin... The advancement of Internet of Things(IoT)technology is driving industries toward intelligent digital transformation,highlighting the crucial role of software engineering.Despite this,the integration of software engineering into IoT engineering education remains underexplored.To address this gap,the School of Software at North University of China,in collaboration with QST Innovation Technology Group Co.,Ltd.(QST),has developed an innovative educational mechanism.This initiative focuses on the software engineering IoT track and optimizes the teaching process through the outcome-based education(OBE)concept.It incorporates military-industrial characteristics,introduces advanced information and technology curricula,and enhances laboratory infrastructure.The goal is to cultivate innovative talents with unique capabilities,thereby fostering the comprehensive development and application of IoT technology. 展开更多
关键词 Software engineering IoT track School-enterprise collaboration Integration and innovation framework Outcome-based education
在线阅读 下载PDF
A Tolerant and Energy Optimization Approach for Internet of Things to Enhance the QoS Using Adaptive Blended Marine Predators Algorithm
9
作者 Vijaya Krishna Akula Tan Kuan Tak +2 位作者 Pravin Ramdas Kshirsagar Shrikant Vijayrao Sonekar Gopichand Ginnela 《Computers, Materials & Continua》 2025年第5期2449-2479,共31页
The rapid expansion of Internet of Things(IoT)networks has introduced challenges in network management,primarily in maintaining energy efficiency and robust connectivity across an increasing array of devices.This pape... The rapid expansion of Internet of Things(IoT)networks has introduced challenges in network management,primarily in maintaining energy efficiency and robust connectivity across an increasing array of devices.This paper introduces the Adaptive Blended Marine Predators Algorithm(AB-MPA),a novel optimization technique designed to enhance Quality of Service(QoS)in IoT systems by dynamically optimizing network configurations for improved energy efficiency and stability.Our results represent significant improvements in network performance metrics such as energy consumption,throughput,and operational stability,indicating that AB-MPA effectively addresses the pressing needs ofmodern IoT environments.Nodes are initiated with 100 J of stored energy,and energy is consumed at 0.01 J per square meter in each node to emphasize energy-efficient networks.The algorithm also provides sufficient network lifetime extension to a resourceful 7000 cycles for up to 200 nodes with a maximum Packet Delivery Ratio(PDR)of 99% and a robust network throughput of up to 1800 kbps in more compact node configurations.This study proposes a viable solution to a critical problem and opens avenues for further research into scalable network management for diverse applications. 展开更多
关键词 Internet of things trust energy marine predators algorithm(MPA) differential evolution(DE) NODES throughput lifetime
在线阅读 下载PDF
A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles
10
作者 Meng-Hua Yen Nilamadhab Mishra +1 位作者 Win-Jet Luo Chu-En Lin 《Computers, Materials & Continua》 2025年第2期1839-1855,共17页
The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it... The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it possible for these devices to communicate with one another.Technologies featured in the IoE include embedding,networking,and sensing devices.To achieve the intended results of the IoE and ease life for everyone involved,sensing devices and monitoring systems are linked together.The IoE is used in several contexts,including intelligent cars’protection,navigation,security,and fuel efficiency.The Smart Things Monitoring System(STMS)framework,which has been proposed for early occurrence identification and theft prevention,is discussed in this article.The STMS uses technologies based on the IoE and PLAs to continuously and remotely observe,control,and monitor vehicles.The STMS is familiar with the platform used by the global positioning system;as a result,the STMS can maintain a real-time record of current vehicle positions.This information is utilized to locate the vehicle in an accident or theft.The findings of the STMS system are promising for precisely identifying crashes,evaluating incident severity,and locating vehicles after collisions have occurred.Moreover,we formulate an ad hoc STMS network communication scenario to evaluate the efficacy of data communication by utilizing various network parameters,such as round-trip time(RTT),data packet transmission,data packet reception,and loss.From our experimentation,we obtained an improved communication efficiency for STMS across multiple PLAs compared to the standard greedy routing and traditional AODV approaches.Our framework facilitates adaptable solutions with communication competence by deploying Proactive PLAs in a cloud-connected smart vehicular environment. 展开更多
关键词 Artificial intelligence(AI) proactive AI-based learning agents(PLA) internet of everything(IoE) smart things monitoring system(STMS) cloud processing system driving monitoring assistance system(MAS) smart vehicles
在线阅读 下载PDF
A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things(IoTs) 被引量:1
11
作者 Kanwal Imran Nasreen Anjum +3 位作者 Abdullah Alghamdi Asadullah Shaikh Mohammed Hamdi Saeed Mahfooz 《Computers, Materials & Continua》 SCIE EI 2022年第1期1033-1052,共20页
IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to ... IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard,thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network.The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES(Advanced Encryption Standard),but the 6LoWPANstandard lacks and has omitted the security and privacy requirements at higher layers.The sensor nodes in 6LoWPANcan join the network without requiring the authentication procedure.Therefore,from security perspectives,6LoWPAN is vulnerable to many attacks such as replay attack,Man-in-the-Middle attack,Impersonation attack,and Modification attack.This paper proposes a secure and efficient cluster-based authentication scheme(CBAS)for highly constrained sensor nodes in 6LoWPAN.In this approach,sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node.The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes.To ensure the low signaling overhead during the registration,authentication,and handover procedures,we also introduce lightweight and efficient registration,de-registration,initial authentication,and handover procedures,when a sensor node or group of sensor nodes join or leave a cluster.Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.Our simulation experiments show that CBAS has reduced the registration delay by 11%,handoff authentication delay by 32%,and signaling cost by 37%compared to the SGMS(Secure GroupMobility Scheme)and LAMS(Light-Wight Authentication&Mobility Scheme). 展开更多
关键词 IOT cyber security security attacks authentication delay handover delay signaling cost 6LoWPAN
在线阅读 下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
12
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
在线阅读 下载PDF
IoTSAMS: A Novel Framework for Internet of Things (IoT) Based Smart Attendance Management System
13
作者 Farzana Akter Amatul Bushra Akhi +2 位作者 Nusrat Jahan Farin Md. Mohsin Khondoker Md. Golam Saklayen 《Intelligent Control and Automation》 2018年第3期74-84,共11页
Automated attendance management system will reduce complexity by eliminating plenty of manual processes involved in attendance system and calculating hours attended. This paper presents a simple technique of taking st... Automated attendance management system will reduce complexity by eliminating plenty of manual processes involved in attendance system and calculating hours attended. This paper presents a simple technique of taking student attendance in the form of an Internet of Things (IoT) based system that records the attendance using fingerprint-based system and stores them securely in a database. We use NodeMCUV3, RFID Module and Fingerprint sensor module in our system. The fingerprint module is responsible for authentication of the students. RFID Module is used to scan the RFID tag and sends data to the central server. By using this information, the system will generate an attendance report which can be accessed for further use. 展开更多
关键词 Automated ATTENDANCE Arduino FINGERPRINT Module IOT RFID TAG and READER
在线阅读 下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach 被引量:1
14
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
在线阅读 下载PDF
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions 被引量:1
15
作者 Nur Mohammad Rabeya Khatoon +3 位作者 Sadia Islam Nilima Jahanara Akter Md Kamruzzaman Hasan Mahmud Sozib 《Journal of Computer and Communications》 2024年第8期257-277,共21页
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device... The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand. 展开更多
关键词 IOT SECURITY PRIVACY Blockchain Technologies Layered Perspective
在线阅读 下载PDF
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning 被引量:1
16
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network Internet of Medical things(IoMT) multi-access edge computing(MEC)
在线阅读 下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
17
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of things(IoT) Internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
在线阅读 下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
18
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
在线阅读 下载PDF
A Few-Shot Learning-Based Automatic Modulation Classification Method for Internet of Things
19
作者 Aer Sileng Qi Chenhao 《China Communications》 SCIE CSCD 2024年第8期18-29,共12页
Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve it... Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods. 展开更多
关键词 automatic modulation classification(AMC) deep learning(DL) few-shot learning Internet of things(IoT)
在线阅读 下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
20
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部