首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
IoT: Communication Protocols and Security Threats 物联网:通信协议和安全威胁
Pub Date : 2021-11-12 DOI: 10.20944/preprints202111.0214.v1
Apostolos K. Gerodimos, Leandros A. Maglaras, Nicholas Ayres
The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.
物联网被公认为未来技术最重要的领域之一,并受到广泛行业的广泛关注。虽然,从第一次发表文献(2002年)20年后,该技术(作为一个整体)尚未成熟。在本研究中,我们将通过解决这种有前途的技术的标准架构、漏洞和用例的问题,用一般方法回顾物联网的基础知识。此外,我们将回顾一些专门为物联网技术、安全威胁和一般实施挑战而发明的通信协议。
{"title":"IoT: Communication Protocols and Security Threats","authors":"Apostolos K. Gerodimos, Leandros A. Maglaras, Nicholas Ayres","doi":"10.20944/preprints202111.0214.v1","DOIUrl":"https://doi.org/10.20944/preprints202111.0214.v1","url":null,"abstract":"The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78763710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A framework for intelligent IoT firmware compliance testing 智能物联网固件合规性测试框架
Pub Date : 2021-01-01 DOI: 10.1016/j.iotcps.2021.07.001
Mohan Krishna Kagita , Giridhar Reddy Bojja , Mohammed Kaosar

The recent mass production and usage of the Internet of Things (IoT) have posed serious concerns due to the unavoidable security complications. The firmware of IoT systems is a critical component of IoT security. Although multiple organizations have released security guidelines, few IoT vendors are following these guidelines properly, either due to a lack of accountability or the availability of appropriate resources. Some tools for this purpose can use static, dynamic, or fuzzing techniques to test the security of IoT firmware, which may result in false positives or failure to discover vulnerabilities. Furthermore, the vast majority of resources are devoted to a single subject, such as networking protocols, web interfaces, or Internet of Things computer applications. This paper aims to present a novel method for conducting compliance testing and vulnerability evaluation on IoT system firmware, communication interfaces, and networking services using static and dynamic analysis. The proposed system detects a broad range of security bugs across a wide range of platforms and hardware architectures. To test and validate our prototype, we ran tests on 4300 firmware images and discovered 13,000+ compliance issues. This work, we believe, will be the first step toward developing a reliable automated compliance testing framework for the IoT manufacturing industry and other stakeholders.

最近,物联网(IoT)的大量生产和使用,由于不可避免的安全问题,引起了严重的担忧。物联网系统的固件是物联网安全的关键组成部分。尽管多个组织已经发布了安全指南,但由于缺乏问责制或适当资源的可用性,很少有物联网供应商正确地遵循这些指南。为此目的的一些工具可以使用静态、动态或模糊测试技术来测试物联网固件的安全性,这可能导致误报或无法发现漏洞。此外,绝大多数资源都用于单一主题,例如网络协议,web接口或物联网计算机应用程序。本文旨在提出一种利用静态和动态分析对物联网系统固件、通信接口和网络服务进行符合性测试和漏洞评估的新方法。该系统可以在各种平台和硬件架构中检测广泛的安全漏洞。为了测试和验证我们的原型,我们对4300个固件映像进行了测试,发现了13000多个遵从性问题。我们相信,这项工作将是为物联网制造业和其他利益相关者开发可靠的自动化合规测试框架的第一步。
{"title":"A framework for intelligent IoT firmware compliance testing","authors":"Mohan Krishna Kagita ,&nbsp;Giridhar Reddy Bojja ,&nbsp;Mohammed Kaosar","doi":"10.1016/j.iotcps.2021.07.001","DOIUrl":"10.1016/j.iotcps.2021.07.001","url":null,"abstract":"<div><p>The recent mass production and usage of the Internet of Things (IoT) have posed serious concerns due to the unavoidable security complications. The firmware of IoT systems is a critical component of IoT security. Although multiple organizations have released security guidelines, few IoT vendors are following these guidelines properly, either due to a lack of accountability or the availability of appropriate resources. Some tools for this purpose can use static, dynamic, or fuzzing techniques to test the security of IoT firmware, which may result in false positives or failure to discover vulnerabilities. Furthermore, the vast majority of resources are devoted to a single subject, such as networking protocols, web interfaces, or Internet of Things computer applications. This paper aims to present a novel method for conducting compliance testing and vulnerability evaluation on IoT system firmware, communication interfaces, and networking services using static and dynamic analysis. The proposed system detects a broad range of security bugs across a wide range of platforms and hardware architectures. To test and validate our prototype, we ran tests on 4300 firmware images and discovered 13,000+ compliance issues. This work, we believe, will be the first step toward developing a reliable automated compliance testing framework for the IoT manufacturing industry and other stakeholders.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.iotcps.2021.07.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"111599462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cyber Physical Systems: Analyses, challenges and possible solutions 网络物理系统:分析、挑战和可能的解决方案
Pub Date : 2021-01-01 DOI: 10.1016/j.iotcps.2021.12.002
Amit Kumar Tyagi , N. Sreenath

It is becoming more difficult to protect the authentication of our data in today's world of smart living. On the one hand, we are able to live in smart homes and smart cities with ease. Even if we use the most complicated passwords, we can't be sure that the Internet of Things and the Internet of Everything are safe. One way to make sure people and things are safe is to use Multi-Factor Authentication. Also, a big and complicated system needs more efficient and robust solutions for real, and strong, security, so this is important. There are a lot of smart ways to solve problems today. For this reason, the internet of things is being used in every possible field or application. This new ecosystem, which is called Cyber Physical Systems, was built by IoTs. Cyber-Physical Systems use computing, communication, and control to make new technology or the next generation of engineered systems. In the last decade, there has been a lot of work done on cyber physical systems that we didn't expect. There have been a lot of threats, challenges, and important issues in the last decade. We have a big problem with the security of CPS because the basic blocks used to make them are very different. Even if we're talking about natural gas systems or transportation systems or other automated systems, they all have something to do with CPS, no matter what. These days, CPSs systems are used for energy, transportation, the environment, and health care, among other things. This article talks about a number of problems that need to be solved by researchers and scientists (working related to respective area, i.e., CPS). As a result, this article also talks about a partial survey of important research issues, and an overview of several research projects that have been done in the last decade by a number of different people to improve CPS.

在当今智能生活的世界中,保护我们的数据身份验证变得越来越困难。一方面,我们可以轻松地生活在智能家居和智能城市中。即使我们使用最复杂的密码,我们也不能保证物联网和万物互联是安全的。确保人和物安全的一种方法是使用多因素身份验证。此外,一个庞大而复杂的系统需要更高效、更健壮的解决方案来实现真正的、强大的安全性,因此这一点很重要。现在有很多聪明的方法来解决问题。因此,物联网正在被应用于每一个可能的领域或应用。这个新的生态系统被称为网络物理系统,是由物联网建立的。信息物理系统使用计算、通信和控制来制造新技术或下一代工程系统。在过去的十年里,我们在网络物理系统上做了很多我们没有预料到的工作。在过去的十年里,有很多威胁、挑战和重要问题。我们在CPS的安全性上有一个很大的问题,因为用于制作它们的基本块非常不同。即使我们谈论的是天然气系统或运输系统或其他自动化系统,无论如何,它们都与CPS有关。如今,cps系统被用于能源、交通、环境和医疗保健等领域。本文讨论了研究人员和科学家(与各自领域相关的工作,即CPS)需要解决的一些问题。因此,本文还讨论了重要研究问题的部分调查,并概述了过去十年中由许多不同的人为改进CPS所做的几个研究项目。
{"title":"Cyber Physical Systems: Analyses, challenges and possible solutions","authors":"Amit Kumar Tyagi ,&nbsp;N. Sreenath","doi":"10.1016/j.iotcps.2021.12.002","DOIUrl":"10.1016/j.iotcps.2021.12.002","url":null,"abstract":"<div><p>It is becoming more difficult to protect the authentication of our data in today's world of smart living. On the one hand, we are able to live in smart homes and smart cities with ease. Even if we use the most complicated passwords, we can't be sure that the Internet of Things and the Internet of Everything are safe. One way to make sure people and things are safe is to use Multi-Factor Authentication. Also, a big and complicated system needs more efficient and robust solutions for real, and strong, security, so this is important. There are a lot of smart ways to solve problems today. For this reason, the internet of things is being used in every possible field or application. This new ecosystem, which is called Cyber Physical Systems, was built by IoTs. Cyber-Physical Systems use computing, communication, and control to make new technology or the next generation of engineered systems. In the last decade, there has been a lot of work done on cyber physical systems that we didn't expect. There have been a lot of threats, challenges, and important issues in the last decade. We have a big problem with the security of CPS because the basic blocks used to make them are very different. Even if we're talking about natural gas systems or transportation systems or other automated systems, they all have something to do with CPS, no matter what. These days, CPSs systems are used for energy, transportation, the environment, and health care, among other things. This article talks about a number of problems that need to be solved by researchers and scientists (working related to respective area, i.e., CPS). As a result, this article also talks about a partial survey of important research issues, and an overview of several research projects that have been done in the last decade by a number of different people to improve CPS.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 22-33"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000055/pdfft?md5=64c472bb257bee895b12206ef895dea3&pid=1-s2.0-S2667345221000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79638699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Sensible and secure IoT communication for digital twins, cyber twins, web twins 为数字双胞胎,网络双胞胎,网络双胞胎提供明智和安全的物联网通信
Pub Date : 2021-01-01 DOI: 10.1016/j.iotcps.2021.12.003
Hailin Feng , Dongliang Chen , Haibin Lv

In order to effectively solve the current security problems encountered by smart wireless terminals in the digital twin biological network, to ensure the stable and efficient operation of the wireless communication network. This research aims to reduce the interference attack in the communication network, an interference source location scheme based on Mobile Tracker in the communication process of the Internet of Things (IoT) is designed. Firstly, this paper improves Attribute-Based Encryption (ABE) to meet the security and overhead requirements of digital twin networking communication. The access control policy is used to encrypt a random key, and the symmetric encryption scheme is used to hide the key. In addition, in the proposed interference source location technology, the influence of observation noise is reduced based on the principle of unscented Kalman filter, and the estimated interference source location is modified by the interference source motion model. In order to further evaluate the performance of the method proposed as the interference source, this paper simulates the jamming attack scenario. The Root Mean Square Error (RMSE) value of the proposed algorithm is 0.245 ​m, which is better than the ErrMin algorithm (0.313 ​m), and the number of observation nodes of the proposed algorithm is less than half of the ErrMin algorithm. To sum up, satisfactory results can be achieved by taking the Jamming Signal Strength (JSS) information as the observation value and estimating the location of the interference source and other state information based on the untracked Kalman filter algorithm. This research has significant value for the secure communication of the digital twins in the IoT.

为了有效解决当前智能无线终端在数字孪生生物网络中遇到的安全问题,保证无线通信网络的稳定高效运行。本研究旨在减少通信网络中的干扰攻击,设计了一种基于移动跟踪器的物联网通信过程中的干扰源定位方案。首先,本文对基于属性的加密(ABE)进行了改进,以满足数字孪生网络通信的安全性和开销要求。访问控制策略用于加密随机密钥,对称加密方案用于隐藏密钥。此外,在本文提出的干扰源定位技术中,基于无气味卡尔曼滤波原理降低了观测噪声的影响,并通过干扰源运动模型对估计的干扰源定位进行修正。为了进一步评估该方法作为干扰源的性能,本文对干扰攻击场景进行了仿真。该算法的均方根误差(RMSE)值为0.245 m,优于ErrMin算法(0.313 m),且观测节点数小于ErrMin算法的一半。综上所述,以干扰信号强度(JSS)信息为观测值,基于无迹卡尔曼滤波算法估计干扰源位置和其他状态信息,可以获得满意的结果。该研究对物联网中数字孪生体的安全通信具有重要价值。
{"title":"Sensible and secure IoT communication for digital twins, cyber twins, web twins","authors":"Hailin Feng ,&nbsp;Dongliang Chen ,&nbsp;Haibin Lv","doi":"10.1016/j.iotcps.2021.12.003","DOIUrl":"10.1016/j.iotcps.2021.12.003","url":null,"abstract":"<div><p>In order to effectively solve the current security problems encountered by smart wireless terminals in the digital twin biological network, to ensure the stable and efficient operation of the wireless communication network. This research aims to reduce the interference attack in the communication network, an interference source location scheme based on Mobile Tracker in the communication process of the Internet of Things (IoT) is designed. Firstly, this paper improves Attribute-Based Encryption (ABE) to meet the security and overhead requirements of digital twin networking communication. The access control policy is used to encrypt a random key, and the symmetric encryption scheme is used to hide the key. In addition, in the proposed interference source location technology, the influence of observation noise is reduced based on the principle of unscented Kalman filter, and the estimated interference source location is modified by the interference source motion model. In order to further evaluate the performance of the method proposed as the interference source, this paper simulates the jamming attack scenario. The Root Mean Square Error (RMSE) value of the proposed algorithm is 0.245 ​m, which is better than the ErrMin algorithm (0.313 ​m), and the number of observation nodes of the proposed algorithm is less than half of the ErrMin algorithm. To sum up, satisfactory results can be achieved by taking the Jamming Signal Strength (JSS) information as the observation value and estimating the location of the interference source and other state information based on the untracked Kalman filter algorithm. This research has significant value for the secure communication of the digital twins in the IoT.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 34-44"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000067/pdfft?md5=21aa05f757dbeb4eb5c2137e1030b919&pid=1-s2.0-S2667345221000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80773922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
5G network slice for digital real-time healthcare system powered by network data analytics 5G网络切片,以网络数据分析为动力,用于数字实时医疗系统
Pub Date : 2021-01-01 DOI: 10.1016/j.iotcps.2021.12.001
Hemant Jain , Vinay Chamola , Yash Jain , Naren

In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband, and real-time biometric data analytics. These could potentially fulfill the requirements of an end-to-end digital healthcare system. For building such a system, there is also a need for a dedicated and specialized communication network. Such a system will not only support dynamic throughput, latency and payload but also provide guaranteed QoS (Quality of Service) at every instant. The motive of our study was to define an implementable low-level architecture for the digital healthcare system by using the 5G Network Slice that incorporates all these features. Best-in-class wearable devices will collect the biometric data and transmit it via the 5G network slice. Data analytics is then applied to the collected data to build a knowledge graph used for quick predictions and prescriptions. The architecture also keeps in mind the security and integrity aspects of healthcare data.

在COVID-19大流行之后,几乎整个全球医疗保健生态系统都在努力处理患者,很明显,医疗保健部门需要一个虚拟实时数字支持系统。最近的技术进步使机器对机器通信、增强的移动宽带和实时生物识别数据分析成为可能。这些可能会满足端到端数字医疗保健系统的需求。为了建立这样一个系统,还需要一个专用的、专门的通信网络。这样的系统不仅支持动态吞吐量、延迟和有效负载,而且在每个时刻都提供有保证的QoS(服务质量)。我们研究的动机是通过使用包含所有这些功能的5G网络切片,为数字医疗保健系统定义一个可实现的底层架构。一流的可穿戴设备将收集生物特征数据,并通过5G网络片传输。然后将数据分析应用于收集的数据,以构建用于快速预测和处方的知识图谱。该体系结构还考虑到医疗保健数据的安全性和完整性方面。
{"title":"5G network slice for digital real-time healthcare system powered by network data analytics","authors":"Hemant Jain ,&nbsp;Vinay Chamola ,&nbsp;Yash Jain ,&nbsp;Naren","doi":"10.1016/j.iotcps.2021.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2021.12.001","url":null,"abstract":"<div><p>In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband, and real-time biometric data analytics. These could potentially fulfill the requirements of an end-to-end digital healthcare system. For building such a system, there is also a need for a dedicated and specialized communication network. Such a system will not only support dynamic throughput, latency and payload but also provide guaranteed QoS (Quality of Service) at every instant. The motive of our study was to define an implementable low-level architecture for the digital healthcare system by using the 5G Network Slice that incorporates all these features. Best-in-class wearable devices will collect the biometric data and transmit it via the 5G network slice. Data analytics is then applied to the collected data to build a knowledge graph used for quick predictions and prescriptions. The architecture also keeps in mind the security and integrity aspects of healthcare data.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 14-21"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000043/pdfft?md5=4593c54a9728287439cc44167d513d6b&pid=1-s2.0-S2667345221000043-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134670775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A proactive role of IoT devices in building smart cities 物联网设备在智慧城市建设中的积极作用
Pub Date : 2021-01-01 DOI: 10.1016/j.iotcps.2021.08.001
Shahzad Ashraf

Due to rapid advancement in technology the world is rapidly changed to face the upcoming challenges and going towards automation. The use of various IoT devices is making a vast approach and every happening becomes part of the network and due to that towns are converting into smart cities. The IoT devices collect the data of every happening smartly and send it for further processing. An imperative part of these devices is containing the wireless sensors used for building smart cities. A giant set of data is collected in the sensors and is stored in the data center. Subsequently, the huge data becomes an exorbitant mountain that must be managed smartly if a smooth operation is required. In this study, how such big data can be managed shrewdly is going to explore and the proactive role of IoT sensors are investigated which helps in building the future smart cities more independently. The impact of services such as Smart transport, smart energy, smart infrastructure, smart health, smart agriculture, and smart recreation in respect of smart cities and the old traditional city has been analyzed through an Analytic Hierarchy Process (AHP). The obtained results showed a satisfactory level of local communities about 98% of people living in smart cities are satisfied in contrast to people living in old traditional cities and others having a neutral opinion.

由于技术的快速进步,世界正在迅速改变,以面对即将到来的挑战,并走向自动化。各种物联网设备的使用正在广泛开展,每一件事都成为网络的一部分,因此城镇正在转变为智能城市。物联网设备智能地收集每一件事的数据,并将其发送给进一步处理。这些设备的一个重要组成部分是包含用于建设智能城市的无线传感器。传感器收集了大量数据,并存储在数据中心。随后,庞大的数据变成了一座高得离谱的山,如果需要平稳运行,就必须对其进行明智的管理。在本研究中,我们将探索如何巧妙地管理这些大数据,并研究物联网传感器的主动作用,这有助于更独立地建设未来的智慧城市。通过层次分析法(AHP)分析了智能交通、智能能源、智能基础设施、智能健康、智能农业和智能娱乐等服务对智慧城市和旧传统城市的影响。所获得的结果显示,当地社区满意的水平,约98%的人生活在智慧城市是满意的,相比之下,人们生活在旧的传统城市和其他人有一个中立的意见。
{"title":"A proactive role of IoT devices in building smart cities","authors":"Shahzad Ashraf","doi":"10.1016/j.iotcps.2021.08.001","DOIUrl":"10.1016/j.iotcps.2021.08.001","url":null,"abstract":"<div><p>Due to rapid advancement in technology the world is rapidly changed to face the upcoming challenges and going towards automation. The use of various IoT devices is making a vast approach and every happening becomes part of the network and due to that towns are converting into smart cities. The IoT devices collect the data of every happening smartly and send it for further processing. An imperative part of these devices is containing the wireless sensors used for building smart cities. A giant set of data is collected in the sensors and is stored in the data center. Subsequently, the huge data becomes an exorbitant mountain that must be managed smartly if a smooth operation is required. In this study, how such big data can be managed shrewdly is going to explore and the proactive role of IoT sensors are investigated which helps in building the future smart cities more independently. The impact of services such as Smart transport, smart energy, smart infrastructure, smart health, smart agriculture, and smart recreation in respect of smart cities and the old traditional city has been analyzed through an Analytic Hierarchy Process (AHP). The obtained results showed a satisfactory level of local communities about 98% of people living in smart cities are satisfied in contrast to people living in old traditional cities and others having a neutral opinion.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 8-13"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.iotcps.2021.08.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90317507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1