首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
RTP transport in IoT MQTT topologies 物联网MQTT拓扑中的RTP传输
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.02.001
Rolando Herrero

Media transmission in the context of constrained IoT devices is of critical importance to support several solutions that enable interaction with the physical environment. This includes solutions that range from scenarios of occupancy estimation in building automation to traditional audio and image processing in remote sensing. Many modern access side IoT networks follow Event Driven Architecture (EDA) topologies that rely on brokers to forward messages between endpoints. The Message Queuing Telemetry Transport (MQTT) is one such protocol that can be used to encapsulate well known Real Time Protocol (RTP) audio and media packets. Unfortunately, MQTT relies on TCP transport that is not well suited in IoT constrained environments. This paper introduces a scheme that leverages some of the MQTT features to enable the reliable transmission of media in the context of Lossy Low Power Networks (LLNs). Specifically, this scheme is presented, analyzed, optimized and compared against other state-of-the-art mechanisms.

在受限物联网设备的背景下,媒体传输对于支持几种能够与物理环境交互的解决方案至关重要。这包括从楼宇自动化中的占用估计场景到遥感中的传统音频和图像处理的解决方案。许多现代访问端物联网网络遵循事件驱动架构(EDA)拓扑,依赖代理在端点之间转发消息。消息队列遥测传输(MQTT)就是这样一种协议,可用于封装众所周知的实时协议(RTP)音频和媒体数据包。不幸的是,MQTT依赖于TCP传输,不太适合物联网受限的环境。本文介绍了一种利用MQTT的一些特性在有损低功耗网络(lln)环境下实现媒体可靠传输的方案。具体而言,对该方案进行了介绍、分析、优化,并与其他先进机构进行了比较。
{"title":"RTP transport in IoT MQTT topologies","authors":"Rolando Herrero","doi":"10.1016/j.iotcps.2023.02.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.02.001","url":null,"abstract":"<div><p>Media transmission in the context of constrained IoT devices is of critical importance to support several solutions that enable interaction with the physical environment. This includes solutions that range from scenarios of occupancy estimation in building automation to traditional audio and image processing in remote sensing. Many modern access side IoT networks follow <em>Event Driven Architecture</em> (EDA) topologies that rely on brokers to forward messages between endpoints. The <em>Message Queuing Telemetry Transport</em> (MQTT) is one such protocol that can be used to encapsulate well known <em>Real Time Protocol</em> (RTP) audio and media packets. Unfortunately, MQTT relies on TCP transport that is not well suited in IoT constrained environments. This paper introduces a scheme that leverages some of the MQTT features to enable the reliable transmission of media in the context of <em>Lossy Low Power Networks</em> (LLNs). Specifically, this scheme is presented, analyzed, optimized and compared against other state-of-the-art mechanisms.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 37-44"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions 物联网系统联合学习的安全性:问题、限制、挑战和解决方案
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.001
Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman

Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a reputation for not only building Machine Learning (ML) models that rely on distributed datasets, but also for starting to play a key role in security and privacy solutions to protect sensitive data and information from a variety of ML-related attacks. This made it an ideal choice for emerging networks such as Internet of Things (IoT) systems, especially with its state-of-the-art algorithms that focus on their practical use over IoT networks, despite the presence of resource-constrained devices. However, the heterogeneous nature of the current devices and models in complex IoT networks has seriously hindered the FL training process's ability to perform well. Thus, rendering it almost unsuitable for direct deployment over IoT networks despite ongoing efforts to tackle this issue and overcome this challenging obstacle. As a result, the main characteristics of FL in the IoT from both security and privacy aspects are presented in this study. We broaden our research to investigate and analyze cutting-edge FL algorithms, models, and protocols, with a focus on their efficacy and practical application across IoT networks and systems alike. This is followed by a comparative analysis of the recently available protection solutions for FL that can be based on cryptographic and non-cryptographic solutions over heterogeneous, dynamic IoT networks. Moreover, the proposed work provides a list of suggestions and recommendations that can be applied to enhance the effectiveness of the adoption of FL and to achieve higher robustness against attacks, especially in heterogeneous dynamic IoT networks and in the presence of resource-constrained devices.

联邦学习(FL,或协作学习(CL))不仅因为构建依赖于分布式数据集的机器学习(ML)模型而获得了声誉,而且还开始在安全和隐私解决方案中发挥关键作用,以保护敏感数据和信息免受各种ML相关攻击。这使其成为物联网(IoT)系统等新兴网络的理想选择,特别是其最先进的算法,专注于其在物联网网络上的实际应用,尽管存在资源受限的设备。然而,复杂物联网网络中当前设备和模型的异构性严重阻碍了FL训练过程的良好执行能力。因此,尽管正在努力解决这一问题并克服这一具有挑战性的障碍,但它几乎不适合直接部署在物联网网络上。因此,本研究从安全和隐私方面介绍了物联网中FL的主要特征。我们扩大研究范围,调查和分析前沿的FL算法、模型和协议,重点关注它们在物联网网络和系统中的功效和实际应用。随后对最近可用的FL保护解决方案进行了比较分析,这些解决方案可以基于异构动态物联网网络上的加密和非加密解决方案。此外,拟议的工作提供了一系列建议和建议,可用于提高采用FL的有效性,并实现更高的抗攻击鲁棒性,特别是在异构动态物联网网络和资源受限设备的存在中。
{"title":"Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions","authors":"Jean-Paul A. Yaacoub ,&nbsp;Hassan N. Noura ,&nbsp;Ola Salman","doi":"10.1016/j.iotcps.2023.04.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.001","url":null,"abstract":"<div><p>Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a reputation for not only building Machine Learning (ML) models that rely on distributed datasets, but also for starting to play a key role in security and privacy solutions to protect sensitive data and information from a variety of ML-related attacks. This made it an ideal choice for emerging networks such as Internet of Things (IoT) systems, especially with its state-of-the-art algorithms that focus on their practical use over IoT networks, despite the presence of resource-constrained devices. However, the heterogeneous nature of the current devices and models in complex IoT networks has seriously hindered the FL training process's ability to perform well. Thus, rendering it almost unsuitable for direct deployment over IoT networks despite ongoing efforts to tackle this issue and overcome this challenging obstacle. As a result, the main characteristics of FL in the IoT from both security and privacy aspects are presented in this study. We broaden our research to investigate and analyze cutting-edge FL algorithms, models, and protocols, with a focus on their efficacy and practical application across IoT networks and systems alike. This is followed by a comparative analysis of the recently available protection solutions for FL that can be based on cryptographic and non-cryptographic solutions over heterogeneous, dynamic IoT networks. Moreover, the proposed work provides a list of suggestions and recommendations that can be applied to enhance the effectiveness of the adoption of FL and to achieve higher robustness against attacks, especially in heterogeneous dynamic IoT networks and in the presence of resource-constrained devices.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 155-179"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT: Communication protocols and security threats 物联网:通信协议和安全威胁
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2022.12.003
Apostolos Gerodimos , Leandros Maglaras , Mohamed Amine Ferrag , Nick Ayres , Ioanna Kantzavelou

In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.

在本研究中,我们回顾了物联网架构的基本原理,并全面介绍了专门为物联网技术发明的通信协议。此外,我们还分析了安全威胁和一般实施问题,提出了可以从物联网发展中获益最多的几个部门。对本次审查结果的讨论揭示了开放的问题和挑战,并规定了在安全框架中扩展和支持物联网系统所需的下一步步骤。
{"title":"IoT: Communication protocols and security threats","authors":"Apostolos Gerodimos ,&nbsp;Leandros Maglaras ,&nbsp;Mohamed Amine Ferrag ,&nbsp;Nick Ayres ,&nbsp;Ioanna Kantzavelou","doi":"10.1016/j.iotcps.2022.12.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.003","url":null,"abstract":"<div><p>In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 1-13"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas 为集水区基于lorawan的物联网洪水监测和预警系统开发智能传感单元
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.005
Muhammad Izzat Zakaria , Waheb A. Jabbar , Noorazliza Sulaiman

This study introduces a novel flood monitoring and warning system (FMWS) that leverages the capabilities of long-range wide area networks (LoRaWAN) to maintain extensive network connectivity, consume minimal power, and utilize low data transmission rates. We developed a new algorithm to measure and monitor flood levels and rate changes effectively. The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. The solar-powered system functions as a stand-alone beacon, notifying individuals and authorities of changing conditions. Consequently, the proposed LoRaWAN-based FMWS gathers information from catchment areas according to water level risks, triggering early flood warnings and sending them to authorities and residents via the mobile application and multiple web-based dashboards for proactive measures. The system's effectiveness and functionality are demonstrated through real-life implementation. Additionally, we evaluated the performance of the LoRa/LoRaWAN communication interface in terms of RSSI, SNR, PDR, and delay for two spreading factors (SF7 and SF12). The system's design allows for future expansion, enabling simultaneous data reporting from multiple sensor monitoring units to a server via a central gateway as a network.

本研究介绍了一种新的洪水监测和预警系统(FMWS),该系统利用远程广域网(LoRaWAN)的功能来保持广泛的网络连接,消耗最小的功率,并利用低数据传输速率。我们开发了一种新的算法来有效地测量和监测洪水水位和速率变化。创新,经济高效,用户友好的FMWS采用HC-SR04超声波传感器与Arduino微控制器来测量洪水水位并确定其状态。有关洪水水位和相关风险级别(安全、警报、谨慎或危险)的实时数据在The Things Network上更新,并通过定制的LoRaWAN网关集成到TagoIO和ThingSpeak物联网平台中。太阳能供电系统作为一个独立的信标,通知个人和当局变化的情况。因此,拟议中的基于lorawan的FMWS根据水位风险从集水区收集信息,触发早期洪水预警,并通过移动应用程序和多个基于网络的仪表板将其发送给当局和居民,以采取积极措施。通过实际应用验证了系统的有效性和功能性。此外,我们从RSSI、信噪比、PDR和两个扩频因子(SF7和SF12)的延迟方面评估了LoRa/LoRaWAN通信接口的性能。该系统的设计允许未来扩展,能够同时从多个传感器监测单元通过中央网关作为网络向服务器报告数据。
{"title":"Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas","authors":"Muhammad Izzat Zakaria ,&nbsp;Waheb A. Jabbar ,&nbsp;Noorazliza Sulaiman","doi":"10.1016/j.iotcps.2023.04.005","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.005","url":null,"abstract":"<div><p>This study introduces a novel flood monitoring and warning system (FMWS) that leverages the capabilities of long-range wide area networks (LoRaWAN) to maintain extensive network connectivity, consume minimal power, and utilize low data transmission rates. We developed a new algorithm to measure and monitor flood levels and rate changes effectively. The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. The solar-powered system functions as a stand-alone beacon, notifying individuals and authorities of changing conditions. Consequently, the proposed LoRaWAN-based FMWS gathers information from catchment areas according to water level risks, triggering early flood warnings and sending them to authorities and residents via the mobile application and multiple web-based dashboards for proactive measures. The system's effectiveness and functionality are demonstrated through real-life implementation. Additionally, we evaluated the performance of the LoRa/LoRaWAN communication interface in terms of RSSI, SNR, PDR, and delay for two spreading factors (SF7 and SF12). The system's design allows for future expansion, enabling simultaneous data reporting from multiple sensor monitoring units to a server via a central gateway as a network.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 249-261"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A systematic review on the current research of digital twin in automotive application 系统综述了数字孪生在汽车应用中的研究现状
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.004
Shutong Deng , Liang Ling , Caizhi Zhang , Congbo Li , Tao Zeng , Kaiqing Zhang , Gang Guo

Digital Twin (DT) has been considered one of the most promising technologies promoting the development of the industry and has successfully achieved significant applications in many fields including national defense, intelligent manufacturing, smart cities, and so on. In addition, DT is gradually used in the research of automobiles which are necessary means of transportation in people's life. A systematic review of the definitions of DT and its applications in automotive-related fields reported in the literature is presented in this paper, with the overall goal to summarize almost all the related research achievements and stimulate innovative thinking. The digital twin, its structure, and its evolution are systematically reviewed. And all reviewed automotive applications of DT are divided into three categories: automotive industry, transportation, and batteries which is the research hotspot in the automotive field. Besides, these methods and ideas will be emphasized in this paper. Particularly, future development directions of digital twins in the automotive field are highlighted.

数字孪生技术(Digital Twin, DT)被认为是推动工业发展的最具前景的技术之一,在国防、智能制造、智慧城市等多个领域都取得了重要的应用。此外,DT也逐渐应用于人们生活中必不可少的交通工具汽车的研究中。本文系统回顾了文献报道的DT定义及其在汽车相关领域的应用,总体目标是总结几乎所有相关的研究成果,激发创新思维。数字孪生,它的结构,它的演变系统地审查。并将其在汽车领域的应用分为汽车工业、交通运输和电池三大类,这是汽车领域的研究热点。此外,本文还将着重介绍这些方法和思想。特别强调了数字孪生在汽车领域的未来发展方向。
{"title":"A systematic review on the current research of digital twin in automotive application","authors":"Shutong Deng ,&nbsp;Liang Ling ,&nbsp;Caizhi Zhang ,&nbsp;Congbo Li ,&nbsp;Tao Zeng ,&nbsp;Kaiqing Zhang ,&nbsp;Gang Guo","doi":"10.1016/j.iotcps.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.004","url":null,"abstract":"<div><p>Digital Twin (DT) has been considered one of the most promising technologies promoting the development of the industry and has successfully achieved significant applications in many fields including national defense, intelligent manufacturing, smart cities, and so on. In addition, DT is gradually used in the research of automobiles which are necessary means of transportation in people's life. A systematic review of the definitions of DT and its applications in automotive-related fields reported in the literature is presented in this paper, with the overall goal to summarize almost all the related research achievements and stimulate innovative thinking. The digital twin, its structure, and its evolution are systematically reviewed. And all reviewed automotive applications of DT are divided into three categories: automotive industry, transportation, and batteries which is the research hotspot in the automotive field. Besides, these methods and ideas will be emphasized in this paper. Particularly, future development directions of digital twins in the automotive field are highlighted.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 180-191"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A blockchain-based decentralized collaborative learning model for reliable energy digital twins 一种基于区块链的分散协作学习模型,用于可靠的能源数字孪生
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.01.003
Liang Qiao , Zhihan Lv

This paper proposes a blockchain-based decentralized collaborative learning method for the Industrial Internet environment to solve the trust and security issues in Federated Learning. Deploy a decentralized network for collaborative learning based on the alliance chain, design a block data structure suitable for asynchronous learning, and model three stages of computing event triggering, computing task distribution, and computing result integration for cross-domain device collaborative learning. List the critical steps for network deployment, including inspection, tearing down old networks, creating organizational encryption material, creating channels, and deploying chaincode. It also introduces the development of crucial chaincode such as initialization, creation, query, and modification. Finally, the correlation between the number of data pieces of the network, the number of communications, and the time of communications are analyzed through experiments. This paper also proposes a decentralized asynchronous collaborative learning algorithm, develops chaincode middleware between the blockchain network and Artificial Intelligence training, and conducts experimental analysis on the industrial steam volume prediction data set in thermal power generation. The performance on the data set, and the experimental results prove that the asynchronous collaborative learning algorithm proposed in this paper can achieve a good convergence effect. It is also compared with the single-machine single-card regression prediction algorithm, proving that the proposed model has better generalization.

为解决联邦学习中的信任和安全问题,提出了一种基于区块链的工业互联网环境下的去中心化协同学习方法。部署基于联盟链的去中心化协同学习网络,设计适合异步学习的块数据结构,对跨域设备协同学习的计算事件触发、计算任务分配、计算结果集成三个阶段进行建模。列出网络部署的关键步骤,包括检查、拆除旧网络、创建组织加密材料、创建通道和部署链码。还介绍了关键链码的开发,如初始化、创建、查询和修改。最后,通过实验分析了网络数据块数、通信次数和通信时间之间的相关性。本文还提出了一种去中心化异步协同学习算法,开发了区块链网络与人工智能训练之间的链码中间件,并对火力发电工业蒸汽量预测数据集进行了实验分析。在数据集上的性能和实验结果都证明了本文提出的异步协同学习算法能够取得良好的收敛效果。并与单机单卡回归预测算法进行了比较,证明了该模型具有更好的泛化性。
{"title":"A blockchain-based decentralized collaborative learning model for reliable energy digital twins","authors":"Liang Qiao ,&nbsp;Zhihan Lv","doi":"10.1016/j.iotcps.2023.01.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.01.003","url":null,"abstract":"<div><p>This paper proposes a blockchain-based decentralized collaborative learning method for the Industrial Internet environment to solve the trust and security issues in Federated Learning. Deploy a decentralized network for collaborative learning based on the alliance chain, design a block data structure suitable for asynchronous learning, and model three stages of computing event triggering, computing task distribution, and computing result integration for cross-domain device collaborative learning. List the critical steps for network deployment, including inspection, tearing down old networks, creating organizational encryption material, creating channels, and deploying chaincode. It also introduces the development of crucial chaincode such as initialization, creation, query, and modification. Finally, the correlation between the number of data pieces of the network, the number of communications, and the time of communications are analyzed through experiments. This paper also proposes a decentralized asynchronous collaborative learning algorithm, develops chaincode middleware between the blockchain network and Artificial Intelligence training, and conducts experimental analysis on the industrial steam volume prediction data set in thermal power generation. The performance on the data set, and the experimental results prove that the asynchronous collaborative learning algorithm proposed in this paper can achieve a good convergence effect. It is also compared with the single-machine single-card regression prediction algorithm, proving that the proposed model has better generalization.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 45-51"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ChatGPT: A comprehensive review on background, applications, key challenges, bias, ethics, limitations and future scope ChatGPT:对背景、应用、关键挑战、偏见、伦理、局限性和未来范围的全面审查
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.003
Partha Pratim Ray

In recent years, artificial intelligence (AI) and machine learning have been transforming the landscape of scientific research. Out of which, the chatbot technology has experienced tremendous advancements in recent years, especially with ChatGPT emerging as a notable AI language model. This comprehensive review delves into the background, applications, key challenges, and future directions of ChatGPT. We begin by exploring its origins, development, and underlying technology, before examining its wide-ranging applications across industries such as customer service, healthcare, and education. We also highlight the critical challenges that ChatGPT faces, including ethical concerns, data biases, and safety issues, while discussing potential mitigation strategies. Finally, we envision the future of ChatGPT by exploring areas of further research and development, focusing on its integration with other technologies, improved human-AI interaction, and addressing the digital divide. This review offers valuable insights for researchers, developers, and stakeholders interested in the ever-evolving landscape of AI-driven conversational agents. This study explores the various ways ChatGPT has been revolutionizing scientific research, spanning from data processing and hypothesis generation to collaboration and public outreach. Furthermore, the paper examines the potential challenges and ethical concerns surrounding the use of ChatGPT in research, while highlighting the importance of striking a balance between AI-assisted innovation and human expertise. The paper presents several ethical issues in existing computing domain and how ChatGPT can invoke challenges to such notion. This work also includes some biases and limitations of ChatGPT. It is worth to note that despite of several controversies and ethical concerns, ChatGPT has attracted remarkable attentions from academia, research, and industries in a very short span of time.

近年来,人工智能(AI)和机器学习正在改变科学研究的格局。其中,聊天机器人技术近年来取得了巨大的进步,尤其是ChatGPT作为一种引人注目的人工智能语言模型。本文对ChatGPT的背景、应用、主要挑战和未来发展方向进行了全面的探讨。我们首先探讨它的起源、发展和底层技术,然后研究它在客户服务、医疗保健和教育等行业的广泛应用。我们还强调了ChatGPT面临的关键挑战,包括伦理问题、数据偏差和安全问题,同时讨论了潜在的缓解策略。最后,我们展望ChatGPT的未来,探索进一步的研究和开发领域,专注于与其他技术的集成,改善人类与人工智能的互动,并解决数字鸿沟。这篇综述为研究人员、开发人员和对人工智能驱动的对话代理的不断发展的前景感兴趣的利益相关者提供了有价值的见解。本研究探讨了ChatGPT从数据处理和假设生成到协作和公众推广等各种方式对科学研究的革命性影响。此外,本文还研究了在研究中使用ChatGPT的潜在挑战和伦理问题,同时强调了在人工智能辅助创新和人类专业知识之间取得平衡的重要性。本文提出了现有计算领域的几个伦理问题,以及ChatGPT如何对这些概念提出挑战。这项工作也包含了ChatGPT的一些偏差和局限性。值得注意的是,尽管存在一些争议和伦理问题,ChatGPT在很短的时间内引起了学术界、研究部门和工业界的极大关注。
{"title":"ChatGPT: A comprehensive review on background, applications, key challenges, bias, ethics, limitations and future scope","authors":"Partha Pratim Ray","doi":"10.1016/j.iotcps.2023.04.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.003","url":null,"abstract":"<div><p>In recent years, artificial intelligence (AI) and machine learning have been transforming the landscape of scientific research. Out of which, the chatbot technology has experienced tremendous advancements in recent years, especially with ChatGPT emerging as a notable AI language model. This comprehensive review delves into the background, applications, key challenges, and future directions of ChatGPT. We begin by exploring its origins, development, and underlying technology, before examining its wide-ranging applications across industries such as customer service, healthcare, and education. We also highlight the critical challenges that ChatGPT faces, including ethical concerns, data biases, and safety issues, while discussing potential mitigation strategies. Finally, we envision the future of ChatGPT by exploring areas of further research and development, focusing on its integration with other technologies, improved human-AI interaction, and addressing the digital divide. This review offers valuable insights for researchers, developers, and stakeholders interested in the ever-evolving landscape of AI-driven conversational agents. This study explores the various ways ChatGPT has been revolutionizing scientific research, spanning from data processing and hypothesis generation to collaboration and public outreach. Furthermore, the paper examines the potential challenges and ethical concerns surrounding the use of ChatGPT in research, while highlighting the importance of striking a balance between AI-assisted innovation and human expertise. The paper presents several ethical issues in existing computing domain and how ChatGPT can invoke challenges to such notion. This work also includes some biases and limitations of ChatGPT. It is worth to note that despite of several controversies and ethical concerns, ChatGPT has attracted remarkable attentions from academia, research, and industries in a very short span of time.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 121-154"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
A fatigue assessment method based on attention mechanism and surface electromyography 基于注意机制和表面肌电图的疲劳评估方法
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.03.002
Yukun Dang , Zitong Liu , Xixin Yang , Linqiang Ge , Sheng Miao

Surface electromyography (sEMG) signals can be used to quantitatively assess muscle fatigue, thereby directly and objectively reflecting the functional state of neuromuscular activity. Effective fatigue diagnosis can prevent muscle damage, thereby improving the safety of rehabilitation exercise. Traditional fatigue diagnosis has certain limitations, including strong subjectivity and poor accuracy. This paper designs a sEMG signals acquisition circuit and collects the sEMG signals of the upper limb biceps brachii and triceps brachii in the force-relaxation state in a dual-channel form. Muscle fatigue classification assessment using Dynamic Time Warping-K Nearest Neighbor (DTW-KNN) and three deep learning algorithms. The experimental results show that compared with traditional machine learning algorithms, deep learning algorithm can achieve higher accuracy and time efficiency. In addition, this study introduces an attention mechanism to dynamically and reasonably assign network weights to achieve high level feature learning. The Attention-Long Short-Term Memory (Attention Based LSTM) neural network achieves 93.5% assessment accuracy with a time overhead of only 3.73s, allowing for real-time assessment of muscle fatigue.

肌表电图(sEMG)信号可以定量评估肌肉疲劳,从而直接客观地反映神经肌肉活动的功能状态。有效的疲劳诊断可以预防肌肉损伤,从而提高康复运动的安全性。传统的疲劳诊断存在一定的局限性,主观性强,准确性差。本文设计了一种表面肌电信号采集电路,以双通道形式采集上肢肱二头肌和肱三头肌在力松弛状态下的表面肌电信号。基于动态时间扭曲- k最近邻(DTW-KNN)和三种深度学习算法的肌肉疲劳分类评估。实验结果表明,与传统的机器学习算法相比,深度学习算法可以达到更高的精度和时间效率。此外,本研究引入注意机制,动态合理分配网络权值,实现高层次的特征学习。注意-长短期记忆(Attention - Based LSTM)神经网络的评估准确率达到93.5%,时间开销仅为3.73秒,可以实时评估肌肉疲劳。
{"title":"A fatigue assessment method based on attention mechanism and surface electromyography","authors":"Yukun Dang ,&nbsp;Zitong Liu ,&nbsp;Xixin Yang ,&nbsp;Linqiang Ge ,&nbsp;Sheng Miao","doi":"10.1016/j.iotcps.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.03.002","url":null,"abstract":"<div><p>Surface electromyography (sEMG) signals can be used to quantitatively assess muscle fatigue, thereby directly and objectively reflecting the functional state of neuromuscular activity. Effective fatigue diagnosis can prevent muscle damage, thereby improving the safety of rehabilitation exercise. Traditional fatigue diagnosis has certain limitations, including strong subjectivity and poor accuracy. This paper designs a sEMG signals acquisition circuit and collects the sEMG signals of the upper limb biceps brachii and triceps brachii in the force-relaxation state in a dual-channel form. Muscle fatigue classification assessment using Dynamic Time Warping-K Nearest Neighbor (DTW-KNN) and three deep learning algorithms. The experimental results show that compared with traditional machine learning algorithms, deep learning algorithm can achieve higher accuracy and time efficiency. In addition, this study introduces an attention mechanism to dynamically and reasonably assign network weights to achieve high level feature learning. The Attention-Long Short-Term Memory (Attention Based LSTM) neural network achieves 93.5% assessment accuracy with a time overhead of only 3.73s, allowing for real-time assessment of muscle fatigue.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 112-120"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations 物联网的道德黑客:安全问题、挑战、解决方案和建议
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.002
Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman , Ali Chehab

In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.

近年来,针对各种物联网系统、网络、服务器、设备和应用的攻击急剧增加,特别是自2021年以来,物联网设备的数量达到358.2亿;到2025年,这一数字可能达到754.4亿。因此,针对物联网领域的安全相关攻击预计将进一步增加,其影响风险将严重影响底层物联网系统、网络、设备和应用。采用标准的安全(对抗)措施并不总是有效的,特别是在资源受限的物联网设备存在的情况下。因此,有必要在物联网系统层面进行渗透测试。然而,主要问题是物联网由各种各样的物联网设备、固件、硬件、软件、应用程序/web服务器、网络和通信协议组成。因此,为了减少这些攻击对物联网系统的影响,强烈建议在物联网的不同层面(终端设备、基础设施和用户)进行定期渗透测试和道德黑客模拟,这可以被视为一种合适的解决方案。因此,本文的重点是通过道德黑客方法和工具来解释、分析和评估物联网系统中安全漏洞的技术和非技术方面。这将提供可根据评估的风险采用的实用安全解决方案。此过程可被视为模拟攻击,目的是识别任何物联网实体(终端设备、网关或服务器)或固件中的任何可利用漏洞或/和安全漏洞。
{"title":"Ethical hacking for IoT: Security issues, challenges, solutions and recommendations","authors":"Jean-Paul A. Yaacoub ,&nbsp;Hassan N. Noura ,&nbsp;Ola Salman ,&nbsp;Ali Chehab","doi":"10.1016/j.iotcps.2023.04.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.002","url":null,"abstract":"<div><p>In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 280-308"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Consensus mechanism for software-defined blockchain in internet of things 物联网中软件定义区块链的共识机制
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2022.12.004
Ruihang Huang , Xiaoming Yang , P. Ajay

This article aims to discuss the consensus mechanism of software-defined blockchain in the Internet of Things, analyze the characteristics of the traditional consensus mechanism algorithms, on the basis of comparing the advantages of each model, the traditional consensus mechanism algorithm is improved. Later, a supervisable consensus scheme based on improved DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance) was proposed. In the context of the development of the Internet of Things technology, the decentralized distributed computing paradigm is used to improve the blockchain smart contract technology, and the DPOS blockchain consensus mechanism is optimized based on the DPOS protocol of the credit model. In addition, through the dynamic grouping algorithm of credibility, the research ranks the credit level of the consensus nodes of the blockchain network, thus further realizing the supervision of the Internet of Things system. The results of the case analysis show that the success rate of the mechanism algorithm can still be maintained at about 97% after 3000 user requests, the maximum delay remains below 8s after 3000 user requests, the minimum delay is always around 3s, the average delay is 2.38s, the overall performance of the algorithm is superior. It can ensure the final consistency of data transmission of each node in the Internet of Things, the research on the blockchain consensus mechanism in the Internet of Things has practical reference value.

本文旨在探讨物联网中软件定义区块链的共识机制,分析传统共识机制算法的特点,在比较各模型优势的基础上,对传统共识机制算法进行改进。随后,提出了一种基于改进DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance)的可监督共识方案。在物联网技术发展的背景下,采用去中心化的分布式计算范式对区块链智能合约技术进行改进,并基于信用模型的DPOS协议对DPOS区块链共识机制进行优化。此外,本研究通过可信度动态分组算法,对区块链网络共识节点的信用等级进行排序,从而进一步实现对物联网系统的监管。案例分析结果表明,该机制算法在3000个用户请求后成功率仍能保持在97%左右,在3000个用户请求后最大延迟保持在8s以下,最小延迟始终在3s左右,平均延迟为2.38s,算法整体性能优越。它可以保证物联网中各节点数据传输的最终一致性,对物联网中区块链共识机制的研究具有实用的参考价值。
{"title":"Consensus mechanism for software-defined blockchain in internet of things","authors":"Ruihang Huang ,&nbsp;Xiaoming Yang ,&nbsp;P. Ajay","doi":"10.1016/j.iotcps.2022.12.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.004","url":null,"abstract":"<div><p>This article aims to discuss the consensus mechanism of software-defined blockchain in the Internet of Things, analyze the characteristics of the traditional consensus mechanism algorithms, on the basis of comparing the advantages of each model, the traditional consensus mechanism algorithm is improved. Later, a supervisable consensus scheme based on improved DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance) was proposed. In the context of the development of the Internet of Things technology, the decentralized distributed computing paradigm is used to improve the blockchain smart contract technology, and the DPOS blockchain consensus mechanism is optimized based on the DPOS protocol of the credit model. In addition, through the dynamic grouping algorithm of credibility, the research ranks the credit level of the consensus nodes of the blockchain network, thus further realizing the supervision of the Internet of Things system. The results of the case analysis show that the success rate of the mechanism algorithm can still be maintained at about 97% after 3000 user requests, the maximum delay remains below 8s after 3000 user requests, the minimum delay is always around 3s, the average delay is 2.38s, the overall performance of the algorithm is superior. It can ensure the final consistency of data transmission of each node in the Internet of Things, the research on the blockchain consensus mechanism in the Internet of Things has practical reference value.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 52-60"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1