Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.02.001
Rolando Herrero
Media transmission in the context of constrained IoT devices is of critical importance to support several solutions that enable interaction with the physical environment. This includes solutions that range from scenarios of occupancy estimation in building automation to traditional audio and image processing in remote sensing. Many modern access side IoT networks follow Event Driven Architecture (EDA) topologies that rely on brokers to forward messages between endpoints. The Message Queuing Telemetry Transport (MQTT) is one such protocol that can be used to encapsulate well known Real Time Protocol (RTP) audio and media packets. Unfortunately, MQTT relies on TCP transport that is not well suited in IoT constrained environments. This paper introduces a scheme that leverages some of the MQTT features to enable the reliable transmission of media in the context of Lossy Low Power Networks (LLNs). Specifically, this scheme is presented, analyzed, optimized and compared against other state-of-the-art mechanisms.
{"title":"RTP transport in IoT MQTT topologies","authors":"Rolando Herrero","doi":"10.1016/j.iotcps.2023.02.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.02.001","url":null,"abstract":"<div><p>Media transmission in the context of constrained IoT devices is of critical importance to support several solutions that enable interaction with the physical environment. This includes solutions that range from scenarios of occupancy estimation in building automation to traditional audio and image processing in remote sensing. Many modern access side IoT networks follow <em>Event Driven Architecture</em> (EDA) topologies that rely on brokers to forward messages between endpoints. The <em>Message Queuing Telemetry Transport</em> (MQTT) is one such protocol that can be used to encapsulate well known <em>Real Time Protocol</em> (RTP) audio and media packets. Unfortunately, MQTT relies on TCP transport that is not well suited in IoT constrained environments. This paper introduces a scheme that leverages some of the MQTT features to enable the reliable transmission of media in the context of <em>Lossy Low Power Networks</em> (LLNs). Specifically, this scheme is presented, analyzed, optimized and compared against other state-of-the-art mechanisms.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 37-44"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.04.001
Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman
Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a reputation for not only building Machine Learning (ML) models that rely on distributed datasets, but also for starting to play a key role in security and privacy solutions to protect sensitive data and information from a variety of ML-related attacks. This made it an ideal choice for emerging networks such as Internet of Things (IoT) systems, especially with its state-of-the-art algorithms that focus on their practical use over IoT networks, despite the presence of resource-constrained devices. However, the heterogeneous nature of the current devices and models in complex IoT networks has seriously hindered the FL training process's ability to perform well. Thus, rendering it almost unsuitable for direct deployment over IoT networks despite ongoing efforts to tackle this issue and overcome this challenging obstacle. As a result, the main characteristics of FL in the IoT from both security and privacy aspects are presented in this study. We broaden our research to investigate and analyze cutting-edge FL algorithms, models, and protocols, with a focus on their efficacy and practical application across IoT networks and systems alike. This is followed by a comparative analysis of the recently available protection solutions for FL that can be based on cryptographic and non-cryptographic solutions over heterogeneous, dynamic IoT networks. Moreover, the proposed work provides a list of suggestions and recommendations that can be applied to enhance the effectiveness of the adoption of FL and to achieve higher robustness against attacks, especially in heterogeneous dynamic IoT networks and in the presence of resource-constrained devices.
{"title":"Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions","authors":"Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman","doi":"10.1016/j.iotcps.2023.04.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.001","url":null,"abstract":"<div><p>Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a reputation for not only building Machine Learning (ML) models that rely on distributed datasets, but also for starting to play a key role in security and privacy solutions to protect sensitive data and information from a variety of ML-related attacks. This made it an ideal choice for emerging networks such as Internet of Things (IoT) systems, especially with its state-of-the-art algorithms that focus on their practical use over IoT networks, despite the presence of resource-constrained devices. However, the heterogeneous nature of the current devices and models in complex IoT networks has seriously hindered the FL training process's ability to perform well. Thus, rendering it almost unsuitable for direct deployment over IoT networks despite ongoing efforts to tackle this issue and overcome this challenging obstacle. As a result, the main characteristics of FL in the IoT from both security and privacy aspects are presented in this study. We broaden our research to investigate and analyze cutting-edge FL algorithms, models, and protocols, with a focus on their efficacy and practical application across IoT networks and systems alike. This is followed by a comparative analysis of the recently available protection solutions for FL that can be based on cryptographic and non-cryptographic solutions over heterogeneous, dynamic IoT networks. Moreover, the proposed work provides a list of suggestions and recommendations that can be applied to enhance the effectiveness of the adoption of FL and to achieve higher robustness against attacks, especially in heterogeneous dynamic IoT networks and in the presence of resource-constrained devices.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 155-179"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.
{"title":"IoT: Communication protocols and security threats","authors":"Apostolos Gerodimos , Leandros Maglaras , Mohamed Amine Ferrag , Nick Ayres , Ioanna Kantzavelou","doi":"10.1016/j.iotcps.2022.12.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.003","url":null,"abstract":"<div><p>In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 1-13"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.04.005
Muhammad Izzat Zakaria , Waheb A. Jabbar , Noorazliza Sulaiman
This study introduces a novel flood monitoring and warning system (FMWS) that leverages the capabilities of long-range wide area networks (LoRaWAN) to maintain extensive network connectivity, consume minimal power, and utilize low data transmission rates. We developed a new algorithm to measure and monitor flood levels and rate changes effectively. The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. The solar-powered system functions as a stand-alone beacon, notifying individuals and authorities of changing conditions. Consequently, the proposed LoRaWAN-based FMWS gathers information from catchment areas according to water level risks, triggering early flood warnings and sending them to authorities and residents via the mobile application and multiple web-based dashboards for proactive measures. The system's effectiveness and functionality are demonstrated through real-life implementation. Additionally, we evaluated the performance of the LoRa/LoRaWAN communication interface in terms of RSSI, SNR, PDR, and delay for two spreading factors (SF7 and SF12). The system's design allows for future expansion, enabling simultaneous data reporting from multiple sensor monitoring units to a server via a central gateway as a network.
本研究介绍了一种新的洪水监测和预警系统(FMWS),该系统利用远程广域网(LoRaWAN)的功能来保持广泛的网络连接,消耗最小的功率,并利用低数据传输速率。我们开发了一种新的算法来有效地测量和监测洪水水位和速率变化。创新,经济高效,用户友好的FMWS采用HC-SR04超声波传感器与Arduino微控制器来测量洪水水位并确定其状态。有关洪水水位和相关风险级别(安全、警报、谨慎或危险)的实时数据在The Things Network上更新,并通过定制的LoRaWAN网关集成到TagoIO和ThingSpeak物联网平台中。太阳能供电系统作为一个独立的信标,通知个人和当局变化的情况。因此,拟议中的基于lorawan的FMWS根据水位风险从集水区收集信息,触发早期洪水预警,并通过移动应用程序和多个基于网络的仪表板将其发送给当局和居民,以采取积极措施。通过实际应用验证了系统的有效性和功能性。此外,我们从RSSI、信噪比、PDR和两个扩频因子(SF7和SF12)的延迟方面评估了LoRa/LoRaWAN通信接口的性能。该系统的设计允许未来扩展,能够同时从多个传感器监测单元通过中央网关作为网络向服务器报告数据。
{"title":"Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas","authors":"Muhammad Izzat Zakaria , Waheb A. Jabbar , Noorazliza Sulaiman","doi":"10.1016/j.iotcps.2023.04.005","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.005","url":null,"abstract":"<div><p>This study introduces a novel flood monitoring and warning system (FMWS) that leverages the capabilities of long-range wide area networks (LoRaWAN) to maintain extensive network connectivity, consume minimal power, and utilize low data transmission rates. We developed a new algorithm to measure and monitor flood levels and rate changes effectively. The innovative, cost-effective, and user-friendly FMWS employs an HC-SR04 ultrasonic sensor with an Arduino microcontroller to measure flood levels and determine their status. Real-time data regarding flood levels and associated risk levels (safe, alert, cautious, or dangerous) are updated on The Things Network and integrated into TagoIO and ThingSpeak IoT platforms through a custom-built LoRaWAN gateway. The solar-powered system functions as a stand-alone beacon, notifying individuals and authorities of changing conditions. Consequently, the proposed LoRaWAN-based FMWS gathers information from catchment areas according to water level risks, triggering early flood warnings and sending them to authorities and residents via the mobile application and multiple web-based dashboards for proactive measures. The system's effectiveness and functionality are demonstrated through real-life implementation. Additionally, we evaluated the performance of the LoRa/LoRaWAN communication interface in terms of RSSI, SNR, PDR, and delay for two spreading factors (SF7 and SF12). The system's design allows for future expansion, enabling simultaneous data reporting from multiple sensor monitoring units to a server via a central gateway as a network.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 249-261"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.04.004
Shutong Deng , Liang Ling , Caizhi Zhang , Congbo Li , Tao Zeng , Kaiqing Zhang , Gang Guo
Digital Twin (DT) has been considered one of the most promising technologies promoting the development of the industry and has successfully achieved significant applications in many fields including national defense, intelligent manufacturing, smart cities, and so on. In addition, DT is gradually used in the research of automobiles which are necessary means of transportation in people's life. A systematic review of the definitions of DT and its applications in automotive-related fields reported in the literature is presented in this paper, with the overall goal to summarize almost all the related research achievements and stimulate innovative thinking. The digital twin, its structure, and its evolution are systematically reviewed. And all reviewed automotive applications of DT are divided into three categories: automotive industry, transportation, and batteries which is the research hotspot in the automotive field. Besides, these methods and ideas will be emphasized in this paper. Particularly, future development directions of digital twins in the automotive field are highlighted.
{"title":"A systematic review on the current research of digital twin in automotive application","authors":"Shutong Deng , Liang Ling , Caizhi Zhang , Congbo Li , Tao Zeng , Kaiqing Zhang , Gang Guo","doi":"10.1016/j.iotcps.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.004","url":null,"abstract":"<div><p>Digital Twin (DT) has been considered one of the most promising technologies promoting the development of the industry and has successfully achieved significant applications in many fields including national defense, intelligent manufacturing, smart cities, and so on. In addition, DT is gradually used in the research of automobiles which are necessary means of transportation in people's life. A systematic review of the definitions of DT and its applications in automotive-related fields reported in the literature is presented in this paper, with the overall goal to summarize almost all the related research achievements and stimulate innovative thinking. The digital twin, its structure, and its evolution are systematically reviewed. And all reviewed automotive applications of DT are divided into three categories: automotive industry, transportation, and batteries which is the research hotspot in the automotive field. Besides, these methods and ideas will be emphasized in this paper. Particularly, future development directions of digital twins in the automotive field are highlighted.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 180-191"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.01.003
Liang Qiao , Zhihan Lv
This paper proposes a blockchain-based decentralized collaborative learning method for the Industrial Internet environment to solve the trust and security issues in Federated Learning. Deploy a decentralized network for collaborative learning based on the alliance chain, design a block data structure suitable for asynchronous learning, and model three stages of computing event triggering, computing task distribution, and computing result integration for cross-domain device collaborative learning. List the critical steps for network deployment, including inspection, tearing down old networks, creating organizational encryption material, creating channels, and deploying chaincode. It also introduces the development of crucial chaincode such as initialization, creation, query, and modification. Finally, the correlation between the number of data pieces of the network, the number of communications, and the time of communications are analyzed through experiments. This paper also proposes a decentralized asynchronous collaborative learning algorithm, develops chaincode middleware between the blockchain network and Artificial Intelligence training, and conducts experimental analysis on the industrial steam volume prediction data set in thermal power generation. The performance on the data set, and the experimental results prove that the asynchronous collaborative learning algorithm proposed in this paper can achieve a good convergence effect. It is also compared with the single-machine single-card regression prediction algorithm, proving that the proposed model has better generalization.
{"title":"A blockchain-based decentralized collaborative learning model for reliable energy digital twins","authors":"Liang Qiao , Zhihan Lv","doi":"10.1016/j.iotcps.2023.01.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.01.003","url":null,"abstract":"<div><p>This paper proposes a blockchain-based decentralized collaborative learning method for the Industrial Internet environment to solve the trust and security issues in Federated Learning. Deploy a decentralized network for collaborative learning based on the alliance chain, design a block data structure suitable for asynchronous learning, and model three stages of computing event triggering, computing task distribution, and computing result integration for cross-domain device collaborative learning. List the critical steps for network deployment, including inspection, tearing down old networks, creating organizational encryption material, creating channels, and deploying chaincode. It also introduces the development of crucial chaincode such as initialization, creation, query, and modification. Finally, the correlation between the number of data pieces of the network, the number of communications, and the time of communications are analyzed through experiments. This paper also proposes a decentralized asynchronous collaborative learning algorithm, develops chaincode middleware between the blockchain network and Artificial Intelligence training, and conducts experimental analysis on the industrial steam volume prediction data set in thermal power generation. The performance on the data set, and the experimental results prove that the asynchronous collaborative learning algorithm proposed in this paper can achieve a good convergence effect. It is also compared with the single-machine single-card regression prediction algorithm, proving that the proposed model has better generalization.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 45-51"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.04.003
Partha Pratim Ray
In recent years, artificial intelligence (AI) and machine learning have been transforming the landscape of scientific research. Out of which, the chatbot technology has experienced tremendous advancements in recent years, especially with ChatGPT emerging as a notable AI language model. This comprehensive review delves into the background, applications, key challenges, and future directions of ChatGPT. We begin by exploring its origins, development, and underlying technology, before examining its wide-ranging applications across industries such as customer service, healthcare, and education. We also highlight the critical challenges that ChatGPT faces, including ethical concerns, data biases, and safety issues, while discussing potential mitigation strategies. Finally, we envision the future of ChatGPT by exploring areas of further research and development, focusing on its integration with other technologies, improved human-AI interaction, and addressing the digital divide. This review offers valuable insights for researchers, developers, and stakeholders interested in the ever-evolving landscape of AI-driven conversational agents. This study explores the various ways ChatGPT has been revolutionizing scientific research, spanning from data processing and hypothesis generation to collaboration and public outreach. Furthermore, the paper examines the potential challenges and ethical concerns surrounding the use of ChatGPT in research, while highlighting the importance of striking a balance between AI-assisted innovation and human expertise. The paper presents several ethical issues in existing computing domain and how ChatGPT can invoke challenges to such notion. This work also includes some biases and limitations of ChatGPT. It is worth to note that despite of several controversies and ethical concerns, ChatGPT has attracted remarkable attentions from academia, research, and industries in a very short span of time.
{"title":"ChatGPT: A comprehensive review on background, applications, key challenges, bias, ethics, limitations and future scope","authors":"Partha Pratim Ray","doi":"10.1016/j.iotcps.2023.04.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.003","url":null,"abstract":"<div><p>In recent years, artificial intelligence (AI) and machine learning have been transforming the landscape of scientific research. Out of which, the chatbot technology has experienced tremendous advancements in recent years, especially with ChatGPT emerging as a notable AI language model. This comprehensive review delves into the background, applications, key challenges, and future directions of ChatGPT. We begin by exploring its origins, development, and underlying technology, before examining its wide-ranging applications across industries such as customer service, healthcare, and education. We also highlight the critical challenges that ChatGPT faces, including ethical concerns, data biases, and safety issues, while discussing potential mitigation strategies. Finally, we envision the future of ChatGPT by exploring areas of further research and development, focusing on its integration with other technologies, improved human-AI interaction, and addressing the digital divide. This review offers valuable insights for researchers, developers, and stakeholders interested in the ever-evolving landscape of AI-driven conversational agents. This study explores the various ways ChatGPT has been revolutionizing scientific research, spanning from data processing and hypothesis generation to collaboration and public outreach. Furthermore, the paper examines the potential challenges and ethical concerns surrounding the use of ChatGPT in research, while highlighting the importance of striking a balance between AI-assisted innovation and human expertise. The paper presents several ethical issues in existing computing domain and how ChatGPT can invoke challenges to such notion. This work also includes some biases and limitations of ChatGPT. It is worth to note that despite of several controversies and ethical concerns, ChatGPT has attracted remarkable attentions from academia, research, and industries in a very short span of time.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 121-154"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.03.002
Yukun Dang , Zitong Liu , Xixin Yang , Linqiang Ge , Sheng Miao
Surface electromyography (sEMG) signals can be used to quantitatively assess muscle fatigue, thereby directly and objectively reflecting the functional state of neuromuscular activity. Effective fatigue diagnosis can prevent muscle damage, thereby improving the safety of rehabilitation exercise. Traditional fatigue diagnosis has certain limitations, including strong subjectivity and poor accuracy. This paper designs a sEMG signals acquisition circuit and collects the sEMG signals of the upper limb biceps brachii and triceps brachii in the force-relaxation state in a dual-channel form. Muscle fatigue classification assessment using Dynamic Time Warping-K Nearest Neighbor (DTW-KNN) and three deep learning algorithms. The experimental results show that compared with traditional machine learning algorithms, deep learning algorithm can achieve higher accuracy and time efficiency. In addition, this study introduces an attention mechanism to dynamically and reasonably assign network weights to achieve high level feature learning. The Attention-Long Short-Term Memory (Attention Based LSTM) neural network achieves 93.5% assessment accuracy with a time overhead of only 3.73s, allowing for real-time assessment of muscle fatigue.
肌表电图(sEMG)信号可以定量评估肌肉疲劳,从而直接客观地反映神经肌肉活动的功能状态。有效的疲劳诊断可以预防肌肉损伤,从而提高康复运动的安全性。传统的疲劳诊断存在一定的局限性,主观性强,准确性差。本文设计了一种表面肌电信号采集电路,以双通道形式采集上肢肱二头肌和肱三头肌在力松弛状态下的表面肌电信号。基于动态时间扭曲- k最近邻(DTW-KNN)和三种深度学习算法的肌肉疲劳分类评估。实验结果表明,与传统的机器学习算法相比,深度学习算法可以达到更高的精度和时间效率。此外,本研究引入注意机制,动态合理分配网络权值,实现高层次的特征学习。注意-长短期记忆(Attention - Based LSTM)神经网络的评估准确率达到93.5%,时间开销仅为3.73秒,可以实时评估肌肉疲劳。
{"title":"A fatigue assessment method based on attention mechanism and surface electromyography","authors":"Yukun Dang , Zitong Liu , Xixin Yang , Linqiang Ge , Sheng Miao","doi":"10.1016/j.iotcps.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.03.002","url":null,"abstract":"<div><p>Surface electromyography (sEMG) signals can be used to quantitatively assess muscle fatigue, thereby directly and objectively reflecting the functional state of neuromuscular activity. Effective fatigue diagnosis can prevent muscle damage, thereby improving the safety of rehabilitation exercise. Traditional fatigue diagnosis has certain limitations, including strong subjectivity and poor accuracy. This paper designs a sEMG signals acquisition circuit and collects the sEMG signals of the upper limb biceps brachii and triceps brachii in the force-relaxation state in a dual-channel form. Muscle fatigue classification assessment using Dynamic Time Warping-K Nearest Neighbor (DTW-KNN) and three deep learning algorithms. The experimental results show that compared with traditional machine learning algorithms, deep learning algorithm can achieve higher accuracy and time efficiency. In addition, this study introduces an attention mechanism to dynamically and reasonably assign network weights to achieve high level feature learning. The Attention-Long Short-Term Memory (Attention Based LSTM) neural network achieves 93.5% assessment accuracy with a time overhead of only 3.73s, allowing for real-time assessment of muscle fatigue.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 112-120"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2023.04.002
Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman , Ali Chehab
In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.
{"title":"Ethical hacking for IoT: Security issues, challenges, solutions and recommendations","authors":"Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman , Ali Chehab","doi":"10.1016/j.iotcps.2023.04.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.002","url":null,"abstract":"<div><p>In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 280-308"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.iotcps.2022.12.004
Ruihang Huang , Xiaoming Yang , P. Ajay
This article aims to discuss the consensus mechanism of software-defined blockchain in the Internet of Things, analyze the characteristics of the traditional consensus mechanism algorithms, on the basis of comparing the advantages of each model, the traditional consensus mechanism algorithm is improved. Later, a supervisable consensus scheme based on improved DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance) was proposed. In the context of the development of the Internet of Things technology, the decentralized distributed computing paradigm is used to improve the blockchain smart contract technology, and the DPOS blockchain consensus mechanism is optimized based on the DPOS protocol of the credit model. In addition, through the dynamic grouping algorithm of credibility, the research ranks the credit level of the consensus nodes of the blockchain network, thus further realizing the supervision of the Internet of Things system. The results of the case analysis show that the success rate of the mechanism algorithm can still be maintained at about 97% after 3000 user requests, the maximum delay remains below 8s after 3000 user requests, the minimum delay is always around 3s, the average delay is 2.38s, the overall performance of the algorithm is superior. It can ensure the final consistency of data transmission of each node in the Internet of Things, the research on the blockchain consensus mechanism in the Internet of Things has practical reference value.
本文旨在探讨物联网中软件定义区块链的共识机制,分析传统共识机制算法的特点,在比较各模型优势的基础上,对传统共识机制算法进行改进。随后,提出了一种基于改进DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance)的可监督共识方案。在物联网技术发展的背景下,采用去中心化的分布式计算范式对区块链智能合约技术进行改进,并基于信用模型的DPOS协议对DPOS区块链共识机制进行优化。此外,本研究通过可信度动态分组算法,对区块链网络共识节点的信用等级进行排序,从而进一步实现对物联网系统的监管。案例分析结果表明,该机制算法在3000个用户请求后成功率仍能保持在97%左右,在3000个用户请求后最大延迟保持在8s以下,最小延迟始终在3s左右,平均延迟为2.38s,算法整体性能优越。它可以保证物联网中各节点数据传输的最终一致性,对物联网中区块链共识机制的研究具有实用的参考价值。
{"title":"Consensus mechanism for software-defined blockchain in internet of things","authors":"Ruihang Huang , Xiaoming Yang , P. Ajay","doi":"10.1016/j.iotcps.2022.12.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.004","url":null,"abstract":"<div><p>This article aims to discuss the consensus mechanism of software-defined blockchain in the Internet of Things, analyze the characteristics of the traditional consensus mechanism algorithms, on the basis of comparing the advantages of each model, the traditional consensus mechanism algorithm is improved. Later, a supervisable consensus scheme based on improved DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance) was proposed. In the context of the development of the Internet of Things technology, the decentralized distributed computing paradigm is used to improve the blockchain smart contract technology, and the DPOS blockchain consensus mechanism is optimized based on the DPOS protocol of the credit model. In addition, through the dynamic grouping algorithm of credibility, the research ranks the credit level of the consensus nodes of the blockchain network, thus further realizing the supervision of the Internet of Things system. The results of the case analysis show that the success rate of the mechanism algorithm can still be maintained at about 97% after 3000 user requests, the maximum delay remains below 8s after 3000 user requests, the minimum delay is always around 3s, the average delay is 2.38s, the overall performance of the algorithm is superior. It can ensure the final consistency of data transmission of each node in the Internet of Things, the research on the blockchain consensus mechanism in the Internet of Things has practical reference value.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 52-60"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}