首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
A robust transmission with enhancement of 5G PHY using FBMC and AMC for machine-to-machine communication node 采用FBMC和AMC作为机器对机器通信节点,增强5G物理层的鲁棒传输
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.06.001
Vipin Sharma , Rajeev Kumar Arya , Sandeep Kumar

Advancement of 5G new radios has enabled more robust communication for the Machine-to-Machine (M2M) communication node, using filter bank multicarrier (FBMC). This paper focuses on robust transmission over random fluctuations of the channel and also enhances the battery life for the massive machine type communication (mMTC) node. Filter bank multicarrier and Adaptive Modulation Coding (AMC) have been utilized together to enhance the performance of the 5G (NR) PHY layer. A frame-to-frame implementation is used to diminish the impact of fading using AMC, while efficient utilization of spectrum is achieved using FBMC. The selection of the AMC profile is obtained through the analysis of uplink packets using the Distance Statistics (DS). The FBMC is incorporated with 5G PHY in place of OFDM to achieve the optimum utilization of spectrum and also obtain a significant reduction in peak to average power ratio (PAPR) for robust transmission, which saves 10% of the battery requirement. On the basis of channel state information, distance statistics were employed to optimize the AMC. The optimum selection of AMC with FBMC will reduce the bit error rate (BER) against multipath fading and ensure the better utilization of available spectrum to attain the optimum utilization of the power amplifier.

5G新无线电的进步使用滤波器组多载波(FBMC)为机器对机器(M2M)通信节点提供了更强大的通信。本文重点研究了信道随机波动下的鲁棒传输,并提高了大规模机器类型通信(mMTC)节点的电池寿命。利用滤波器组多载波和自适应调制编码(AMC)来提高5G (NR)物理层的性能。采用帧对帧实现,利用AMC减少衰落的影响,同时利用FBMC实现频谱的有效利用。AMC配置文件的选择是通过距离统计(DS)对上行报文进行分析得出的。FBMC与5G PHY结合以取代OFDM,以实现频谱的最佳利用,并显著降低峰值与平均功率比(PAPR),从而实现稳健传输,节省10%的电池需求。在信道状态信息的基础上,利用距离统计对AMC进行优化。利用FBMC优化选择AMC可以降低多径衰落时的误码率(BER),保证有效频谱的更好利用,实现功率放大器的最佳利用率。
{"title":"A robust transmission with enhancement of 5G PHY using FBMC and AMC for machine-to-machine communication node","authors":"Vipin Sharma ,&nbsp;Rajeev Kumar Arya ,&nbsp;Sandeep Kumar","doi":"10.1016/j.iotcps.2023.06.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.06.001","url":null,"abstract":"<div><p>Advancement of 5G new radios has enabled more robust communication for the Machine-to-Machine (M2M) communication node, using filter bank multicarrier (FBMC). This paper focuses on robust transmission over random fluctuations of the channel and also enhances the battery life for the massive machine type communication (mMTC) node. Filter bank multicarrier and Adaptive Modulation Coding (AMC) have been utilized together to enhance the performance of the 5G (NR) PHY layer. A frame-to-frame implementation is used to diminish the impact of fading using AMC, while efficient utilization of spectrum is achieved using FBMC. The selection of the AMC profile is obtained through the analysis of uplink packets using the Distance Statistics (DS). The FBMC is incorporated with 5G PHY in place of OFDM to achieve the optimum utilization of spectrum and also obtain a significant reduction in peak to average power ratio (PAPR) for robust transmission, which saves 10% of the battery requirement. On the basis of channel state information, distance statistics were employed to optimize the AMC. The optimum selection of AMC with FBMC will reduce the bit error rate (BER) against multipath fading and ensure the better utilization of available spectrum to attain the optimum utilization of the power amplifier.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 323-332"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks PRAFT和RPBFT:一类区块链共识算法及其在V2G网络电动汽车充电场景中的应用
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.02.003
Haoxiang Luo , Hongfang Yu , Jian Luo

With the improvement of people's awareness of environmental protection, electric vehicles (EVs) are becoming more and more popular, and the issue of vehicle to grid (V2G) energy trading is also put on the agenda. To protect the security and privacy of EVs when they trade energy with the grid, many scholars have introduced the emerging blockchain technology. However, there are few studies on the blockchain consensus algorithm for the EVs charging scenario, while the consensus is exactly the core technology in blockchain for reaching agreement in distributed systems, which to some extent determines the efficiency of V2G. Therefore, aiming at the above scenario, this paper proposes two low-complexity consensus algorithms, namely (PBFT-enabled RAFT) PRAFT and (RAFT-enable PBFT) RPBFT, which are combined the typical blockchain consensus PBFT and RAFT, and can be respectively applied to two EVs charging scenarios. In our V2G model, charging piles (CPs) and charging stations (CSs) will participate in the blockchain consensus as nodes. Through theoretical analysis and simulation, and compared with other methods, these two consensus algorithms have high scalability, low communication complexity, low storage overhead, high throughput, and low latency. Meanwhile they can also avoid the risk of Byzantine leader in RAFT. Finally, we demonstrate the two consensus algorithms in a real charging scenario, which show their transaction latency and energy consumption can well adapt to the EVs charging scenario in V2G networks.

随着人们环保意识的提高,电动汽车(ev)越来越普及,车对网(V2G)能源交易问题也提上了日程。为了保护电动汽车与电网进行能源交易时的安全性和隐私性,许多学者引入了新兴的区块链技术。然而,针对电动汽车充电场景的区块链共识算法研究较少,而共识恰恰是区块链在分布式系统中达成共识的核心技术,在一定程度上决定了V2G的效率。因此,针对上述场景,本文提出了两种低复杂度的共识算法,即(PBFT-enabled RAFT) PRAFT和(RAFT-enable PBFT) RPBFT,将典型的区块链共识PBFT和RAFT结合在一起,可分别应用于两种电动汽车充电场景。在我们的V2G模型中,充电桩(CPs)和充电站(CSs)将作为节点参与区块链共识。通过理论分析和仿真,并与其他方法进行比较,这两种共识算法具有高扩展性、低通信复杂度、低存储开销、高吞吐量和低延迟等特点。同时也可以避免RAFT中拜占庭式leader的风险。最后,在实际充电场景中对两种共识算法进行了验证,验证结果表明,两种共识算法的交易延迟和能耗都能很好地适应V2G网络下的电动汽车充电场景。
{"title":"PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks","authors":"Haoxiang Luo ,&nbsp;Hongfang Yu ,&nbsp;Jian Luo","doi":"10.1016/j.iotcps.2023.02.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.02.003","url":null,"abstract":"<div><p>With the improvement of people's awareness of environmental protection, electric vehicles (EVs) are becoming more and more popular, and the issue of vehicle to grid (V2G) energy trading is also put on the agenda. To protect the security and privacy of EVs when they trade energy with the grid, many scholars have introduced the emerging blockchain technology. However, there are few studies on the blockchain consensus algorithm for the EVs charging scenario, while the consensus is exactly the core technology in blockchain for reaching agreement in distributed systems, which to some extent determines the efficiency of V2G. Therefore, aiming at the above scenario, this paper proposes two low-complexity consensus algorithms, namely (PBFT-enabled RAFT) PRAFT and (RAFT-enable PBFT) RPBFT, which are combined the typical blockchain consensus PBFT and RAFT, and can be respectively applied to two EVs charging scenarios. In our V2G model, charging piles (CPs) and charging stations (CSs) will participate in the blockchain consensus as nodes. Through theoretical analysis and simulation, and compared with other methods, these two consensus algorithms have high scalability, low communication complexity, low storage overhead, high throughput, and low latency. Meanwhile they can also avoid the risk of Byzantine leader in RAFT. Finally, we demonstrate the two consensus algorithms in a real charging scenario, which show their transaction latency and energy consumption can well adapt to the EVs charging scenario in V2G networks.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 61-70"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
REST and EDA architectures in IoT actuation 物联网驱动中的REST和EDA架构
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.05.002
Rolando Herrero

While most Internet of Things (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) Representational State Transfer (REST) and (2) Event Driven Architecture (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that drives an algorithm that enables the dynamic selection of the right technology based on network impairments.

虽然大多数物联网(IoT)解决方案涉及传感,但其中一些还引入了驱动机制。具体来说,设备与环境中的资产交互,并将传感器读数传输到执行分析的应用程序。这些应用程序通常驻留在网络核心上,并依次处理触发向设备传输驱动命令的读出。这些方案中的一个重要问题是通信通道的性质。大多数设备都是无线的,因此它们受到信号多径衰落的影响,从而导致应用程序丢失。更重要的是,这些损伤可能导致驱动命令丢失或严重延迟。在这种情况下,已经提出了几种标准机制,用于将流量从应用程序传输到设备。它们属于两个主要的体系结构类别:(1)具象状态传输(REST)和(2)事件驱动体系结构(EDA)。在本文中,我们分析了与这两种架构相关的两个协议,通过比较它们来评估它们在物联网驱动解决方案中的效率。这种分析导致了数学模型的发展,该模型驱动了一种算法,该算法能够根据网络损伤动态选择正确的技术。
{"title":"REST and EDA architectures in IoT actuation","authors":"Rolando Herrero","doi":"10.1016/j.iotcps.2023.05.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.05.002","url":null,"abstract":"<div><p>While most <em>Internet of Things</em> (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) <em>Representational State Transfer</em> (REST) and (2) <em>Event Driven Architecture</em> (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that drives an algorithm that enables the dynamic selection of the right technology based on network impairments.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 205-212"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things for smart factories in industry 4.0, a review 工业4.0中的物联网智能工厂,综述
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.006
Mohsen Soori , Behrooz Arezoo , Roza Dastres

The Internet of Things (IoT) is playing a significant role in the transformation of traditional factories into smart factories in Industry 4.0 by using network of interconnected devices, sensors, and software to monitor and optimize the production process. Predictive maintenance using the IoT in smart factories can also be used to prevent machine failures, reduce downtime, and extend the lifespan of equipment. To monitor and optimize energy usage during part manufacturing, manufacturers can obtain real-time insights into energy consumption patterns by deploying IoT sensors in smart factories. Also, IoT can provide a more comprehensive view of the factory environment to enhance workplace safety by identifying potential hazards and alerting workers to potential dangers. Suppliers can use IoT-enabled tracking devices to monitor shipments and provide real-time updates on delivery times and locations in order to analyze and optimize the supply chain in smart factories. Moreover, IoT is a powerful technology which can optimize inventory management in smart factories to reduce costs, improve efficiency, and provide real-time visibility into inventory levels and movements. To analyze and enhance the impact of internet of thing in smart factories of industry 4.0, a review is presented. Applications of internet of things in smart factories such as predictive maintenance, asset tracking, inventory management, quality control, production process monitoring, energy efficiency and supply chain optimization are reviewed. Thus, by analyzing the application of IoT in smart factories of Industry 4.0, new ideas and advanced methodologies can be provided to improve quality control and optimize part production processes.

在工业4.0时代,物联网(IoT)通过使用互联设备、传感器和软件网络来监控和优化生产过程,在传统工厂向智能工厂的转变中发挥着重要作用。在智能工厂中使用物联网的预测性维护也可用于防止机器故障,减少停机时间并延长设备的使用寿命。为了监控和优化零件制造过程中的能源使用情况,制造商可以通过在智能工厂中部署物联网传感器,实时了解能源消耗模式。此外,物联网可以提供更全面的工厂环境视图,通过识别潜在危险并提醒工人注意潜在危险来提高工作场所的安全性。供应商可以使用支持物联网的跟踪设备来监控货物,并提供有关交货时间和地点的实时更新,以便分析和优化智能工厂的供应链。此外,物联网是一项强大的技术,可以优化智能工厂的库存管理,以降低成本,提高效率,并提供对库存水平和流动的实时可见性。为了分析和增强物联网对工业4.0智能工厂的影响,本文进行了综述。综述了物联网在智能工厂中的应用,如预测性维护、资产跟踪、库存管理、质量控制、生产过程监控、能源效率和供应链优化。因此,通过分析物联网在工业4.0智能工厂中的应用,可以为提高质量控制和优化零件生产流程提供新的思路和先进的方法。
{"title":"Internet of things for smart factories in industry 4.0, a review","authors":"Mohsen Soori ,&nbsp;Behrooz Arezoo ,&nbsp;Roza Dastres","doi":"10.1016/j.iotcps.2023.04.006","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.006","url":null,"abstract":"<div><p>The Internet of Things (IoT) is playing a significant role in the transformation of traditional factories into smart factories in Industry 4.0 by using network of interconnected devices, sensors, and software to monitor and optimize the production process. Predictive maintenance using the IoT in smart factories can also be used to prevent machine failures, reduce downtime, and extend the lifespan of equipment. To monitor and optimize energy usage during part manufacturing, manufacturers can obtain real-time insights into energy consumption patterns by deploying IoT sensors in smart factories. Also, IoT can provide a more comprehensive view of the factory environment to enhance workplace safety by identifying potential hazards and alerting workers to potential dangers. Suppliers can use IoT-enabled tracking devices to monitor shipments and provide real-time updates on delivery times and locations in order to analyze and optimize the supply chain in smart factories. Moreover, IoT is a powerful technology which can optimize inventory management in smart factories to reduce costs, improve efficiency, and provide real-time visibility into inventory levels and movements. To analyze and enhance the impact of internet of thing in smart factories of industry 4.0, a review is presented. Applications of internet of things in smart factories such as predictive maintenance, asset tracking, inventory management, quality control, production process monitoring, energy efficiency and supply chain optimization are reviewed. Thus, by analyzing the application of IoT in smart factories of Industry 4.0, new ideas and advanced methodologies can be provided to improve quality control and optimize part production processes.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 192-204"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Android malware classification using optimum feature selection and ensemble machine learning 基于最优特征选择和集成机器学习的Android恶意软件分类
Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.03.001
Rejwana Islam , Moinul Islam Sayed , Sajal Saha , Mohammad Jamal Hossain , Md Abdul Masud

The majority of smartphones on the market run on the Android operating system. Security has been a core concern with this platform since it allows users to install apps from unknown sources. With thousands of apps being produced and launched daily, malware detection using Machine Learning (ML) has attracted significant attention compared to traditional detection techniques. Despite academic and commercial efforts, developing an efficient and reliable method for classifying malware remains challenging. As a result, several datasets for malware analysis have been generated and made available during the past ten years. These datasets may contain static features, such as API calls, intents, and permissions, or dynamic features, like logcat errors, shared memory, and system calls. Dynamic analysis is more resilient when it comes to code obfuscation. Though binary classification and multi-classification have been carried out in recent studies, the latter provides valuable insight into the nature of malware. Because each malware variant operates differently, identifying its category might help prevent it. Using the well-known ensemble ML approach called weighted voting, this study performed dynamic feature analysis for multi-classification. Random Forest, K-nearest Neighbors, Multi-Level Perceptrons, Decision Trees, Support Vector Machines, and Logistic Regression are all studied in this ensemble model. We used a recent dataset named CCCS-CIC-AndMal-2020, which contains an extensive collection of Android applications and malware samples. A well-researched data preparation phase followed by weighted voting based on R2 scores of the ML classifiers presents an accuracy of 95.0% even after excluding 60.2% features, outperforming all recent studies.

市场上的大多数智能手机都运行Android操作系统。安全一直是这个平台的核心问题,因为它允许用户安装来自未知来源的应用程序。随着每天成千上万的应用程序被制作和发布,与传统的检测技术相比,使用机器学习(ML)进行恶意软件检测引起了极大的关注。尽管学术界和商界都在努力,但开发一种高效可靠的恶意软件分类方法仍然具有挑战性。因此,在过去的十年中,已经产生并提供了一些用于恶意软件分析的数据集。这些数据集可能包含静态特性,如API调用、意图和权限,也可能包含动态特性,如日志记录错误、共享内存和系统调用。当涉及到代码混淆时,动态分析更具弹性。虽然在最近的研究中已经进行了二元分类和多重分类,但后者提供了对恶意软件本质的有价值的见解。由于每种恶意软件的运作方式不同,识别其类别可能有助于预防。本研究使用著名的集成ML方法加权投票,对多分类进行动态特征分析。随机森林、k近邻、多层次感知器、决策树、支持向量机和逻辑回归等都在该集成模型中进行了研究。我们使用了一个名为CCCS-CIC-AndMal-2020的最新数据集,其中包含大量Android应用程序和恶意软件样本。经过充分研究的数据准备阶段,然后根据ML分类器的R2分数进行加权投票,即使在排除60.2%的特征后,准确率也达到95.0%,优于最近的所有研究。
{"title":"Android malware classification using optimum feature selection and ensemble machine learning","authors":"Rejwana Islam ,&nbsp;Moinul Islam Sayed ,&nbsp;Sajal Saha ,&nbsp;Mohammad Jamal Hossain ,&nbsp;Md Abdul Masud","doi":"10.1016/j.iotcps.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.03.001","url":null,"abstract":"<div><p>The majority of smartphones on the market run on the Android operating system. Security has been a core concern with this platform since it allows users to install apps from unknown sources. With thousands of apps being produced and launched daily, malware detection using Machine Learning (ML) has attracted significant attention compared to traditional detection techniques. Despite academic and commercial efforts, developing an efficient and reliable method for classifying malware remains challenging. As a result, several datasets for malware analysis have been generated and made available during the past ten years. These datasets may contain static features, such as API calls, intents, and permissions, or dynamic features, like logcat errors, shared memory, and system calls. Dynamic analysis is more resilient when it comes to code obfuscation. Though binary classification and multi-classification have been carried out in recent studies, the latter provides valuable insight into the nature of malware. Because each malware variant operates differently, identifying its category might help prevent it. Using the well-known ensemble ML approach called weighted voting, this study performed dynamic feature analysis for multi-classification. Random Forest, K-nearest Neighbors, Multi-Level Perceptrons, Decision Trees, Support Vector Machines, and Logistic Regression are all studied in this ensemble model. We used a recent dataset named CCCS-CIC-AndMal-2020, which contains an extensive collection of Android applications and malware samples. A well-researched data preparation phase followed by weighted voting based on R<sup>2</sup> scores of the ML classifiers presents an accuracy of 95.0% even after excluding 60.2% features, outperforming all recent studies.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 100-111"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense-in-depth against insider attacks in cyber-physical systems 深度防御网络物理系统内部攻击
Pub Date : 2022-12-01 DOI: 10.1016/j.iotcps.2022.12.001
Xirong Ning, Jin Jiang
{"title":"Defense-in-depth against insider attacks in cyber-physical systems","authors":"Xirong Ning, Jin Jiang","doi":"10.1016/j.iotcps.2022.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78939803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of solar-powered with IoT-Enabled portable irrigation system 设计和实现太阳能和物联网驱动的便携式灌溉系统
Pub Date : 2022-12-01 DOI: 10.1016/j.iotcps.2022.12.002
R. M. Ramli, W. Jabbar
{"title":"Design and implementation of solar-powered with IoT-Enabled portable irrigation system","authors":"R. M. Ramli, W. Jabbar","doi":"10.1016/j.iotcps.2022.12.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.002","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82412980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secured energy ecosystems under Distributed Energy Resources penetration 分布式能源渗透下的安全能源生态系统
Pub Date : 2022-11-01 DOI: 10.1016/j.iotcps.2022.10.002
R. Ravi, A. Jolfaei, Deepak Tripathy, Muhammad Ali
{"title":"Secured energy ecosystems under Distributed Energy Resources penetration","authors":"R. Ravi, A. Jolfaei, Deepak Tripathy, Muhammad Ali","doi":"10.1016/j.iotcps.2022.10.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.10.002","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82678826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of challenges and problems in supply chain among retailers during COVID-19 epidemic through AHP-TOPSIS hybrid MCDM technique 基于AHP-TOPSIS混合MCDM技术的新冠疫情期间零售商供应链挑战与问题评估
Pub Date : 2022-10-01 DOI: 10.1016/j.iotcps.2022.10.001
S. U. Ul Islam, Sameena Khan, Hozaifa Ahmad, Md Adib Ur Rahman, Sarika Tomar, Mohd Zaheen Khan
{"title":"Assessment of challenges and problems in supply chain among retailers during COVID-19 epidemic through AHP-TOPSIS hybrid MCDM technique","authors":"S. U. Ul Islam, Sameena Khan, Hozaifa Ahmad, Md Adib Ur Rahman, Sarika Tomar, Mohd Zaheen Khan","doi":"10.1016/j.iotcps.2022.10.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.10.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"10 1","pages":"180 - 193"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89336542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0 基于一致性轮哈希优化的基于srp -6的端到端相互认证,实现工业4.0下的数据安全传输
Pub Date : 2022-09-01 DOI: 10.1016/j.iotcps.2022.09.001
Ravi Sharma, B. Villányi
{"title":"Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0","authors":"Ravi Sharma, B. Villányi","doi":"10.1016/j.iotcps.2022.09.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.09.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82279584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1