首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
Secured energy ecosystems under Distributed Energy Resources penetration 分布式能源渗透下的安全能源生态系统
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.10.002
Raja Sekhar Ravi , Alireza Jolfaei , Deepak Tripathy , Muhammad Ali

Renewable energy systems have mushroomed in the form of microgrids and Virtual Power Plants (VPP). In Australia itself, there are over three million Distributed Energy Resources (DERs). Integrating these new energy ecosystems into current systems is becoming a horrendous task as multi-dimensional energy flows and new energy business models are evolving. The stakeholders in the energy sector are focused on reducing costs prematurely while integration standards are still evolving, and interoperability of Internet of things (IoT) with legacy systems has outstanding security concerns. In this paper, the changing energy landscape is examined, and cybersecurity issues associated with the operation of VPPs and renewable energy-based microgrids are highlighted. The security and operational scenarios of new ecosystems are outlined, with an emphasis on DER interoperability, security, and integration. The design and development of these evolving standards into these new energy ecosystems is detailed based on observations from experiments on real-world DER installations. This paper is an extension of work originally reported in proceedings of the 31st Australasian Universities Power Engineering Conference [1].

可再生能源系统以微电网和虚拟电厂(VPP)的形式迅速发展。在澳大利亚,有超过300万个分布式能源(DERs)。随着多维能源流和新能源商业模式的发展,将这些新能源生态系统整合到现有系统中正在成为一项艰巨的任务。能源行业的利益相关者在集成标准仍在发展的情况下过早地关注降低成本,物联网(IoT)与遗留系统的互操作性存在突出的安全问题。本文研究了不断变化的能源格局,并强调了与vpp和基于可再生能源的微电网运营相关的网络安全问题。概述了新生态系统的安全和操作场景,重点是DER的互操作性、安全性和集成。这些新能源生态系统中不断发展的标准的设计和开发是基于对现实世界DER装置的实验观察而详细介绍的。本文是对第31届澳大拉西亚大学动力工程会议论文集中最初报道的工作的扩展。
{"title":"Secured energy ecosystems under Distributed Energy Resources penetration","authors":"Raja Sekhar Ravi ,&nbsp;Alireza Jolfaei ,&nbsp;Deepak Tripathy ,&nbsp;Muhammad Ali","doi":"10.1016/j.iotcps.2022.10.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.10.002","url":null,"abstract":"<div><p>Renewable energy systems have mushroomed in the form of microgrids and Virtual Power Plants (VPP). In Australia itself, there are over three million Distributed Energy Resources (DERs). Integrating these new energy ecosystems into current systems is becoming a horrendous task as multi-dimensional energy flows and new energy business models are evolving. The stakeholders in the energy sector are focused on reducing costs prematurely while integration standards are still evolving, and interoperability of Internet of things (IoT) with legacy systems has outstanding security concerns. In this paper, the changing energy landscape is examined, and cybersecurity issues associated with the operation of VPPs and renewable energy-based microgrids are highlighted. The security and operational scenarios of new ecosystems are outlined, with an emphasis on DER interoperability, security, and integration. The design and development of these evolving standards into these new energy ecosystems is detailed based on observations from experiments on real-world DER installations. This paper is an extension of work originally reported in proceedings of the 31st Australasian Universities Power Engineering Conference [1].</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 194-202"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000268/pdfft?md5=c24e4b148f0e3ab237b5a9c6919efec6&pid=1-s2.0-S2667345222000268-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91756485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New trends on computer vision applied to mobile robot localization 计算机视觉在移动机器人定位中的应用新趋势
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.05.002
Antonio Savio Silva Oliveira , Marcello Carvalho dos Reis , Francisco Alan Xavier da Mota , Maria Elisa Marciano Martinez , Auzuir Ripardo Alexandria

This work presents a systematic review of computer vision techniques for locating mobile robots. Its main objectives are to analyze the latest technology in use to locate mobile robots. In addition, this work violated the advances achieved so far, assesses the challenges to be overcome and provides an analysis of future prospects. There is a lot of research related to the location of mobile robots, but the number of review articles on the topic is small, which makes this work of remarkable value. The research covered the works published in Web of Science, Scopus, Science Direct and IEEEXplore until June 2021. Each work found proposes a vision-based localization technique. After being analyzed individually, it can be concluded that it is necessary to assess the level of accuracy of these techniques through a single standard, it is necessary to assess the cost-benefit of the computational cost and the need for more powerful computers or systems to perform the localization task. Finally, the main contributions of this work are the creation of a table summarizing the main methods of localization by computer vision, the statistical analysis performed on the keywords of the selected works and providing an overview of this line of research that can be a basis for future research.

这项工作提出了定位移动机器人的计算机视觉技术的系统综述。它的主要目标是分析用于定位移动机器人的最新技术。此外,这项工作违反了迄今取得的进展,评估了有待克服的挑战,并分析了未来的前景。与移动机器人定位相关的研究有很多,但关于该主题的综述文章数量很少,这使得这项工作具有显著的价值。该研究涵盖了截至2021年6月在Web of Science、Scopus、Science Direct和ieee explore上发表的作品。发现的每一项工作都提出了一种基于视觉的定位技术。在单独分析之后,可以得出结论,有必要通过单一标准评估这些技术的准确性水平,有必要评估计算成本的成本效益以及对更强大的计算机或系统的需求来执行定位任务。最后,本工作的主要贡献是创建了一个表格,总结了计算机视觉定位的主要方法,对所选作品的关键词进行了统计分析,并对这一研究方向进行了概述,为今后的研究奠定了基础。
{"title":"New trends on computer vision applied to mobile robot localization","authors":"Antonio Savio Silva Oliveira ,&nbsp;Marcello Carvalho dos Reis ,&nbsp;Francisco Alan Xavier da Mota ,&nbsp;Maria Elisa Marciano Martinez ,&nbsp;Auzuir Ripardo Alexandria","doi":"10.1016/j.iotcps.2022.05.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.05.002","url":null,"abstract":"<div><p>This work presents a systematic review of computer vision techniques for locating mobile robots. Its main objectives are to analyze the latest technology in use to locate mobile robots. In addition, this work violated the advances achieved so far, assesses the challenges to be overcome and provides an analysis of future prospects. There is a lot of research related to the location of mobile robots, but the number of review articles on the topic is small, which makes this work of remarkable value. The research covered the works published in Web of Science, Scopus, Science Direct and IEEEXplore until June 2021. Each work found proposes a vision-based localization technique. After being analyzed individually, it can be concluded that it is necessary to assess the level of accuracy of these techniques through a single standard, it is necessary to assess the cost-benefit of the computational cost and the need for more powerful computers or systems to perform the localization task. Finally, the main contributions of this work are the creation of a table summarizing the main methods of localization by computer vision, the statistical analysis performed on the keywords of the selected works and providing an overview of this line of research that can be a basis for future research.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 63-69"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000128/pdfft?md5=7236985683bc963d415bdb07065f66f8&pid=1-s2.0-S2667345222000128-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling flexible manufacturing system (FMS) through the applications of industry 4.0 technologies 通过应用工业4.0技术实现柔性制造系统(FMS)
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.05.005
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman

The implementation of Industry 4.0 technologies has improved the flexibility of the entire manufacturing system. These technologies are the Internet of Things (IoT), big data, Artificial Intelligence (AI), Additive Manufacturing (AM), advanced robotics, virtual reality, cloud computing, simulation, and among others, have arisen to improve the flexibility in the entire manufacturing system. Industry 4.0 is becoming recognised as a unique industrial paradigm. It is predicated on the widespread adoption of communication and information technology, which would lead to improved organisational performance and flexibility. The incorporation of Industry 4.0 is the true game-changer in terms of flexibility and customisation. Manufacturers may utilise this technology to build digital twins of items used by consumers in the real world. The digital twin gets real-time information from sensors on the actual objects. Manufacturers benefit from digital twin and simulation technology, including predictive maintenance and making errors easier and faster to rectify. This paper discusses Industry 4.0 and its Flexible Manufacturing System (FMS) capability. Different dimensions and technologies of Industry 4.0 Practices for improving FMS performance are studied,d and then discusses several flexible approaches using Industry 4.0 technologies are. One of the most significant benefits of adopting virtual infrastructure maintained by a service provider is improved flexibility. Cloud services allow auto-scaling, which means that the underlying computer resources automatically adjust to changing utilisation rates. Industry 4.0 increases production flexibility, allowing a facility to respond to market changes quickly. A plant control system automatically varies output depending on shifting utility rates, lowering production costs. Industry 4.0 offers some incredible benefits and has gone a long way in the last several years.

工业4.0技术的实施提高了整个制造系统的灵活性。这些技术包括物联网(IoT)、大数据、人工智能(AI)、增材制造(AM)、先进机器人、虚拟现实、云计算、仿真等,它们的出现提高了整个制造系统的灵活性。工业4.0被认为是一种独特的工业模式。它是基于通信和信息技术的广泛采用,这将导致改进组织绩效和灵活性。在灵活性和定制化方面,工业4.0的整合是真正的游戏规则改变者。制造商可以利用这项技术制造消费者在现实世界中使用的物品的数字双胞胎。数字孪生体从实际物体上的传感器获取实时信息。制造商受益于数字孪生和仿真技术,包括预测性维护和使错误更容易、更快地纠正。本文讨论了工业4.0及其柔性制造系统(FMS)的能力。研究了提高FMS性能的实践,然后讨论了使用工业4.0技术的几种灵活方法。采用由服务提供商维护的虚拟基础设施的最重要的好处之一是提高了灵活性。云服务允许自动扩展,这意味着底层计算机资源会自动调整以适应不断变化的利用率。工业4.0提高了生产的灵活性,使工厂能够快速响应市场变化。工厂控制系统会根据不断变化的公用事业费率自动改变产量,从而降低生产成本。工业4.0提供了一些令人难以置信的好处,并在过去几年中取得了长足的进步。
{"title":"Enabling flexible manufacturing system (FMS) through the applications of industry 4.0 technologies","authors":"Mohd Javaid ,&nbsp;Abid Haleem ,&nbsp;Ravi Pratap Singh ,&nbsp;Rajiv Suman","doi":"10.1016/j.iotcps.2022.05.005","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.05.005","url":null,"abstract":"<div><p>The implementation of Industry 4.0 technologies has improved the flexibility of the entire manufacturing system. These technologies are the Internet of Things (IoT), big data, Artificial Intelligence (AI), Additive Manufacturing (AM), advanced robotics, virtual reality, cloud computing, simulation, and among others, have arisen to improve the flexibility in the entire manufacturing system. Industry 4.0 is becoming recognised as a unique industrial paradigm. It is predicated on the widespread adoption of communication and information technology, which would lead to improved organisational performance and flexibility. The incorporation of Industry 4.0 is the true game-changer in terms of flexibility and customisation. Manufacturers may utilise this technology to build digital twins of items used by consumers in the real world. The digital twin gets real-time information from sensors on the actual objects. Manufacturers benefit from digital twin and simulation technology, including predictive maintenance and making errors easier and faster to rectify. This paper discusses Industry 4.0 and its Flexible Manufacturing System (FMS) capability. Different dimensions and technologies of Industry 4.0 Practices for improving FMS performance are studied,d and then discusses several flexible approaches using Industry 4.0 technologies are. One of the most significant benefits of adopting virtual infrastructure maintained by a service provider is improved flexibility. Cloud services allow auto-scaling, which means that the underlying computer resources automatically adjust to changing utilisation rates. Industry 4.0 increases production flexibility, allowing a facility to respond to market changes quickly. A plant control system automatically varies output depending on shifting utility rates, lowering production costs. Industry 4.0 offers some incredible benefits and has gone a long way in the last several years.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 49-62"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000153/pdfft?md5=d12798b3d3d9158c1b328de5e3f8ee74&pid=1-s2.0-S2667345222000153-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90125207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Metaheuristic Optimization Algorithm for energy efficiency in Digital Twins 数字孪生体能源效率的元启发式优化算法
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.08.001
Rui Chen , Hai Shen , Yi Lai

This work aims to study the role of Digital Twins (DTs) technology combined with the Metaheuristic Optimization Algorithm in manufacturing energy efficiency optimization. Firstly,a machine tool model is established based on DTs technology to study the energy consumption of the milling process of Computer Numerical Machine Tools. Besides, the Particle Swarm Optimization (PSO) algorithm is introduced to optimize the milling parameters of the machining process. Meanwhile, the tool machining path is optimized by combining the Optimized Genetic algorithm and Simulated Annealing algorithm and find the optimal solution of the machining path. On the premise of ensuring the machining quality, this scheme improves the machining efficiency, reduces the energy consumption of the processing process, and improve the energy efficiency. The results demonstrate that the optimized milling parameters can ensure the lowest milling power while considering the maximum material removal rate. Take the plane model as an example. The Improved Genetic Algorithm-Simulated Annealing algorithm can significantly reduce the number of empty walking knife by adopting projection machining and helical machining. The total length of the milling path is reduced by 69.45 ​mm at most, a relative reduction of 10.01%. The average measured energy consumption of milling is reduced by 5.62W∗h compared with the empirical value; the measured average energy consumption of the optimized idle tool is reduced by 0.17W∗h; the total measured energy consumption of milling processing is reduced by 5.73W∗h compared with the empirical value. It can be seen that the optimization algorithm can improve the processing efficiency and reduce the energy consumption.

本研究旨在研究数字孪生(DTs)技术与元启发式优化算法在制造业能效优化中的作用。首先,建立了基于DTs技术的机床模型,研究了计算机数控机床铣削过程的能耗。此外,引入粒子群优化算法对加工过程的铣削参数进行优化。同时,结合优化遗传算法和模拟退火算法对刀具加工路径进行优化,找到加工路径的最优解。该方案在保证加工质量的前提下,提高了加工效率,降低了加工过程的能耗,提高了能效。结果表明,优化后的铣削参数可以在考虑最大材料去除率的同时保证铣削功率最小。以飞机模型为例。改进的遗传算法-模拟退火算法通过采用投影加工和螺旋加工,可以显著减少空步刀数量。铣削路径总长度最多减少69.45 mm,相对减少10.01%。与经验值相比,铣削的平均测量能耗降低了5.62W * h;优化后的怠速刀具的实测平均能耗降低0.17W * h;与经验值相比,铣削加工的实测总能耗降低了5.73W * h。可以看出,优化算法可以提高加工效率,降低能耗。
{"title":"A Metaheuristic Optimization Algorithm for energy efficiency in Digital Twins","authors":"Rui Chen ,&nbsp;Hai Shen ,&nbsp;Yi Lai","doi":"10.1016/j.iotcps.2022.08.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.08.001","url":null,"abstract":"<div><p>This work aims to study the role of Digital Twins (DTs) technology combined with the Metaheuristic Optimization Algorithm in manufacturing energy efficiency optimization. Firstly,a machine tool model is established based on DTs technology to study the energy consumption of the milling process of Computer Numerical Machine Tools. Besides, the Particle Swarm Optimization (PSO) algorithm is introduced to optimize the milling parameters of the machining process. Meanwhile, the tool machining path is optimized by combining the Optimized Genetic algorithm and Simulated Annealing algorithm and find the optimal solution of the machining path. On the premise of ensuring the machining quality, this scheme improves the machining efficiency, reduces the energy consumption of the processing process, and improve the energy efficiency. The results demonstrate that the optimized milling parameters can ensure the lowest milling power while considering the maximum material removal rate. Take the plane model as an example. The Improved Genetic Algorithm-Simulated Annealing algorithm can significantly reduce the number of empty walking knife by adopting projection machining and helical machining. The total length of the milling path is reduced by 69.45 ​mm at most, a relative reduction of 10.01%. The average measured energy consumption of milling is reduced by 5.62W∗h compared with the empirical value; the measured average energy consumption of the optimized idle tool is reduced by 0.17W∗h; the total measured energy consumption of milling processing is reduced by 5.73W∗h compared with the empirical value. It can be seen that the optimization algorithm can improve the processing efficiency and reduce the energy consumption.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 159-169"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000232/pdfft?md5=22ec30d0e4e20be9b6023f92f9c8ea93&pid=1-s2.0-S2667345222000232-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Defense-in-depth against insider attacks in cyber-physical systems 深度防御网络物理系统内部攻击
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.12.001
Xirong Ning, Jin Jiang

In a cyber-physical system (CPS) built on Internet-of-things (IoT) technologies, whenever measurement and control signals are transferred over communication networks across cyber and physical systems, it potentially becomes a target for adversaries. The problem becomes especially serious if the adversaries are insiders. A single layer of defense may not be strong enough in such a case, as it is difficult to assess the extent of knowledge that the inside attackers may have known about the physical and cyber system configurations, communication networks/protocols, and their respective vulnerabilities. Hence, it is paramount to have a reliable and fail-safe defense-in-depth architecture to fence off would-be-attackers. In this paper, a multi-layer defense-in-depth approach has been developed. For an inside attacker with legitimate access, the first line of defense, such as access control, may have already been compromised. Given this fact, the focus of the current paper has been on detection and mitigation. Both data-driven and model-based techniques are considered to catch stealthy attacks and stop them in their tracks. Effective mitigation techniques can then be deployed to minimize the adverse effects. To demonstrate this design philosophy and validate the effectiveness of the developed methodologies, a lab-scale cyber-physical system platform based on industry-grade communication networks and physical sensors has been used for validation.

在基于物联网(IoT)技术的网络物理系统(CPS)中,每当测量和控制信号通过通信网络跨网络和物理系统传输时,它就有可能成为对手的目标。如果对手是内部人士,问题就会变得特别严重。在这种情况下,单层防御可能不够强大,因为很难评估内部攻击者对物理和网络系统配置、通信网络/协议及其各自漏洞的了解程度。因此,最重要的是要有一个可靠的和故障安全的纵深防御体系结构来隔离可能的攻击者。本文提出了一种多层纵深防御方法。对于具有合法访问权限的内部攻击者来说,第一道防线(例如访问控制)可能已经被攻破。鉴于这一事实,本文的重点是检测和缓解。数据驱动和基于模型的技术都被认为可以捕捉到隐形攻击并阻止它们。然后可以采用有效的缓解技术,尽量减少不利影响。为了证明这一设计理念并验证所开发方法的有效性,一个基于工业级通信网络和物理传感器的实验室规模的网络物理系统平台已被用于验证。
{"title":"Defense-in-depth against insider attacks in cyber-physical systems","authors":"Xirong Ning,&nbsp;Jin Jiang","doi":"10.1016/j.iotcps.2022.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.001","url":null,"abstract":"<div><p>In a cyber-physical system (CPS) built on Internet-of-things (IoT) technologies, whenever measurement and control signals are transferred over communication networks across cyber and physical systems, it potentially becomes a target for adversaries. The problem becomes especially serious if the adversaries are insiders. A single layer of defense may not be strong enough in such a case, as it is difficult to assess the extent of knowledge that the inside attackers may have known about the physical and cyber system configurations, communication networks/protocols, and their respective vulnerabilities. Hence, it is paramount to have a reliable and fail-safe defense-in-depth architecture to fence off would-be-attackers. In this paper, a multi-layer defense-in-depth approach has been developed. For an inside attacker with legitimate access, the first line of defense, such as access control, may have already been compromised. Given this fact, the focus of the current paper has been on detection and mitigation. Both data-driven and model-based techniques are considered to catch stealthy attacks and stop them in their tracks. Effective mitigation techniques can then be deployed to minimize the adverse effects. To demonstrate this design philosophy and validate the effectiveness of the developed methodologies, a lab-scale cyber-physical system platform based on industry-grade communication networks and physical sensors has been used for validation.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 203-211"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266734522200027X/pdfft?md5=fb3ebb68af90fd90774bf8956beede7a&pid=1-s2.0-S266734522200027X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
UAV surveying and mapping information collection method based on Internet of Things 基于物联网的无人机测绘信息采集方法
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.07.002
Zheng Xu

The unmanned vehicles (UAVs) are most useful communication elements in current technology platform. The emerging communication applications like IoT, cloud and Datamining are most prominent to surveillance. This research study is concentrated on IoT (Internet if things) based UAVs design based on information collection methodology. Autonomous flying vehicles with IoT connectivity to ensure site health and safety applications. It goes through the fundamental limits and flaws of current state-of-the-art solutions for the same goal, such as route planning optimization challenges, lightweight machine learning (ML) and machine vision algorithms, coordination in IoT communications, and IoT network scaling. As a result, this article will assist the reader in delving deeper into a variety of open research questions.

在当前的技术平台中,无人飞行器是最有用的通信元件。物联网、云和数据挖掘等新兴通信应用对监控最为突出。本文主要研究基于信息收集方法的基于物联网的无人机设计。具有物联网连接的自主飞行器,可确保现场健康和安全应用。它通过当前最先进的解决方案的基本限制和缺陷来实现相同的目标,例如路线规划优化挑战,轻量级机器学习(ML)和机器视觉算法,物联网通信中的协调以及物联网网络扩展。因此,本文将帮助读者更深入地研究各种开放的研究问题。
{"title":"UAV surveying and mapping information collection method based on Internet of Things","authors":"Zheng Xu","doi":"10.1016/j.iotcps.2022.07.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.07.002","url":null,"abstract":"<div><p>The unmanned vehicles (UAVs) are most useful communication elements in current technology platform. The emerging communication applications like IoT, cloud and Datamining are most prominent to surveillance. This research study is concentrated on IoT (Internet if things) based UAVs design based on information collection methodology. Autonomous flying vehicles with IoT connectivity to ensure site health and safety applications. It goes through the fundamental limits and flaws of current state-of-the-art solutions for the same goal, such as route planning optimization challenges, lightweight machine learning (ML) and machine vision algorithms, coordination in IoT communications, and IoT network scaling. As a result, this article will assist the reader in delving deeper into a variety of open research questions.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 138-144"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000219/pdfft?md5=36b28947f98e3d8267f6a1b9cae75073&pid=1-s2.0-S2667345222000219-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0 基于一致性轮哈希优化的基于srp -6的端到端相互认证,实现工业4.0下的数据安全传输
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.09.001
Ravi Sharma, Balázs Villányi

When the Internet of Things (IoT) is used in a typical manufacturing system, the industrial plant can be controlled remotely through the Internet. This enables manufacturing and execution systems to obtain real-time work orders directly from the Enterprise Resource Planning (ERP) system. Therefore, workflows for development, production, and manufacturing can be integrated with sales, market, and finance business processes. The possibility of implementing this integration, however, is dependent on the trust, security, and authentication of IoT devices. Many IoT devices face significant security risks such as device hijacking and data leaks due to limited resources and inadequate self-protection capabilities. Despite the fact that several studies have been conducted using the physical unclonable function to protect communication between IoT devices from the aforementioned security threats, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and has a significant impact on efficiency. To fill this gap, this article proposes a Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer technique with single-share trusted device collaboration can detect an unauthenticated device. In addition, our proposed technique ensures the overall system's integrity and stability during a scaling-out phenomenon, which is becoming increasingly common in complex industrial environments. Furthermore, we present a formal and informal security analysis of the proposed protocol. According to the results of the performance analysis, our proposed technique has the lowest communication overhead, computational cost, and round-trip time when compared to other state-of-the-art schemes.

当在典型的制造系统中使用物联网(IoT)时,可以通过互联网远程控制工业工厂。这使得制造和执行系统能够直接从企业资源规划(ERP)系统获取实时工作订单。因此,用于开发、生产和制造的工作流可以与销售、市场和财务业务流程集成。然而,实现这种集成的可能性取决于物联网设备的信任、安全性和身份验证。由于资源有限和自我保护能力不足,许多物联网设备面临着设备劫持和数据泄露等重大安全风险。尽管已经进行了几项研究,使用物理不可克隆功能来保护物联网设备之间的通信免受上述安全威胁,但目前的解决方案依赖于服务器的参与来分发关键参数,这需要很高的消息开销,并对效率产生重大影响。为了填补这一空白,本文提出了一种基于一致性轮哈希优化的基于srp -6的端到端相互身份验证,用于安全数据传输技术,具有单共享可信设备协作,可以检测未经身份验证的设备。此外,我们提出的技术确保了整个系统在横向扩展现象期间的完整性和稳定性,这在复杂的工业环境中变得越来越普遍。此外,我们对提议的协议进行了正式和非正式的安全分析。根据性能分析的结果,与其他最先进的方案相比,我们提出的技术具有最低的通信开销、计算成本和往返时间。
{"title":"Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0","authors":"Ravi Sharma,&nbsp;Balázs Villányi","doi":"10.1016/j.iotcps.2022.09.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.09.001","url":null,"abstract":"<div><p>When the Internet of Things (IoT) is used in a typical manufacturing system, the industrial plant can be controlled remotely through the Internet. This enables manufacturing and execution systems to obtain real-time work orders directly from the Enterprise Resource Planning (ERP) system. Therefore, workflows for development, production, and manufacturing can be integrated with sales, market, and finance business processes. The possibility of implementing this integration, however, is dependent on the trust, security, and authentication of IoT devices. Many IoT devices face significant security risks such as device hijacking and data leaks due to limited resources and inadequate self-protection capabilities. Despite the fact that several studies have been conducted using the physical unclonable function to protect communication between IoT devices from the aforementioned security threats, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and has a significant impact on efficiency. To fill this gap, this article proposes a Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer technique with single-share trusted device collaboration can detect an unauthenticated device. In addition, our proposed technique ensures the overall system's integrity and stability during a scaling-out phenomenon, which is becoming increasingly common in complex industrial environments. Furthermore, we present a formal and informal security analysis of the proposed protocol. According to the results of the performance analysis, our proposed technique has the lowest communication overhead, computational cost, and round-trip time when compared to other state-of-the-art schemes.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 170-179"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000244/pdfft?md5=25280775935436cfd53ac91b584c6ac8&pid=1-s2.0-S2667345222000244-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91756484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sustainability 4.0 and its applications in the field of manufacturing 可持续性4.0及其在制造领域的应用
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.06.001
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Shahbaz Khan , Rajiv Suman

Sustainability 4.0 is being enabled through the effective adoption of modern technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Machine Vision (MV), Data Analytics (DA), Additive Manufacturing (AM) and other modern technologies. These technologies enable services at significantly lower prices due to the effective use of energy and resources with lesser wastage. Manufacturers are constantly looking for methods to lower the operating expenses associated with production processes. Manufacturers might optimise their value chain's production and associated processes by adopting sustainability 4.0 technologies. Such technologies will help manufacturers select their optimal facilities and employees, lower operational costs, enhance productivity and resource utilisation and provide a picture of process gaps that can be addressed. Sustainability is based on the effective use and reuse of resources across the product life cycle, from materials and processes to equipment and skills. Sustainable manufacturing produces manufactured goods using economically viable procedures that reduce negative environmental consequences while preserving energy and natural resources. This paper briefs Sustainability 4.0 and its significant needs. Various fundamental technologies and futuristic research aspects for Sustainability 4.0 are discussed diagrammatically. Finally, we identified and discussed significant applications of Sustainability 4.0 in manufacturing. Sustainability 4.0 refers to a long-term vision for enterprises that allows them to continue perpetually without depleting resources faster than they can be replaced. Sustainability 4.0 entails empowering prosumers to co-create to reshape the economy and society toward social inclusion and environmental sustainability. The use of sustainability and digitisation to solve environmental, social, and economic problems appears hopeful and exhausting.

通过有效采用物联网(IoT)、人工智能(AI)、机器学习(ML)、机器视觉(MV)、数据分析(DA)、增材制造(AM)和其他现代技术等现代技术,可持续发展4.0正在实现。由于有效利用了能源和资源,减少了浪费,这些技术使服务的价格大大降低。制造商一直在寻找降低与生产过程相关的运营费用的方法。制造商可以通过采用可持续性4.0技术来优化其价值链的生产和相关流程。这些技术将帮助制造商选择最佳的设施和员工,降低运营成本,提高生产力和资源利用率,并提供可以解决的过程差距的图片。可持续发展是基于在整个产品生命周期中,从材料和工艺到设备和技能,资源的有效利用和再利用。可持续制造业使用经济上可行的程序生产制成品,减少对环境的负面影响,同时保护能源和自然资源。本文简要介绍了可持续性4.0及其重要需求。可持续性4.0的各种基础技术和未来研究方面进行了图解讨论。最后,我们确定并讨论了可持续性4.0在制造业中的重要应用。可持续性4.0指的是企业的长期愿景,使其能够持续发展,而不会以比替代速度更快的速度耗尽资源。可持续发展4.0需要赋予产消者共同创造的权力,以重塑经济和社会,实现社会包容和环境可持续性。利用可持续性和数字化来解决环境、社会和经济问题似乎充满希望,但也令人筋疲力尽。
{"title":"Sustainability 4.0 and its applications in the field of manufacturing","authors":"Mohd Javaid ,&nbsp;Abid Haleem ,&nbsp;Ravi Pratap Singh ,&nbsp;Shahbaz Khan ,&nbsp;Rajiv Suman","doi":"10.1016/j.iotcps.2022.06.001","DOIUrl":"10.1016/j.iotcps.2022.06.001","url":null,"abstract":"<div><p>Sustainability 4.0 is being enabled through the effective adoption of modern technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Machine Vision (MV), Data Analytics (DA), Additive Manufacturing (AM) and other modern technologies. These technologies enable services at significantly lower prices due to the effective use of energy and resources with lesser wastage. Manufacturers are constantly looking for methods to lower the operating expenses associated with production processes. Manufacturers might optimise their value chain's production and associated processes by adopting sustainability 4.0 technologies. Such technologies will help manufacturers select their optimal facilities and employees, lower operational costs, enhance productivity and resource utilisation and provide a picture of process gaps that can be addressed. Sustainability is based on the effective use and reuse of resources across the product life cycle, from materials and processes to equipment and skills. Sustainable manufacturing produces manufactured goods using economically viable procedures that reduce negative environmental consequences while preserving energy and natural resources. This paper briefs Sustainability 4.0 and its significant needs. Various fundamental technologies and futuristic research aspects for Sustainability 4.0 are discussed diagrammatically. Finally, we identified and discussed significant applications of Sustainability 4.0 in manufacturing. Sustainability 4.0 refers to a long-term vision for enterprises that allows them to continue perpetually without depleting resources faster than they can be replaced. Sustainability 4.0 entails empowering prosumers to co-create to reshape the economy and society toward social inclusion and environmental sustainability. The use of sustainability and digitisation to solve environmental, social, and economic problems appears hopeful and exhausting.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 82-90"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000177/pdfft?md5=deb59d935cfaaa92d2189a5a303c9578&pid=1-s2.0-S2667345222000177-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74807117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Energy-efficient SDN for Internet of Things in smart city 面向智慧城市物联网的节能SDN
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.07.003
Chen Cheng , Jing Dou , Zhijiang Zheng

The establishment of smart city database requires Internet of things technology. With the continuous expansion of the scale of the Internet of things data center, the energy consumption of the data center is increasing, which greatly limits the development of the Internet of things data center. Energy consumption of Internet of things network data center in China's smart city has increased year by year, and data center network energy conservation has become a current research hotspot. The traditional network nodes are distributed and centralized innovatively to complete centralized control, and the controller completes the collection of the whole network information, the maintenance of network status, the distribution of flow entry, etc. Firstly, the energy-saving model of digital center network and the model data center network traffic prediction algorithm based on the principle of high accuracy traffic prediction are constructed, and an energy-saving multi-layer virtual traffic scheduling algorithm is proposed. Secondly, the two algorithms are fused, and finally an empirical study is carried out. The results show that in Random mode, the energy consumption ratio of energy-efficient multi-layer virtual-software defined networking (EMV-SDN) is the lowest, and the maximum reduction of energy consumption ratio reaches 7.8% compared with equal-cost multi-path (ECMP) algorithm. In Staggered mode and Stride mode, the energy consumption ratio of EMV-SDN algorithm is the lowest. Compared with the actual data flow, the prediction result of K-means-support vector machine (KM-SVM) algorithm is closer to the actual result, and the maximum error between the predicted value and the actual value of KM-SVM algorithm is 1.2 ​Gbps. However, the maximum error of balanced iterative reducing and clustering using hierarchies-support vector machine (B-SVM) algorithm reaches 3.1 ​Gbps; the prediction accuracy of KM-SVM algorithm is always higher than that of B-SVM algorithm in both discontinuous data flow and continuous actual data flow; the accuracy of KM-SVM algorithm in different experiments is high; among the energy consumption ratios of the combined algorithm, the energy consumption ratio of EMV-SDN algorithm is the lowest under the three communication modes, and the performance of the algorithm constructed in this study is higher than that of other algorithms in simulation operation; when the traffic prediction algorithm is combined with the virtual topology energy conservation control algorithm, the network structure change is reduced and the network stability is increased in this study. In the delay comparison of EMV-SDN algorithm, ECMP algorithm, and Dijkstra algorithm in the three communication modes, the EMV-SDN algorithm has the best performance. The results of this study provide an improvement direction for the development of Internet of Things technology and the construction of smart cities.

智慧城市数据库的建立需要物联网技术。随着物联网数据中心规模的不断扩大,数据中心的能耗越来越大,极大地限制了物联网数据中心的发展。中国智慧城市中物联网数据中心的能耗逐年增加,数据中心网络节能已成为当前的研究热点。将传统的网络节点创新性地进行分布式和集中化,完成集中控制,由控制器完成全网信息的采集、网络状态的维护、流量入口的分配等。首先,构建了数字中心网络的节能模型和基于高精度流量预测原理的模型数据中心网络流量预测算法,提出了一种节能的多层虚拟流量调度算法;其次,将两种算法进行融合,最后进行实证研究。结果表明:在随机模式下,高能效多层虚拟软件定义网络(EMV-SDN)的能耗比最低,与等成本多路径(ECMP)算法相比,能耗比最大降低7.8%;在交错模式和跨步模式下,EMV-SDN算法的能耗率最低。与实际数据流相比,k -均值-支持向量机(KM-SVM)算法的预测结果更接近实际结果,KM-SVM算法的预测值与实际值之间的最大误差为1.2 Gbps。然而,基于层次-支持向量机(B-SVM)算法的平衡迭代约简聚类最大误差达到3.1 Gbps;KM-SVM算法在不连续数据流和连续实际数据流中的预测精度始终高于B-SVM算法;KM-SVM算法在不同实验中的准确率较高;在组合算法的能耗比中,EMV-SDN算法在三种通信模式下的能耗比最低,并且本研究构建的算法在仿真运行中的性能高于其他算法;本研究将流量预测算法与虚拟拓扑节能控制算法相结合,减少了网络结构变化,提高了网络稳定性。在三种通信模式下EMV-SDN算法、ECMP算法和Dijkstra算法的时延比较中,EMV-SDN算法的性能最好。本研究结果为物联网技术的发展和智慧城市的建设提供了改进方向。
{"title":"Energy-efficient SDN for Internet of Things in smart city","authors":"Chen Cheng ,&nbsp;Jing Dou ,&nbsp;Zhijiang Zheng","doi":"10.1016/j.iotcps.2022.07.003","DOIUrl":"10.1016/j.iotcps.2022.07.003","url":null,"abstract":"<div><p>The establishment of smart city database requires Internet of things technology. With the continuous expansion of the scale of the Internet of things data center, the energy consumption of the data center is increasing, which greatly limits the development of the Internet of things data center. Energy consumption of Internet of things network data center in China's smart city has increased year by year, and data center network energy conservation has become a current research hotspot. The traditional network nodes are distributed and centralized innovatively to complete centralized control, and the controller completes the collection of the whole network information, the maintenance of network status, the distribution of flow entry, etc. Firstly, the energy-saving model of digital center network and the model data center network traffic prediction algorithm based on the principle of high accuracy traffic prediction are constructed, and an energy-saving multi-layer virtual traffic scheduling algorithm is proposed. Secondly, the two algorithms are fused, and finally an empirical study is carried out. The results show that in Random mode, the energy consumption ratio of energy-efficient multi-layer virtual-software defined networking (EMV-SDN) is the lowest, and the maximum reduction of energy consumption ratio reaches 7.8% compared with equal-cost multi-path (ECMP) algorithm. In Staggered mode and Stride mode, the energy consumption ratio of EMV-SDN algorithm is the lowest. Compared with the actual data flow, the prediction result of K-means-support vector machine (KM-SVM) algorithm is closer to the actual result, and the maximum error between the predicted value and the actual value of KM-SVM algorithm is 1.2 ​Gbps. However, the maximum error of balanced iterative reducing and clustering using hierarchies-support vector machine (B-SVM) algorithm reaches 3.1 ​Gbps; the prediction accuracy of KM-SVM algorithm is always higher than that of B-SVM algorithm in both discontinuous data flow and continuous actual data flow; the accuracy of KM-SVM algorithm in different experiments is high; among the energy consumption ratios of the combined algorithm, the energy consumption ratio of EMV-SDN algorithm is the lowest under the three communication modes, and the performance of the algorithm constructed in this study is higher than that of other algorithms in simulation operation; when the traffic prediction algorithm is combined with the virtual topology energy conservation control algorithm, the network structure change is reduced and the network stability is increased in this study. In the delay comparison of EMV-SDN algorithm, ECMP algorithm, and Dijkstra algorithm in the three communication modes, the EMV-SDN algorithm has the best performance. The results of this study provide an improvement direction for the development of Internet of Things technology and the construction of smart cities.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 145-158"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000220/pdfft?md5=2ec68f56dcfb3479211251d01df631b8&pid=1-s2.0-S2667345222000220-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76369624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Artificial intelligence enabled Digital Twins for training autonomous cars 人工智能使Digital Twins能够训练自动驾驶汽车
Pub Date : 2022-01-01 DOI: 10.1016/j.iotcps.2022.05.001
Dongliang Chen , Zhihan Lv

This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities.

针对基于人工智能技术的自动驾驶汽车数字孪生体(Digital Twins, dt)的系统预测和安全性能,以及智慧城市交通的智能化发展进行探索。一方面,考虑到智能交通系统中自动驾驶汽车的安全驾驶问题,必须保证车辆数据的传输安全,实现数据传输资源的负载均衡调度。另一方面,采用深度学习算法中的卷积神经网络(CNN)进行改进,然后引入dt技术。最后,构建了基于网络负载均衡和时空图卷积网络的自动驾驶汽车dt预测模型。并通过仿真,从准确率、精密度、召回率和F1-score四个方面分析了该模型的性能。实验结果表明,通过对比分析,本文模型的路网预测准确率为92.70%,比其他学者提出的模型至少高出2.92%。通过对网络数据传输安全性能的分析,发现该模型比其他比较模型实现了更低的平均延迟时间。消息投递率基本稳定在80%,消息泄漏率基本稳定在10%左右。因此,本文构建的自动驾驶汽车预测模型在保证低时延的同时,还具有良好的网络安全性能,使信息能够更高效地交互。研究成果可为智慧城市交通领域的智能化发展和安全性能提升提供实验依据。
{"title":"Artificial intelligence enabled Digital Twins for training autonomous cars","authors":"Dongliang Chen ,&nbsp;Zhihan Lv","doi":"10.1016/j.iotcps.2022.05.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.05.001","url":null,"abstract":"<div><p>This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 31-41"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000116/pdfft?md5=cf5256f2bb80cd6ce81c3f66b2885b73&pid=1-s2.0-S2667345222000116-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91756488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1