首页 > 最新文献

Internet of Things最新文献

英文 中文
E-governance and the European Union: Agenda for implementation 电子政务和欧洲联盟:实施议程
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/j.iot.2024.101352
David Ramiro Troitino
E-governance and Digital transformation in the European Union, ENDE, is a Jean Monnet network including prestigious experts on digital transformation holding Jean Monnet actions on digital aspects (Module, Chair or Centre of Excellence).
At a historical period of renovation in the paradigm of society, E-Governance and digitalization have seen their implementation accelerated by the recent COVID-19 pandemic. Therefore, understanding, suggesting adequate implementation and promoting such a change in the model of civilization is a priority as scientific target of the network. The main working areas are related to the practical implementation of E-governance in the European Union, including areas as politics, economy, law, international relations and social aspects. The objective of this special number of Internet of Things journal, is understanding and foreseeing the fast development on the digital agenda that can change completely the perception of the European Union, its influence over the citizen lives and the external scope of the organization.
欧盟的电子政务和数字化转型,即ENDE,是一个让·莫内网络,包括在数字化转型方面拥有让·莫内数字化方面行动的知名专家(模块、主席或卓越中心)。在社会范式革新的历史时期,最近的COVID-19大流行加速了电子政务和数字化的实施。因此,理解、建议适当实施和促进这种文明模式的转变是网络科学的首要目标。主要工作领域涉及欧盟电子政务的实际实施,包括政治、经济、法律、国际关系和社会等方面。这期物联网期刊的目的是理解和预见数字议程的快速发展,这可以完全改变欧盟的看法,其对公民生活和组织外部范围的影响。
{"title":"E-governance and the European Union: Agenda for implementation","authors":"David Ramiro Troitino","doi":"10.1016/j.iot.2024.101352","DOIUrl":"10.1016/j.iot.2024.101352","url":null,"abstract":"<div><div>E-governance and Digital transformation in the European Union, ENDE, is a Jean Monnet network including prestigious experts on digital transformation holding Jean Monnet actions on digital aspects (Module, Chair or Centre of Excellence).</div><div>At a historical period of renovation in the paradigm of society, E-Governance and digitalization have seen their implementation accelerated by the recent COVID-19 pandemic. Therefore, understanding, suggesting adequate implementation and promoting such a change in the model of civilization is a priority as scientific target of the network. The main working areas are related to the practical implementation of E-governance in the European Union, including areas as politics, economy, law, international relations and social aspects. The objective of this special number of Internet of Things journal, is understanding and foreseeing the fast development on the digital agenda that can change completely the perception of the European Union, its influence over the citizen lives and the external scope of the organization.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101352"},"PeriodicalIF":6.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142748252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention 通过情感识别和区块链驱动的入侵防御增强物联网安全
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-26 DOI: 10.1016/j.iot.2024.101442
Ernest Ntizikira , Lei Wang , Jenhui Chen , Kiran Saleem
As the Internet of Things (IoT) expands, ensuring the security and privacy of interconnected devices poses significant challenges. Traditional intrusion detection and prevention systems (IDPS) for IoT rely primarily on network traffic, anomaly detection, and signature-based approaches. This paper addresses deficiencies in conventional infrastructure security, particularly within Closed-Circuit Television (CCTV) operations, to fortify IoT environments against emerging intrusions and ensure heightened levels of privacy and security. Traditional intrusion detection and prevention systems (IDPSs) for IoT primarily rely on network traffic analysis, anomaly detection, and signature-based approaches. However, there is a promising opportunity to enhance IDPS effectiveness by incorporating CCTV cameras and human-inspired techniques. We present a novel approach to IoT security employing CCTV cameras, Raspberry Pi, and emotion recognition intrusion detection and prevention. Initially, two CCTV cameras are installed and connected to a Raspberry Pi for video recording and preprocessing. Emotions are then detected using a convolutional neural network (CNN). Anomalies are classified according to predefined criteria based on detected emotions: individuals meeting conditions such as fear, multiple failed logins (greater than 2), and activity after 6 PM are classified as intruders, those meeting one or two criteria are labeled suspicious, while others are considered normal (non-intruders). In the event of suspicious activity, an alarm is automatically generated, while for intruders, an internet ban is also applied in addition to an alarm. Our proposed system aims to provide a proactive and context-aware defense mechanism against IoT intrusions by integrating machine learning algorithms and blockchain technology, ensuring the robustness and reliability of IoT security.
随着物联网(IoT)的扩展,确保互联设备的安全性和隐私性提出了重大挑战。传统的物联网入侵检测和防御系统(IDPS)主要依赖于网络流量、异常检测和基于签名的方法。本文解决了传统基础设施安全方面的不足,特别是在闭路电视(CCTV)运营中,以加强物联网环境抵御新出现的入侵,并确保提高隐私和安全水平。传统的物联网入侵检测和防御系统(idps)主要依靠网络流量分析、异常检测和基于签名的方法。然而,通过结合闭路电视摄像机和人类启发的技术,有一个很有希望的机会来提高国内流离失所者的有效性。我们提出了一种采用闭路电视摄像机,树莓派和情感识别入侵检测和预防的物联网安全新方法。最初,安装了两个闭路电视摄像机并连接到树莓派上进行视频录制和预处理。然后使用卷积神经网络(CNN)检测情绪。根据检测到的情绪,根据预定义的标准对异常进行分类:满足恐惧、多次失败登录(大于2)和下午6点之后的活动等条件的个体被归类为入侵者,满足一个或两个标准的个体被标记为可疑,而其他的被认为是正常的(非入侵者)。在发生可疑活动时,会自动发出警报,而对于入侵者,除了警报外,还会应用互联网禁令。我们提出的系统旨在通过集成机器学习算法和区块链技术,提供针对物联网入侵的主动和情境感知防御机制,确保物联网安全的鲁棒性和可靠性。
{"title":"Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention","authors":"Ernest Ntizikira ,&nbsp;Lei Wang ,&nbsp;Jenhui Chen ,&nbsp;Kiran Saleem","doi":"10.1016/j.iot.2024.101442","DOIUrl":"10.1016/j.iot.2024.101442","url":null,"abstract":"<div><div>As the Internet of Things (IoT) expands, ensuring the security and privacy of interconnected devices poses significant challenges. Traditional intrusion detection and prevention systems (IDPS) for IoT rely primarily on network traffic, anomaly detection, and signature-based approaches. This paper addresses deficiencies in conventional infrastructure security, particularly within Closed-Circuit Television (CCTV) operations, to fortify IoT environments against emerging intrusions and ensure heightened levels of privacy and security. Traditional intrusion detection and prevention systems (IDPSs) for IoT primarily rely on network traffic analysis, anomaly detection, and signature-based approaches. However, there is a promising opportunity to enhance IDPS effectiveness by incorporating CCTV cameras and human-inspired techniques. We present a novel approach to IoT security employing CCTV cameras, Raspberry Pi, and emotion recognition intrusion detection and prevention. Initially, two CCTV cameras are installed and connected to a Raspberry Pi for video recording and preprocessing. Emotions are then detected using a convolutional neural network (CNN). Anomalies are classified according to predefined criteria based on detected emotions: individuals meeting conditions such as fear, multiple failed logins (greater than 2), and activity after 6 PM are classified as intruders, those meeting one or two criteria are labeled suspicious, while others are considered normal (non-intruders). In the event of suspicious activity, an alarm is automatically generated, while for intruders, an internet ban is also applied in addition to an alarm. Our proposed system aims to provide a proactive and context-aware defense mechanism against IoT intrusions by integrating machine learning algorithms and blockchain technology, ensuring the robustness and reliability of IoT security.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101442"},"PeriodicalIF":6.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insights for metrics in assessing TSCH scheduling efficiency 对评估TSCH调度效率的指标的见解
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-26 DOI: 10.1016/j.iot.2024.101440
Ivanilson França Vieira Junior , Jorge Granjal , Marilia Curado
Time-Slotted Channel Hopping (TSCH) Media Access Control (MAC) has become a leading wireless technology for industrial applications, offering deterministic communication while balancing latency, bandwidth, and energy consumption. This study addresses the critical challenge of cell scheduling within TSCH MAC, emphasising the importance of selecting scheduling mechanisms based on application-specific quality of service parameters. Despite numerous proposals and evaluations, the lack of standardised scheduling methods and comprehensive performance metrics remains a significant obstacle. Traditional network metrics often fail to capture key issues in TSCH-based mesh networks, potentially overlooking indicators of network stability. To address this gap, we examine both application and network metrics from a mesh network perspective and propose a set of complementary metrics tailored to the characteristics of TSCH. These metrics provide a more detailed evaluation of how scheduling impacts network reliability and efficiency. Given the diverse applications and configurations in industrial environments, this study offers insights into employing these complementary metrics for a more accurate assessment of the impact of TSCH scheduling. Ultimately, our approach aims to improve TSCH scheduling evaluation and contribute to advancing industrial wireless communication systems.
时隙信道跳频(TSCH)媒体访问控制(MAC)已成为工业应用的领先无线技术,在平衡延迟、带宽和能耗的同时提供确定性通信。本研究解决了TSCH MAC中蜂窝调度的关键挑战,强调了基于特定应用的服务质量参数选择调度机制的重要性。尽管有许多建议和评估,但缺乏标准化的调度方法和全面的绩效指标仍然是一个重大障碍。传统的网络指标往往不能捕捉到基于tsch的网状网络中的关键问题,潜在地忽略了网络稳定性指标。为了解决这一差距,我们从网状网络的角度研究了应用程序和网络指标,并提出了一套针对TSCH特征的补充指标。这些指标提供了调度如何影响网络可靠性和效率的更详细的评估。考虑到工业环境中不同的应用和配置,本研究为采用这些互补指标更准确地评估TSCH调度的影响提供了见解。最终,我们的方法旨在改善TSCH调度评估,并促进工业无线通信系统的发展。
{"title":"Insights for metrics in assessing TSCH scheduling efficiency","authors":"Ivanilson França Vieira Junior ,&nbsp;Jorge Granjal ,&nbsp;Marilia Curado","doi":"10.1016/j.iot.2024.101440","DOIUrl":"10.1016/j.iot.2024.101440","url":null,"abstract":"<div><div>Time-Slotted Channel Hopping (TSCH) Media Access Control (MAC) has become a leading wireless technology for industrial applications, offering deterministic communication while balancing latency, bandwidth, and energy consumption. This study addresses the critical challenge of cell scheduling within TSCH MAC, emphasising the importance of selecting scheduling mechanisms based on application-specific quality of service parameters. Despite numerous proposals and evaluations, the lack of standardised scheduling methods and comprehensive performance metrics remains a significant obstacle. Traditional network metrics often fail to capture key issues in TSCH-based mesh networks, potentially overlooking indicators of network stability. To address this gap, we examine both application and network metrics from a mesh network perspective and propose a set of complementary metrics tailored to the characteristics of TSCH. These metrics provide a more detailed evaluation of how scheduling impacts network reliability and efficiency. Given the diverse applications and configurations in industrial environments, this study offers insights into employing these complementary metrics for a more accurate assessment of the impact of TSCH scheduling. Ultimately, our approach aims to improve TSCH scheduling evaluation and contribute to advancing industrial wireless communication systems.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101440"},"PeriodicalIF":6.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-driven load forecasting with machine learning for logistics planning 物联网驱动的负荷预测与物流规划的机器学习
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-26 DOI: 10.1016/j.iot.2024.101441
Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub
Forecasting electricity load in logistics is crucial for managing dynamic energy demands. This research introduces the Integrated Load Forecasting System (ILFS), integrating IoT-driven load forecasting with advanced machine learning. As pioneers in logistics-focused electricity load forecasting, we acknowledge challenges posed by operational metrics, external factors, and diverse features. Starting with thorough preparation, including managing missing data and normalization, ILFS incorporates novel approaches such as Hybrid Boruta with XGBoost (BXG) for feature selection and Uniform Manifold Projection and Approximation (UMAP) for lower dimensionality. In the classification phase, we introduce a pioneering approach: the Hybrid Huber Regression with ResNet (HRRN) model, fine-tuned using the Coyote Optimization Algorithm (COA). Demonstrating scalability and interpretability, ILFS adjusts to various electricity load data scenarios, capturing trends in logistics supply warehouses across different days. Validation metrics underscore ILFS’s efficacy, achieving 98% accuracy, 4 MAE, 12 MSE, 5 RMSE, and 0.99 R-squared (R2). With an average execution time of 7.2 s, ILFS outperforms current techniques, and rigorous statistical analyses support this superiority. ILFS emerges as a pivotal solution, meeting the necessities of precise electricity load forecasting in logistics driven by IoT technologies. This research strides towards harmonious integration of load forecasting, IoT, and logistics planning, ushering in advancements in the field.
物流用电负荷预测是管理动态能源需求的关键。本研究引入综合负荷预测系统(ILFS),将物联网驱动的负荷预测与先进的机器学习相结合。作为以物流为中心的电力负荷预测的先驱,我们承认运营指标、外部因素和各种特征带来的挑战。从彻底的准备开始,包括管理丢失的数据和归一化,ILFS结合了新的方法,如混合Boruta与XGBoost (BXG)的特征选择和统一流形投影和近似(UMAP)的低维。在分类阶段,我们引入了一种开创性的方法:混合Huber回归与ResNet (HRRN)模型,使用Coyote优化算法(COA)进行微调。ILFS展示了可扩展性和可解释性,可适应各种电力负荷数据场景,捕捉不同日期物流供应仓库的趋势。验证指标强调了ILFS的有效性,达到98%的准确率,4 MAE, 12 MSE, 5 RMSE和0.99 r平方(R2)。ILFS的平均执行时间为7.2秒,优于当前的技术,严格的统计分析支持这种优势。ILFS作为一种关键的解决方案出现,满足了物联网技术驱动下物流中精确电力负荷预测的需求。本研究朝着负荷预测、物联网和物流规划的和谐融合迈进,在该领域取得了进展。
{"title":"IoT-driven load forecasting with machine learning for logistics planning","authors":"Abdulrahman A. Alshdadi,&nbsp;Abdulwahab Ali Almazroi,&nbsp;Nasir Ayub","doi":"10.1016/j.iot.2024.101441","DOIUrl":"10.1016/j.iot.2024.101441","url":null,"abstract":"<div><div>Forecasting electricity load in logistics is crucial for managing dynamic energy demands. This research introduces the Integrated Load Forecasting System (ILFS), integrating IoT-driven load forecasting with advanced machine learning. As pioneers in logistics-focused electricity load forecasting, we acknowledge challenges posed by operational metrics, external factors, and diverse features. Starting with thorough preparation, including managing missing data and normalization, ILFS incorporates novel approaches such as Hybrid Boruta with XGBoost (BXG) for feature selection and Uniform Manifold Projection and Approximation (UMAP) for lower dimensionality. In the classification phase, we introduce a pioneering approach: the Hybrid Huber Regression with ResNet (HRRN) model, fine-tuned using the Coyote Optimization Algorithm (COA). Demonstrating scalability and interpretability, ILFS adjusts to various electricity load data scenarios, capturing trends in logistics supply warehouses across different days. Validation metrics underscore ILFS’s efficacy, achieving 98% accuracy, 4 MAE, 12 MSE, 5 RMSE, and 0.99 R-squared (<span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>). With an average execution time of 7.2 s, ILFS outperforms current techniques, and rigorous statistical analyses support this superiority. ILFS emerges as a pivotal solution, meeting the necessities of precise electricity load forecasting in logistics driven by IoT technologies. This research strides towards harmonious integration of load forecasting, IoT, and logistics planning, ushering in advancements in the field.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101441"},"PeriodicalIF":6.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing an IOT-based assistant service for recognizing vocal cord diseases 构建基于物联网的声带疾病识别辅助服务
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-26 DOI: 10.1016/j.iot.2024.101424
Chen-Kun Tsung , Yung-An Tsou , Rahmi Liza
In this paper, we apply the Internet of Things (IoT) technology to construct the non-invasive examination, named IoT-based vocal cords (VC) disease inference system (i-VCD), to provide the disease inference assistant framework for physicians. The proposed i-VCD tracks patient’s voice recording during consulting by the IoT technology, analyzes the voice features, and outputs potential VC diseases. We evaluate several classification algorithms, including eXtreme gradient boosting (XGBoost), random forest, support vector machines, and artificial neural networks, to recognize the diseases based on the voice features. In the experiments, polyps, paralysis, and Reinke’s edema are considered as the target diseases, and two scenarios are proposed: the one-to-one model and the one-to-many model. In the one-to-one model, a classification algorithm is applied to recognize exactly one VC disease, while four diseases are evaluated together in the one-to-many model. The performance in the one-to-many model is worse than that in the one-to-one model because the sound features may overlap in various diseases. However, the one-to-many model is close to the clinical environment. The experiment results show that the i-VCD with XGBoost in the one-to-one model has 94%, 100%, and 100% for polyps, paralysis, and Reinke’s edema in accuracy, respectively. The accuracy is 93% in the one-to-many model, which outperforms related approaches. Moreover, i-VCD is also deployed in a cloud service so that the physicians can get the assistance of i-VCD easily. Eventually, i-VCD provides high performance in recognizing VC diseases in a non-invasive way and is helpful in clinical consulting.
本文应用物联网(IoT)技术构建无创检查,命名为基于物联网的声带(VC)疾病推断系统(i-VCD),为医生提供疾病推断助手框架。所提出的 i-VCD通过物联网技术跟踪病人咨询时的语音记录,分析语音特征,并输出潜在的声带疾病。我们评估了几种分类算法,包括极端梯度提升(XGBoost)、随机森林、支持向量机和人工神经网络,以根据语音特征识别疾病。在实验中,以息肉、瘫痪和莱因克氏水肿为目标疾病,提出了两种方案:一对一模型和一对多模型。在一对一模型中,应用分类算法准确识别一种 VC 疾病,而在一对多模型中,四种疾病一起进行评估。一对多模型的性能比一对一模型差,因为各种疾病的声音特征可能会重叠。不过,一对多模型接近临床环境。实验结果表明,在一对一模型中,使用 XGBoost 的 i-VCD 对息肉、瘫痪和莱因克氏水肿的准确率分别为 94%、100% 和 100%。在一对多模型中,准确率为 93%,优于相关方法。此外,i-VCD 还部署在云服务中,医生可以轻松获得 i-VCD 的帮助。最终,i-VCD 能以非侵入性的方式高效识别血管疾病,有助于临床咨询。
{"title":"Constructing an IOT-based assistant service for recognizing vocal cord diseases","authors":"Chen-Kun Tsung ,&nbsp;Yung-An Tsou ,&nbsp;Rahmi Liza","doi":"10.1016/j.iot.2024.101424","DOIUrl":"10.1016/j.iot.2024.101424","url":null,"abstract":"<div><div>In this paper, we apply the Internet of Things (IoT) technology to construct the non-invasive examination, named IoT-based vocal cords (VC) disease inference system (i-VCD), to provide the disease inference assistant framework for physicians. The proposed i-VCD tracks patient’s voice recording during consulting by the IoT technology, analyzes the voice features, and outputs potential VC diseases. We evaluate several classification algorithms, including eXtreme gradient boosting (XGBoost), random forest, support vector machines, and artificial neural networks, to recognize the diseases based on the voice features. In the experiments, polyps, paralysis, and Reinke’s edema are considered as the target diseases, and two scenarios are proposed: the one-to-one model and the one-to-many model. In the one-to-one model, a classification algorithm is applied to recognize exactly one VC disease, while four diseases are evaluated together in the one-to-many model. The performance in the one-to-many model is worse than that in the one-to-one model because the sound features may overlap in various diseases. However, the one-to-many model is close to the clinical environment. The experiment results show that the i-VCD with XGBoost in the one-to-one model has 94%, 100%, and 100% for polyps, paralysis, and Reinke’s edema in accuracy, respectively. The accuracy is 93% in the one-to-many model, which outperforms related approaches. Moreover, i-VCD is also deployed in a cloud service so that the physicians can get the assistance of i-VCD easily. Eventually, i-VCD provides high performance in recognizing VC diseases in a non-invasive way and is helpful in clinical consulting.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101424"},"PeriodicalIF":6.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-temporal-scale event detection and clustering in IoT systems 物联网系统中的多时标事件检测与聚类
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-23 DOI: 10.1016/j.iot.2024.101434
Youchan Park, In-Young Ko
Sensor-based Internet of Things (IoT) systems detect events from the data stream and take appropriate actions through event processing. The core of event processing, event rules, are typically defined manually by domain experts. However, there are limitations to domain experts manually setting rules for all the unlabeled events in the runtime of IoT systems. Therefore, there is a need for methods that support the generation of rules for unlabeled events. This study addresses this issue by adding two phases to the existing event processing. The first phase is the detection of unlabeled events from the data stream. Considering the characteristics of IoT systems, we propose Multi-Temporal-Scale Sampling (MulTemS), an extension of anomaly detection techniques that can detect events of various temporal-scales from multivariate time-series data. The second phase is the formation of clusters among similar events. We propose Feature-based Clustering Number prediction and Clustering (FeatCNC), which predicts the number of clusters through feature extraction and performs domain-neutral clustering. Through experiments, we demonstrate that MulTemS can effectively detect events of multiple temporal-scales, and FeatCNC can reliably cluster events across diverse domains. Additionally, we verify that the integration of these two phases results in the better formation of clusters that capture the characteristics of the events.
基于传感器的物联网(IoT)系统从数据流中检测事件,并通过事件处理采取适当的行动。事件处理的核心--事件规则通常由领域专家手动定义。然而,在物联网系统的运行过程中,领域专家为所有未标记的事件手动设置规则存在局限性。因此,需要有支持为未标记事件生成规则的方法。本研究通过在现有事件处理中增加两个阶段来解决这一问题。第一阶段是从数据流中检测无标记事件。考虑到物联网系统的特点,我们提出了多时标采样(MulTemS)技术,它是异常检测技术的一种扩展,可以从多元时间序列数据中检测出各种时标事件。第二阶段是在类似事件中形成聚类。我们提出了基于特征的聚类数量预测和聚类(FeatCNC),它通过特征提取来预测聚类数量,并执行领域中立的聚类。通过实验,我们证明 MulTemS 可以有效检测多个时间尺度的事件,而 FeatCNC 可以可靠地对不同领域的事件进行聚类。此外,我们还验证了这两个阶段的整合能更好地形成能捕捉事件特征的聚类。
{"title":"Multi-temporal-scale event detection and clustering in IoT systems","authors":"Youchan Park,&nbsp;In-Young Ko","doi":"10.1016/j.iot.2024.101434","DOIUrl":"10.1016/j.iot.2024.101434","url":null,"abstract":"<div><div>Sensor-based Internet of Things (IoT) systems detect events from the data stream and take appropriate actions through event processing. The core of event processing, event rules, are typically defined manually by domain experts. However, there are limitations to domain experts manually setting rules for all the unlabeled events in the runtime of IoT systems. Therefore, there is a need for methods that support the generation of rules for unlabeled events. This study addresses this issue by adding two phases to the existing event processing. The first phase is the detection of unlabeled events from the data stream. Considering the characteristics of IoT systems, we propose Multi-Temporal-Scale Sampling (MulTemS), an extension of anomaly detection techniques that can detect events of various temporal-scales from multivariate time-series data. The second phase is the formation of clusters among similar events. We propose Feature-based Clustering Number prediction and Clustering (FeatCNC), which predicts the number of clusters through feature extraction and performs domain-neutral clustering. Through experiments, we demonstrate that MulTemS can effectively detect events of multiple temporal-scales, and FeatCNC can reliably cluster events across diverse domains. Additionally, we verify that the integration of these two phases results in the better formation of clusters that capture the characteristics of the events.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101434"},"PeriodicalIF":6.0,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authorization models for IoT environments: A survey 物联网环境的授权模型:调查
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-23 DOI: 10.1016/j.iot.2024.101430
Jaime Pérez Díaz, Florina Almenares Mendoza
Authorization models are pivotal in the Internet of Things (IoT) ecosystem, ensuring secure management of data access and communication. These models function after authentication, determining the specific actions that a device is allowed to perform. This paper aims to provide a comprehensive and comparative analysis of authorization solutions within IoT contexts, based on the requirements identified from the existing literature. We critically assess the functionalities and capabilities of various authorization solutions, particularly those designed for IoT cloud platforms and distributed architectures. Our findings highlight the urgent need for further development of authorization models optimized for the unique demands of IoT environments. Consequently, we address both the persistent challenges and the gaps within this domain. As IoT continues to reshape the technological landscape, the refinement and adaptation of authorization models remain imperative ongoing pursuits.
授权模型在物联网(IoT)生态系统中至关重要,可确保数据访问和通信的安全管理。这些模型在身份验证后发挥作用,确定允许设备执行的特定操作。本文旨在基于从现有文献中确定的需求,对物联网环境下的授权解决方案进行全面和比较分析。我们严格评估各种授权解决方案的功能和能力,特别是那些为物联网云平台和分布式架构设计的解决方案。我们的研究结果强调,迫切需要进一步开发针对物联网环境独特需求进行优化的授权模型。因此,我们解决了这一领域内持续存在的挑战和差距。随着物联网继续重塑技术格局,授权模型的改进和适应仍然是势在必行的持续追求。
{"title":"Authorization models for IoT environments: A survey","authors":"Jaime Pérez Díaz,&nbsp;Florina Almenares Mendoza","doi":"10.1016/j.iot.2024.101430","DOIUrl":"10.1016/j.iot.2024.101430","url":null,"abstract":"<div><div>Authorization models are pivotal in the Internet of Things (IoT) ecosystem, ensuring secure management of data access and communication. These models function after authentication, determining the specific actions that a device is allowed to perform. This paper aims to provide a comprehensive and comparative analysis of authorization solutions within IoT contexts, based on the requirements identified from the existing literature. We critically assess the functionalities and capabilities of various authorization solutions, particularly those designed for IoT cloud platforms and distributed architectures. Our findings highlight the urgent need for further development of authorization models optimized for the unique demands of IoT environments. Consequently, we address both the persistent challenges and the gaps within this domain. As IoT continues to reshape the technological landscape, the refinement and adaptation of authorization models remain imperative ongoing pursuits.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101430"},"PeriodicalIF":6.0,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization 工业 5.0 中的未来工厂--软件化、服务化和工业化
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-21 DOI: 10.1016/j.iot.2024.101431
Amr Adel , Noor HS Alani , Tony Jan
The transition from industry 4.0 to industry 5.0 represents a profound paradigm shift in the manufacturing domain, emphasizing the convergence of advanced digital technologies with human-centric collaboration, sustainability, and operational resilience. This paper rigorously investigates the transformative potential of softwarization and servitization within sophisticated cloud architectures, which are pivotal enablers for the realization of Factories-of-the-Future (FoF) in the industry 5.0 context. We explore the technical intricacies of softwarization, harnessing technologies such as Software-Defined Networking (SDN), Network Functions Virtualization (NFV), Artificial Intelligence as a Service (AIaaS), and cloud-native architectures to achieve unprecedented levels of flexibility, scalability, and operational efficiency in manufacturing ecosystems. Concurrently, servitization facilitates a shift from traditional product-centric models to dynamic, service-oriented frameworks, enabling highly customizable, on-demand manufacturing processes and significantly enhancing customer engagement. By meticulously examining the symbiotic relationship between these technologies, this paper presents a comprehensive roadmap that addresses critical technical challenges, including scalability, interoperability with legacy systems, and robust cybersecurity in distributed environments. Furthermore, we identify emergent opportunities such as AI-driven predictive maintenance, large-scale hyper-personalization, and the dynamic orchestration of Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) paradigms. Our contributions offer valuable insights for researchers, industry experts, and stakeholders, aiming to fully leverage the potential of Industry 5.0 to drive innovation and transform global manufacturing practices.
从工业 4.0 到工业 5.0 的转变代表着制造领域的深刻范式转变,强调先进数字技术与以人为本的协作、可持续性和运营弹性的融合。本文严格研究了先进云架构中的软化和服务化的变革潜力,它们是在工业 5.0 背景下实现未来工厂(FoF)的关键推动因素。我们探讨了软沃化的复杂技术,利用软件定义网络(SDN)、网络功能虚拟化(NFV)、人工智能即服务(AIaaS)和云原生架构等技术,在制造生态系统中实现前所未有的灵活性、可扩展性和运营效率。同时,服务化促进了从传统的以产品为中心的模式向动态的、以服务为导向的框架转变,实现了高度定制化、按需生产流程,并显著提高了客户参与度。通过仔细研究这些技术之间的共生关系,本文提出了一个全面的路线图,以解决关键技术挑战,包括分布式环境中的可扩展性、与传统系统的互操作性和强大的网络安全。此外,我们还发现了人工智能驱动的预测性维护、大规模超个性化以及平台即服务(PaaS)和基础设施即服务(IaaS)范例的动态协调等新兴机遇。我们的贡献为研究人员、行业专家和利益相关者提供了宝贵的见解,旨在充分利用工业 5.0 的潜力,推动创新并改变全球制造业实践。
{"title":"Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization","authors":"Amr Adel ,&nbsp;Noor HS Alani ,&nbsp;Tony Jan","doi":"10.1016/j.iot.2024.101431","DOIUrl":"10.1016/j.iot.2024.101431","url":null,"abstract":"<div><div>The transition from industry 4.0 to industry 5.0 represents a profound paradigm shift in the manufacturing domain, emphasizing the convergence of advanced digital technologies with human-centric collaboration, sustainability, and operational resilience. This paper rigorously investigates the transformative potential of softwarization and servitization within sophisticated cloud architectures, which are pivotal enablers for the realization of Factories-of-the-Future (FoF) in the industry 5.0 context. We explore the technical intricacies of softwarization, harnessing technologies such as Software-Defined Networking (SDN), Network Functions Virtualization (NFV), Artificial Intelligence as a Service (AIaaS), and cloud-native architectures to achieve unprecedented levels of flexibility, scalability, and operational efficiency in manufacturing ecosystems. Concurrently, servitization facilitates a shift from traditional product-centric models to dynamic, service-oriented frameworks, enabling highly customizable, on-demand manufacturing processes and significantly enhancing customer engagement. By meticulously examining the symbiotic relationship between these technologies, this paper presents a comprehensive roadmap that addresses critical technical challenges, including scalability, interoperability with legacy systems, and robust cybersecurity in distributed environments. Furthermore, we identify emergent opportunities such as AI-driven predictive maintenance, large-scale hyper-personalization, and the dynamic orchestration of Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) paradigms. Our contributions offer valuable insights for researchers, industry experts, and stakeholders, aiming to fully leverage the potential of Industry 5.0 to drive innovation and transform global manufacturing practices.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101431"},"PeriodicalIF":6.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142702988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic risk assessment approach for analysing cyber security events in medical IoT networks 用于分析医疗物联网网络安全事件的动态风险评估方法
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-20 DOI: 10.1016/j.iot.2024.101437
Ricardo M. Czekster , Thais Webber , Leonardo Bertolin Furstenau , César Marcon
Advancements in Medical Internet of Things (MIoT) technology ease remote health monitoring and effective management of medical devices. However, these developments also expose systems to novel cyber security risks as sophisticated threat actors exploit infrastructure vulnerabilities to access sensitive data or deploy malicious software, threatening patient safety, device reliability, and trust. This paper introduces a lightweight dynamic risk assessment approach using scenario-based simulations to analyse cyber security events in MIoT infrastructures and supplement cyber security activities within organisations. The approach includes synthetic data and threat models to enrich discrete-event simulations, offering a comprehensive understanding of emerging threats and their potential impact on healthcare settings. Our simulation scenario illustrates the model’s behaviour in processing data flows and capturing the characteristics of healthcare settings. Our findings demonstrate its validity by highlighting potential threats and mitigation strategies. The insights from these simulations highlight the model’s flexibility, enabling adaptation to various healthcare settings and supporting continuous risk assessment to enhance MIoT system security and resilience.
医疗物联网(MIoT)技术的进步方便了远程健康监测和医疗设备的有效管理。然而,这些发展也使系统面临新的网络安全风险,因为复杂的威胁行为者会利用基础设施漏洞访问敏感数据或部署恶意软件,从而威胁患者安全、设备可靠性和信任度。本文介绍了一种轻量级动态风险评估方法,利用基于场景的模拟来分析 MIoT 基础设施中的网络安全事件,并对组织内的网络安全活动进行补充。该方法包括合成数据和威胁模型,以丰富离散事件模拟,全面了解新兴威胁及其对医疗环境的潜在影响。我们的模拟场景说明了该模型在处理数据流和捕捉医疗环境特征时的行为。我们的研究结果通过强调潜在威胁和缓解策略证明了该模型的有效性。从这些模拟中获得的见解突出了该模型的灵活性,使其能够适应各种医疗环境,并支持持续的风险评估,以增强移动医疗系统的安全性和弹性。
{"title":"Dynamic risk assessment approach for analysing cyber security events in medical IoT networks","authors":"Ricardo M. Czekster ,&nbsp;Thais Webber ,&nbsp;Leonardo Bertolin Furstenau ,&nbsp;César Marcon","doi":"10.1016/j.iot.2024.101437","DOIUrl":"10.1016/j.iot.2024.101437","url":null,"abstract":"<div><div>Advancements in Medical Internet of Things (MIoT) technology ease remote health monitoring and effective management of medical devices. However, these developments also expose systems to novel cyber security risks as sophisticated threat actors exploit infrastructure vulnerabilities to access sensitive data or deploy malicious software, threatening patient safety, device reliability, and trust. This paper introduces a lightweight dynamic risk assessment approach using scenario-based simulations to analyse cyber security events in MIoT infrastructures and supplement cyber security activities within organisations. The approach includes synthetic data and threat models to enrich discrete-event simulations, offering a comprehensive understanding of emerging threats and their potential impact on healthcare settings. Our simulation scenario illustrates the model’s behaviour in processing data flows and capturing the characteristics of healthcare settings. Our findings demonstrate its validity by highlighting potential threats and mitigation strategies. The insights from these simulations highlight the model’s flexibility, enabling adaptation to various healthcare settings and supporting continuous risk assessment to enhance MIoT system security and resilience.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"29 ","pages":"Article 101437"},"PeriodicalIF":6.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-robotics for collaborative sweep coverage 用于协作清扫覆盖的物联网机器人
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1016/j.iot.2024.101417
Alba Amato , Dario Branco , Beniamino Di Martino , Caterina Fedele , Salvatore Venticinque
The combination of Task Scheduling (TS) approaches in Multi-Agent Systems (MAS) and Path Finding (PF) can produce a wide range of solutions in several application contexts, such of logistics, sweeping and cleaning of large areas, and surveillance missions by Unmanned Vehicles. This paper presents a task assignment method for multi-agents-based collaborative sweep covering, where it is relevant to follow the optimal route in order to maximize the expected results with the available resources and constraints. The designed solution uses a smart planner, which computes optimal routes, and a centralized scheduler that assigns tasks to unmanned robots according to different priority queues. The prototype implementation integrates off-the-shelf IoT technologies to drive a simple robot in a controlled environment. Image processing technologies are used either to estimate in advance the expected reward for the planned route and afterward to get a feedback about the task execution.
多代理系统(MAS)中的任务调度(TS)方法与路径查找(PF)相结合,可以在多种应用环境中产生广泛的解决方案,例如物流、大面积清扫和清洁以及无人驾驶飞行器的监视任务。本文介绍了一种基于多机器人协作清扫覆盖的任务分配方法,在这种情况下,需要遵循最优路线,以便在可用资源和限制条件下实现预期效果最大化。所设计的解决方案使用智能规划器计算最优路线,并使用集中式调度器根据不同的优先级队列为无人驾驶机器人分配任务。原型实施集成了现成的物联网技术,可在受控环境中驱动一个简单的机器人。图像处理技术既可用于事先估计计划路线的预期回报,也可用于事后获得任务执行情况的反馈。
{"title":"IoT-robotics for collaborative sweep coverage","authors":"Alba Amato ,&nbsp;Dario Branco ,&nbsp;Beniamino Di Martino ,&nbsp;Caterina Fedele ,&nbsp;Salvatore Venticinque","doi":"10.1016/j.iot.2024.101417","DOIUrl":"10.1016/j.iot.2024.101417","url":null,"abstract":"<div><div>The combination of Task Scheduling (TS) approaches in Multi-Agent Systems (MAS) and Path Finding (PF) can produce a wide range of solutions in several application contexts, such of logistics, sweeping and cleaning of large areas, and surveillance missions by Unmanned Vehicles. This paper presents a task assignment method for multi-agents-based collaborative sweep covering, where it is relevant to follow the optimal route in order to maximize the expected results with the available resources and constraints. The designed solution uses a smart planner, which computes optimal routes, and a centralized scheduler that assigns tasks to unmanned robots according to different priority queues. The prototype implementation integrates off-the-shelf IoT technologies to drive a simple robot in a controlled environment. Image processing technologies are used either to estimate in advance the expected reward for the planned route and afterward to get a feedback about the task execution.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101417"},"PeriodicalIF":6.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142702987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1