首页 > 最新文献

Internet of Things最新文献

英文 中文
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices 基于 WSN 和视觉的智能、节能、可扩展且可靠的停车监控系统,可在边缘对资源有限的物联网设备进行光学验证
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101346
Shreeram Hudda, Rishabh Barnwal, Abhishek Khurana, K. Haribabu

As urbanization accelerates, the demand for efficient parking surveillance solutions has increased. However, existing solutions often face challenges related to energy consumption, scalability, and reliability. This paper introduces a smart hybrid parking surveillance system integrating wireless sensor networks (WSNs) with vision based solution at the edge for resource constrained IoT devices to address these challenges. The solution leverages WSNs for periodic readings of parking space occupancy and introduces a low power sleep mode in the network for energy efficiency, along with optical verification strategies using computer vision models like R-CNN and Faster R-CNN FPN on ResNet50 and MobileNetv2 backbones for distinguishing between true and false positives in the WSN data for a greater accuracy in parking space occupancy. The system utilizes edge for computing on edge servers resulting in increased responsiveness of the system, reduced data transmission and real time processing of data. The proposed solution is formulated in such a way that it automatically switches between WSN and vision based sensing resulting in less energy consumption and longer lifespan of the system without compromising on accuracy. Through experimental results it is observed that models trained on the MobileNetv2 backbone demonstrated at least twice faster for both processing the images and training compared to those models trained on the ResNet backbone. On the other hand, both Faster R-CNN FPN (input resolution: 1440) and R-CNN (input resolution: 128) models trained on the MobileNetv2 backbone have slightly lower accuracies than the same models trained on the ResNet50 backbone.

随着城市化进程的加快,对高效停车场监控解决方案的需求也随之增加。然而,现有的解决方案往往面临着能耗、可扩展性和可靠性方面的挑战。本文介绍了一种智能混合停车监控系统,该系统集成了无线传感器网络(WSN)和基于视觉的边缘解决方案,适用于资源受限的物联网设备,以应对这些挑战。该解决方案利用 WSN 定期读取停车位占用情况,并在网络中引入低功耗睡眠模式以提高能效,同时在 ResNet50 和 MobileNetv2 主干网上使用 R-CNN 和 Faster R-CNN FPN 等计算机视觉模型进行光学验证策略,以区分 WSN 数据中的真假阳性,从而提高停车位占用情况的准确性。该系统利用边缘服务器上的边缘进行计算,从而提高了系统的响应速度,减少了数据传输并实现了数据的实时处理。所提出的解决方案可以在 WSN 和基于视觉的传感之间自动切换,从而在不影响准确性的前提下降低能耗,延长系统的使用寿命。实验结果表明,与在 ResNet 主干网上训练的模型相比,在 MobileNetv2 主干网上训练的模型处理图像和训练的速度至少快两倍。另一方面,在 MobileNetv2 主干网上训练的 Faster R-CNN FPN(输入分辨率:1440)和 R-CNN(输入分辨率:128)模型的准确率都略低于在 ResNet50 主干网上训练的相同模型。
{"title":"A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices","authors":"Shreeram Hudda,&nbsp;Rishabh Barnwal,&nbsp;Abhishek Khurana,&nbsp;K. Haribabu","doi":"10.1016/j.iot.2024.101346","DOIUrl":"10.1016/j.iot.2024.101346","url":null,"abstract":"<div><p>As urbanization accelerates, the demand for efficient parking surveillance solutions has increased. However, existing solutions often face challenges related to energy consumption, scalability, and reliability. This paper introduces a smart hybrid parking surveillance system integrating wireless sensor networks (WSNs) with vision based solution at the edge for resource constrained IoT devices to address these challenges. The solution leverages WSNs for periodic readings of parking space occupancy and introduces a low power sleep mode in the network for energy efficiency, along with optical verification strategies using computer vision models like R-CNN and Faster R-CNN FPN on ResNet50 and MobileNetv2 backbones for distinguishing between true and false positives in the WSN data for a greater accuracy in parking space occupancy. The system utilizes edge for computing on edge servers resulting in increased responsiveness of the system, reduced data transmission and real time processing of data. The proposed solution is formulated in such a way that it automatically switches between WSN and vision based sensing resulting in less energy consumption and longer lifespan of the system without compromising on accuracy. Through experimental results it is observed that models trained on the MobileNetv2 backbone demonstrated at least twice faster for both processing the images and training compared to those models trained on the ResNet backbone. On the other hand, both Faster R-CNN FPN (input resolution: 1440) and R-CNN (input resolution: 128) models trained on the MobileNetv2 backbone have slightly lower accuracies than the same models trained on the ResNet50 backbone.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101346"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of data collaborative sensing methods for smart agriculture 智能农业数据协作传感方法调查
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101354
Xiaomin Li , Zhaokang Gong , Jianhua Zheng , Yongxin Liu , Huiru Cao

Data is becoming increasingly pivotal and foundational in the development of smart agriculture, underscoring the importance of efficient methods for obtaining high-value data. Data sensing methods have become the key technologies and methods to realize the agricultural Internet of Things (IoT). However, in the face of the new agricultural paradigm driven by big data, traditional agricultural IoT confronts numerous challenges at the data sensing level. This article, therefore, adopts a data sensing perspective and, based on the agricultural IoT, explores the evolution of data sensing technology in the agricultural domain. Initially, it introduces a data sensing framework for the agricultural Internet of Things, which integrates cloud and edge computing. Subsequently, it reviews the sensors commonly deployed in agricultural scenarios. Then, common methods for collaborative sensing of agricultural data were discussed from three aspects: intra-node, multiple nodes, and cross-domain. At the same time, the issues of data security and privacy in data collaborative sensing were discussed. Next, we integrate multi-dimensional technology to construct an application case for data sensing in the agricultural IoT. Finally, it discusses the challenges that Collaborative sensing technology encounters within the agricultural IoT.

数据在智慧农业的发展中越来越具有关键性和基础性作用,这凸显了高效获取高价值数据方法的重要性。数据传感方法已成为实现农业物联网的关键技术和方法。然而,面对大数据驱动的新型农业模式,传统农业物联网在数据传感层面面临诸多挑战。因此,本文采用数据传感视角,以农业物联网为基础,探讨数据传感技术在农业领域的发展。文章首先介绍了农业物联网的数据传感框架,该框架集成了云计算和边缘计算。随后,它回顾了农业场景中通常部署的传感器。然后,从节点内、多节点和跨域三个方面讨论了农业数据协同感知的常用方法。同时,讨论了数据协同感知中的数据安全和隐私问题。其次,结合多维技术,构建了农业物联网中数据感知的应用案例。最后,讨论了协作传感技术在农业物联网中遇到的挑战。
{"title":"A survey of data collaborative sensing methods for smart agriculture","authors":"Xiaomin Li ,&nbsp;Zhaokang Gong ,&nbsp;Jianhua Zheng ,&nbsp;Yongxin Liu ,&nbsp;Huiru Cao","doi":"10.1016/j.iot.2024.101354","DOIUrl":"10.1016/j.iot.2024.101354","url":null,"abstract":"<div><p>Data is becoming increasingly pivotal and foundational in the development of smart agriculture, underscoring the importance of efficient methods for obtaining high-value data. Data sensing methods have become the key technologies and methods to realize the agricultural Internet of Things (IoT). However, in the face of the new agricultural paradigm driven by big data, traditional agricultural IoT confronts numerous challenges at the data sensing level. This article, therefore, adopts a data sensing perspective and, based on the agricultural IoT, explores the evolution of data sensing technology in the agricultural domain. Initially, it introduces a data sensing framework for the agricultural Internet of Things, which integrates cloud and edge computing. Subsequently, it reviews the sensors commonly deployed in agricultural scenarios. Then, common methods for collaborative sensing of agricultural data were discussed from three aspects: intra-node, multiple nodes, and cross-domain. At the same time, the issues of data security and privacy in data collaborative sensing were discussed. Next, we integrate multi-dimensional technology to construct an application case for data sensing in the agricultural IoT. Finally, it discusses the challenges that Collaborative sensing technology encounters within the agricultural IoT.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101354"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized complexity of coverage in multi-interface IoT networks: Pathwidth 多接口物联网网络覆盖的参数化复杂性:路径宽度
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101353
Alessandro Aloisio , Alfredo Navarra

The Internet of Things (IoT) has emerged as one of the growing fields in digital technology over the past decade. A primary goal of IoT is to connect physical objects to the Internet to provide various services. Due to the vast number and diversity of these objects, referred to as devices, IoT must tackle both traditional and novel theoretical and practical network problems. Among these, multi-interface problems are well-known and have been extensively studied.

This research focuses on one of the newest multi-interface models that fits well within the IoT context. It is known as the Coverage in the budget-constrained multi-interface problem, where the budget represents the total amount of energy in the network, and coverage refers to the model’s goal of activating all required communications among IoT devices. Since most IoT devices are battery-powered, energy consumption must be considered to extend the network’s lifespan. This means selecting the most energy-efficient interface configuration that allows all desired connections to function. To achieve this, both global energy consumption and the local number of active interfaces are limited. Moreover, this model also incentivize devices to turn on the available interfaces to create a more performant network. Finally, this model also takes into account the performance of the networks assigning a profit to devices that activate interfaces and realize connections.

This problem can be represented using an undirected graph where each vertex represents a device, and each edge represents a desired connection. Every device is equipped with a set of available interfaces that can be used to facilitate transmission among the devices. The final goal is to activate a subset of the available interfaces that maximize the total profit, while not violating the constraints.

This problem has been recognized as NP-hard, which is why we decided to investigate the decision version from the perspective of fixed-parameter tractability (FPT) theory. FPT is an advanced area of complexity theory that aims to identify the core complexity of a combinatorial problem by incorporating parameters into the time complexity domain.

We provide two fixed-parameter tractability results, each describing an FPT algorithm. One algorithm is based on the well-known pathwidth parameter, the number of available interfaces, and the maximum available energy. The other algorithm considers pathwidth, the number of available interfaces, and an upper bound on the optimal profit. Finally, we show that these two algorithms can be applied to the maximization version of the problem.

过去十年来,物联网(IoT)已成为数字技术领域不断发展的领域之一。物联网的主要目标是将物理对象连接到互联网,以提供各种服务。由于这些被称为设备的物体数量庞大、种类繁多,物联网必须解决传统和新颖的理论和实际网络问题。在这些问题中,多接口问题是众所周知的,并且已经得到了广泛的研究。本研究的重点是最新的多接口模型之一,它非常适合物联网环境。它被称为预算受限多接口问题中的覆盖率,其中预算代表网络中的能源总量,而覆盖率指的是该模型的目标,即激活物联网设备间所有需要的通信。由于大多数物联网设备都由电池供电,因此必须考虑能耗以延长网络的使用寿命。这意味着要选择最节能的接口配置,使所有需要的连接都能正常运行。为此,必须限制全局能耗和本地活动接口的数量。此外,该模型还鼓励设备打开可用接口,以创建性能更高的网络。最后,该模型还考虑到了网络的性能,为激活接口和实现连接的设备分配了利润。每个设备都配有一组可用接口,可用于促进设备间的传输。最终目标是激活可用接口的一个子集,使总利润最大化,同时不违反约束条件。这个问题已被公认为 NP 难,因此我们决定从固定参数可计算性(FPT)理论的角度来研究决策版本。FPT 是复杂性理论的一个高级领域,旨在通过将参数纳入时间复杂性域来确定组合问题的核心复杂性。其中一种算法基于众所周知的路径宽度参数、可用接口数量和最大可用能量。另一种算法则考虑了路径宽度、可用接口数量和最优利润上限。最后,我们展示了这两种算法可以应用于问题的最大化版本。
{"title":"Parameterized complexity of coverage in multi-interface IoT networks: Pathwidth","authors":"Alessandro Aloisio ,&nbsp;Alfredo Navarra","doi":"10.1016/j.iot.2024.101353","DOIUrl":"10.1016/j.iot.2024.101353","url":null,"abstract":"<div><p>The Internet of Things (IoT) has emerged as one of the growing fields in digital technology over the past decade. A primary goal of IoT is to connect physical objects to the Internet to provide various services. Due to the vast number and diversity of these objects, referred to as devices, IoT must tackle both traditional and novel theoretical and practical network problems. Among these, multi-interface problems are well-known and have been extensively studied.</p><p>This research focuses on one of the newest multi-interface models that fits well within the IoT context. It is known as the <em>Coverage</em> in the budget-constrained multi-interface problem, where the budget represents the total amount of energy in the network, and coverage refers to the model’s goal of activating all required communications among IoT devices. Since most IoT devices are battery-powered, energy consumption must be considered to extend the network’s lifespan. This means selecting the most energy-efficient interface configuration that allows all desired connections to function. To achieve this, both global energy consumption and the local number of active interfaces are limited. Moreover, this model also incentivize devices to turn on the available interfaces to create a more performant network. Finally, this model also takes into account the performance of the networks assigning a profit to devices that activate interfaces and realize connections.</p><p>This problem can be represented using an undirected graph where each vertex represents a device, and each edge represents a desired connection. Every device is equipped with a set of available interfaces that can be used to facilitate transmission among the devices. The final goal is to activate a subset of the available interfaces that maximize the total profit, while not violating the constraints.</p><p>This problem has been recognized as <em>NP</em>-hard, which is why we decided to investigate the decision version from the perspective of fixed-parameter tractability (FPT) theory. FPT is an advanced area of complexity theory that aims to identify the core complexity of a combinatorial problem by incorporating parameters into the time complexity domain.</p><p>We provide two fixed-parameter tractability results, each describing an FPT algorithm. One algorithm is based on the well-known pathwidth parameter, the number of available interfaces, and the maximum available energy. The other algorithm considers pathwidth, the number of available interfaces, and an upper bound on the optimal profit. Finally, we show that these two algorithms can be applied to the maximization version of the problem.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101353"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of LoRa-enabled IoT infrastructure for advanced campus safety systems in Taiwan 为台湾先进的校园安全系统集成支持 LoRa 的物联网基础设施
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.iot.2024.101347
Shu-Han Liao , Jheng-Da Jiang , Cheng-Fu Yang

Amid rising concerns about campus safety in Taiwan, particularly with the global trend towards smart cities, integrating the Internet of Things (IoT) into institutional security frameworks has become pivotal. The paper discusses the implementation of using iBeacons and Long Range (LoRa) technology to locating the student position and ensure his safety in the school campus. It uses Internet of Things (IoT) approach in real time to monitor and locate the student presence in the school compound. This paper unveils an innovative design for a campus security system that harnesses the LoRa technology. In the system, the students are equipped with devices containing Bluetooth Low Energy (BLE) beacons to capture and transmit real-time location data. The system response time to locating student in abnormal locations such as cornered and concealed areas is about one second. By extending this system to cover all individuals on campus, a closely monitored environment and areas is enabled that significantly bolstering the security measures. This not only furnishes a dynamic protective layer for educational institutions but also serves as a proactive deterrent against potential security breaches. Ultimately, this research underscores the transformative potential of merging IoT with campus security to ushering in a new era of student safety. LoRa technology offers advantages in battery life, cost-effectiveness, deployment flexibility, and network coverage etc. Therefore, this paper ultimately provides a method of how to utilize the LoRa technology to develop a campus security system. Unlike artificial intelligence (AI)-based image recognition, which raises concerns about privacy and human rights; the features of LoRa’s long-range communication and low power consumption make it a more suitable choice.

在台湾,人们对校园安全的关注与日俱增,尤其是在全球迈向智慧城市的趋势下,将物联网(IoT)融入机构安全框架已变得至关重要。本文讨论了如何利用 iBeacons 和长距离(LoRa)技术定位学生位置,确保学生在校园内的安全。它采用物联网(IoT)方法实时监控和定位学生在校园内的位置。本文揭示了一种利用 LoRa 技术的校园安全系统的创新设计。在该系统中,学生配备了包含蓝牙低功耗(BLE)信标的设备,用于捕捉和传输实时位置数据。在拐角和隐蔽区域等异常位置定位学生的系统响应时间约为一秒。通过将该系统扩展到覆盖校园内的所有人员,可实现对环境和区域的严密监控,从而大大加强安全措施。这不仅为教育机构提供了一个动态保护层,而且还对潜在的安全漏洞起到了积极的威慑作用。最终,这项研究强调了将物联网与校园安全相结合的变革潜力,从而开创了学生安全的新时代。LoRa 技术在电池寿命、成本效益、部署灵活性和网络覆盖等方面具有优势。因此,本文最终提供了一种如何利用 LoRa 技术开发校园安全系统的方法。与基于人工智能(AI)的图像识别不同,人工智能(AI)会引发对隐私和人权的担忧;而 LoRa 的长距离通信和低功耗特性使其成为更合适的选择。
{"title":"Integration of LoRa-enabled IoT infrastructure for advanced campus safety systems in Taiwan","authors":"Shu-Han Liao ,&nbsp;Jheng-Da Jiang ,&nbsp;Cheng-Fu Yang","doi":"10.1016/j.iot.2024.101347","DOIUrl":"10.1016/j.iot.2024.101347","url":null,"abstract":"<div><p>Amid rising concerns about campus safety in Taiwan, particularly with the global trend towards smart cities, integrating the Internet of Things (IoT) into institutional security frameworks has become pivotal. The paper discusses the implementation of using iBeacons and Long Range (LoRa) technology to locating the student position and ensure his safety in the school campus. It uses Internet of Things (IoT) approach in real time to monitor and locate the student presence in the school compound. This paper unveils an innovative design for a campus security system that harnesses the LoRa technology. In the system, the students are equipped with devices containing Bluetooth Low Energy (BLE) beacons to capture and transmit real-time location data. The system response time to locating student in abnormal locations such as cornered and concealed areas is about one second. By extending this system to cover all individuals on campus, a closely monitored environment and areas is enabled that significantly bolstering the security measures. This not only furnishes a dynamic protective layer for educational institutions but also serves as a proactive deterrent against potential security breaches. Ultimately, this research underscores the transformative potential of merging IoT with campus security to ushering in a new era of student safety. LoRa technology offers advantages in battery life, cost-effectiveness, deployment flexibility, and network coverage etc. Therefore, this paper ultimately provides a method of how to utilize the LoRa technology to develop a campus security system. Unlike artificial intelligence (AI)-based image recognition, which raises concerns about privacy and human rights; the features of LoRa’s long-range communication and low power consumption make it a more suitable choice.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101347"},"PeriodicalIF":6.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002889/pdfft?md5=88274724d2e14ad2e476d0f5502d687e&pid=1-s2.0-S2542660524002889-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network 基于时间平滑性和时变相似性的无线传感器网络缺失数据恢复
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.iot.2024.101349
Ke Zhang , Jianyong Dai , Xiuwu Yu , Guang Zhang

Wireless Sensor Networks (WSN) play a vital role in the Internet of Things (IoT) and show great potential in monitoring applications. However, due to harsh environmental conditions and unreliable communication links, WSN often encounter partial data loss during data collection, which inevitably affects the quality of service. To address this challenge, researchers have employed matrix completion techniques to recover missing data by exploiting the low-rank features in the data, but its accuracy is not satisfactory. This paper argues that the spatiotemporal characteristics of the data underlie its low-rank nature, enabling a more accurate capture of the intrinsic patterns within the data. Drawing on this insight, we propose a missing data recovery algorithm based on Temporal Smoothness and Time-Varying Similarity (TSTVS). Unlike traditional low-rank methods, the TSTVS algorithm directly utilizes the structural features of data in the spatiotemporal domain to establish a missing data completion model. Subsequently, the model is converted into an unconstrained optimization problem using the penalty function method, and the gradient descent method is applied to solve it, reconstructing the complete data matrix. Finally, simulation experiments were conducted on three real-world monitoring datasets, comparing the TSTVS with three low-rank methods, Efficient Data Collection Approach (EDCA), Matrix factorization with Smoothness constraints (MFS) and Data Recovery Based on Low Rank and Short-Term Stability(DRLRSS). The experimental results indicate that the proposed TSTVS algorithm consistently outperforms the three low-rank based algorithms in terms of recovery accuracy across different datasets and missing rate scenarios.

无线传感器网络(WSN)在物联网(IoT)中发挥着重要作用,并在监测应用中展现出巨大潜力。然而,由于恶劣的环境条件和不可靠的通信链路,WSN 在数据收集过程中经常会出现部分数据丢失的情况,这不可避免地会影响服务质量。为解决这一难题,研究人员采用了矩阵补全技术,通过利用数据中的低秩特征来恢复丢失的数据,但其准确性并不理想。本文认为,数据的时空特征是其低秩特性的基础,从而能够更准确地捕捉数据的内在模式。基于这一观点,我们提出了一种基于时空平滑性和时变相似性(TSTVS)的丢失数据恢复算法。与传统的低秩方法不同,TSTVS 算法直接利用数据在时空领域的结构特征来建立缺失数据补全模型。随后,利用惩罚函数法将该模型转化为无约束优化问题,并应用梯度下降法进行求解,从而重建完整的数据矩阵。最后,在三个真实世界的监测数据集上进行了仿真实验,比较了 TSTVS 和三种低秩方法,即高效数据收集方法(EDCA)、带平滑性约束的矩阵因式分解(MFS)和基于低秩和短期稳定性的数据恢复(DRLRSS)。实验结果表明,在不同的数据集和缺失率情况下,所提出的 TSTVS 算法的恢复精度始终优于三种基于低秩的算法。
{"title":"Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network","authors":"Ke Zhang ,&nbsp;Jianyong Dai ,&nbsp;Xiuwu Yu ,&nbsp;Guang Zhang","doi":"10.1016/j.iot.2024.101349","DOIUrl":"10.1016/j.iot.2024.101349","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSN) play a vital role in the Internet of Things (IoT) and show great potential in monitoring applications. However, due to harsh environmental conditions and unreliable communication links, WSN often encounter partial data loss during data collection, which inevitably affects the quality of service. To address this challenge, researchers have employed matrix completion techniques to recover missing data by exploiting the low-rank features in the data, but its accuracy is not satisfactory. This paper argues that the spatiotemporal characteristics of the data underlie its low-rank nature, enabling a more accurate capture of the intrinsic patterns within the data. Drawing on this insight, we propose a missing data recovery algorithm based on Temporal Smoothness and Time-Varying Similarity (TSTVS). Unlike traditional low-rank methods, the TSTVS algorithm directly utilizes the structural features of data in the spatiotemporal domain to establish a missing data completion model. Subsequently, the model is converted into an unconstrained optimization problem using the penalty function method, and the gradient descent method is applied to solve it, reconstructing the complete data matrix. Finally, simulation experiments were conducted on three real-world monitoring datasets, comparing the TSTVS with three low-rank methods, Efficient Data Collection Approach (EDCA), Matrix factorization with Smoothness constraints (MFS) and Data Recovery Based on Low Rank and Short-Term Stability(DRLRSS). The experimental results indicate that the proposed TSTVS algorithm consistently outperforms the three low-rank based algorithms in terms of recovery accuracy across different datasets and missing rate scenarios.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101349"},"PeriodicalIF":6.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fair multi-attribute data transaction mechanism supporting cross-chain 支持跨链的公平多属性数据交易机制
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.iot.2024.101339
Kuan Fan , Chaozhi Zhou , Ning Lu , Wenbo Shi , Victor Chang

Reliable storage and high-speed data networks enable individuals to access high-quality Internet of Things (IoT) data for scientific research through global transactions. Blockchain technology provides transparency for institutions to securely store and manage IoT data, while cross-chain transaction mechanisms facilitate the flow of IoT data. However, fairness issues may arise when it comes to cross-chain transactions of IoT data. This paper proposes a mechanism for multi-attribute data transactions to support cross-chain. The solution utilizes Vickrey–Clarke–Groves (VCG) auction, Paillier, Intel SGX, and other technologies to design a secure and equitable data seller selection scheme. The scheme ensures that the selection process for data sellers is both informed and private. Additionally, we generate a key pair for each attribute in the dataset to produce the corresponding attribute data signature. The dataset’s legitimacy is verified through batch verification to ensure that the data seller’s purchased attributes align with their requirements. The exchange of crypto assets and private keys between data sellers and buyers is designed to achieve fair payment. Our research suggests that the scheme meets the necessary security standards, and simulation results confirm its feasibility and effectiveness.

可靠的存储和高速数据网络使个人能够通过全球交易获取用于科学研究的高质量物联网(IoT)数据。区块链技术为机构安全存储和管理物联网数据提供了透明度,而跨链交易机制则促进了物联网数据的流动。然而,物联网数据的跨链交易可能会出现公平性问题。本文提出了一种支持跨链的多属性数据交易机制。该解决方案利用 Vickrey-Clarke-Groves (VCG) auction、Paillier、Intel SGX 等技术设计了一种安全、公平的数据卖方选择方案。该方案确保数据卖方的选择过程既知情又保密。此外,我们还为数据集中的每个属性生成一对密钥,以生成相应的属性数据签名。数据集的合法性通过批量验证进行验证,以确保数据卖方购买的属性符合其要求。数据卖方和买方之间的加密资产和私钥交换旨在实现公平支付。我们的研究表明,该方案符合必要的安全标准,模拟结果也证实了其可行性和有效性。
{"title":"A fair multi-attribute data transaction mechanism supporting cross-chain","authors":"Kuan Fan ,&nbsp;Chaozhi Zhou ,&nbsp;Ning Lu ,&nbsp;Wenbo Shi ,&nbsp;Victor Chang","doi":"10.1016/j.iot.2024.101339","DOIUrl":"10.1016/j.iot.2024.101339","url":null,"abstract":"<div><p>Reliable storage and high-speed data networks enable individuals to access high-quality Internet of Things (IoT) data for scientific research through global transactions. Blockchain technology provides transparency for institutions to securely store and manage IoT data, while cross-chain transaction mechanisms facilitate the flow of IoT data. However, fairness issues may arise when it comes to cross-chain transactions of IoT data. This paper proposes a mechanism for multi-attribute data transactions to support cross-chain. The solution utilizes Vickrey–Clarke–Groves (VCG) auction, Paillier, Intel SGX, and other technologies to design a secure and equitable data seller selection scheme. The scheme ensures that the selection process for data sellers is both informed and private. Additionally, we generate a key pair for each attribute in the dataset to produce the corresponding attribute data signature. The dataset’s legitimacy is verified through batch verification to ensure that the data seller’s purchased attributes align with their requirements. The exchange of crypto assets and private keys between data sellers and buyers is designed to achieve fair payment. Our research suggests that the scheme meets the necessary security standards, and simulation results confirm its feasibility and effectiveness.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101339"},"PeriodicalIF":6.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002804/pdfft?md5=6f20d81b3e138117809153011553ec58&pid=1-s2.0-S2542660524002804-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the dynamics of social interaction in SIoT: Human-machine engagement 了解 SIoT 中社交互动的动态:人机互动
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101337
Kuo Cheng Chung , Paul Juinn Bing Tan

The Social Internet of Things (SIoT) amalgamates social networks with the Internet of Things (IoT) to enable intelligent devices to form social connections analogous to human networks. This research is grounded in psychological contract theory, which examines the reciprocal mechanisms arising from diverse customer interactions to encourage user engagement and provide recommendations on social media platforms. This study in particular identifies the factors that drive customer engagement on social media. It is unique in its exploration of customer interactions within the framework of psychological contracts across multiple levels of customer engagement (through customer empowerment). The findings reveal that psychological ownership among customers is influenced by empowering interactions on social media, which ultimately drive engagement behaviors.

社交物联网(SIoT)将社交网络与物联网(IoT)相结合,使智能设备能够形成类似于人类网络的社交联系。本研究以心理契约理论为基础,探讨了不同客户互动所产生的互惠机制,以鼓励用户参与并在社交媒体平台上提供推荐。本研究特别确定了推动客户参与社交媒体的因素。这项研究的独特之处在于,它在心理契约的框架内探讨了多层次客户参与(通过客户授权)中的客户互动。研究结果表明,社交媒体上的赋权互动会影响客户的心理所有权,并最终推动参与行为。
{"title":"Understanding the dynamics of social interaction in SIoT: Human-machine engagement","authors":"Kuo Cheng Chung ,&nbsp;Paul Juinn Bing Tan","doi":"10.1016/j.iot.2024.101337","DOIUrl":"10.1016/j.iot.2024.101337","url":null,"abstract":"<div><p>The Social Internet of Things (SIoT) amalgamates social networks with the Internet of Things (IoT) to enable intelligent devices to form social connections analogous to human networks. This research is grounded in psychological contract theory, which examines the reciprocal mechanisms arising from diverse customer interactions to encourage user engagement and provide recommendations on social media platforms. This study in particular identifies the factors that drive customer engagement on social media. It is unique in its exploration of customer interactions within the framework of psychological contracts across multiple levels of customer engagement (through customer empowerment). The findings reveal that psychological ownership among customers is influenced by empowering interactions on social media, which ultimately drive engagement behaviors.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101337"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset 电动汽车充电站的 DDoS 检测:通过 CICEV2023 数据集的深度学习视角
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101343
Yagiz Alp Anli , Zeki Ciplak , Murat Sakaliuzun , Seniz Zekiye Izgu , Kazim Yildiz

Distributed Denial of Service (DDoS) attacks have always been an important research topic in the field of information security. Regarding specialized infrastructures such as electric vehicle charging stations, detecting and preventing such attacks becomes even more critical. In the existing literature, most studies on DDoS attack detection focus on traditional methods that analyze network metrics such as network traffic, packet rates, and number of connections. These approaches attempt to detect attacks by identifying anomalies and irregularities in the network, but can have high error rates and fail to identify advanced attacks. Conversely though, detection methods based on system metrics use deeper and more insightful parameters such as processor utilization, memory usage, disk I/O operations, and system behavior. Such metrics provide a more detailed perspective than network-based approaches, allowing for more accurate detection of attacks. However, work in this area is not yet widespread enough further research and improvement are needed. The adoption of advanced system metrics-based methods can significantly improve the effectiveness of DDoS defense strategies, especially in next-generation and specialized infrastructures. This paper evaluates the applicability and effectiveness of Long Short-Term Memory (LSTM) and Feed-Forward Network (FFN) in detecting DDoS attacks against electric vehicle charging stations through system metrics using CICEV2023 dataset. Experimental results show that the LSTM based model offers advantages in terms of speed and processing capacity, while the FFN is superior in terms of the accuracy.

分布式拒绝服务(DDoS)攻击一直是信息安全领域的重要研究课题。对于电动汽车充电站等专业基础设施而言,检测和预防此类攻击变得更加重要。在现有文献中,大多数有关 DDoS 攻击检测的研究都集中在分析网络流量、数据包速率和连接数等网络指标的传统方法上。这些方法试图通过识别网络中的异常和不正常现象来检测攻击,但错误率可能很高,而且无法识别高级攻击。相反,基于系统指标的检测方法使用更深入、更有洞察力的参数,如处理器利用率、内存使用率、磁盘 I/O 操作和系统行为。与基于网络的方法相比,此类指标能提供更详细的视角,从而更准确地检测攻击。不过,这一领域的工作还不够广泛,需要进一步研究和改进。采用先进的基于系统指标的方法可以显著提高 DDoS 防御策略的有效性,尤其是在下一代和专用基础设施中。本文利用 CICEV2023 数据集,通过系统指标评估了长短期记忆(LSTM)和前馈网络(FFN)在检测针对电动汽车充电站的 DDoS 攻击中的适用性和有效性。实验结果表明,基于 LSTM 的模型在速度和处理能力方面具有优势,而 FFN 则在准确性方面更胜一筹。
{"title":"DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset","authors":"Yagiz Alp Anli ,&nbsp;Zeki Ciplak ,&nbsp;Murat Sakaliuzun ,&nbsp;Seniz Zekiye Izgu ,&nbsp;Kazim Yildiz","doi":"10.1016/j.iot.2024.101343","DOIUrl":"10.1016/j.iot.2024.101343","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks have always been an important research topic in the field of information security. Regarding specialized infrastructures such as electric vehicle charging stations, detecting and preventing such attacks becomes even more critical. In the existing literature, most studies on DDoS attack detection focus on traditional methods that analyze network metrics such as network traffic, packet rates, and number of connections. These approaches attempt to detect attacks by identifying anomalies and irregularities in the network, but can have high error rates and fail to identify advanced attacks. Conversely though, detection methods based on system metrics use deeper and more insightful parameters such as processor utilization, memory usage, disk I/O operations, and system behavior. Such metrics provide a more detailed perspective than network-based approaches, allowing for more accurate detection of attacks. However, work in this area is not yet widespread enough further research and improvement are needed. The adoption of advanced system metrics-based methods can significantly improve the effectiveness of DDoS defense strategies, especially in next-generation and specialized infrastructures. This paper evaluates the applicability and effectiveness of Long Short-Term Memory (LSTM) and Feed-Forward Network (FFN) in detecting DDoS attacks against electric vehicle charging stations through system metrics using CICEV2023 dataset. Experimental results show that the LSTM based model offers advantages in terms of speed and processing capacity, while the FFN is superior in terms of the accuracy.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101343"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing SPM-SeCTIS:用于智能增材制造中可计算威胁信息安全共享的严重性模式匹配
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101334
Mahender Kumar, Gregory Epiphaniou, Carsten Maple

Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to defend against cyberattacks. However, current methods often fail to adequately protect sensitive information, leading to security risks, especially in Intelligent Additive Manufacturing (IAM) systems. In these systems, the security and privacy of incident data collected by IoT devices are essential, as revealing threat information, such as types, impacts, and organisational interests, could be harmful. To address these challenges, we propose the Severity Pattern Matching for a Secure Computable Threat Information Sharing System (SPM-SeCTIS). This system is designed to maintain privacy by allowing intermediaries to pass along threat information without accessing sensitive details, such as the type or severity of the threats. SPM-SeCTIS ensures that attackers cannot determine which incidents organisations are interested in or what specific threats they monitor. The system employs Homomorphic Encryption (HE) to conduct threat pattern matching on encrypted data, keeping sensitive information confidential even during analysis. Our performance tests indicate that SPM-SeCTIS operates efficiently, requiring minimal time for encryption and decryption processes. Additionally, the system scales effectively, handling a large number of subscribers and incidents with ease. Compared to existing methods, SPM-SeCTIS provides improved security measures and better overall performance, making it a robust solution for protecting sensitive threat information.

共享网络威胁情报 (CTI) 使各组织能够共同抵御网络攻击。然而,目前的方法往往无法充分保护敏感信息,从而导致安全风险,尤其是在智能增材制造(IAM)系统中。在这些系统中,物联网设备收集的事件数据的安全性和隐私性至关重要,因为泄露威胁信息(如类型、影响和组织利益)可能会造成危害。为了应对这些挑战,我们提出了安全可计算威胁信息共享系统(SPM-SeCTIS)的严重性模式匹配。该系统旨在维护隐私,允许中间人传递威胁信息,而不会获取敏感细节,如威胁的类型或严重程度。SPM-SeCTIS 可确保攻击者无法确定组织对哪些事件感兴趣,也无法确定组织监控的具体威胁。该系统采用同态加密(HE)技术对加密数据进行威胁模式匹配,即使在分析过程中也能保持敏感信息的机密性。我们的性能测试表明,SPM-SeCTIS 运行高效,加密和解密过程所需的时间极短。此外,该系统还能有效扩展,轻松处理大量用户和事件。与现有方法相比,SPM-SeCTIS 改进了安全措施,提高了整体性能,是保护敏感威胁信息的强大解决方案。
{"title":"SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing","authors":"Mahender Kumar,&nbsp;Gregory Epiphaniou,&nbsp;Carsten Maple","doi":"10.1016/j.iot.2024.101334","DOIUrl":"10.1016/j.iot.2024.101334","url":null,"abstract":"<div><p>Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to defend against cyberattacks. However, current methods often fail to adequately protect sensitive information, leading to security risks, especially in Intelligent Additive Manufacturing (IAM) systems. In these systems, the security and privacy of incident data collected by IoT devices are essential, as revealing threat information, such as types, impacts, and organisational interests, could be harmful. To address these challenges, we propose the Severity Pattern Matching for a Secure Computable Threat Information Sharing System (SPM-SeCTIS). This system is designed to maintain privacy by allowing intermediaries to pass along threat information without accessing sensitive details, such as the type or severity of the threats. SPM-SeCTIS ensures that attackers cannot determine which incidents organisations are interested in or what specific threats they monitor. The system employs Homomorphic Encryption (HE) to conduct threat pattern matching on encrypted data, keeping sensitive information confidential even during analysis. Our performance tests indicate that SPM-SeCTIS operates efficiently, requiring minimal time for encryption and decryption processes. Additionally, the system scales effectively, handling a large number of subscribers and incidents with ease. Compared to existing methods, SPM-SeCTIS provides improved security measures and better overall performance, making it a robust solution for protecting sensitive threat information.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101334"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002750/pdfft?md5=de14d9cf242bc80bc1d64e608fdfcd74&pid=1-s2.0-S2542660524002750-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems 确保医疗物联网系统安全的两阶段区块链框架
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1016/j.iot.2024.101335
Kainat Fiaz , Asim Zeb , Shahid Hussain , Kinza Khurshid , Reyazur Rashid Irshad , Maher Alharby , Taj Rahman , Ibrahim M. Alwayle , Fabiano Pallonetto

The healthcare industry has witnessed a transformative impact due to recent advancements in sensing technology, coupled with the Internet of Medical Things (IoMTs)-based healthcare systems. Remote monitoring and informed decision-making have become possible by leveraging an integrated platform for efficient data analysis and processing, thereby optimizing data management in healthcare. However, this data is collected, processed, and transmitted across an interconnected network of devices, which introduces notable security risks and escalates the potential for vulnerabilities throughout the entire data processing pipeline. Traditional security approaches rely on computational complexity and face challenges in adequately securing sensitive healthcare data against evolving threats, thus necessitating robust solutions that ensure trust, enhance security, and maintain data confidentiality and integrity. To address these challenges, this paper introduces a two-phase framework that integrates blockchain technology with IoMT to enhance trust computation, resulting in a secure cluster that supports the quality-of-service (QoS) for sensitive data. The first phase utilizes the decentralized interplanetary file system and hashing functions to create a smart contract for device registration, establishing a resilient storage platform that encrypts data, improves fault tolerance, and facilitates data access. In the second phase, communication overhead is optimized by considering power levels, communication ranges, and computing capabilities alongside the smart contract. The smart contract evaluates the trust index and QoS of each node to facilitate device clustering based on processing capabilities. We implemented the proposed framework using OMNeT++ simulator and C++ programming language and evaluated against the cutting-edge IoMT security approaches in terms of attack detection, energy consumption, packet delivery ratio, throughput, and latency. The qualitative results demonstrated that the proposed framework enhanced attack detection by 6.00%, 18.00%, 20.00%, and 27.00%, reduced energy consumption by 6.91%, 8.19%, 12.07%, and 17.94%, improved packet delivery ratio by 3.00%, 6.00%, 9.00%, and 10.00%, increased throughput by 7.00%, 8.00%, 11.00%, and 13.00%, and decreased latency by 4.90%, 8.81%, 11.54%, and 20.63%, against state-of-the-art methods and was supported by statistical analysis.

由于最近传感技术的进步,再加上基于医疗物联网(IoMTs)的医疗保健系统,医疗保健行业见证了一场变革。利用集成平台进行高效的数据分析和处理,从而优化医疗保健领域的数据管理,使远程监控和知情决策成为可能。然而,这些数据是通过设备互连网络收集、处理和传输的,这就带来了显著的安全风险,并增加了整个数据处理管道出现漏洞的可能性。传统的安全方法依赖于计算的复杂性,在充分保护敏感的医疗保健数据免受不断变化的威胁方面面临挑战,因此需要能够确保信任、增强安全性并维护数据机密性和完整性的强大解决方案。为了应对这些挑战,本文介绍了一个分两个阶段的框架,该框架将区块链技术与 IoMT 相集成,以增强信任计算,从而形成一个支持敏感数据服务质量(QoS)的安全集群。第一阶段利用去中心化的星际文件系统和哈希函数创建设备注册智能合约,建立一个弹性存储平台,对数据进行加密,提高容错能力,方便数据访问。在第二阶段,通过考虑功率水平、通信范围和智能合约的计算能力,优化通信开销。智能合约会评估每个节点的信任指数和服务质量,以促进基于处理能力的设备集群。我们使用 OMNeT++ 模拟器和 C++ 编程语言实现了所提出的框架,并在攻击检测、能耗、数据包交付率、吞吐量和延迟等方面与最先进的 IoMT 安全方法进行了对比评估。定性结果表明,拟议框架的攻击检测率分别提高了 6.00%、18.00%、20.00% 和 27.00%,能耗分别降低了 6.91%、8.19%、12.07% 和 17.94%,数据包交付率分别提高了 3.00%、6.00%、9.00% 和 10.00%,吞吐量提高了 7.00%、8.00%、11.00% 和 13.00%,延迟降低了 4.90%、8.81%、11.54% 和 20.63%。
{"title":"A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems","authors":"Kainat Fiaz ,&nbsp;Asim Zeb ,&nbsp;Shahid Hussain ,&nbsp;Kinza Khurshid ,&nbsp;Reyazur Rashid Irshad ,&nbsp;Maher Alharby ,&nbsp;Taj Rahman ,&nbsp;Ibrahim M. Alwayle ,&nbsp;Fabiano Pallonetto","doi":"10.1016/j.iot.2024.101335","DOIUrl":"10.1016/j.iot.2024.101335","url":null,"abstract":"<div><p>The healthcare industry has witnessed a transformative impact due to recent advancements in sensing technology, coupled with the Internet of Medical Things (IoMTs)-based healthcare systems. Remote monitoring and informed decision-making have become possible by leveraging an integrated platform for efficient data analysis and processing, thereby optimizing data management in healthcare. However, this data is collected, processed, and transmitted across an interconnected network of devices, which introduces notable security risks and escalates the potential for vulnerabilities throughout the entire data processing pipeline. Traditional security approaches rely on computational complexity and face challenges in adequately securing sensitive healthcare data against evolving threats, thus necessitating robust solutions that ensure trust, enhance security, and maintain data confidentiality and integrity. To address these challenges, this paper introduces a two-phase framework that integrates blockchain technology with IoMT to enhance trust computation, resulting in a secure cluster that supports the quality-of-service (QoS) for sensitive data. The first phase utilizes the decentralized interplanetary file system and hashing functions to create a smart contract for device registration, establishing a resilient storage platform that encrypts data, improves fault tolerance, and facilitates data access. In the second phase, communication overhead is optimized by considering power levels, communication ranges, and computing capabilities alongside the smart contract. The smart contract evaluates the trust index and QoS of each node to facilitate device clustering based on processing capabilities. We implemented the proposed framework using OMNeT++ simulator and C++ programming language and evaluated against the cutting-edge IoMT security approaches in terms of attack detection, energy consumption, packet delivery ratio, throughput, and latency. The qualitative results demonstrated that the proposed framework enhanced attack detection by 6.00%, 18.00%, 20.00%, and 27.00%, reduced energy consumption by 6.91%, 8.19%, 12.07%, and 17.94%, improved packet delivery ratio by 3.00%, 6.00%, 9.00%, and 10.00%, increased throughput by 7.00%, 8.00%, 11.00%, and 13.00%, and decreased latency by 4.90%, 8.81%, 11.54%, and 20.63%, against state-of-the-art methods and was supported by statistical analysis.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101335"},"PeriodicalIF":6.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002762/pdfft?md5=a09955f31a5ac83ee06a0cb5866b7585&pid=1-s2.0-S2542660524002762-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1