首页 > 最新文献

Internet of Things最新文献

英文 中文
Graph neural networks for IoT security: A comparative study 图神经网络用于物联网安全:比较研究
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-26 DOI: 10.1016/j.iot.2025.101863
Nicola Capuano , Vincenzo Carletti , Pasquale Foggia , Francesco Rosa , Mario Vento
The increasing deployment of IoT devices has introduced new cybersecurity vulnerabilities, as traditional defense mechanisms often fail to protect resource-constrained and highly heterogeneous environments. Network traffic analysis has emerged as a key strategy for detecting malicious activities; however, the inherent dynamism of IoT communications undermines the effectiveness of traditional security mechanisms. In this paper, we focus on detecting malicious activities in IoT networks by solving a node-classification problem in a graph-based network representation. We evaluate six Graph Neural Network methods, encompassing both static and time-dependent models, using two distinct graph representations of network traffic. Our analysis is conducted across three recent IoT traffic datasets, and considers multiple snapshot durations to understand how temporal granularity affects detection accuracy. Through extensive experiments, we assess the impact of graph structure, snapshot duration, and temporal modeling on detection performance. Results show that GNNs, especially static models, are effective at identifying anomalous nodes even in unseen environments. We find that shorter snapshot durations consistently improve model accuracy by reducing noise in node embeddings, and that simpler traffic representation often match or outperform more complex counterparts, particularly when computational efficiency is a concern. Additionally, further research is needed to draw firm conclusions about dynamic methods. Our findings provide actionable insights for selecting models, representations, and configurations in the design of GNN-based intrusion detection systems for IoT networks.
物联网设备的不断增加部署带来了新的网络安全漏洞,因为传统的防御机制往往无法保护资源受限和高度异构的环境。网络流量分析已成为检测恶意活动的关键策略;然而,物联网通信固有的动态性破坏了传统安全机制的有效性。在本文中,我们专注于通过解决基于图的网络表示中的节点分类问题来检测物联网网络中的恶意活动。我们评估了六种图神经网络方法,包括静态和时间依赖模型,使用两种不同的网络流量图表示。我们的分析是在三个最近的物联网流量数据集上进行的,并考虑了多个快照持续时间,以了解时间粒度如何影响检测准确性。通过大量的实验,我们评估了图结构、快照持续时间和时间建模对检测性能的影响。结果表明,即使在不可见的环境中,gnn,特别是静态模型,也能有效地识别异常节点。我们发现,更短的快照持续时间通过减少节点嵌入中的噪声不断提高模型的准确性,并且更简单的流量表示通常匹配或优于更复杂的对应,特别是当计算效率是一个问题时。此外,还需要进一步的研究来得出关于动态方法的确切结论。我们的研究结果为在物联网网络中基于gnn的入侵检测系统设计中选择模型、表示和配置提供了可操作的见解。
{"title":"Graph neural networks for IoT security: A comparative study","authors":"Nicola Capuano ,&nbsp;Vincenzo Carletti ,&nbsp;Pasquale Foggia ,&nbsp;Francesco Rosa ,&nbsp;Mario Vento","doi":"10.1016/j.iot.2025.101863","DOIUrl":"10.1016/j.iot.2025.101863","url":null,"abstract":"<div><div>The increasing deployment of IoT devices has introduced new cybersecurity vulnerabilities, as traditional defense mechanisms often fail to protect resource-constrained and highly heterogeneous environments. Network traffic analysis has emerged as a key strategy for detecting malicious activities; however, the inherent dynamism of IoT communications undermines the effectiveness of traditional security mechanisms. In this paper, we focus on detecting malicious activities in IoT networks by solving a node-classification problem in a graph-based network representation. We evaluate six Graph Neural Network methods, encompassing both static and time-dependent models, using two distinct graph representations of network traffic. Our analysis is conducted across three recent IoT traffic datasets, and considers multiple snapshot durations to understand how temporal granularity affects detection accuracy. Through extensive experiments, we assess the impact of graph structure, snapshot duration, and temporal modeling on detection performance. Results show that GNNs, especially static models, are effective at identifying anomalous nodes even in unseen environments. We find that shorter snapshot durations consistently improve model accuracy by reducing noise in node embeddings, and that simpler traffic representation often match or outperform more complex counterparts, particularly when computational efficiency is a concern. Additionally, further research is needed to draw firm conclusions about dynamic methods. Our findings provide actionable insights for selecting models, representations, and configurations in the design of GNN-based intrusion detection systems for IoT networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101863"},"PeriodicalIF":7.6,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game-theoretic approach to sustainable smart manufacturing using IoT under policy incentives: a case study of Iran and South Korea 政策激励下利用物联网实现可持续智能制造的博弈论方法:以伊朗和韩国为例
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-26 DOI: 10.1016/j.iot.2025.101860
Mahnaz Naghsh-Nilchi , Morteza Rasti-Barzoki , Mohammad-Bagher Jamali , Jörn Altmann , Bernhard Egger
This study presents a mathematical model to analyze the competition between smart and traditional home appliance manufacturers in Iran and South Korea using a game theory approach. The smart manufacturer utilizes IoT-enabled products and a Sensing-as-a-Service (SaaS) ecosystem to collect and analyze real-time operational data, enabling predictive maintenance, energy optimization, and intelligent product design. This data-driven approach extends the product life cycle, reduces operating costs, and reduces material waste and carbon emissions. In contrast, the traditional manufacturer relies on conventional R&D and after-sales feedback, which limits responsiveness and efficiency. The proposed model is the first to highlight the strategic value of data analytics in the SaaS ecosystem in shaping competitive advantage, sustainability, and market performance by considering customer behavior and government incentives. The results show that providing targeted incentives for data sharing significantly increases demand, profitability, and environmental benefits, especially in mature digital markets. Furthermore, the study shows that supporting context-specific policies enhances the effectiveness of smart manufacturing strategies. Overall, this research provides actionable insights for policymakers, manufacturers, and IoT stakeholders seeking to foster sustainable, competitive, and digital industrial systems in emerging and advanced economies.
本研究提出一个数学模型,运用博弈论的方法分析伊朗和韩国的智能家电制造商和传统家电制造商之间的竞争。智能制造商利用物联网产品和感知即服务(SaaS)生态系统收集和分析实时运营数据,实现预测性维护、能源优化和智能产品设计。这种数据驱动的方法延长了产品生命周期,降低了运营成本,减少了材料浪费和碳排放。相比之下,传统制造商依赖于传统的研发和售后反馈,这限制了响应能力和效率。该模型首次强调了数据分析在SaaS生态系统中的战略价值,即通过考虑客户行为和政府激励,塑造竞争优势、可持续性和市场表现。研究结果表明,为数据共享提供有针对性的激励措施可以显著提高需求、盈利能力和环境效益,尤其是在成熟的数字市场。此外,研究表明,支持特定情境的政策可以提高智能制造战略的有效性。总体而言,本研究为决策者、制造商和物联网利益相关者提供了可操作的见解,以寻求在新兴和发达经济体中培育可持续、有竞争力的数字工业系统。
{"title":"A game-theoretic approach to sustainable smart manufacturing using IoT under policy incentives: a case study of Iran and South Korea","authors":"Mahnaz Naghsh-Nilchi ,&nbsp;Morteza Rasti-Barzoki ,&nbsp;Mohammad-Bagher Jamali ,&nbsp;Jörn Altmann ,&nbsp;Bernhard Egger","doi":"10.1016/j.iot.2025.101860","DOIUrl":"10.1016/j.iot.2025.101860","url":null,"abstract":"<div><div>This study presents a mathematical model to analyze the competition between smart and traditional home appliance manufacturers in Iran and South Korea using a game theory approach. The smart manufacturer utilizes IoT-enabled products and a Sensing-as-a-Service (SaaS) ecosystem to collect and analyze real-time operational data, enabling predictive maintenance, energy optimization, and intelligent product design. This data-driven approach extends the product life cycle, reduces operating costs, and reduces material waste and carbon emissions. In contrast, the traditional manufacturer relies on conventional R&amp;D and after-sales feedback, which limits responsiveness and efficiency. The proposed model is the first to highlight the strategic value of data analytics in the SaaS ecosystem in shaping competitive advantage, sustainability, and market performance by considering customer behavior and government incentives. The results show that providing targeted incentives for data sharing significantly increases demand, profitability, and environmental benefits, especially in mature digital markets. Furthermore, the study shows that supporting context-specific policies enhances the effectiveness of smart manufacturing strategies. Overall, this research provides actionable insights for policymakers, manufacturers, and IoT stakeholders seeking to foster sustainable, competitive, and digital industrial systems in emerging and advanced economies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101860"},"PeriodicalIF":7.6,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and low-power edge architecture with Wi-Fi HaLow and on-device spectrograms generation for flexible urban bioacoustics monitoring 可扩展和低功耗边缘架构,具有Wi-Fi HaLow和设备上的频谱生成,用于灵活的城市生物声学监测
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1016/j.iot.2025.101864
Francisco A. Delgado-Rajó , Carlos M. Travieso-González , Ruyman Hernández-López
Urban biodiversity monitoring in smart cities requires scalable and efficient computing architectures capable of handling real-time, distributed sensing tasks. This paper proposes a low-power edge computing and Internet of Things (IoT) framework that enables on-device acoustic detection and classification of bird species, serving as bioindicators of ecosystem health. The architecture leverages lightweight convolutional neural networks (CNNs) deployed on energy-efficient sensor nodes, significantly reducing communication overhead by transmitting only detection events and compact spectrogram data. A key contribution is the automatic generation of Mel-spectrograms at the edge, which supports the continuous creation of training datasets and iterative neural network refinement without manual preprocessing. The proposed system incorporates dual Wi-Fi and Wi-Fi HaLow connectivity, providing adaptable long-range, low-power communication for heterogeneous urban environments. Field experiments validate the framework’s scalability and effectiveness, demonstrating robust detection of both native and invasive species. By combining distributed intelligence, resource-aware computation, and flexible networking, the system offers a practical edge–IoT solution for large-scale, real-time environmental monitoring in smart city contexts.
智慧城市的城市生物多样性监测需要可扩展和高效的计算架构,能够处理实时、分布式的传感任务。本文提出了一种低功耗边缘计算和物联网(IoT)框架,可以实现设备上的鸟类声学检测和分类,作为生态系统健康的生物指标。该架构利用部署在节能传感器节点上的轻量级卷积神经网络(cnn),通过仅传输检测事件和紧凑的频谱图数据,显著降低了通信开销。一个关键的贡献是在边缘自动生成mel谱图,它支持连续创建训练数据集和迭代神经网络细化,而无需手动预处理。该系统采用双Wi-Fi和Wi-Fi HaLow连接,为异构城市环境提供适应性强的远程低功耗通信。现场实验验证了该框架的可扩展性和有效性,展示了对本地和入侵物种的鲁棒检测。通过结合分布式智能、资源感知计算和灵活的网络,该系统为智慧城市背景下的大规模、实时环境监测提供了实用的边缘物联网解决方案。
{"title":"Scalable and low-power edge architecture with Wi-Fi HaLow and on-device spectrograms generation for flexible urban bioacoustics monitoring","authors":"Francisco A. Delgado-Rajó ,&nbsp;Carlos M. Travieso-González ,&nbsp;Ruyman Hernández-López","doi":"10.1016/j.iot.2025.101864","DOIUrl":"10.1016/j.iot.2025.101864","url":null,"abstract":"<div><div>Urban biodiversity monitoring in smart cities requires scalable and efficient computing architectures capable of handling real-time, distributed sensing tasks. This paper proposes a low-power edge computing and Internet of Things (IoT) framework that enables on-device acoustic detection and classification of bird species, serving as bioindicators of ecosystem health. The architecture leverages lightweight convolutional neural networks (CNNs) deployed on energy-efficient sensor nodes, significantly reducing communication overhead by transmitting only detection events and compact spectrogram data. A key contribution is the automatic generation of Mel-spectrograms at the edge, which supports the continuous creation of training datasets and iterative neural network refinement without manual preprocessing. The proposed system incorporates dual Wi-Fi and Wi-Fi HaLow connectivity, providing adaptable long-range, low-power communication for heterogeneous urban environments. Field experiments validate the framework’s scalability and effectiveness, demonstrating robust detection of both native and invasive species. By combining distributed intelligence, resource-aware computation, and flexible networking, the system offers a practical edge–IoT solution for large-scale, real-time environmental monitoring in smart city contexts.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101864"},"PeriodicalIF":7.6,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive artificial noise beamforming for securing grant-free massive machine-type communication 自适应人工噪声波束形成,确保大规模机器型通信免授权
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-21 DOI: 10.1016/j.iot.2025.101859
Uchenna P. Enwereonye, Ahmad Salehi Shahraki, Hooman Alavizadeh, A S M Kayes
Massive machine-type communication (mMTC) growth beyond 5G (B5G)/6G networks presents significant security challenges, particularly in grant-free scenarios where traditional cryptographic methods are insufficient. The lack of defined access control and the complexities of key management expose these systems to vulnerabilities such as pilot contamination and jamming. Existing physical layer security (PLS) techniques, including adaptive beamforming and artificial noise generation, are limited by their static nature and reliance on perfect channel state information (CSI), making them less effective in the dynamic and densely populated environments characteristic of mMTC. This paper introduces Adaptive Artificial Noise Beamforming (AANB), an enhanced PLS approach designed to optimise the trade-off between security and system performance for grant-free mMTC in B5G/6G, by dynamically adjusting beamforming vectors and artificial noise based on real-time CSI and spatial correlation, while ensuring minimal impact on legitimate users and maximising interference against eavesdroppers. The proposed AANB’s secrecy outage probability (SOP) for grant-free mMTC is analytically derived, and the impact of AANB is demonstrated through simulations, which shows that AANB significantly lowers SOP when benchmarked against Semi-grant-free (SGF) and traditional beamforming with artificial noise (BF+AN) techniques in grant-free mMTC environment. The results indicate that AANB consistently outperforms SGF and BF+AN, achieving lower SOP values across various signal-to-noise ratio (SNR) levels and spatial correlation scenarios, offering robust security in grant-free mMTC scenarios. Additionally, bit error rate (BER) analysis demonstrates that AANB consistently outperforms benchmark schemes across all SNR levels, due to its adaptive noise-to-signal ratio optimisation, thereby enhancing resistance against eavesdropping in grant-free mMTC.
超过5G (B5G)/6G网络的大规模机器类型通信(mMTC)增长带来了重大的安全挑战,特别是在传统加密方法不足的无授权场景中。缺乏定义的访问控制和密钥管理的复杂性使这些系统暴露于诸如先导污染和干扰之类的漏洞。现有的物理层安全(PLS)技术,包括自适应波束形成和人工噪声产生,由于其静态特性和对完美信道状态信息(CSI)的依赖,使得它们在mMTC的动态和密集环境中效果不佳。本文介绍了自适应人工噪声波束形成(AANB),这是一种增强型PLS方法,旨在通过动态调整波束形成矢量和基于实时CSI和空间相关性的人工噪声来优化B5G/6G中免费mMTC的安全性和系统性能之间的权衡,同时确保对合法用户的影响最小,并最大限度地干扰窃听者。分析了该方法对无授权mMTC保密中断概率(SOP)的影响,并通过仿真验证了该方法的影响,结果表明,在无授权mMTC环境下,与半无授权(SGF)和传统的人工噪声波束形成(BF+AN)技术进行基准测试时,AANB显著降低了SOP。结果表明,AANB始终优于SGF和BF+AN,在各种信噪比(SNR)水平和空间相关场景下实现更低的SOP值,在无授权的mMTC场景中提供强大的安全性。此外,误码率(BER)分析表明,由于其自适应噪声与信号比优化,AANB在所有信噪比水平上始终优于基准方案,从而增强了对无授权mMTC窃听的抵抗力。
{"title":"Adaptive artificial noise beamforming for securing grant-free massive machine-type communication","authors":"Uchenna P. Enwereonye,&nbsp;Ahmad Salehi Shahraki,&nbsp;Hooman Alavizadeh,&nbsp;A S M Kayes","doi":"10.1016/j.iot.2025.101859","DOIUrl":"10.1016/j.iot.2025.101859","url":null,"abstract":"<div><div>Massive machine-type communication (mMTC) growth beyond 5G (B5G)/6G networks presents significant security challenges, particularly in grant-free scenarios where traditional cryptographic methods are insufficient. The lack of defined access control and the complexities of key management expose these systems to vulnerabilities such as pilot contamination and jamming. Existing physical layer security (PLS) techniques, including adaptive beamforming and artificial noise generation, are limited by their static nature and reliance on perfect channel state information (CSI), making them less effective in the dynamic and densely populated environments characteristic of mMTC. This paper introduces Adaptive Artificial Noise Beamforming (AANB), an enhanced PLS approach designed to optimise the trade-off between security and system performance for grant-free mMTC in B5G/6G, by dynamically adjusting beamforming vectors and artificial noise based on real-time CSI and spatial correlation, while ensuring minimal impact on legitimate users and maximising interference against eavesdroppers. The proposed AANB’s secrecy outage probability (SOP) for grant-free mMTC is analytically derived, and the impact of AANB is demonstrated through simulations, which shows that AANB significantly lowers SOP when benchmarked against Semi-grant-free (SGF) and traditional beamforming with artificial noise (BF+AN) techniques in grant-free mMTC environment. The results indicate that AANB consistently outperforms SGF and BF+AN, achieving lower SOP values across various signal-to-noise ratio (SNR) levels and spatial correlation scenarios, offering robust security in grant-free mMTC scenarios. Additionally, bit error rate (BER) analysis demonstrates that AANB consistently outperforms benchmark schemes across all SNR levels, due to its adaptive noise-to-signal ratio optimisation, thereby enhancing resistance against eavesdropping in grant-free mMTC.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101859"},"PeriodicalIF":7.6,"publicationDate":"2025-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart parking with pixel-wise ROI selection for vehicle detection using YOLOv8, YOLOv9, YOLOv10, and YOLOv11 使用YOLOv8, YOLOv9, YOLOv10和YOLOv11进行车辆检测,具有逐像素ROI选择的智能停车
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1016/j.iot.2025.101858
Gustavo P C P da Luz, Gabriel Massuyoshi Sato, Luis Fernando Gomez Gonzalez, Juliana Freitag Borin
The increasing urbanization and the growing number of vehicles in cities have underscored the need for efficient parking management systems. Traditional smart parking solutions often rely on sensors or cameras for occupancy detection, each with its limitations. Recent advancements in deep learning have introduced new YOLO models (YOLOv8, YOLOv9, YOLOv10, and YOLOv11), but these models have not been extensively evaluated in the context of smart parking systems, particularly when combined with Region of Interest (ROI) selection for object detection. Existing methods still rely on fixed polygonal ROI selections or simple pixel-based modifications, which limit flexibility and precision. This work introduces a novel approach that integrates Internet of Things, Edge Computing, and Deep Learning concepts, by using the latest YOLO models for vehicle detection. By exploring both edge and cloud computing, it was found that inference times on edge devices ranged from 1 to 92 seconds, depending on the hardware and model version. Additionally, a highly flexible pixel-wise post-processing ROI selection method is proposed for accurately identifying regions of interest to count vehicles in parking lot images, overcoming the limitations of conventional polygon-based approaches. The proposed system achieved 99.68 % balanced accuracy on a custom dataset of 3484 images, providing a cost-effective smart parking solution that ensures precise vehicle detection while preserving data privacy, improving upon the previously used method by over 20 percentage points while maintaining the inference at the edge.
随着城市化进程的加快和城市车辆数量的增加,对高效停车管理系统的需求日益突出。传统的智能停车解决方案通常依赖于传感器或摄像头进行占用检测,每种解决方案都有其局限性。深度学习的最新进展引入了新的YOLO模型(YOLOv8, YOLOv9, YOLOv10和YOLOv11),但这些模型尚未在智能停车系统的背景下进行广泛评估,特别是在与感兴趣区域(ROI)选择相结合进行目标检测时。现有的方法仍然依赖于固定的多边形ROI选择或简单的基于像素的修改,这限制了灵活性和精度。这项工作通过使用最新的YOLO模型进行车辆检测,引入了一种集成了物联网、边缘计算和深度学习概念的新方法。通过探索边缘和云计算,发现边缘设备上的推理时间从1秒到92秒不等,具体取决于硬件和模型版本。此外,提出了一种高度灵活的逐像素后处理ROI选择方法,用于准确识别停车场图像中感兴趣的区域以对车辆进行计数,克服了传统基于多边形的方法的局限性。该系统在3484张图像的自定义数据集上实现了99.68%的平衡精度,提供了一种具有成本效益的智能停车解决方案,确保了精确的车辆检测,同时保持了数据隐私,在之前使用的方法的基础上提高了20个百分点以上,同时保持了边缘推理。
{"title":"Smart parking with pixel-wise ROI selection for vehicle detection using YOLOv8, YOLOv9, YOLOv10, and YOLOv11","authors":"Gustavo P C P da Luz,&nbsp;Gabriel Massuyoshi Sato,&nbsp;Luis Fernando Gomez Gonzalez,&nbsp;Juliana Freitag Borin","doi":"10.1016/j.iot.2025.101858","DOIUrl":"10.1016/j.iot.2025.101858","url":null,"abstract":"<div><div>The increasing urbanization and the growing number of vehicles in cities have underscored the need for efficient parking management systems. Traditional smart parking solutions often rely on sensors or cameras for occupancy detection, each with its limitations. Recent advancements in deep learning have introduced new YOLO models (YOLOv8, YOLOv9, YOLOv10, and YOLOv11), but these models have not been extensively evaluated in the context of smart parking systems, particularly when combined with Region of Interest (ROI) selection for object detection. Existing methods still rely on fixed polygonal ROI selections or simple pixel-based modifications, which limit flexibility and precision. This work introduces a novel approach that integrates Internet of Things, Edge Computing, and Deep Learning concepts, by using the latest YOLO models for vehicle detection. By exploring both edge and cloud computing, it was found that inference times on edge devices ranged from 1 to 92 seconds, depending on the hardware and model version. Additionally, a highly flexible pixel-wise post-processing ROI selection method is proposed for accurately identifying regions of interest to count vehicles in parking lot images, overcoming the limitations of conventional polygon-based approaches. The proposed system achieved 99.68 % balanced accuracy on a custom dataset of 3484 images, providing a cost-effective smart parking solution that ensures precise vehicle detection while preserving data privacy, improving upon the previously used method by over 20 percentage points while maintaining the inference at the edge.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101858"},"PeriodicalIF":7.6,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust weighted late fusion approach for IoT 一种面向物联网的鲁棒加权后期融合方法
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1016/j.iot.2025.101857
Vipin Nirala, Ratneshwer
IoT systems consist of numerous sensors that generate multiple modalities. Consequently, IoT-based systems often rely on these multiple modalities to perform their intended functionalities. However, the dynamic, heterogeneous, and openly-deployed nature of IoT-based systems makes them susceptible to several issues, including data corruption, inconsistencies, and unavailability. Catastrophic impacts such as node failures or security vulnerabilities further hinder the consistent availability of modalities. Therefore, achieving reliable access to all modalities at all times is almost impossible. In this work, we aim to improve decision-making in IoT systems by adaptively weighing different modalities. To this end, we propose an adaptive weighted late fusion, which combines heuristic-based strategies with optimization-based weight adaptation. This hybrid approach maintains a balance between heuristics and optimization, thereby improving overall system performance. We compare the proposed work against popular multimodal fusion approaches, including accuracy-based, F1-based, and entropy-based weighted fusion methods. Experimental results show that our proposed fusion method outperforms these approaches in terms of raw performance. Additionally, we simulate scenarios involving data corruption and modality unavailability, in which our proposed fusion method demonstrates superior performance compared to benchmark methods. In conclusion, the proposed fusion approach performs better in both ideal scenarios and challenging conditions with modality unavailability and inconsistencies.
物联网系统由产生多种模式的众多传感器组成。因此,基于物联网的系统通常依赖于这些多种模式来执行其预期功能。然而,基于物联网的系统的动态、异构和开放部署的特性使它们容易受到几个问题的影响,包括数据损坏、不一致和不可用。节点故障或安全漏洞等灾难性影响进一步阻碍了模式的一致可用性。因此,在任何时候实现所有模式的可靠访问几乎是不可能的。在这项工作中,我们的目标是通过自适应权衡不同的模式来改善物联网系统的决策。为此,我们提出了一种自适应加权后期融合算法,该算法将启发式策略与基于优化的权重自适应相结合。这种混合方法保持了启发式和优化之间的平衡,从而提高了系统的整体性能。我们将所提出的工作与流行的多模态融合方法进行了比较,包括基于精度的、基于f1的和基于熵的加权融合方法。实验结果表明,我们提出的融合方法在原始性能方面优于这些方法。此外,我们还模拟了涉及数据损坏和模态不可用的场景,与基准测试方法相比,我们提出的融合方法表现出更好的性能。总之,所提出的融合方法在理想场景和具有模态不可用和不一致的挑战性条件下都表现更好。
{"title":"A robust weighted late fusion approach for IoT","authors":"Vipin Nirala,&nbsp;Ratneshwer","doi":"10.1016/j.iot.2025.101857","DOIUrl":"10.1016/j.iot.2025.101857","url":null,"abstract":"<div><div>IoT systems consist of numerous sensors that generate multiple modalities. Consequently, IoT-based systems often rely on these multiple modalities to perform their intended functionalities. However, the dynamic, heterogeneous, and openly-deployed nature of IoT-based systems makes them susceptible to several issues, including data corruption, inconsistencies, and unavailability. Catastrophic impacts such as node failures or security vulnerabilities further hinder the consistent availability of modalities. Therefore, achieving reliable access to all modalities at all times is almost impossible. In this work, we aim to improve decision-making in IoT systems by adaptively weighing different modalities. To this end, we propose an adaptive weighted late fusion, which combines heuristic-based strategies with optimization-based weight adaptation. This hybrid approach maintains a balance between heuristics and optimization, thereby improving overall system performance. We compare the proposed work against popular multimodal fusion approaches, including accuracy-based, F1-based, and entropy-based weighted fusion methods. Experimental results show that our proposed fusion method outperforms these approaches in terms of raw performance. Additionally, we simulate scenarios involving data corruption and modality unavailability, in which our proposed fusion method demonstrates superior performance compared to benchmark methods. In conclusion, the proposed fusion approach performs better in both ideal scenarios and challenging conditions with modality unavailability and inconsistencies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101857"},"PeriodicalIF":7.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-To-end response-time analysis of DDS-based real-time applications 基于dds的实时应用的端到端响应时间分析
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1016/j.iot.2025.101853
Gerlando Sciangula , Daniel Casini , Alessandro Biondi , Claudio Scordino , Marco Di Natale
The Data Distribution Service (DDS) is established as a middleware communication standard based on a data-centric publish-subscribe protocol. This standard is pivotal for applications in autonomous driving, smart cities, and Industry 4.0, facilitating communication among diverse devices across the IoT-to-Edge-to-Cloud continuum. Particularly in the automotive industry, modern autonomous systems, built on top of frameworks like ROS 2 and Autoware, heavily rely on DDS for real-time data exchange across distributed software components. The DDS is however typically implemented with a multithreaded software structure and leverages middleware-specific policies for message dispatching, posing considerable challenges in guaranteeing timing constraints. This paper fills significant gaps in the current understanding of DDS’s real-time performance. We introduce a comprehensive DDS model that includes both synchronous and asynchronous communication under various dispatching policies. The model is then used to derive a holistic response-time analysis capable of bounding the end-to-end latency of DDS-enabled real-time applications. Furthermore, we integrate our analysis with a state-of-the-art executor-based analysis for ROS2-based systems. The effectiveness of our approach is validated through experiments on a real platform using FastDDS, a popular DDS implementation, and a modern automotive testbed taken from the WATERS 2019 Industrial Challenge by Bosch. Finally, our analysis method is evaluated with both a ROS2 case-study application and the Autoware reference system, a realistic testbed from the open-source Autoware.Auto framework for autonomous driving.
数据分发服务(DDS)是基于以数据为中心的发布-订阅协议建立的中间件通信标准。该标准对于自动驾驶、智慧城市和工业4.0的应用至关重要,促进了物联网到边缘到云连续体中各种设备之间的通信。特别是在汽车行业,建立在ROS 2和Autoware等框架之上的现代自主系统严重依赖DDS在分布式软件组件之间进行实时数据交换。然而,DDS通常使用多线程软件结构实现,并利用特定于中间件的策略进行消息调度,这在保证时间约束方面提出了相当大的挑战。本文填补了目前对DDS实时性能理解的重大空白。我们介绍了一个综合的DDS模型,包括各种调度策略下的同步和异步通信。然后使用该模型推导出一个整体的响应时间分析,该分析能够限定启用dds的实时应用程序的端到端延迟。此外,我们将我们的分析与基于ros2的系统的最先进的基于执行者的分析集成在一起。我们的方法的有效性通过使用FastDDS(一种流行的DDS实现)和博世2019年WATERS工业挑战赛的现代汽车测试平台在真实平台上的实验得到验证。最后,通过ROS2案例研究应用程序和Autoware参考系统(来自开源Autoware的现实测试平台)对我们的分析方法进行了评估。用于自动驾驶的汽车框架。
{"title":"End-To-end response-time analysis of DDS-based real-time applications","authors":"Gerlando Sciangula ,&nbsp;Daniel Casini ,&nbsp;Alessandro Biondi ,&nbsp;Claudio Scordino ,&nbsp;Marco Di Natale","doi":"10.1016/j.iot.2025.101853","DOIUrl":"10.1016/j.iot.2025.101853","url":null,"abstract":"<div><div>The Data Distribution Service (DDS) is established as a middleware communication standard based on a data-centric publish-subscribe protocol. This standard is pivotal for applications in autonomous driving, smart cities, and Industry 4.0, facilitating communication among diverse devices across the IoT-to-Edge-to-Cloud continuum. Particularly in the automotive industry, modern autonomous systems, built on top of frameworks like ROS 2 and Autoware, heavily rely on DDS for real-time data exchange across distributed software components. The DDS is however typically implemented with a multithreaded software structure and leverages middleware-specific policies for message dispatching, posing considerable challenges in guaranteeing timing constraints. This paper fills significant gaps in the current understanding of DDS’s real-time performance. We introduce a comprehensive DDS model that includes both synchronous and asynchronous communication under various dispatching policies. The model is then used to derive a holistic response-time analysis capable of bounding the end-to-end latency of DDS-enabled real-time applications. Furthermore, we integrate our analysis with a state-of-the-art executor-based analysis for ROS2-based systems. The effectiveness of our approach is validated through experiments on a real platform using FastDDS, a popular DDS implementation, and a modern automotive testbed taken from the WATERS 2019 Industrial Challenge by Bosch. Finally, our analysis method is evaluated with both a ROS2 case-study application and the Autoware reference system, a realistic testbed from the open-source Autoware.Auto framework for autonomous driving.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101853"},"PeriodicalIF":7.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correct by design, complete by iteration: A graph-based framework for automated security assessment 设计正确,迭代完成:用于自动安全评估的基于图的框架
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-14 DOI: 10.1016/j.iot.2025.101851
Felice Moretta , Umberto Barbato , Massimiliano Rak , Daniele Granata
Modern IT infrastructures, especially IoT and cyber-physical systems, require systematic and repeatable security assessment methods. A persistent challenge concerns the correctness and completeness of the system model underlying such analyses, which directly affect the quality of threat modeling and penetration test planning. Existing model-based approaches support these activities, but rarely ensure that the adopted model is both structurally valid and representative of the real system. This paper addresses this gap by introducing a formal modeling framework and extending a security assessment methodology (ESSecA) with a cyclical refinement process. At its core lies the Multi-purpose Application Composition Model (MACM), a property-graph formalism equipped with a schema and a set of syntactic and semantic constraints that define the space of admissible models. These constraints are automatically verified through formal checks (e.g., Cypher queries and Neo4j triggers), enabling automated verification of model correctness throughout the assessment lifecycle. As a result, any model accepted by the framework is guaranteed to comply with the rules of the modeling system. The cyclical refinement process complements this by addressing model completeness. Penetration testing results are iteratively reintegrated into the model, enriching it with newly discovered elements and interactions. This produces progressively more accurate system representations, which in turn yield more comprehensive threat models and increasingly precise penetration test plans, effectively mitigating grey-box limitations. The contribution is demonstrated through two case studies: the eWeLink IoT ecosystem, illustrating MACM’s modeling and validation capabilities, and the JetRacer autonomous vehicle platform, showcasing the full iterative methodology. Overall, the proposed approach combines a formal modeling system with a cyclic refinement process that exploits such formal guarantees to progressively enhance model completeness, ultimately strengthening threat modeling and penetration test planning.
现代IT基础设施,特别是物联网和网络物理系统,需要系统和可重复的安全评估方法。一个持续的挑战涉及到这种分析的系统模型的正确性和完整性,这直接影响到威胁建模和渗透测试计划的质量。现有的基于模型的方法支持这些活动,但是很少能确保所采用的模型在结构上是有效的,并且代表了真实的系统。本文通过引入正式的建模框架和扩展安全评估方法(eseca)来解决这一差距。其核心是多用途应用程序组合模型(MACM),这是一种带有模式和一组定义可接受模型空间的语法和语义约束的属性图形式。这些约束通过正式检查(例如,Cypher查询和Neo4j触发器)自动验证,从而在整个评估生命周期中实现模型正确性的自动验证。因此,框架所接受的任何模型都保证符合建模系统的规则。循环细化过程通过解决模型的完整性来补充这一点。渗透测试的结果被迭代地重新集成到模型中,用新发现的元素和交互来丰富模型。这产生了越来越精确的系统表示,进而产生了更全面的威胁模型和越来越精确的渗透测试计划,有效地减轻了灰盒限制。通过两个案例研究展示了MACM的贡献:eWeLink物联网生态系统,展示了MACM的建模和验证能力,以及JetRacer自动驾驶汽车平台,展示了完整的迭代方法。总的来说,提出的方法结合了一个正式的建模系统和一个循环的细化过程,利用这种正式的保证来逐步增强模型的完整性,最终加强威胁建模和渗透测试计划。
{"title":"Correct by design, complete by iteration: A graph-based framework for automated security assessment","authors":"Felice Moretta ,&nbsp;Umberto Barbato ,&nbsp;Massimiliano Rak ,&nbsp;Daniele Granata","doi":"10.1016/j.iot.2025.101851","DOIUrl":"10.1016/j.iot.2025.101851","url":null,"abstract":"<div><div>Modern IT infrastructures, especially IoT and cyber-physical systems, require systematic and repeatable security assessment methods. A persistent challenge concerns the correctness and completeness of the system model underlying such analyses, which directly affect the quality of threat modeling and penetration test planning. Existing model-based approaches support these activities, but rarely ensure that the adopted model is both structurally valid and representative of the real system. This paper addresses this gap by introducing a formal modeling framework and extending a security assessment methodology (ESSecA) with a cyclical refinement process. At its core lies the Multi-purpose Application Composition Model (MACM), a property-graph formalism equipped with a schema and a set of syntactic and semantic constraints that define the space of admissible models. These constraints are automatically verified through formal checks (e.g., Cypher queries and Neo4j triggers), enabling automated verification of model correctness throughout the assessment lifecycle. As a result, any model accepted by the framework is guaranteed to comply with the rules of the modeling system. The cyclical refinement process complements this by addressing model completeness. Penetration testing results are iteratively reintegrated into the model, enriching it with newly discovered elements and interactions. This produces progressively more accurate system representations, which in turn yield more comprehensive threat models and increasingly precise penetration test plans, effectively mitigating grey-box limitations. The contribution is demonstrated through two case studies: the eWeLink IoT ecosystem, illustrating MACM’s modeling and validation capabilities, and the JetRacer autonomous vehicle platform, showcasing the full iterative methodology. Overall, the proposed approach combines a formal modeling system with a cyclic refinement process that exploits such formal guarantees to progressively enhance model completeness, ultimately strengthening threat modeling and penetration test planning.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101851"},"PeriodicalIF":7.6,"publicationDate":"2025-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying user-created passwords using machine learning and natural language processing techniques 使用机器学习和自然语言处理技术对用户创建的密码进行分类
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-13 DOI: 10.1016/j.iot.2025.101854
Binh Le Thanh Thai, Tsubasa Takii, Hidema Tanaka
Passwords are the dominant authentication method. However, evaluating the strength of user-created passwords remains a significant challenge due to the influence of various external factors, such as language, culture, and keyboard layout. In this paper, we address the problem of classifying user-created passwords into predefined groups, rather than directly evaluating their strength. First, we assess the performance of classifiers utilizing eight machine learning (ML) algorithms and four Natural Language Processing techniques to identify the optimal combination of ML algorithms and feature extraction methods. Through this experiment, we determine that the classifier combining Bag-of-Words and Logistic Regression is the most effective approach for classifying user-created passwords. Subsequently, we propose a hierarchical classification model to enhance the performance of this classifier. Experimental results demonstrate that the proposed model achieves accuracy of 97.81 % and recall of 99.66 % for weak passwords.
密码是主要的认证方法。然而,由于语言、文化和键盘布局等各种外部因素的影响,评估用户创建的密码的强度仍然是一个重大挑战。在本文中,我们解决了将用户创建的密码分类到预定义组的问题,而不是直接评估它们的强度。首先,我们评估了使用八种机器学习(ML)算法和四种自然语言处理技术的分类器的性能,以确定ML算法和特征提取方法的最佳组合。通过本实验,我们确定结合词袋和逻辑回归的分类器是对用户创建的密码进行分类的最有效方法。随后,我们提出了一种层次分类模型来提高该分类器的性能。实验结果表明,该模型对弱密码的识别率为97.81%,召回率为99.66%。
{"title":"Classifying user-created passwords using machine learning and natural language processing techniques","authors":"Binh Le Thanh Thai,&nbsp;Tsubasa Takii,&nbsp;Hidema Tanaka","doi":"10.1016/j.iot.2025.101854","DOIUrl":"10.1016/j.iot.2025.101854","url":null,"abstract":"<div><div>Passwords are the dominant authentication method. However, evaluating the strength of user-created passwords remains a significant challenge due to the influence of various external factors, such as language, culture, and keyboard layout. In this paper, we address the problem of classifying user-created passwords into predefined groups, rather than directly evaluating their strength. First, we assess the performance of classifiers utilizing eight machine learning (ML) algorithms and four Natural Language Processing techniques to identify the optimal combination of ML algorithms and feature extraction methods. Through this experiment, we determine that the classifier combining Bag-of-Words and Logistic Regression is the most effective approach for classifying user-created passwords. Subsequently, we propose a hierarchical classification model to enhance the performance of this classifier. Experimental results demonstrate that the proposed model achieves accuracy of 97.81 % and recall of 99.66 % for weak passwords.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101854"},"PeriodicalIF":7.6,"publicationDate":"2025-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Snip-Cache: A code snippet caching system for LLM-based command-driven IoT systems snippet - cache:用于基于llm的命令驱动物联网系统的代码片段缓存系统
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-13 DOI: 10.1016/j.iot.2025.101852
Chiwon Song , Sooyong Kang
Large language models (LLMs) are widely used in real-time interface systems that process user commands. Despite their high output quality, the long response times and substantial operating costs undermine the practicality and sustainability of LLM-based services. Prompt caching is one of the optimization techniques introduced to mitigate the problem. It avoids redundant processing of repetitive prompts by caching and reusing the response for the same or similar prompts. However, such a static caching scheme has an intrinsic limitation, in terms of the reusability of results, due to the variety of expressions having the same semantics in real-world usage environments. In this paper, we introduce a new strategy for prompt caching, Snippet Caching, for LLM-based command-driven IoT systems to overcome the limitation. It perceives a command (prompt) as a function call with specific arguments. Instead of caching (input, output) pairs, it caches two simple code snippets that mimic LLM operations for each function. Based on the strategy, we design a novel prompt caching scheme, Snip-Cache, which generates code snippets with the help of LLMs. Experimental results show that Snip-Cache is significantly more beneficial to command-driven IoT systems than semantic caching schemes (GPTCache and vCache), in terms of response accuracy, response time, and token usage.
大型语言模型(llm)广泛应用于处理用户命令的实时接口系统中。尽管它们的输出质量很高,但响应时间长,运营成本高,破坏了llm服务的实用性和可持续性。提示缓存是为了缓解这个问题而引入的一种优化技术。它通过缓存和重用相同或类似提示的响应来避免重复提示的冗余处理。然而,就结果的可重用性而言,这种静态缓存方案具有内在的限制,因为在实际使用环境中,各种表达式具有相同的语义。在本文中,我们为基于llm的命令驱动物联网系统引入了一种新的提示缓存策略——Snippet caching,以克服这一限制。它将命令(提示符)视为带有特定参数的函数调用。它没有缓存(输入、输出)对,而是缓存两个简单的代码片段,模拟每个函数的LLM操作。基于该策略,我们设计了一种新的提示缓存方案——snippet - cache,该方案在llm的帮助下生成代码片段。实验结果表明,在响应精度、响应时间和令牌使用方面,snippet - cache明显比语义缓存方案(GPTCache和vCache)更有利于命令驱动的物联网系统。
{"title":"Snip-Cache: A code snippet caching system for LLM-based command-driven IoT systems","authors":"Chiwon Song ,&nbsp;Sooyong Kang","doi":"10.1016/j.iot.2025.101852","DOIUrl":"10.1016/j.iot.2025.101852","url":null,"abstract":"<div><div>Large language models (LLMs) are widely used in real-time interface systems that process user commands. Despite their high output quality, the long response times and substantial operating costs undermine the practicality and sustainability of LLM-based services. Prompt caching is one of the optimization techniques introduced to mitigate the problem. It avoids redundant processing of repetitive prompts by caching and reusing the response for the same or similar prompts. However, such a static caching scheme has an intrinsic limitation, in terms of the reusability of results, due to the variety of expressions having the same semantics in real-world usage environments. In this paper, we introduce a new strategy for prompt caching, <em>Snippet Caching</em>, for LLM-based command-driven IoT systems to overcome the limitation. It perceives a command (prompt) as a function call with specific arguments. Instead of caching (input, output) pairs, it caches two simple code snippets that mimic LLM operations for each function. Based on the strategy, we design a novel prompt caching scheme, <em>Snip-Cache</em>, which generates code snippets with the help of LLMs. Experimental results show that Snip-Cache is significantly more beneficial to command-driven IoT systems than semantic caching schemes (GPTCache and vCache), in terms of response accuracy, response time, and token usage.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"36 ","pages":"Article 101852"},"PeriodicalIF":7.6,"publicationDate":"2025-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1