首页 > 最新文献

Internet of Things最新文献

英文 中文
Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis 区块链技术在市场营销中的应用和新兴趋势,以发展工业 5.0 企业:全面调查与网络分析
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1016/j.iot.2024.101401
Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva
With the availability of enormous amounts of data come the difficulties of big data, privacy, and ransomware assaults, which result in Marketing fraud and spam. Blockchain offers an extensive array of possible applications in the Marketing field. Nevertheless, both Marketing research and practice exhibit a degree of hesitance toward using Blockchain technology and have not yet come around to completely understand and adopt the technology. Here, the aim is to examine the Blockchain concepts and their applications in Marketing through bibliometrics, network, and thematic analyses, which can provide several novel insights and perspectives into current research trends in this field by evaluating the most significant and cited research publications, keywords, institutions, authors' collaboration network, and finally countries that promote Industry 5.0 (I5.0) businesses. This study performs a detailed bibliometric and thematic-based Systematic Literature Review (SLR) on 124 of over 15000 research papers. Major outcomes include the identification of emerging themes such as the role of Blockchain in advertising, and dynamic pricing, as well as the need for further exploration of underdeveloped areas (e.g., consumer behavior and brand equity). The results contribute to theoretical and practical management elements and provide the groundwork for future study in this area. The overarching target of this research is to give a complete overview of applications and emerging trends of Blockchain technology in Marketing, thereby serving as a resource for future research topics for Marketing scholars and experts aiming to implement solutions based on Blockchain technology and algorithms to develop an I5.0 business.
随着海量数据的出现,大数据、隐私和勒索软件攻击等难题也随之而来,这导致了营销欺诈和垃圾邮件。区块链为市场营销领域提供了大量可能的应用。然而,营销研究和实践都对使用区块链技术表现出一定程度的犹豫,尚未完全理解和采用该技术。本研究旨在通过文献计量学、网络和主题分析来研究区块链概念及其在市场营销中的应用,通过评估最重要和最常被引用的研究出版物、关键词、机构、作者合作网络以及最终促进工业5.0(I5.0)业务的国家,为该领域当前的研究趋势提供一些新的见解和视角。本研究对超过 15000 篇研究论文中的 124 篇进行了详细的文献计量和基于主题的系统文献综述(SLR)。主要成果包括确定了区块链在广告中的作用和动态定价等新兴主题,以及进一步探索欠发达领域(如消费者行为和品牌资产)的必要性。研究结果为理论和实际管理要素做出了贡献,并为该领域的未来研究奠定了基础。本研究的总体目标是全面概述区块链技术在市场营销中的应用和新兴趋势,从而为旨在实施基于区块链技术和算法的解决方案以发展I5.0业务的市场营销学者和专家提供未来研究课题的资源。
{"title":"Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis","authors":"Ali Nikseresht ,&nbsp;Sajjad Shokouhyar ,&nbsp;Erfan Babaee Tirkolaee ,&nbsp;Nima Pishva","doi":"10.1016/j.iot.2024.101401","DOIUrl":"10.1016/j.iot.2024.101401","url":null,"abstract":"<div><div>With the availability of enormous amounts of data come the difficulties of big data, privacy, and ransomware assaults, which result in Marketing fraud and spam. Blockchain offers an extensive array of possible applications in the Marketing field. Nevertheless, both Marketing research and practice exhibit a degree of hesitance toward using Blockchain technology and have not yet come around to completely understand and adopt the technology. Here, the aim is to examine the Blockchain concepts and their applications in Marketing through bibliometrics, network, and thematic analyses, which can provide several novel insights and perspectives into current research trends in this field by evaluating the most significant and cited research publications, keywords, institutions, authors' collaboration network, and finally countries that promote Industry 5.0 (I5.0) businesses. This study performs a detailed bibliometric and thematic-based Systematic Literature Review (SLR) on 124 of over 15000 research papers. Major outcomes include the identification of emerging themes such as the role of Blockchain in advertising, and dynamic pricing, as well as the need for further exploration of underdeveloped areas (e.g., consumer behavior and brand equity). The results contribute to theoretical and practical management elements and provide the groundwork for future study in this area. The overarching target of this research is to give a complete overview of applications and emerging trends of Blockchain technology in Marketing, thereby serving as a resource for future research topics for Marketing scholars and experts aiming to implement solutions based on Blockchain technology and algorithms to develop an I5.0 business.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101401"},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaussian process-based online sensor selection for source localization 基于高斯过程的源定位在线传感器选择
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1016/j.iot.2024.101388
Obadah Habash, Rabeb Mizouni, Shakti Singh, Hadi Otrok
This paper addresses the sensor selection problem for source localization within cyber–physical systems (CPSs). While recent machine learning and reinforcement learning approaches aim to optimize sensor selection and placement within the Area of Interest (AoI), their need for intensive data collection and training precludes online operation. Furthermore, these methods often require prior knowledge of the unknown source’s characteristics and lack adaptability to the dynamic nature of CPSs, leading to inefficiencies in unseen environments. This paper addresses these shortcomings using Gaussian process Optimization coupled with an active sensor selection mechanism to locate the unknown source within the AoI. The proposed approach first builds a probabilistic model of the environment, which is discretized into a grid, without prior training using a Gaussian Process surrogate model. Next, the model iteratively and systematically learns the underlying spatial phenomenon using Gaussian Process optimization. Concurrently, the approach selects a subset of sensors by optimizing a fitness function that advocates selecting informative and energy-efficient sensors. Next, the probabilistic model, having accurately learned the environment, directs the algorithm to the unknown source by identifying the cell with the highest likelihood of containing it. Finally, a peak refinement step is performed, which computes the exact location of the source within the designated cell. The proposed method’s efficacy is validated through experiments in radioactive source localization, validation studies, and adaptability assessments across various environments. In terms of quality of localization (QoL), it outperforms recent localization benchmarks, such as a reinforcement learning-based approach and DANS, by around 18% and 100%, respectively.
本文探讨了网络物理系统(CPS)中源定位的传感器选择问题。虽然最近的机器学习和强化学习方法旨在优化感兴趣区(AoI)内的传感器选择和放置,但它们需要密集的数据收集和训练,因此无法实现在线操作。此外,这些方法通常需要事先了解未知源的特征,对 CPS 的动态性质缺乏适应性,导致在看不见的环境中效率低下。本文利用高斯过程优化和主动传感器选择机制来解决这些不足,从而在 AoI 内定位未知源。所提出的方法首先利用高斯过程代理模型建立了一个环境概率模型,并将其离散化为网格,而无需事先进行训练。接下来,该模型利用高斯过程优化迭代系统地学习潜在的空间现象。同时,该方法通过优化适合度函数来选择传感器子集,该函数主张选择信息量大、能效高的传感器。接下来,概率模型在准确了解环境后,通过识别包含未知源可能性最大的单元,将算法导向未知源。最后,执行峰值细化步骤,计算源在指定小区内的确切位置。通过放射源定位实验、验证研究和各种环境适应性评估,验证了所提方法的有效性。就定位质量(QoL)而言,该方法优于近期的定位基准,如基于强化学习的方法和 DANS,分别优于约 18% 和 100%。
{"title":"Gaussian process-based online sensor selection for source localization","authors":"Obadah Habash,&nbsp;Rabeb Mizouni,&nbsp;Shakti Singh,&nbsp;Hadi Otrok","doi":"10.1016/j.iot.2024.101388","DOIUrl":"10.1016/j.iot.2024.101388","url":null,"abstract":"<div><div>This paper addresses the sensor selection problem for source localization within cyber–physical systems (CPSs). While recent machine learning and reinforcement learning approaches aim to optimize sensor selection and placement within the Area of Interest (AoI), their need for intensive data collection and training precludes online operation. Furthermore, these methods often require prior knowledge of the unknown source’s characteristics and lack adaptability to the dynamic nature of CPSs, leading to inefficiencies in unseen environments. This paper addresses these shortcomings using Gaussian process Optimization coupled with an active sensor selection mechanism to locate the unknown source within the AoI. The proposed approach first builds a probabilistic model of the environment, which is discretized into a grid, without prior training using a Gaussian Process surrogate model. Next, the model iteratively and systematically learns the underlying spatial phenomenon using Gaussian Process optimization. Concurrently, the approach selects a subset of sensors by optimizing a fitness function that advocates selecting informative and energy-efficient sensors. Next, the probabilistic model, having accurately learned the environment, directs the algorithm to the unknown source by identifying the cell with the highest likelihood of containing it. Finally, a peak refinement step is performed, which computes the exact location of the source within the designated cell. The proposed method’s efficacy is validated through experiments in radioactive source localization, validation studies, and adaptability assessments across various environments. In terms of quality of localization (QoL), it outperforms recent localization benchmarks, such as a reinforcement learning-based approach and DANS, by around 18% and 100%, respectively.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101388"},"PeriodicalIF":6.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data 使用同态加密和无辅助数据的弱物理不可克隆函数的物联网设备量子安全认证方案
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-08 DOI: 10.1016/j.iot.2024.101389
Roberto Román, Rosario Arjona, Iluminada Baturone
Physical Unclonable Functions (PUFs) are widely used to authenticate electronic devices because they take advantage of random variations in the manufacturing process that are unique to each device and cannot be cloned. Therefore, each device can be uniquely identified and counterfeit devices can be detected. Weak PUFs, which support a relatively small number of challenge-response pairs (CRPs), are simple and easy to construct. Device authentication with weak PUFs typically uses helper data to obfuscate and recover a cryptographic key that is then required by a cryptographic authentication scheme. However, these schemes are vulnerable to helper-data attacks and many of them do not protect conveniently the PUF responses, which are sensitive data, as well as are not resistant to attacks performed by quantum computers. This paper proposes an authentication scheme that avoids the aforementioned weaknesses by not using helper data, protecting the PUF response with a quantum-safe homomorphic encryption, and by using a two-server setup. Specifically, the CRYSTALS-Kyber public key cryptographic algorithm is used for its quantum resistance and suitability for resource-constrained Internet-of-Things (IoT) devices. The practicality of the proposal was tested on an ESP32 microcontroller using its internal SRAM as a SRAM PUF. For PUF responses of 512 bits, the encryption execution time ranges from 16.41 ms to 41.08 ms, depending on the desired level of security. In terms of memory, the device only needs to store between 800 and 1,568 bytes. This makes the solution post-quantum secure, lightweight and affordable for IoT devices with limited computing, memory, and power resources.
物理不可克隆功能(PUF)被广泛用于验证电子设备,因为它利用了制造过程中的随机变化,这些变化对每个设备都是独一无二的,无法克隆。因此,每个设备都能被唯一识别,假冒设备也能被检测出来。弱 PUF 支持相对较少的挑战-响应对 (CRP),其构造简单、容易。使用弱 PUF 进行设备验证时,通常会使用辅助数据来混淆和恢复加密密钥,而加密验证方案则需要该密钥。然而,这些方案很容易受到辅助数据攻击,而且许多方案不能方便地保护作为敏感数据的 PUF 响应,也无法抵御量子计算机的攻击。本文提出了一种验证方案,通过不使用辅助数据、使用量子安全同态加密保护 PUF 响应以及使用双服务器设置来避免上述弱点。具体来说,CRYSTALS-Kyber 公钥加密算法具有量子抗性,适合资源受限的物联网(IoT)设备。在 ESP32 微控制器上使用其内部 SRAM 作为 SRAM PUF 测试了该提案的实用性。对于 512 位的 PUF 响应,加密执行时间从 16.41 ms 到 41.08 ms 不等,具体取决于所需的安全级别。在内存方面,设备只需存储 800 到 1,568 字节。这使得该解决方案对于计算、内存和电力资源有限的物联网设备来说,具有后量子安全、轻便和经济实惠的特点。
{"title":"A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data","authors":"Roberto Román,&nbsp;Rosario Arjona,&nbsp;Iluminada Baturone","doi":"10.1016/j.iot.2024.101389","DOIUrl":"10.1016/j.iot.2024.101389","url":null,"abstract":"<div><div>Physical Unclonable Functions (PUFs) are widely used to authenticate electronic devices because they take advantage of random variations in the manufacturing process that are unique to each device and cannot be cloned. Therefore, each device can be uniquely identified and counterfeit devices can be detected. Weak PUFs, which support a relatively small number of challenge-response pairs (CRPs), are simple and easy to construct. Device authentication with weak PUFs typically uses helper data to obfuscate and recover a cryptographic key that is then required by a cryptographic authentication scheme. However, these schemes are vulnerable to helper-data attacks and many of them do not protect conveniently the PUF responses, which are sensitive data, as well as are not resistant to attacks performed by quantum computers. This paper proposes an authentication scheme that avoids the aforementioned weaknesses by not using helper data, protecting the PUF response with a quantum-safe homomorphic encryption, and by using a two-server setup. Specifically, the CRYSTALS-Kyber public key cryptographic algorithm is used for its quantum resistance and suitability for resource-constrained Internet-of-Things (IoT) devices. The practicality of the proposal was tested on an ESP32 microcontroller using its internal SRAM as a SRAM PUF. For PUF responses of 512 bits, the encryption execution time ranges from 16.41 ms to 41.08 ms, depending on the desired level of security. In terms of memory, the device only needs to store between 800 and 1,568 bytes. This makes the solution post-quantum secure, lightweight and affordable for IoT devices with limited computing, memory, and power resources.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101389"},"PeriodicalIF":6.0,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid vehicular access protocol and message prioritization for real-time safety messaging 实时安全信息的混合车辆接入协议和信息优先级排序
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-05 DOI: 10.1016/j.iot.2024.101390
Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed
Real-time safety services rely on the exchange of messages to enhance the operations of connected and automated vehicles (CAVs). These safety messages convey vital information about traffic conditions, enabling drivers to take necessary measures to prevent accidents. The timely and reliable delivery of these messages is essential, necessitating efficient channel access. Vehicular Deterministic Access (VDA) is employed as a channel access scheme with distinct priorities and stringent timing guidelines, particularly for urgent safety warnings. In this paper, we propose a hybrid approach that combines VDA and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocols, along with a message prioritization algorithm, to ensure efficient and reliable communication of safety messages in vehicular networks. Our approach leverages the strengths of both VDA and CSMA/CA to avoid message collisions; VDA is more efficient under high traffic loads, while CSMA/CA is better suited for low traffic loads. Additionally, the incorporation of the message prioritization algorithm ensures strict deadline guarantees for high-priority messages, such as Decentralized Environmental Notification Messages (DENMs). We evaluate our proposed solution using the Artery simulation framework. Our results show over a 93% delivery rate for DENM exchanges while maintaining low collision probability across various traffic loads. This research provides practical guidance for the development of efficient and reliable communication systems for CAVs. It also offers a detailed analysis of the trade-offs among different access protocols and message prioritization strategies in vehicular networks.
实时安全服务依靠信息交换来提高互联和自动驾驶车辆(CAV)的运行。这些安全信息传递有关交通状况的重要信息,使驾驶员能够采取必要措施防止事故发生。及时可靠地传递这些信息至关重要,因此需要高效的信道接入。车载确定性接入(VDA)作为一种信道接入方案,具有明确的优先级和严格的时间准则,尤其适用于紧急安全警告。在本文中,我们提出了一种混合方法,将 VDA 和带碰撞避免功能的载波侦测多路访问(CSMA/CA)协议与信息优先级算法相结合,以确保车载网络中安全信息的高效可靠通信。我们的方法利用了 VDA 和 CSMA/CA 的优势来避免信息碰撞;VDA 在高流量负载下更有效,而 CSMA/CA 则更适合低流量负载。此外,信息优先级算法的加入确保了高优先级信息(如分散环境通知信息 (DENM))的严格截止日期保证。我们使用 Artery 仿真框架对我们提出的解决方案进行了评估。我们的结果表明,DENM 交换的交付率超过 93%,同时在各种流量负载下保持了较低的碰撞概率。这项研究为开发高效可靠的 CAV 通信系统提供了实用指导。它还对车载网络中不同接入协议和信息优先级策略之间的权衡进行了详细分析。
{"title":"Hybrid vehicular access protocol and message prioritization for real-time safety messaging","authors":"Mayssa Dardour,&nbsp;Mohamed Mosbah,&nbsp;Toufik Ahmed","doi":"10.1016/j.iot.2024.101390","DOIUrl":"10.1016/j.iot.2024.101390","url":null,"abstract":"<div><div>Real-time safety services rely on the exchange of messages to enhance the operations of connected and automated vehicles (CAVs). These safety messages convey vital information about traffic conditions, enabling drivers to take necessary measures to prevent accidents. The timely and reliable delivery of these messages is essential, necessitating efficient channel access. Vehicular Deterministic Access (VDA) is employed as a channel access scheme with distinct priorities and stringent timing guidelines, particularly for urgent safety warnings. In this paper, we propose a hybrid approach that combines VDA and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocols, along with a message prioritization algorithm, to ensure efficient and reliable communication of safety messages in vehicular networks. Our approach leverages the strengths of both VDA and CSMA/CA to avoid message collisions; VDA is more efficient under high traffic loads, while CSMA/CA is better suited for low traffic loads. Additionally, the incorporation of the message prioritization algorithm ensures strict deadline guarantees for high-priority messages, such as Decentralized Environmental Notification Messages (DENMs). We evaluate our proposed solution using the Artery simulation framework. Our results show over a 93% delivery rate for DENM exchanges while maintaining low collision probability across various traffic loads. This research provides practical guidance for the development of efficient and reliable communication systems for CAVs. It also offers a detailed analysis of the trade-offs among different access protocols and message prioritization strategies in vehicular networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101390"},"PeriodicalIF":6.0,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security 基于 BRLWE 的轻量级后量子密码系统,具有物联网安全的侧信道恢复能力
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-03 DOI: 10.1016/j.iot.2024.101391
Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen
The rapid advancement of quantum computing poses a significant threat to conventional cryptographic systems, particularly in the context of Internet of Things (IoT) security. This paper introduces PQ-IoTCrypt, a lightweight post-quantum cryptosystem for resource-constrained IoT devices. PQ-IoTCrypt builds upon the binary ring learning with errors problem, incorporating optimizations for efficient implementation on 8-bit microcontrollers commonly found in IoT environments. We introduce a symmetric discrete uniform distribution and streamlined polynomial arithmetic to reduce computational overhead while maintaining a high-security level. Additionally, we present a comprehensive power side-channel analysis framework for lattice-based post-quantum cryptography, demonstrating PQ-IoTCrypt's resilience against various side-channel attacks, including advanced ciphertext selection criteria, IoT-optimized template creation, and a hierarchical chosen-ciphertext attack methodology tailored for IoT deployments. Experimental results show that PQ-IoTCrypt achieves a 9.9% reduction in total encryption time compared to the next best baseline at the 256-bit security level while requiring significantly fewer ciphertexts for successful attacks. PQ-IoTCrypt demonstrates superior performance in key generation, encryption, and decryption processes, with times reduced by 12.7 %, 9.1 %, and 9.2 %, respectively, compared to the closest competitor. This work contributes to the standardization efforts of post-quantum IoT security and offers valuable insights for real-world deployment of quantum-resistant cryptography in resource-limited settings.
量子计算的快速发展对传统加密系统构成了巨大威胁,尤其是在物联网(IoT)安全方面。本文介绍的 PQ-IoTCrypt 是一种轻量级后量子加密系统,适用于资源受限的物联网设备。PQ-IoTCrypt 建立在二进制环误差学习问题的基础上,为在物联网环境中常见的 8 位微控制器上高效实施进行了优化。我们引入了对称离散均匀分布和精简多项式运算,以减少计算开销,同时保持较高的安全级别。此外,我们还为基于晶格的后量子加密技术提出了一个全面的电源侧信道分析框架,展示了 PQ-IoTCrypt 抵御各种侧信道攻击的能力,包括先进的密文选择标准、物联网优化模板创建以及为物联网部署量身定制的分层选择密文攻击方法。实验结果表明,在 256 位安全级别下,PQ-IoTCrypt 的总加密时间比次佳基线缩短了 9.9%,同时成功攻击所需的密文数量显著减少。PQ-IoTCrypt 在密钥生成、加密和解密过程中表现出卓越的性能,与最接近的竞争对手相比,时间分别缩短了 12.7%、9.1% 和 9.2%。这项工作有助于后量子物联网安全的标准化工作,并为在资源有限的环境中部署抗量子加密技术提供了宝贵的见解。
{"title":"A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security","authors":"Changsheng Ma ,&nbsp;Achyut Shankar ,&nbsp;Saru Kumari ,&nbsp;Chien-Ming Chen","doi":"10.1016/j.iot.2024.101391","DOIUrl":"10.1016/j.iot.2024.101391","url":null,"abstract":"<div><div>The rapid advancement of quantum computing poses a significant threat to conventional cryptographic systems, particularly in the context of Internet of Things (IoT) security. This paper introduces PQ-IoTCrypt, a lightweight post-quantum cryptosystem for resource-constrained IoT devices. PQ-IoTCrypt builds upon the binary ring learning with errors problem, incorporating optimizations for efficient implementation on 8-bit microcontrollers commonly found in IoT environments. We introduce a symmetric discrete uniform distribution and streamlined polynomial arithmetic to reduce computational overhead while maintaining a high-security level. Additionally, we present a comprehensive power side-channel analysis framework for lattice-based post-quantum cryptography, demonstrating PQ-IoTCrypt's resilience against various side-channel attacks, including advanced ciphertext selection criteria, IoT-optimized template creation, and a hierarchical chosen-ciphertext attack methodology tailored for IoT deployments. Experimental results show that PQ-IoTCrypt achieves a 9.9% reduction in total encryption time compared to the next best baseline at the 256-bit security level while requiring significantly fewer ciphertexts for successful attacks. PQ-IoTCrypt demonstrates superior performance in key generation, encryption, and decryption processes, with times reduced by 12.7 %, 9.1 %, and 9.2 %, respectively, compared to the closest competitor. This work contributes to the standardization efforts of post-quantum IoT security and offers valuable insights for real-world deployment of quantum-resistant cryptography in resource-limited settings.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101391"},"PeriodicalIF":6.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data 利用室内轨迹数据对工人活动进行分类的分层半监督方法
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-30 DOI: 10.1016/j.iot.2024.101386
Mashud Rana , Ashfaqur Rahman , Daniel Smith
Activity recognition refers to the process of automatically identifying or interpreting activities of objects based on the data captured from different sensing devices. While previous research on indoor activity recognition predominantly relies on visual data like images or video recordings, we present a novel approach based on spatiotemporal trajectory data recorded by IoT based sensors. The proposed approach is tailored for indoor manufacturing applications leveraging trajectory partitioning, hierarchical clustering, and convolutional neural networks. Moreover, a vast majority of activity recognition models that have been used in different industrial settings are supervised methods requiring large manually labelled datasets to be collected. This manual annotation process is unwieldly and labour-intensive, and hence, often infeasible to deploy for practical applications. In contrast, our proposed activity recognition approach is semi-supervised meaning it can be trained with far less labelled data; significantly reducing the effort and costs associated with the manual annotation process. The proposed approach is evaluated using two indoor trajectory datasets related to different manufacturing assembly processes. Experimental results demonstrate its effectiveness for activity recognition: the classification accuracy (measured using F-score) varies between 0.81 to 0.95 and 0.88 to 0.92 across indoor trajectory datasets. A comparison with a baseline model indicates that it achieves up to a 18% improvement in classification accuracy. Furthermore, the classification results enable insights into factory floor states, aiding in decision-making for operational efficiency and resource allocation.
活动识别是指根据不同传感设备捕获的数据自动识别或解释物体活动的过程。以往有关室内活动识别的研究主要依赖于图像或视频记录等可视数据,而我们提出了一种基于物联网传感器记录的时空轨迹数据的新方法。所提出的方法利用轨迹分割、分层聚类和卷积神经网络,专为室内制造应用而量身定制。此外,在不同工业环境中使用的绝大多数活动识别模型都是有监督的方法,需要收集大量人工标注的数据集。这种人工标注过程既不方便又耗费人力,因此在实际应用中往往不可行。相比之下,我们提出的活动识别方法是半监督式的,这意味着它可以使用更少的标注数据进行训练,从而大大减少了与人工标注过程相关的工作量和成本。我们使用两个与不同制造装配流程相关的室内轨迹数据集对所提出的方法进行了评估。实验结果证明了该方法在活动识别方面的有效性:室内轨迹数据集的分类准确率(使用 F 分数衡量)介于 0.81 到 0.95 和 0.88 到 0.92 之间。与基线模型的比较表明,该模型的分类准确率提高了 18%。此外,分类结果还有助于深入了解工厂车间状态,为提高运营效率和分配资源提供决策依据。
{"title":"Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data","authors":"Mashud Rana ,&nbsp;Ashfaqur Rahman ,&nbsp;Daniel Smith","doi":"10.1016/j.iot.2024.101386","DOIUrl":"10.1016/j.iot.2024.101386","url":null,"abstract":"<div><div>Activity recognition refers to the process of automatically identifying or interpreting activities of objects based on the data captured from different sensing devices. While previous research on indoor activity recognition predominantly relies on visual data like images or video recordings, we present a novel approach based on <em>spatiotemporal trajectory</em> data recorded by IoT based sensors. The proposed approach is tailored for indoor manufacturing applications leveraging trajectory partitioning, hierarchical clustering, and convolutional neural networks. Moreover, a vast majority of activity recognition models that have been used in different industrial settings are supervised methods requiring large manually labelled datasets to be collected. This manual annotation process is unwieldly and labour-intensive, and hence, often infeasible to deploy for practical applications. In contrast, our proposed activity recognition approach is <em>semi-supervised</em> meaning it can be trained with far less labelled data; significantly reducing the effort and costs associated with the manual annotation process. The proposed approach is evaluated using two indoor trajectory datasets related to different manufacturing assembly processes. Experimental results demonstrate its effectiveness for activity recognition: the classification accuracy (measured using F-score) varies between 0.81 to 0.95 and 0.88 to 0.92 across indoor trajectory datasets. A comparison with a baseline model indicates that it achieves up to a 18% improvement in classification accuracy. Furthermore, the classification results enable insights into factory floor states, aiding in decision-making for operational efficiency and resource allocation.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101386"},"PeriodicalIF":6.0,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity 医疗保健领域的数字孪生:基于层次、应用和成熟度的模型分类和类型学
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-28 DOI: 10.1016/j.iot.2024.101379
Yasmina Maïzi, Antoine Arcand, Ygal Bendavid
The digital twin (DT) is a powerful technological tool that has captured many industries’ attention in recent years, including healthcare where it offers great potential for service quality and operational efficiency. However, the literature in this field remains scattered among heterogeneous applications ranging from the digital twinning of a heart to that of a city’s population health. Although recent reviews may have provided better structure for literature understanding, a typology of healthcare DTs as well as evaluation and implementation guidelines are still missing. Therefore, this article provides a structured review of literature as well as a three-tiered taxonomy and evaluation system to better assess the current state of research on DTs in healthcare and facilitate comparisons among models sharing similar core characteristics. First, we provide a comprehensive review of case studies and use case frameworks in literature and industry based on their hierarchical level of reality, application purpose, and maturity or sophistication of models. Second, we provide an analysis of the maturity and sophistication of models by application type to highlight particular characteristics and facilitate discussion of future opportunities and improvement paths. The proposed classification of reviewed articles provides a better overview of the most studied types of models in research and facilitates the understanding of their potential use in healthcare settings, but is also extendable to other fields as well, as it aims to regroup models in a way that is coherent with existing models in industry.
数字孪生(DT)是一种强大的技术工具,近年来吸引了许多行业的关注,其中包括医疗保健行业,它为提高服务质量和运营效率提供了巨大的潜力。然而,该领域的文献仍然散见于各种不同的应用中,从心脏的数字孪生到城市人口健康的数字孪生,不一而足。虽然近期的综述可能为文献理解提供了更好的结构,但仍缺少医疗保健 DT 的类型学以及评估和实施指南。因此,本文提供了结构化的文献综述以及三层分类和评估体系,以更好地评估医疗保健领域 DTs 的研究现状,并促进具有相似核心特征的模式之间的比较。首先,我们根据模型的现实层次、应用目的和成熟度或复杂程度,对文献和行业中的案例研究和用例框架进行了全面回顾。其次,我们按应用类型对模型的成熟度和先进性进行了分析,以突出其特殊性,并促进对未来机遇和改进途径的讨论。所建议的综述文章分类法能更好地概述研究中研究最多的模型类型,并有助于了解它们在医疗保健环境中的潜在用途,但也可扩展到其他领域,因为它旨在以一种与行业中现有模型一致的方式重新组合模型。
{"title":"Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity","authors":"Yasmina Maïzi,&nbsp;Antoine Arcand,&nbsp;Ygal Bendavid","doi":"10.1016/j.iot.2024.101379","DOIUrl":"10.1016/j.iot.2024.101379","url":null,"abstract":"<div><div>The digital twin (DT) is a powerful technological tool that has captured many industries’ attention in recent years, including healthcare where it offers great potential for service quality and operational efficiency. However, the literature in this field remains scattered among heterogeneous applications ranging from the digital twinning of a heart to that of a city’s population health. Although recent reviews may have provided better structure for literature understanding, a typology of healthcare DTs as well as evaluation and implementation guidelines are still missing. Therefore, this article provides a structured review of literature as well as a three-tiered taxonomy and evaluation system to better assess the current state of research on DTs in healthcare and facilitate comparisons among models sharing similar core characteristics. First, we provide a comprehensive review of case studies and use case frameworks in literature and industry based on their hierarchical level of reality, application purpose, and maturity or sophistication of models. Second, we provide an analysis of the maturity and sophistication of models by application type to highlight particular characteristics and facilitate discussion of future opportunities and improvement paths. The proposed classification of reviewed articles provides a better overview of the most studied types of models in research and facilitates the understanding of their potential use in healthcare settings, but is also extendable to other fields as well, as it aims to regroup models in a way that is coherent with existing models in industry.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101379"},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semantic communication model for the task of high quality image transmission to edge-end devices 用于向边缘设备传输高质量图像任务的语义通信模型
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-28 DOI: 10.1016/j.iot.2024.101384
Zhaoxu Wen, Jiandong Fang, Xiuling Wang
With the development of Industrial Internet of Things (IIOT) equipment to intelligentization and digitalization, a large number of intelligent mobile devices and Automated Guided Vehicles (AGV) are widely used in modern intelligent warehouse management, which generates a large number of machine vision tasks as well as massive demand for image and video data transmission. Guaranteeing the quality of image data transmission while saving the amount of transmitted data by edge-end devices has become one of the key issues in modern IIOT. As an efficient new communication method, semantic communication technology can significantly improve the transmission efficiency by focusing on the intrinsic meaning of the transmitted data. In this paper, a semantic communication model is proposed for the modern intelligent warehouse environment, using the ray tracing method to obtain its channel characteristic parameters, according to the obtained channel characteristic parameters to establish an end-to-end semantic communication scheme applicable to the warehouse environment, to achieve the optimization of the communication process transmission. Simulation analysis shows that compared with the traditional communication scheme, the proposed scheme can still achieve a structural similarity index higher than 0.8 when the transmission signal-to-noise ratio (SNR) is less than 6 dB, which effectively improves the image reconstruction quality compared with the traditional compression scheme.
随着工业物联网(IIOT)设备向智能化和数字化发展,大量智能移动设备和自动导引车(AGV)被广泛应用于现代智能仓储管理中,由此产生了大量的机器视觉任务以及海量的图像和视频数据传输需求。在保证图像数据传输质量的同时,节省边缘设备的传输数据量已成为现代 IIOT 的关键问题之一。作为一种高效的新型通信方式,语义通信技术通过关注传输数据的内在含义,可以显著提高传输效率。本文提出了一种适用于现代智能仓储环境的语义通信模型,利用射线追踪方法获取其信道特性参数,根据获取的信道特性参数建立适用于仓储环境的端到端语义通信方案,实现通信过程的优化传输。仿真分析表明,与传统通信方案相比,当传输信噪比(SNR)小于6 dB时,所提出的方案仍能达到高于0.8的结构相似度指数,与传统压缩方案相比,有效提高了图像重建质量。
{"title":"A semantic communication model for the task of high quality image transmission to edge-end devices","authors":"Zhaoxu Wen,&nbsp;Jiandong Fang,&nbsp;Xiuling Wang","doi":"10.1016/j.iot.2024.101384","DOIUrl":"10.1016/j.iot.2024.101384","url":null,"abstract":"<div><div>With the development of Industrial Internet of Things (IIOT) equipment to intelligentization and digitalization, a large number of intelligent mobile devices and Automated Guided Vehicles (AGV) are widely used in modern intelligent warehouse management, which generates a large number of machine vision tasks as well as massive demand for image and video data transmission. Guaranteeing the quality of image data transmission while saving the amount of transmitted data by edge-end devices has become one of the key issues in modern IIOT. As an efficient new communication method, semantic communication technology can significantly improve the transmission efficiency by focusing on the intrinsic meaning of the transmitted data. In this paper, a semantic communication model is proposed for the modern intelligent warehouse environment, using the ray tracing method to obtain its channel characteristic parameters, according to the obtained channel characteristic parameters to establish an end-to-end semantic communication scheme applicable to the warehouse environment, to achieve the optimization of the communication process transmission. Simulation analysis shows that compared with the traditional communication scheme, the proposed scheme can still achieve a structural similarity index higher than 0.8 when the transmission signal-to-noise ratio (SNR) is less than 6 dB, which effectively improves the image reconstruction quality compared with the traditional compression scheme.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101384"},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions 物联网边缘计算中的资源调度与分布式学习之间的关系--对互补方面、现有研究和未来方向的见解
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1016/j.iot.2024.101375
Harsha Varun Marisetty, Nida Fatima, Manik Gupta, Paresh Saxena
Resource Scheduling and Distributed learning play a key role in Internet of Things (IoT) edge computing systems. There has been extensive research in each area, however, there is limited work focusing on the relationship between the two. We present a systematic literature review (SLR) examining the relationship between the two by thoroughly reviewing the available articles in these two specific areas. Our main novel contribution is to discover a complementary relationship between resource scheduling and distributed learning. We find that the resource scheduling techniques are utilized for distributed machine learning (DML) in edge networks, while distributed reinforcement learning (RL) is used as an optimization technique for resource scheduling in edge networks. Other key contributions of the SLR include: (1) presenting a detailed taxonomy on resource scheduling and distributed learning in edge computing, (2) reviewing articles on resource scheduling for DML and distributed RL for resource scheduling, mapping them to the taxonomy, and classifying them into broad categories, and (3) discussing the future research directions as well as the challenges arising from the integration of new technologies with resource scheduling and distributed learning in edge networks.
资源调度和分布式学习在物联网(IoT)边缘计算系统中发挥着关键作用。每个领域都有大量的研究,但关注两者之间关系的研究却很有限。我们提交了一份系统性文献综述(SLR),通过全面回顾这两个特定领域的现有文章,研究两者之间的关系。我们的主要新贡献是发现了资源调度与分布式学习之间的互补关系。我们发现,资源调度技术可用于边缘网络中的分布式机器学习(DML),而分布式强化学习(RL)可用作边缘网络资源调度的优化技术。SLR 的其他主要贡献包括(1) 提出了边缘计算中资源调度和分布式学习的详细分类法,(2) 回顾了有关用于 DML 的资源调度和用于资源调度的分布式 RL 的文章,将它们映射到分类法,并将它们分为几大类,(3) 讨论了未来的研究方向以及新技术与边缘网络资源调度和分布式学习的整合所带来的挑战。
{"title":"Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions","authors":"Harsha Varun Marisetty,&nbsp;Nida Fatima,&nbsp;Manik Gupta,&nbsp;Paresh Saxena","doi":"10.1016/j.iot.2024.101375","DOIUrl":"10.1016/j.iot.2024.101375","url":null,"abstract":"<div><div>Resource Scheduling and Distributed learning play a key role in Internet of Things (IoT) edge computing systems. There has been extensive research in each area, however, there is limited work focusing on the relationship between the two. We present a systematic literature review (SLR) examining the relationship between the two by thoroughly reviewing the available articles in these two specific areas. Our main novel contribution is to discover a complementary relationship between resource scheduling and distributed learning. We find that the resource scheduling techniques are utilized for distributed machine learning (DML) in edge networks, while distributed reinforcement learning (RL) is used as an optimization technique for resource scheduling in edge networks. Other key contributions of the SLR include: (1) presenting a detailed taxonomy on resource scheduling and distributed learning in edge computing, (2) reviewing articles on resource scheduling for DML and distributed RL for resource scheduling, mapping them to the taxonomy, and classifying them into broad categories, and (3) discussing the future research directions as well as the challenges arising from the integration of new technologies with resource scheduling and distributed learning in edge networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101375"},"PeriodicalIF":6.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster-based cooperative fog caching for scalable coded videos of multiple content providers 基于集群的合作雾缓存,用于多个内容提供商的可扩展编码视频
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-25 DOI: 10.1016/j.iot.2024.101380
Ferdous Sharifi , Shaahin Hessabi , Young Choon Lee
Efficient content caching in video streaming services is important for improving user experience as well as reducing network bandwidth consumption. Fog caching combined with scalable video coding (SVC) has the potential to significantly improve caching efficiency. However, challenges such as the limited storage capacity of fog nodes and determining the optimal number of SVC layers must be overcome for their effective adoption. This becomes more complicated with multiple content providers requiring shared cache resources. To the best of our knowledge, no existing research has simultaneously tackled all these aspects. In this paper, we present Cluster-based Cooperative Fog Caching (CCo-Fog), a holistic caching strategy that enables multiple content providers to share the scarce storage of fog nodes in a multi-tier fog network to judiciously cache SVC videos in a cooperative manner. In particular, CCo-Fog consists of a cluster-based storage partitioning method and tier-wise cooperative content placement policies. The partitioning method distributes the storage of each fog node to multiple content providers for users clustered based on their population density and their proximity to fog nodes. The content placement policies determine the optimal number of SVC layers of each video for different tiers of the fog network by solving a latency-aware content placement optimization problem. Our evaluations on a real-world dataset and various configurations demonstrate the efficacy of CCo-Fog, showing a reduction in latency by about 60% and an increase in fog hit ratio by about 20% on average, compared to state-of-the-art caching strategies.
视频流服务中的高效内容缓存对于改善用户体验和减少网络带宽消耗非常重要。雾缓存与可扩展视频编码(SVC)相结合,有望显著提高缓存效率。然而,要有效地采用这种方法,必须克服一些挑战,如雾节点的存储容量有限,以及确定最佳的 SVC 层数。如果多个内容提供商需要共享缓存资源,情况就会变得更加复杂。据我们所知,目前还没有研究能同时解决所有这些问题。在本文中,我们提出了基于集群的合作式雾缓存(CCo-Fog),这是一种整体缓存策略,能让多个内容提供商共享多层雾网络中雾节点的稀缺存储,以合作的方式明智地缓存 SVC 视频。具体而言,CCo-Fog 由基于集群的存储分区方法和分层合作内容放置策略组成。分区方法将每个雾节点的存储空间分配给多个内容提供商,这些内容提供商根据用户的人口密度和与雾节点的距离为用户提供服务。内容放置策略通过解决延迟感知内容放置优化问题,为不同层级的雾网络确定每个视频的最佳 SVC 层数。我们在真实数据集和各种配置上进行的评估证明了 CCo-Fog 的功效,与最先进的缓存策略相比,延迟降低了约 60%,雾命中率平均提高了约 20%。
{"title":"Cluster-based cooperative fog caching for scalable coded videos of multiple content providers","authors":"Ferdous Sharifi ,&nbsp;Shaahin Hessabi ,&nbsp;Young Choon Lee","doi":"10.1016/j.iot.2024.101380","DOIUrl":"10.1016/j.iot.2024.101380","url":null,"abstract":"<div><div>Efficient content caching in video streaming services is important for improving user experience as well as reducing network bandwidth consumption. Fog caching combined with scalable video coding (SVC) has the potential to significantly improve caching efficiency. However, challenges such as the limited storage capacity of fog nodes and determining the optimal number of SVC layers must be overcome for their effective adoption. This becomes more complicated with multiple content providers requiring shared cache resources. To the best of our knowledge, no existing research has simultaneously tackled all these aspects. In this paper, we present Cluster-based Cooperative Fog Caching (CCo-Fog), a holistic caching strategy that enables multiple content providers to share the scarce storage of fog nodes in a multi-tier fog network to judiciously cache SVC videos in a cooperative manner. In particular, CCo-Fog consists of a cluster-based storage partitioning method and tier-wise cooperative content placement policies. The partitioning method distributes the storage of each fog node to multiple content providers for users clustered based on their population density and their proximity to fog nodes. The content placement policies determine the optimal number of SVC layers of each video for different tiers of the fog network by solving a latency-aware content placement optimization problem. Our evaluations on a real-world dataset and various configurations demonstrate the efficacy of CCo-Fog, showing a reduction in latency by about 60% and an increase in fog hit ratio by about 20% on average, compared to state-of-the-art caching strategies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101380"},"PeriodicalIF":6.0,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1