首页 > 最新文献

Internet of Things最新文献

英文 中文
DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles DISFIDA:为健康物联网和车联网提供在线学习的分布式自监督联合入侵检测算法
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1016/j.iot.2024.101340
Erol Gelenbe , Baran Can Gül , Mert Nakıp

Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.

联网医疗系统经常成为网络攻击的受害者,给患者和医疗成本带来严重后果,而物联网(IoT)则是另一个主要攻击目标。我们可以想象,在未来的系统中,车联网(IoV)也将被用于运送病人,以进行综合诊断和治疗。因此,医疗领域面临着非常重大和特殊的挑战,因为即使是一个病人,也可能有多家医疗服务提供商进行检测或提供医疗服务,并且可能有不同的互联分包商提供服务,如救护车和联网汽车、联网设备或临时人员提供商,这些服务提供商除了可能存在商业竞争外,还具有不同的保密要求。另一方面,这些不同的实体可能会受到类似或协调的攻击,可以从彼此的网络安全经验中获益,从而更好地检测和缓解网络攻击。因此,本研究提出了一种新颖的分布式自监督联合入侵检测算法(DISFIDA),该算法使用密集随机神经网络(DRNN)进行在线自监督联合学习。在 DISFIDA 中,学习数据是私有的,神经元权重由联盟伙伴共享。DISFIDA 中的每个伙伴都会将自己的突触权重与其他伙伴收到的权重结合起来,并优先选择那些与自己的权重数值更接近的权重,因为这些权重是自己学习的。DISFIDA 利用三个开放数据集与五种基准方法进行了测试,涉及两个相关的物联网医疗应用:设备网络(如人体传感器)和互联智能车辆(如运送病人的救护车)。这些测试表明,DISFIDA 方法对攻击的真阳性率为 100%(比达到 99% 的同类先进方法高出一个百分点),因此在检测攻击方面表现更佳,对分布式拒绝服务 (DDoS) 攻击的真阴性率为 99%,与最先进的联合学习方法类似。
{"title":"DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles","authors":"Erol Gelenbe ,&nbsp;Baran Can Gül ,&nbsp;Mert Nakıp","doi":"10.1016/j.iot.2024.101340","DOIUrl":"10.1016/j.iot.2024.101340","url":null,"abstract":"<div><p>Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101340"},"PeriodicalIF":6.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002816/pdfft?md5=3f8cac47e530cac8c010a7b776652d64&pid=1-s2.0-S2542660524002816-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained vulnerability detection for medical sensor systems 医疗传感器系统的细粒度漏洞检测
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.iot.2024.101362
Le Sun , Yueyuan Wang , Huiyun Li , Ghulam Muhammad

The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.

物联网(IoT)通过将医疗传感器连接到互联网,彻底改变了医疗系统,同时也对医疗传感器网络(MSN)的安全性提出了挑战。鉴于医疗数据的极端敏感性,任何漏洞都可能导致数据泄露和滥用,影响患者的安全和隐私。因此,保障 MSN 安全至关重要。由于医疗传感器设备依赖智能医疗软件系统进行数据管理和通信,因此精确检测系统代码漏洞对确保网络安全至关重要。有效的软件漏洞检测有两个关键目标:(i) 实现高精确度;(ii) 直接识别有漏洞的代码行,以便开发人员进行修复。为了应对这些挑战,我们引入了 Vulcoder,这是一种新颖的以漏洞为导向的编码器驱动模型,基于双向编码器表示变换器(BERT)架构。我们提出了一种一对一的映射功能,通过抽象语法树(AST)来捕捉代码语义。Vulcoder 与多头关注相结合,实现了对 MSN 中软件漏洞的函数级和行级精确检测。这加快了漏洞修复过程,从而加强了网络安全。各种数据集的实验结果表明,Vulcoder 在识别 MSN 中的漏洞方面优于之前的模型。具体来说,它在函数级预测 F1 分数上提高了 1%-419%,在行级定位精度上提高了 12.5%-380%。因此,Vulcoder 有助于加强 MSN 的安全防御和保护患者隐私,促进智能医疗的发展。
{"title":"Fine-grained vulnerability detection for medical sensor systems","authors":"Le Sun ,&nbsp;Yueyuan Wang ,&nbsp;Huiyun Li ,&nbsp;Ghulam Muhammad","doi":"10.1016/j.iot.2024.101362","DOIUrl":"10.1016/j.iot.2024.101362","url":null,"abstract":"<div><p>The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101362"},"PeriodicalIF":6.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003032/pdfft?md5=ec517a1daef40dd544058b39166a1eae&pid=1-s2.0-S2542660524003032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques 加强机器人物联网的安全性:利用加密和区块链技术回顾近期趋势、做法和建议
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101357
Ehsanul Islam Zafir , Afifa Akter , M.N. Islam , Shahid A. Hasib , Touhid Islam , Subrata K. Sarker , S.M. Muyeen

The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.

机器人物联网(IoRT)集成了机器人和自主设备,改变了制造、医疗保健和运输等行业。然而,IoRT 系统中的安全漏洞给数据隐私和系统完整性带来了巨大挑战。为了解决这些问题,加密对于保护设备间传输的敏感数据至关重要。通过将数据转换为密文,加密可确保数据的保密性和完整性,降低未经授权访问和数据泄露的风险。区块链技术还能提供去中心化、防篡改的数据存储解决方案,从而增强 IoRT 的安全性。本文旨在通过提供全面的见解、实用的建议和未来的发展方向,推动互联机器人系统安全知识和实践的进步,从而确保 IoRT 生态系统内数据交换的完整性和保密性。通过对加密的要求、范围和当前在物联网中的实施情况进行深入研究,本文为参与物联网安全工作的研究人员、工程师和决策者提供了有价值的见解。通过将加密和区块链技术整合到物联网系统中,利益相关者可以营造一个安全可靠的环境,有效管理风险,增强用户信心,并加快物联网在各行各业的广泛应用。本研究的结论强调了加密和区块链技术在增强物联网安全方面的关键作用,并突出了进一步探索和创新的潜在途径。此外,本文还提出了未来的研究领域,如威胁情报和分析、安全设计、多因素身份验证和用于威胁检测的人工智能。这些建议有助于不断创新,确保不断发展的物联网技术安全。
{"title":"Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques","authors":"Ehsanul Islam Zafir ,&nbsp;Afifa Akter ,&nbsp;M.N. Islam ,&nbsp;Shahid A. Hasib ,&nbsp;Touhid Islam ,&nbsp;Subrata K. Sarker ,&nbsp;S.M. Muyeen","doi":"10.1016/j.iot.2024.101357","DOIUrl":"10.1016/j.iot.2024.101357","url":null,"abstract":"<div><p>The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101357"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002981/pdfft?md5=a4332066960a6d42faa3e5a09581d2cb&pid=1-s2.0-S2542660524002981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks CLARA:基于集群的节点关联,用于传感器网络中的采样率适应和容错
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101345
Hassan Harb , Clara Abou Nader , Ali Jaber , Mourad Hakem , Jean-Claude Charr , Chady Abou Jaoude , Chamseddine Zaki

Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.

近来,无线传感器网络(WSN)已被证明是监测各种应用的高效、低成本解决方案。然而,传感器节点收集和传输的大量数据(大多是冗余数据)会迅速消耗其有限的电池电量,而电池电量有时很难更换或充电。尽管研究人员为解决这一问题做出了巨大努力,但提出的大多数技术都存在精度和复杂性问题,不适合资源有限的传感器。因此,设计新的数据缩减技术来减少在此类网络中收集的原始数据,对延长其使用寿命至关重要。在本文中,我们提出了一种基于集群的节点相关性的采样率适应和故障容忍机制,简称 CLARA,专门用于周期性传感器网络应用。CLARA 主要分为两个阶段:节点关联和容错。第一阶段引入一种数据聚类方法,旨在搜索相邻节点之间的相关性。然后,它相应地调整节点的传感频率,以减少此类网络中收集的数据量,同时保持信息汇的信息完整性。在第二阶段,我们提出了一个容错模型,允许汇根据移动平均(MA)和指数平滑(ES)两种方法重新生成原始传感器数据。我们通过模拟和实验证明了我们技术的效率。获得的最佳结果表明,第一阶段可以降低传感器采样率,从而降低传感器能耗达 64%,而第二阶段可以准确地再生原始数据,误差损失小于 0.15。
{"title":"CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks","authors":"Hassan Harb ,&nbsp;Clara Abou Nader ,&nbsp;Ali Jaber ,&nbsp;Mourad Hakem ,&nbsp;Jean-Claude Charr ,&nbsp;Chady Abou Jaoude ,&nbsp;Chamseddine Zaki","doi":"10.1016/j.iot.2024.101345","DOIUrl":"10.1016/j.iot.2024.101345","url":null,"abstract":"<div><p>Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101345"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model IoTSLE:通过基于有限自动机、深度学习和 DNA 计算的图像隐写模型确保弱光环境下物联网系统的安全
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101358
Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar

The Internet of Things (IoT) is a vast network of interconnected devices and systems, including wearables, smart home appliances, industrial machinery, and vehicles, equipped with sensors and connectivity. The data collected by the IoT devices are transmitted over a network, for processing and analyzing that data, so that appropriate actions can be initiated. Security of IoT systems is a major concern, as IoT devices collect and transmit crucial information. But images captured in low-light environments pose a challenge for IoT security by limiting the ability to accurately identify objects and people, increasing the risk of spoofing, and hindering forensic analysis. This paper unfolds a novel framework for IoT security using Steganography in Low-light Environment (IoTSLE) by image enhancement and data concealment. In proposed IoTSLE, initially, the low-light images, captured by the IoT devices in a low-light environment, are enhanced by band learning with recursion and band recomposition. After that, the secret information is concealed within the enhanced image. This concealment is supervised by using a specially designed finite automata for genome sequence encoding and 2-2-2 embedding. The proposed steganography technique is capable of hiding secret information within a 512 × 512 RGB image with the payload of 2 097 152 bits. The experiments like, PSNR, SSIM, Q-Index, BER, NCC, and NAE etc. are conducted to analyze the imperceptibility and security of IoTSLE. The proposed IoTSLE is useful for various IoT systems in different private and government fields like, defense agencies, digital forensics, agriculture, healthcare industry, cybersecurity firms, smart home, smart city etc.

物联网(IoT)是一个由互联设备和系统(包括可穿戴设备、智能家电、工业机械和车辆)组成的庞大网络,配备有传感器和连接装置。物联网设备收集的数据通过网络传输,用于处理和分析这些数据,以便启动适当的行动。由于物联网设备收集和传输重要信息,因此物联网系统的安全性是一个主要问题。但是,在弱光环境下捕获的图像会限制准确识别物体和人员的能力,增加欺骗风险,阻碍取证分析,从而给物联网安全带来挑战。本文通过图像增强和数据隐藏,利用低光环境下的隐写术(IoTSLE)为物联网安全提供了一个新框架。在拟议的 IoTSLE 中,首先通过带学习递归和带重构对物联网设备在弱光环境下捕获的弱光图像进行增强。然后,在增强后的图像中隐藏秘密信息。通过使用专门设计的有限自动机进行基因组序列编码和 2-2-2 嵌入,对隐藏进行了监督。所提出的隐写术能够在有效载荷为 2 097 152 比特的 512 × 512 RGB 图像中隐藏秘密信息。实验包括 PSNR、SSIM、Q-Index、BER、NCC 和 NAE 等,以分析 IoTSLE 的不可感知性和安全性。提议的 IoTSLE 适用于不同私人和政府领域的各种物联网系统,如国防机构、数字取证、农业、医疗保健行业、网络安全公司、智能家居、智能城市等。
{"title":"IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model","authors":"Subhadip Mukherjee,&nbsp;Somnath Mukhopadhyay,&nbsp;Sunita Sarkar","doi":"10.1016/j.iot.2024.101358","DOIUrl":"10.1016/j.iot.2024.101358","url":null,"abstract":"<div><p>The Internet of Things (IoT) is a vast network of interconnected devices and systems, including wearables, smart home appliances, industrial machinery, and vehicles, equipped with sensors and connectivity. The data collected by the IoT devices are transmitted over a network, for processing and analyzing that data, so that appropriate actions can be initiated. Security of IoT systems is a major concern, as IoT devices collect and transmit crucial information. But images captured in low-light environments pose a challenge for IoT security by limiting the ability to accurately identify objects and people, increasing the risk of spoofing, and hindering forensic analysis. This paper unfolds a novel framework for IoT security using Steganography in Low-light Environment (IoTSLE) by image enhancement and data concealment. In proposed IoTSLE, initially, the low-light images, captured by the IoT devices in a low-light environment, are enhanced by band learning with recursion and band recomposition. After that, the secret information is concealed within the enhanced image. This concealment is supervised by using a specially designed finite automata for genome sequence encoding and 2-2-2 embedding. The proposed steganography technique is capable of hiding secret information within a 512 × 512 RGB image with the payload of 2<!--> <!-->097<!--> <!-->152 bits. The experiments like, PSNR, SSIM, Q-Index, BER, NCC, and NAE etc. are conducted to analyze the imperceptibility and security of IoTSLE. The proposed IoTSLE is useful for various IoT systems in different private and government fields like, defense agencies, digital forensics, agriculture, healthcare industry, cybersecurity firms, smart home, smart city etc.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101358"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized and intelligent metaverse intrusion detection system based on rough sets 基于粗糙集的优化智能元宇宙入侵检测系统
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101360
Gehad Ismail Sayed , Aboul Ella Hassanien

The convergence of the Internet of Things (IoT) and the Metaverse is revolutionizing the digital world by providing immersive, interactive environments as well as new data transmission opportunities. However, this rapid integration raises complex security issues, including an increased risk of unlawful access and data breaches. Strong cybersecurity measures are required to identify and prevent these attacks, preserving the security and confidentiality of users. Finding significant features for recognizing malicious attacks and enhancing the accuracy of network intrusion detection in general, and particularly in the virtual environment, are some of the significant research needs. This paper introduces an intelligent intrusion detection system (IIDS) based on rough set-based electric eel foraging optimization (RSEEFO) in conjunction with the AdaBoost-based classification algorithm. The main objective of this system is to detect and recognize different types of attacks on the interaction and connectivity between the IoT and the metaverse. The proposed IIDS-RSEEFO consists of three phases, which are data pre-processing, multi-IoT attack classification, and evaluation. The main problems associated with the adopted dataset are handled in data pre-processing. Then, in the second phase, a one-versus-all approach is employed along with RSEEFO and AdaBoost to handle the multi-class classification problem. Finally, several evaluation metrics are employed to assess the reliability and robustness of the proposed IIDS-RSEEFO. The proposed IIDS was tested on CIC-IoT-2023 and validated on UNSWNB-15. It achieved high accuracy across all attack types of CIC-IoT-2023, with accuracies of 99.7 %, 100 %, 100 %, 99.8 %, 100 %, 100 %, 99.8 %, and 100 % for benign traffic, DDoS, brute force, spoofing, DoS, Mirai, recon, and web-Based respectively, accompanied by robust sensitivity, F1-Score, Specificity, G-Mean, and crossover-error rate metrics demonstrating its effectiveness in accurately predicting each attack type. Additionally, it obtained high accuracy for all attack types of UNSWNB-15, with accuracies of 96.48 %, 99.12 %, 99.24 %, 93.78 %, 92.55 %, 92.55 %, 92.55 %, 94.73 %, 94.73 %, 98.09 %, 98.39 %, 99.50 %, and 99.95 % for analysis, backdoor, DoS, exploits, fuzzers, generic, normal, reconnaissance, shellcode, and worms, respectively. In addition, the results evaluated that the proposed model is superior compared to the existing intrusion detection systems.

物联网(IoT)和元宇宙(Metaverse)的融合为数字世界带来了革命性的变化,提供了身临其境的互动环境和新的数据传输机会。然而,这种快速融合带来了复杂的安全问题,包括非法访问和数据泄露的风险增加。需要采取强有力的网络安全措施来识别和防止这些攻击,保护用户的安全和保密性。寻找识别恶意攻击的重要特征,提高网络入侵检测的准确性,特别是在虚拟环境中的准确性,是一些重要的研究需求。本文介绍了基于粗糙集的电鳗觅食优化(RSEEFO)与基于 AdaBoost 的分类算法相结合的智能入侵检测系统(IIDS)。该系统的主要目标是检测和识别针对物联网与元宇宙之间的交互和连接的不同类型的攻击。拟议的 IIDS-RSEEFO 包括三个阶段,即数据预处理、多物联网攻击分类和评估。所采用数据集的主要问题将在数据预处理中处理。然后,在第二阶段,采用单对全方法以及 RSEEFO 和 AdaBoost 来处理多类分类问题。最后,采用几个评估指标来评估所提出的 IIDS-RSEEFO 的可靠性和鲁棒性。拟议的 IIDS 在 CIC-IoT-2023 上进行了测试,并在 UNSWNB-15 上进行了验证。它在CIC-IoT-2023的所有攻击类型中都取得了很高的准确率,对良性流量、DDoS、暴力、欺骗、DoS、Mirai、侦察和基于网络的攻击的准确率分别为99.7%、100%、100%、99.8%、100%、100%、99.8%和100%,同时还具有稳健的灵敏度、F1-分数、特异性、G-中值和交叉错误率指标,证明了它在准确预测每种攻击类型方面的有效性。此外,它对 UNSWNB-15 的所有攻击类型都获得了较高的准确率,对分析、后门、DoS、漏洞、模糊器、通用、正常、侦察、shellcode 和蠕虫的准确率分别为 96.48 %、99.12 %、99.24 %、93.78 %、92.55 %、92.55 %、92.55 %、94.73 %、94.73 %、98.09 %、98.39 %、99.50 % 和 99.95 %。此外,评估结果表明,与现有的入侵检测系统相比,建议的模型更胜一筹。
{"title":"An optimized and intelligent metaverse intrusion detection system based on rough sets","authors":"Gehad Ismail Sayed ,&nbsp;Aboul Ella Hassanien","doi":"10.1016/j.iot.2024.101360","DOIUrl":"10.1016/j.iot.2024.101360","url":null,"abstract":"<div><p>The convergence of the Internet of Things (IoT) and the Metaverse is revolutionizing the digital world by providing immersive, interactive environments as well as new data transmission opportunities. However, this rapid integration raises complex security issues, including an increased risk of unlawful access and data breaches. Strong cybersecurity measures are required to identify and prevent these attacks, preserving the security and confidentiality of users. Finding significant features for recognizing malicious attacks and enhancing the accuracy of network intrusion detection in general, and particularly in the virtual environment, are some of the significant research needs. This paper introduces an intelligent intrusion detection system (IIDS) based on rough set-based electric eel foraging optimization (RSEEFO) in conjunction with the AdaBoost-based classification algorithm. The main objective of this system is to detect and recognize different types of attacks on the interaction and connectivity between the IoT and the metaverse. The proposed IIDS-RSEEFO consists of three phases, which are data pre-processing, multi-IoT attack classification, and evaluation. The main problems associated with the adopted dataset are handled in data pre-processing. Then, in the second phase, a one-versus-all approach is employed along with RSEEFO and AdaBoost to handle the multi-class classification problem. Finally, several evaluation metrics are employed to assess the reliability and robustness of the proposed IIDS-RSEEFO. The proposed IIDS was tested on CIC-IoT-2023 and validated on UNSWNB-15. It achieved high accuracy across all attack types of CIC-IoT-2023, with accuracies of 99.7 %, 100 %, 100 %, 99.8 %, 100 %, 100 %, 99.8 %, and 100 % for benign traffic, DDoS, brute force, spoofing, DoS, Mirai, recon, and web-Based respectively, accompanied by robust sensitivity, F1-Score, Specificity, G-Mean, and crossover-error rate metrics demonstrating its effectiveness in accurately predicting each attack type. Additionally, it obtained high accuracy for all attack types of UNSWNB-15, with accuracies of 96.48 %, 99.12 %, 99.24 %, 93.78 %, 92.55 %, 92.55 %, 92.55 %, 94.73 %, 94.73 %, 98.09 %, 98.39 %, 99.50 %, and 99.95 % for analysis, backdoor, DoS, exploits, fuzzers, generic, normal, reconnaissance, shellcode, and worms, respectively. In addition, the results evaluated that the proposed model is superior compared to the existing intrusion detection systems.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101360"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time series processing-based malicious activity detection in SCADA systems 基于时间序列处理的 SCADA 系统恶意活动检测
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.iot.2024.101355
Michael Zaslavski, Meir Kalech

Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.

许多对现代生活至关重要的关键基础设施,如油气管道控制和电力分配,都由 SCADA 系统管理。在现代社会中,这些系统与互联网相互连接,因此很容易受到各种网络攻击。因此,确保 SCADA 安全已成为一个重要的研究领域。本文的重点是检测在保持原有顺序和内容的情况下,操纵系统内命令的时间的攻击。为应对这一挑战,我们提出了几种基于机器学习的方法。第一种方法依赖于长短期记忆模型,第二种方法利用分层时态记忆模型,这两种方法都因其在检测时间序列数据模式方面的有效性而闻名。我们使用一个真实的 SCADA 系统数据集对我们的方法进行了严格评估,结果表明这些方法优于以前为应对此类攻击而设计的技术。
{"title":"Time series processing-based malicious activity detection in SCADA systems","authors":"Michael Zaslavski,&nbsp;Meir Kalech","doi":"10.1016/j.iot.2024.101355","DOIUrl":"10.1016/j.iot.2024.101355","url":null,"abstract":"<div><p>Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101355"},"PeriodicalIF":6.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive IoT edge based smart irrigation system for tomato cultivation 基于物联网边缘的番茄种植综合智能灌溉系统
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.iot.2024.101356
Rohit Kumar Kasera, Tapodhir Acharjee

Agriculture industry is the primary engine for a country's economic development. Growing crops using minimum irrigation water is a major challenge for farmers. In conventional farming, crops may be affected by various diseases due to inadequate irrigation scheduling. Recent proposals have suggested using Edge-IoT, AI, and distributed computing to accelerate the inference procedure utilized in smart irrigation applications. The use of resource-constrained edge servers and edge devices used to deliver smart agriculture applications can cause latency-sensitive workloads to interfere with one another. To address this issue, we design a long-range (LoRa) edge IoT computing-based sustainable and customized smart irrigation framework to capture the real-time data of tomato plants. This helps in automatic underground drip irrigation scheduling. This also predicts total water demand and usage, and measure plant growth status. The edge-IoT cloud data transmission control and optimization has been enforced using Smart irrigation data optimization and robust transmission (SIDORT) Message Queuing Telemetry Transport (MQTT) system. We develop a hybrid algorithm named Linked least traversal (LLT) for machine-to-machine communication (M2M). Also, a Reinforcement learning (RL) based Optimal Soil Wetness Closeness Policy (OSWCP) for irrigation scheduling has been proposed. The performance of the proposed smart irrigation models has been validated through extensive experiments using real-time data in which OSWCP performance has been measured at a 97.88 % accuracy rate. Additionally, a comparison of our proposed architecture has been accomplished by resolving the existing smart irrigation system challenges.

农业是国家经济发展的主要动力。使用最少的灌溉用水种植农作物是农民面临的一大挑战。在传统农业中,由于灌溉调度不当,农作物可能会受到各种疾病的影响。最近有建议提出,利用边缘物联网、人工智能和分布式计算来加速智能灌溉应用中的推理过程。使用资源受限的边缘服务器和边缘设备来提供智能农业应用,可能会导致对延迟敏感的工作负载相互干扰。为解决这一问题,我们设计了一种基于长距离(LoRa)边缘物联网计算的可持续定制智能灌溉框架,以捕捉番茄植物的实时数据。这有助于自动地下滴灌调度。它还能预测水的总需求和使用量,并测量植物的生长状况。利用智能灌溉数据优化和稳健传输(SIDORT)消息队列遥测传输(MQTT)系统实现了边缘物联网云数据传输控制和优化。我们为机器对机器通信(M2M)开发了一种名为 "关联最小遍历"(LLT)的混合算法。此外,我们还提出了一种基于强化学习(RL)的灌溉调度最佳土壤湿度接近策略(OSWCP)。通过使用实时数据进行大量实验,验证了所提出的智能灌溉模型的性能,其中 OSWCP 的准确率达到 97.88%。此外,通过解决现有智能灌溉系统面临的挑战,对我们提出的架构进行了比较。
{"title":"A Comprehensive IoT edge based smart irrigation system for tomato cultivation","authors":"Rohit Kumar Kasera,&nbsp;Tapodhir Acharjee","doi":"10.1016/j.iot.2024.101356","DOIUrl":"10.1016/j.iot.2024.101356","url":null,"abstract":"<div><p>Agriculture industry is the primary engine for a country's economic development. Growing crops using minimum irrigation water is a major challenge for farmers. In conventional farming, crops may be affected by various diseases due to inadequate irrigation scheduling. Recent proposals have suggested using Edge-IoT, AI, and distributed computing to accelerate the inference procedure utilized in smart irrigation applications. The use of resource-constrained edge servers and edge devices used to deliver smart agriculture applications can cause latency-sensitive workloads to interfere with one another. To address this issue, we design a long-range (LoRa) edge IoT computing-based sustainable and customized smart irrigation framework to capture the real-time data of tomato plants. This helps in automatic underground drip irrigation scheduling. This also predicts total water demand and usage, and measure plant growth status. The edge-IoT cloud data transmission control and optimization has been enforced using Smart irrigation data optimization and robust transmission (SIDORT) Message Queuing Telemetry Transport (MQTT) system. We develop a hybrid algorithm named Linked least traversal (LLT) for machine-to-machine communication (M2M). Also, a Reinforcement learning (RL) based Optimal Soil Wetness Closeness Policy (OSWCP) for irrigation scheduling has been proposed. The performance of the proposed smart irrigation models has been validated through extensive experiments using real-time data in which OSWCP performance has been measured at a 97.88 % accuracy rate. Additionally, a comparison of our proposed architecture has been accomplished by resolving the existing smart irrigation system challenges.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101356"},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum IoTDeploy:通过计算连续性部署物联网智能应用
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.iot.2024.101348
Francis Borges Oliveira , Marco Di Felice , Carlos Kamienski

IoT Smart Applications have created a demand for architectures, infrastructure, platforms, orchestration, and service deployment strategies. They are deployed from sensors to the cloud over a geographical and computing continuum, which is challenging for service orchestration and DevOps strategies. The distributed infrastructure to implement the end-to-end data path may vary, even for similar applications, concerning the services deployed over the mist, fog, edge, and cloud stages. This paper proposes and evaluates IoTDeploy, a solution for streamlining and scaling static and dynamic IoT service deployment over the continuum. IoTDeploy implements a CI/CD tool plugin for deploying applications running on the continuum and supports dynamic service migration. We evaluated the service migration from cloud to fog and fog to cloud with a case study on smart irrigation in agriculture. The experiments reveal that deployment in IoT-distributed environments is reliable and resilient, enabling migration without interrupting the application and losing data.

物联网智能应用催生了对架构、基础设施、平台、协调和服务部署策略的需求。它们从传感器到云的部署跨越了地理和计算的连续性,这对服务协调和 DevOps 战略是一个挑战。实施端到端数据路径的分布式基础架构可能各不相同,即使是类似的应用,在雾、雾、边缘和云阶段部署的服务也不尽相同。本文提出并评估了 IoTDeploy,这是一种用于简化和扩展静态和动态连续物联网服务部署的解决方案。IoTDeploy 实现了一个 CI/CD 工具插件,用于部署在连续体上运行的应用程序,并支持动态服务迁移。我们以农业智能灌溉为例,评估了从云到雾和从雾到云的服务迁移。实验结果表明,在物联网分布式环境中进行部署既可靠又有弹性,能够在不中断应用和丢失数据的情况下实现迁移。
{"title":"IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum","authors":"Francis Borges Oliveira ,&nbsp;Marco Di Felice ,&nbsp;Carlos Kamienski","doi":"10.1016/j.iot.2024.101348","DOIUrl":"10.1016/j.iot.2024.101348","url":null,"abstract":"<div><p>IoT Smart Applications have created a demand for architectures, infrastructure, platforms, orchestration, and service deployment strategies. They are deployed from sensors to the cloud over a geographical and computing continuum, which is challenging for service orchestration and DevOps strategies. The distributed infrastructure to implement the end-to-end data path may vary, even for similar applications, concerning the services deployed over the mist, fog, edge, and cloud stages. This paper proposes and evaluates IoTDeploy, a solution for streamlining and scaling static and dynamic IoT service deployment over the continuum. IoTDeploy implements a CI/CD tool plugin for deploying applications running on the continuum and supports dynamic service migration. We evaluated the service migration from cloud to fog and fog to cloud with a case study on smart irrigation in agriculture. The experiments reveal that deployment in IoT-distributed environments is reliable and resilient, enabling migration without interrupting the application and losing data.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101348"},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positive connotations of map-matching based on sub-city districts for trajectory data analytics 基于城市分区的地图匹配对轨迹数据分析的积极意义
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.iot.2024.101338
Zheng-Yun Zhuang , Ye Ding
We propose a new data pre-processing method, sub-district-based map matching (SDBMM), which involves projecting a trajectory onto sub-city districts (SCDs), geographical areas on the map with irregular boundaries. Thus, this method differs significantly from traditional map-matching processes, which match trajectory data points to the nearest or most probable road segments. With SDBMM, a moving object is represented through gradual transitions through a set of SCDs instead of ‘blinking’ at the road segments rapidly. This change in information granularity yields more presentation efficiency. As SCDs are meaningful partitions of a city based on urban planning or travel behaviours, SDBMM also underlies a new ground for post hoc analytics. In the first application, we perform SDBMM for a large taxi-trajectory dataset in a large city. This case verifies SDBMM with sufficient massive data and brings valuable knowledge to several parties (i.e. taxi drivers, service operators, and the government) in managing the taxi transport mode in the city and policy-making. We apply SDBMM in a second application of anti-drug investigation and find that SCDs with pathway entrances/exits across the mountain ranges are usually the hot traces of drug transactions. These practical applications may foster greater confidence in future utilisations of SDBMM.
我们提出了一种新的数据预处理方法--基于子区的地图匹配(SDBMM),该方法涉及将轨迹投射到地图上边界不规则的地理区域--城市子区(SCD)上。因此,这种方法与传统的地图匹配过程有很大不同,传统的地图匹配过程是将轨迹数据点与最近或最可能的路段进行匹配。在 SDBMM 中,移动物体是通过一组 SCD 的渐进过渡来表示的,而不是快速 "闪烁 "到路段上。这种信息粒度上的变化提高了呈现效率。由于 SCD 是根据城市规划或旅行行为对城市进行的有意义的划分,因此 SDBMM 还为事后分析提供了新的基础。在第一个应用中,我们对一个大城市的大型出租车轨迹数据集执行了 SDBMM。该案例利用足够的海量数据验证了 SDBMM,并为多方(即出租车司机、服务运营商和政府)在管理城市出租车交通模式和政策制定方面提供了有价值的知识。我们将 SDBMM 应用于第二项禁毒调查,发现具有跨山脉出入口的 SCD 通常是毒品交易的热点区域。这些实际应用可能会增强人们对未来使用 SDBMM 的信心。
{"title":"Positive connotations of map-matching based on sub-city districts for trajectory data analytics","authors":"Zheng-Yun Zhuang ,&nbsp;Ye Ding","doi":"10.1016/j.iot.2024.101338","DOIUrl":"10.1016/j.iot.2024.101338","url":null,"abstract":"<div><div>We propose a new data pre-processing method, sub-district-based map matching (SDBMM), which involves projecting a trajectory onto sub-city districts (SCDs), geographical areas on the map with irregular boundaries. Thus, this method differs significantly from traditional map-matching processes, which match trajectory data points to the nearest or most probable road segments. With SDBMM, a moving object is represented through gradual transitions through a set of SCDs instead of ‘blinking’ at the road segments rapidly. This change in information granularity yields more presentation efficiency. As SCDs are meaningful partitions of a city based on urban planning or travel behaviours, SDBMM also underlies a new ground for post hoc analytics. In the first application, we perform SDBMM for a large taxi-trajectory dataset in a large city. This case verifies SDBMM with sufficient massive data and brings valuable knowledge to several parties (i.e. taxi drivers, service operators, and the government) in managing the taxi transport mode in the city and policy-making. We apply SDBMM in a second application of anti-drug investigation and find that SCDs with pathway entrances/exits across the mountain ranges are usually the hot traces of drug transactions. These practical applications may foster greater confidence in future utilisations of SDBMM.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101338"},"PeriodicalIF":6.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142323744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1