首页 > 最新文献

Internet of Things最新文献

英文 中文
CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT CICIoMT2024:用于 IoMT 多协议安全评估的基准数据集
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.iot.2024.101351
Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, Reginald Chukwuka Molokwu, Somayeh Sadeghi, Ali A. Ghorbani

The Internet of Things (IoT) is increasingly integrated into daily life, particularly in healthcare, through the Internet of Medical Things (IoMT). IoMT devices support services like continuous health monitoring but raise significant cybersecurity concerns due to their vulnerability to various attacks. The complexity and data volume of IoMT network traffic requires advanced methods to enhance security and reliability. Machine Learning (ML) offers techniques to detect, prevent, and mitigate cyberattacks. However, existing benchmark datasets lack essential features for robust IoMT security solutions, such as a reduced number of real devices, a limited variety of attacks, and a lack of extensive profiling. We propose a realistic benchmark dataset for IoMT security solutions development and evaluation to address these gaps. We executed 18 attacks on an IoMT testbed with 40 devices (25 real and 15 simulated), using protocols like Wi-Fi, MQTT, and Bluetooth. Supporting technologies, including dedicated network traffic collectors and a Faraday Cage, ensured data quality. The attacks fall into five categories: DDoS, DoS, Recon, MQTT, and spoofing. We aim to establish a baseline that complements existing datasets, aiding researchers in creating secure healthcare systems using ML. Beyond simulating attacks, we capture the lifecycle of IoMT devices from network entry to exit through profiling, allowing classifiers to identify device anomalies. The resulting CICIoMT2024 dataset, published on the CIC dataset page, demonstrates that various methods can classify IoMT cyberattacks. This effort supports new IoMT security solutions and contributes to the broader field of cybersecurity in healthcare, ensuring more reliable IoMT device deployment.

通过医疗物联网(IoMT),物联网(IoT)正日益融入日常生活,尤其是医疗保健领域。IoMT 设备支持持续健康监测等服务,但由于容易受到各种攻击,引发了严重的网络安全问题。IoMT 网络流量的复杂性和数据量要求采用先进的方法来提高安全性和可靠性。机器学习(ML)提供了检测、预防和减轻网络攻击的技术。然而,现有的基准数据集缺乏强大的 IoMT 安全解决方案所需的基本特征,例如真实设备数量减少、攻击种类有限以及缺乏广泛的剖析。为了弥补这些不足,我们提出了一个用于 IoMT 安全解决方案开发和评估的真实基准数据集。我们在拥有 40 台设备(25 台真实设备和 15 台模拟设备)的 IoMT 测试平台上使用 Wi-Fi、MQTT 和蓝牙等协议实施了 18 种攻击。包括专用网络流量收集器和法拉第笼在内的辅助技术确保了数据质量。攻击分为五类:DDoS、DoS、侦察、MQTT 和欺骗。我们的目标是建立一个基线,补充现有的数据集,帮助研究人员利用 ML 创建安全的医疗保健系统。除了模拟攻击外,我们还通过剖析捕捉 IoMT 设备从进入网络到退出网络的生命周期,使分类器能够识别设备异常。由此产生的 CICIoMT2024 数据集发布在 CIC 数据集页面上,展示了各种方法可以对 IoMT 网络攻击进行分类。这项工作支持新的 IoMT 安全解决方案,并为更广泛的医疗保健网络安全领域做出了贡献,从而确保更可靠的 IoMT 设备部署。
{"title":"CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT","authors":"Sajjad Dadkhah,&nbsp;Euclides Carlos Pinto Neto,&nbsp;Raphael Ferreira,&nbsp;Reginald Chukwuka Molokwu,&nbsp;Somayeh Sadeghi,&nbsp;Ali A. Ghorbani","doi":"10.1016/j.iot.2024.101351","DOIUrl":"10.1016/j.iot.2024.101351","url":null,"abstract":"<div><p>The Internet of Things (IoT) is increasingly integrated into daily life, particularly in healthcare, through the Internet of Medical Things (IoMT). IoMT devices support services like continuous health monitoring but raise significant cybersecurity concerns due to their vulnerability to various attacks. The complexity and data volume of IoMT network traffic requires advanced methods to enhance security and reliability. Machine Learning (ML) offers techniques to detect, prevent, and mitigate cyberattacks. However, existing benchmark datasets lack essential features for robust IoMT security solutions, such as a reduced number of real devices, a limited variety of attacks, and a lack of extensive profiling. We propose a realistic benchmark dataset for IoMT security solutions development and evaluation to address these gaps. We executed 18 attacks on an IoMT testbed with 40 devices (25 real and 15 simulated), using protocols like Wi-Fi, MQTT, and Bluetooth. Supporting technologies, including dedicated network traffic collectors and a Faraday Cage, ensured data quality. The attacks fall into five categories: DDoS, DoS, Recon, MQTT, and spoofing. We aim to establish a baseline that complements existing datasets, aiding researchers in creating secure healthcare systems using ML. Beyond simulating attacks, we capture the lifecycle of IoMT devices from network entry to exit through profiling, allowing classifiers to identify device anomalies. The resulting <span><span>CICIoMT2024</span><svg><path></path></svg></span> dataset, published on the CIC dataset page, demonstrates that various methods can classify IoMT cyberattacks. This effort supports new IoMT security solutions and contributes to the broader field of cybersecurity in healthcare, ensuring more reliable IoMT device deployment.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101351"},"PeriodicalIF":6.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002920/pdfft?md5=0430302d374a16cfc8032840ccdad749&pid=1-s2.0-S2542660524002920-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving estimation of electric vehicle charging behavior: A federated learning approach based on differential privacy 电动汽车充电行为的隐私保护估计:基于差异隐私的联合学习方法
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1016/j.iot.2024.101344
Xiuping Kong , Lin Lu , Ke Xiong

With the popularity of connected electric vehicles, the openness and sharing of charging data between stakeholders allows a more accurate estimation of charging behavior, which is valuable for optimizing energy systems and facilitating travel convenience. However, to enable such an effective mechanism, the challenge of data security and privacy should be addressed. Federated learning in the vehicular network is appealing for utilizing individual vehicle data while preserving data privacy. We propose an improved local differential privacy-based federated learning approach for modeling charging session prediction problems while preserving user privacy against the threat from a honest-but-curious server. In this approach, all vehicles, within the coordination of a cloud server, collaboratively establish a global regression network through parameter exchange. Meanwhile, the servers may belong to third-party model owners and can be semi-honest when inferring private information on the collected model parameters. Hence, local differential privacy is adopted to perturb the parameters. Additionally, a combination of local and global models via elastic synchronization is proposed to improve the accuracy of the learned noisy global model. Through the test on a real data set, the results show the superiority of the proposed algorithm over traditional noisy federated learning methods. Furthermore, the practical value of the proposed method is validated with a real-world charging case. Such an accurate charging session prediction service for electric vehicle drivers facilitates charging and travel convenience in the green transportation world.

随着联网电动汽车的普及,利益相关者之间开放和共享充电数据可以更准确地估计充电行为,这对优化能源系统和方便出行非常有价值。然而,要实现这种有效的机制,必须解决数据安全和隐私方面的挑战。车辆网络中的联合学习对于利用单个车辆数据同时保护数据隐私很有吸引力。我们提出了一种改进的基于本地差分隐私的联合学习方法,用于对充电会话预测问题进行建模,同时保护用户隐私,防止来自诚实但好奇的服务器的威胁。在这种方法中,所有车辆在云服务器的协调下,通过参数交换协作建立一个全局回归网络。同时,服务器可能属于第三方模型所有者,在推断所收集模型参数的隐私信息时可能是半诚实的。因此,采用局部差分隐私来扰动参数。此外,还提出了通过弹性同步将局部模型和全局模型相结合的方法,以提高学习到的噪声全局模型的准确性。通过对真实数据集的测试,结果表明所提出的算法优于传统的噪声联合学习方法。此外,还通过实际充电案例验证了所提方法的实用价值。为电动汽车驾驶员提供如此准确的充电时段预测服务,将为绿色交通领域的充电和出行提供便利。
{"title":"Privacy-preserving estimation of electric vehicle charging behavior: A federated learning approach based on differential privacy","authors":"Xiuping Kong ,&nbsp;Lin Lu ,&nbsp;Ke Xiong","doi":"10.1016/j.iot.2024.101344","DOIUrl":"10.1016/j.iot.2024.101344","url":null,"abstract":"<div><p>With the popularity of connected electric vehicles, the openness and sharing of charging data between stakeholders allows a more accurate estimation of charging behavior, which is valuable for optimizing energy systems and facilitating travel convenience. However, to enable such an effective mechanism, the challenge of data security and privacy should be addressed. Federated learning in the vehicular network is appealing for utilizing individual vehicle data while preserving data privacy. We propose an improved local differential privacy-based federated learning approach for modeling charging session prediction problems while preserving user privacy against the threat from a honest-but-curious server. In this approach, all vehicles, within the coordination of a cloud server, collaboratively establish a global regression network through parameter exchange. Meanwhile, the servers may belong to third-party model owners and can be semi-honest when inferring private information on the collected model parameters. Hence, local differential privacy is adopted to perturb the parameters. Additionally, a combination of local and global models via elastic synchronization is proposed to improve the accuracy of the learned noisy global model. Through the test on a real data set, the results show the superiority of the proposed algorithm over traditional noisy federated learning methods. Furthermore, the practical value of the proposed method is validated with a real-world charging case. Such an accurate charging session prediction service for electric vehicle drivers facilitates charging and travel convenience in the green transportation world.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101344"},"PeriodicalIF":6.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel deep learning-based intrusion detection system for IoT DDoS security 基于深度学习的新型物联网 DDoS 安全入侵检测系统
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1016/j.iot.2024.101336
Selman Hizal , Unal Cavusoglu , Devrim Akgun

Intrusion detection systems (IDS) for IoT devices are critical for protecting against a wide range of possible attacks when dealing with Distributed Denial of Service (DDoS) attacks. These attacks have become a primary concern for IoT networks. Intelligent decision-making techniques are required for DDoS attacks, which pose serious threats. The range of devices connected to the IoT ecosystem is growing, and the data traffic they generate is continually changing; the need for models more resistant to new attack types and existing attacks is of research interest. Motivated by this gap, this paper provides an effective IDS powered by deep learning models for IoT networks based on the recently published CICIoT2023 dataset. In this work, we improved the detection and mitigation of potential security threats in IoT networks. To increase performance, we performed preprocessing operations on the dataset, such as random subset selection, feature elimination, duplication removal, and normalization. A two-level IDS using deep-learning models containing binary and multiclass classifiers has been designed to identify DDoS attacks in IoT networks. The effectiveness of several deep-learning models in real-time and detection performance has been evaluated. We trained fully connected, convolutional, and LSTM-based deep learning models for detecting DDoS attacks and sub-classes. According to the results on a partially balanced sub-dataset, two staged models performed better than baseline models such as DNN (Deep Neural Networks), CNN (Convolutional Neural Networks), LSTM (Long Short Term Memory), RNN (Recurrent Neural Network).

在应对分布式拒绝服务(DDoS)攻击时,物联网设备的入侵检测系统(IDS)对于防范各种可能的攻击至关重要。这些攻击已成为物联网网络的首要问题。针对构成严重威胁的 DDoS 攻击,需要智能决策技术。连接到物联网生态系统的设备越来越多,它们产生的数据流量也在不断变化;因此,研究人员需要建立更能抵御新攻击类型和现有攻击的模型。受这一差距的激励,本文基于最近发布的 CICIoT2023 数据集,为物联网网络提供了一种由深度学习模型驱动的有效 IDS。在这项工作中,我们改进了对物联网网络中潜在安全威胁的检测和缓解。为了提高性能,我们对数据集进行了预处理操作,如随机子集选择、特征消除、重复删除和归一化。我们设计了一种使用包含二元分类器和多分类器的深度学习模型的两级 IDS,以识别物联网网络中的 DDoS 攻击。我们评估了几种深度学习模型的实时有效性和检测性能。我们训练了基于全连接、卷积和 LSTM 的深度学习模型来检测 DDoS 攻击和子类。根据部分平衡子数据集的结果,两个阶段模型的性能优于 DNN(深度神经网络)、CNN(卷积神经网络)、LSTM(长短期记忆)和 RNN(循环神经网络)等基线模型。
{"title":"A novel deep learning-based intrusion detection system for IoT DDoS security","authors":"Selman Hizal ,&nbsp;Unal Cavusoglu ,&nbsp;Devrim Akgun","doi":"10.1016/j.iot.2024.101336","DOIUrl":"10.1016/j.iot.2024.101336","url":null,"abstract":"<div><p>Intrusion detection systems (IDS) for IoT devices are critical for protecting against a wide range of possible attacks when dealing with Distributed Denial of Service (DDoS) attacks. These attacks have become a primary concern for IoT networks. Intelligent decision-making techniques are required for DDoS attacks, which pose serious threats. The range of devices connected to the IoT ecosystem is growing, and the data traffic they generate is continually changing; the need for models more resistant to new attack types and existing attacks is of research interest. Motivated by this gap, this paper provides an effective IDS powered by deep learning models for IoT networks based on the recently published CICIoT2023 dataset. In this work, we improved the detection and mitigation of potential security threats in IoT networks. To increase performance, we performed preprocessing operations on the dataset, such as random subset selection, feature elimination, duplication removal, and normalization. A two-level IDS using deep-learning models containing binary and multiclass classifiers has been designed to identify DDoS attacks in IoT networks. The effectiveness of several deep-learning models in real-time and detection performance has been evaluated. We trained fully connected, convolutional, and LSTM-based deep learning models for detecting DDoS attacks and sub-classes. According to the results on a partially balanced sub-dataset, two staged models performed better than baseline models such as DNN (Deep Neural Networks), CNN (Convolutional Neural Networks), LSTM (Long Short Term Memory), RNN (Recurrent Neural Network).</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101336"},"PeriodicalIF":6.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture 通过多层感知器分解架构实现数据融合集成网络预测方案分类器(DFI-NFSC)
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1016/j.iot.2024.101341
Erdem Çakan , Volkan Rodoplu , Cüneyt Güzeliş

The Massive Access Problem of the Internet of Things stands for the access problem of the wireless devices to the Gateway when the device population in the coverage area is excessive. We develop a hybrid model called Data Fusion Integrated Network Forecasting Scheme Classifier (DFI-NFSC) using a Multi-Layer Perceptron (MLP) Decomposition architecture specifically designed to address the Massive Access Problem. We utilize our custom error metric to display throughput and energy consumption results. These results are obtained by emulating the Joint Forecasting–Scheduling (JFS) system on a single IoT Gateway and distinguishing between ARIMA, LSTM, and MLP forecasters of the JFS system. The outcomes indicate that the DFI-NFCS method plays a notable role in improving performance and mitigating challenges arising from the dynamic fluctuations in the diversity of device types within an IoT gateway’s coverage zone.

物联网的大规模接入问题是指当覆盖区域内的设备数量过多时,无线设备接入网关的问题。我们开发了一种混合模型,称为数据融合集成网络预测方案分类器(DFI-NFSC),它采用多层感知器(MLP)分解架构,专门用于解决大规模接入问题。我们利用自定义误差度量来显示吞吐量和能耗结果。这些结果是通过在单个物联网网关上模拟联合预测-调度(JFS)系统,并区分 JFS 系统的 ARIMA、LSTM 和 MLP 预测器得出的。结果表明,DFI-NFCS 方法在提高性能和缓解物联网网关覆盖区域内设备类型多样性动态波动带来的挑战方面发挥了显著作用。
{"title":"Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture","authors":"Erdem Çakan ,&nbsp;Volkan Rodoplu ,&nbsp;Cüneyt Güzeliş","doi":"10.1016/j.iot.2024.101341","DOIUrl":"10.1016/j.iot.2024.101341","url":null,"abstract":"<div><p>The Massive Access Problem of the Internet of Things stands for the access problem of the wireless devices to the Gateway when the device population in the coverage area is excessive. We develop a hybrid model called Data Fusion Integrated Network Forecasting Scheme Classifier (DFI-NFSC) using a Multi-Layer Perceptron (MLP) Decomposition architecture specifically designed to address the Massive Access Problem. We utilize our custom error metric to display throughput and energy consumption results. These results are obtained by emulating the Joint Forecasting–Scheduling (JFS) system on a single IoT Gateway and distinguishing between ARIMA, LSTM, and MLP forecasters of the JFS system. The outcomes indicate that the DFI-NFCS method plays a notable role in improving performance and mitigating challenges arising from the dynamic fluctuations in the diversity of device types within an IoT gateway’s coverage zone.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101341"},"PeriodicalIF":6.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices 基于 WSN 和视觉的智能、节能、可扩展且可靠的停车监控系统,可在边缘对资源有限的物联网设备进行光学验证
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101346
Shreeram Hudda, Rishabh Barnwal, Abhishek Khurana, K. Haribabu

As urbanization accelerates, the demand for efficient parking surveillance solutions has increased. However, existing solutions often face challenges related to energy consumption, scalability, and reliability. This paper introduces a smart hybrid parking surveillance system integrating wireless sensor networks (WSNs) with vision based solution at the edge for resource constrained IoT devices to address these challenges. The solution leverages WSNs for periodic readings of parking space occupancy and introduces a low power sleep mode in the network for energy efficiency, along with optical verification strategies using computer vision models like R-CNN and Faster R-CNN FPN on ResNet50 and MobileNetv2 backbones for distinguishing between true and false positives in the WSN data for a greater accuracy in parking space occupancy. The system utilizes edge for computing on edge servers resulting in increased responsiveness of the system, reduced data transmission and real time processing of data. The proposed solution is formulated in such a way that it automatically switches between WSN and vision based sensing resulting in less energy consumption and longer lifespan of the system without compromising on accuracy. Through experimental results it is observed that models trained on the MobileNetv2 backbone demonstrated at least twice faster for both processing the images and training compared to those models trained on the ResNet backbone. On the other hand, both Faster R-CNN FPN (input resolution: 1440) and R-CNN (input resolution: 128) models trained on the MobileNetv2 backbone have slightly lower accuracies than the same models trained on the ResNet50 backbone.

随着城市化进程的加快,对高效停车场监控解决方案的需求也随之增加。然而,现有的解决方案往往面临着能耗、可扩展性和可靠性方面的挑战。本文介绍了一种智能混合停车监控系统,该系统集成了无线传感器网络(WSN)和基于视觉的边缘解决方案,适用于资源受限的物联网设备,以应对这些挑战。该解决方案利用 WSN 定期读取停车位占用情况,并在网络中引入低功耗睡眠模式以提高能效,同时在 ResNet50 和 MobileNetv2 主干网上使用 R-CNN 和 Faster R-CNN FPN 等计算机视觉模型进行光学验证策略,以区分 WSN 数据中的真假阳性,从而提高停车位占用情况的准确性。该系统利用边缘服务器上的边缘进行计算,从而提高了系统的响应速度,减少了数据传输并实现了数据的实时处理。所提出的解决方案可以在 WSN 和基于视觉的传感之间自动切换,从而在不影响准确性的前提下降低能耗,延长系统的使用寿命。实验结果表明,与在 ResNet 主干网上训练的模型相比,在 MobileNetv2 主干网上训练的模型处理图像和训练的速度至少快两倍。另一方面,在 MobileNetv2 主干网上训练的 Faster R-CNN FPN(输入分辨率:1440)和 R-CNN(输入分辨率:128)模型的准确率都略低于在 ResNet50 主干网上训练的相同模型。
{"title":"A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices","authors":"Shreeram Hudda,&nbsp;Rishabh Barnwal,&nbsp;Abhishek Khurana,&nbsp;K. Haribabu","doi":"10.1016/j.iot.2024.101346","DOIUrl":"10.1016/j.iot.2024.101346","url":null,"abstract":"<div><p>As urbanization accelerates, the demand for efficient parking surveillance solutions has increased. However, existing solutions often face challenges related to energy consumption, scalability, and reliability. This paper introduces a smart hybrid parking surveillance system integrating wireless sensor networks (WSNs) with vision based solution at the edge for resource constrained IoT devices to address these challenges. The solution leverages WSNs for periodic readings of parking space occupancy and introduces a low power sleep mode in the network for energy efficiency, along with optical verification strategies using computer vision models like R-CNN and Faster R-CNN FPN on ResNet50 and MobileNetv2 backbones for distinguishing between true and false positives in the WSN data for a greater accuracy in parking space occupancy. The system utilizes edge for computing on edge servers resulting in increased responsiveness of the system, reduced data transmission and real time processing of data. The proposed solution is formulated in such a way that it automatically switches between WSN and vision based sensing resulting in less energy consumption and longer lifespan of the system without compromising on accuracy. Through experimental results it is observed that models trained on the MobileNetv2 backbone demonstrated at least twice faster for both processing the images and training compared to those models trained on the ResNet backbone. On the other hand, both Faster R-CNN FPN (input resolution: 1440) and R-CNN (input resolution: 128) models trained on the MobileNetv2 backbone have slightly lower accuracies than the same models trained on the ResNet50 backbone.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101346"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of data collaborative sensing methods for smart agriculture 智能农业数据协作传感方法调查
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101354
Xiaomin Li , Zhaokang Gong , Jianhua Zheng , Yongxin Liu , Huiru Cao

Data is becoming increasingly pivotal and foundational in the development of smart agriculture, underscoring the importance of efficient methods for obtaining high-value data. Data sensing methods have become the key technologies and methods to realize the agricultural Internet of Things (IoT). However, in the face of the new agricultural paradigm driven by big data, traditional agricultural IoT confronts numerous challenges at the data sensing level. This article, therefore, adopts a data sensing perspective and, based on the agricultural IoT, explores the evolution of data sensing technology in the agricultural domain. Initially, it introduces a data sensing framework for the agricultural Internet of Things, which integrates cloud and edge computing. Subsequently, it reviews the sensors commonly deployed in agricultural scenarios. Then, common methods for collaborative sensing of agricultural data were discussed from three aspects: intra-node, multiple nodes, and cross-domain. At the same time, the issues of data security and privacy in data collaborative sensing were discussed. Next, we integrate multi-dimensional technology to construct an application case for data sensing in the agricultural IoT. Finally, it discusses the challenges that Collaborative sensing technology encounters within the agricultural IoT.

数据在智慧农业的发展中越来越具有关键性和基础性作用,这凸显了高效获取高价值数据方法的重要性。数据传感方法已成为实现农业物联网的关键技术和方法。然而,面对大数据驱动的新型农业模式,传统农业物联网在数据传感层面面临诸多挑战。因此,本文采用数据传感视角,以农业物联网为基础,探讨数据传感技术在农业领域的发展。文章首先介绍了农业物联网的数据传感框架,该框架集成了云计算和边缘计算。随后,它回顾了农业场景中通常部署的传感器。然后,从节点内、多节点和跨域三个方面讨论了农业数据协同感知的常用方法。同时,讨论了数据协同感知中的数据安全和隐私问题。其次,结合多维技术,构建了农业物联网中数据感知的应用案例。最后,讨论了协作传感技术在农业物联网中遇到的挑战。
{"title":"A survey of data collaborative sensing methods for smart agriculture","authors":"Xiaomin Li ,&nbsp;Zhaokang Gong ,&nbsp;Jianhua Zheng ,&nbsp;Yongxin Liu ,&nbsp;Huiru Cao","doi":"10.1016/j.iot.2024.101354","DOIUrl":"10.1016/j.iot.2024.101354","url":null,"abstract":"<div><p>Data is becoming increasingly pivotal and foundational in the development of smart agriculture, underscoring the importance of efficient methods for obtaining high-value data. Data sensing methods have become the key technologies and methods to realize the agricultural Internet of Things (IoT). However, in the face of the new agricultural paradigm driven by big data, traditional agricultural IoT confronts numerous challenges at the data sensing level. This article, therefore, adopts a data sensing perspective and, based on the agricultural IoT, explores the evolution of data sensing technology in the agricultural domain. Initially, it introduces a data sensing framework for the agricultural Internet of Things, which integrates cloud and edge computing. Subsequently, it reviews the sensors commonly deployed in agricultural scenarios. Then, common methods for collaborative sensing of agricultural data were discussed from three aspects: intra-node, multiple nodes, and cross-domain. At the same time, the issues of data security and privacy in data collaborative sensing were discussed. Next, we integrate multi-dimensional technology to construct an application case for data sensing in the agricultural IoT. Finally, it discusses the challenges that Collaborative sensing technology encounters within the agricultural IoT.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101354"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized complexity of coverage in multi-interface IoT networks: Pathwidth 多接口物联网网络覆盖的参数化复杂性:路径宽度
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.iot.2024.101353
Alessandro Aloisio , Alfredo Navarra

The Internet of Things (IoT) has emerged as one of the growing fields in digital technology over the past decade. A primary goal of IoT is to connect physical objects to the Internet to provide various services. Due to the vast number and diversity of these objects, referred to as devices, IoT must tackle both traditional and novel theoretical and practical network problems. Among these, multi-interface problems are well-known and have been extensively studied.

This research focuses on one of the newest multi-interface models that fits well within the IoT context. It is known as the Coverage in the budget-constrained multi-interface problem, where the budget represents the total amount of energy in the network, and coverage refers to the model’s goal of activating all required communications among IoT devices. Since most IoT devices are battery-powered, energy consumption must be considered to extend the network’s lifespan. This means selecting the most energy-efficient interface configuration that allows all desired connections to function. To achieve this, both global energy consumption and the local number of active interfaces are limited. Moreover, this model also incentivize devices to turn on the available interfaces to create a more performant network. Finally, this model also takes into account the performance of the networks assigning a profit to devices that activate interfaces and realize connections.

This problem can be represented using an undirected graph where each vertex represents a device, and each edge represents a desired connection. Every device is equipped with a set of available interfaces that can be used to facilitate transmission among the devices. The final goal is to activate a subset of the available interfaces that maximize the total profit, while not violating the constraints.

This problem has been recognized as NP-hard, which is why we decided to investigate the decision version from the perspective of fixed-parameter tractability (FPT) theory. FPT is an advanced area of complexity theory that aims to identify the core complexity of a combinatorial problem by incorporating parameters into the time complexity domain.

We provide two fixed-parameter tractability results, each describing an FPT algorithm. One algorithm is based on the well-known pathwidth parameter, the number of available interfaces, and the maximum available energy. The other algorithm considers pathwidth, the number of available interfaces, and an upper bound on the optimal profit. Finally, we show that these two algorithms can be applied to the maximization version of the problem.

过去十年来,物联网(IoT)已成为数字技术领域不断发展的领域之一。物联网的主要目标是将物理对象连接到互联网,以提供各种服务。由于这些被称为设备的物体数量庞大、种类繁多,物联网必须解决传统和新颖的理论和实际网络问题。在这些问题中,多接口问题是众所周知的,并且已经得到了广泛的研究。本研究的重点是最新的多接口模型之一,它非常适合物联网环境。它被称为预算受限多接口问题中的覆盖率,其中预算代表网络中的能源总量,而覆盖率指的是该模型的目标,即激活物联网设备间所有需要的通信。由于大多数物联网设备都由电池供电,因此必须考虑能耗以延长网络的使用寿命。这意味着要选择最节能的接口配置,使所有需要的连接都能正常运行。为此,必须限制全局能耗和本地活动接口的数量。此外,该模型还鼓励设备打开可用接口,以创建性能更高的网络。最后,该模型还考虑到了网络的性能,为激活接口和实现连接的设备分配了利润。每个设备都配有一组可用接口,可用于促进设备间的传输。最终目标是激活可用接口的一个子集,使总利润最大化,同时不违反约束条件。这个问题已被公认为 NP 难,因此我们决定从固定参数可计算性(FPT)理论的角度来研究决策版本。FPT 是复杂性理论的一个高级领域,旨在通过将参数纳入时间复杂性域来确定组合问题的核心复杂性。其中一种算法基于众所周知的路径宽度参数、可用接口数量和最大可用能量。另一种算法则考虑了路径宽度、可用接口数量和最优利润上限。最后,我们展示了这两种算法可以应用于问题的最大化版本。
{"title":"Parameterized complexity of coverage in multi-interface IoT networks: Pathwidth","authors":"Alessandro Aloisio ,&nbsp;Alfredo Navarra","doi":"10.1016/j.iot.2024.101353","DOIUrl":"10.1016/j.iot.2024.101353","url":null,"abstract":"<div><p>The Internet of Things (IoT) has emerged as one of the growing fields in digital technology over the past decade. A primary goal of IoT is to connect physical objects to the Internet to provide various services. Due to the vast number and diversity of these objects, referred to as devices, IoT must tackle both traditional and novel theoretical and practical network problems. Among these, multi-interface problems are well-known and have been extensively studied.</p><p>This research focuses on one of the newest multi-interface models that fits well within the IoT context. It is known as the <em>Coverage</em> in the budget-constrained multi-interface problem, where the budget represents the total amount of energy in the network, and coverage refers to the model’s goal of activating all required communications among IoT devices. Since most IoT devices are battery-powered, energy consumption must be considered to extend the network’s lifespan. This means selecting the most energy-efficient interface configuration that allows all desired connections to function. To achieve this, both global energy consumption and the local number of active interfaces are limited. Moreover, this model also incentivize devices to turn on the available interfaces to create a more performant network. Finally, this model also takes into account the performance of the networks assigning a profit to devices that activate interfaces and realize connections.</p><p>This problem can be represented using an undirected graph where each vertex represents a device, and each edge represents a desired connection. Every device is equipped with a set of available interfaces that can be used to facilitate transmission among the devices. The final goal is to activate a subset of the available interfaces that maximize the total profit, while not violating the constraints.</p><p>This problem has been recognized as <em>NP</em>-hard, which is why we decided to investigate the decision version from the perspective of fixed-parameter tractability (FPT) theory. FPT is an advanced area of complexity theory that aims to identify the core complexity of a combinatorial problem by incorporating parameters into the time complexity domain.</p><p>We provide two fixed-parameter tractability results, each describing an FPT algorithm. One algorithm is based on the well-known pathwidth parameter, the number of available interfaces, and the maximum available energy. The other algorithm considers pathwidth, the number of available interfaces, and an upper bound on the optimal profit. Finally, we show that these two algorithms can be applied to the maximization version of the problem.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101353"},"PeriodicalIF":6.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of LoRa-enabled IoT infrastructure for advanced campus safety systems in Taiwan 为台湾先进的校园安全系统集成支持 LoRa 的物联网基础设施
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.iot.2024.101347
Shu-Han Liao , Jheng-Da Jiang , Cheng-Fu Yang

Amid rising concerns about campus safety in Taiwan, particularly with the global trend towards smart cities, integrating the Internet of Things (IoT) into institutional security frameworks has become pivotal. The paper discusses the implementation of using iBeacons and Long Range (LoRa) technology to locating the student position and ensure his safety in the school campus. It uses Internet of Things (IoT) approach in real time to monitor and locate the student presence in the school compound. This paper unveils an innovative design for a campus security system that harnesses the LoRa technology. In the system, the students are equipped with devices containing Bluetooth Low Energy (BLE) beacons to capture and transmit real-time location data. The system response time to locating student in abnormal locations such as cornered and concealed areas is about one second. By extending this system to cover all individuals on campus, a closely monitored environment and areas is enabled that significantly bolstering the security measures. This not only furnishes a dynamic protective layer for educational institutions but also serves as a proactive deterrent against potential security breaches. Ultimately, this research underscores the transformative potential of merging IoT with campus security to ushering in a new era of student safety. LoRa technology offers advantages in battery life, cost-effectiveness, deployment flexibility, and network coverage etc. Therefore, this paper ultimately provides a method of how to utilize the LoRa technology to develop a campus security system. Unlike artificial intelligence (AI)-based image recognition, which raises concerns about privacy and human rights; the features of LoRa’s long-range communication and low power consumption make it a more suitable choice.

在台湾,人们对校园安全的关注与日俱增,尤其是在全球迈向智慧城市的趋势下,将物联网(IoT)融入机构安全框架已变得至关重要。本文讨论了如何利用 iBeacons 和长距离(LoRa)技术定位学生位置,确保学生在校园内的安全。它采用物联网(IoT)方法实时监控和定位学生在校园内的位置。本文揭示了一种利用 LoRa 技术的校园安全系统的创新设计。在该系统中,学生配备了包含蓝牙低功耗(BLE)信标的设备,用于捕捉和传输实时位置数据。在拐角和隐蔽区域等异常位置定位学生的系统响应时间约为一秒。通过将该系统扩展到覆盖校园内的所有人员,可实现对环境和区域的严密监控,从而大大加强安全措施。这不仅为教育机构提供了一个动态保护层,而且还对潜在的安全漏洞起到了积极的威慑作用。最终,这项研究强调了将物联网与校园安全相结合的变革潜力,从而开创了学生安全的新时代。LoRa 技术在电池寿命、成本效益、部署灵活性和网络覆盖等方面具有优势。因此,本文最终提供了一种如何利用 LoRa 技术开发校园安全系统的方法。与基于人工智能(AI)的图像识别不同,人工智能(AI)会引发对隐私和人权的担忧;而 LoRa 的长距离通信和低功耗特性使其成为更合适的选择。
{"title":"Integration of LoRa-enabled IoT infrastructure for advanced campus safety systems in Taiwan","authors":"Shu-Han Liao ,&nbsp;Jheng-Da Jiang ,&nbsp;Cheng-Fu Yang","doi":"10.1016/j.iot.2024.101347","DOIUrl":"10.1016/j.iot.2024.101347","url":null,"abstract":"<div><p>Amid rising concerns about campus safety in Taiwan, particularly with the global trend towards smart cities, integrating the Internet of Things (IoT) into institutional security frameworks has become pivotal. The paper discusses the implementation of using iBeacons and Long Range (LoRa) technology to locating the student position and ensure his safety in the school campus. It uses Internet of Things (IoT) approach in real time to monitor and locate the student presence in the school compound. This paper unveils an innovative design for a campus security system that harnesses the LoRa technology. In the system, the students are equipped with devices containing Bluetooth Low Energy (BLE) beacons to capture and transmit real-time location data. The system response time to locating student in abnormal locations such as cornered and concealed areas is about one second. By extending this system to cover all individuals on campus, a closely monitored environment and areas is enabled that significantly bolstering the security measures. This not only furnishes a dynamic protective layer for educational institutions but also serves as a proactive deterrent against potential security breaches. Ultimately, this research underscores the transformative potential of merging IoT with campus security to ushering in a new era of student safety. LoRa technology offers advantages in battery life, cost-effectiveness, deployment flexibility, and network coverage etc. Therefore, this paper ultimately provides a method of how to utilize the LoRa technology to develop a campus security system. Unlike artificial intelligence (AI)-based image recognition, which raises concerns about privacy and human rights; the features of LoRa’s long-range communication and low power consumption make it a more suitable choice.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101347"},"PeriodicalIF":6.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002889/pdfft?md5=88274724d2e14ad2e476d0f5502d687e&pid=1-s2.0-S2542660524002889-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network 基于时间平滑性和时变相似性的无线传感器网络缺失数据恢复
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.iot.2024.101349
Ke Zhang , Jianyong Dai , Xiuwu Yu , Guang Zhang

Wireless Sensor Networks (WSN) play a vital role in the Internet of Things (IoT) and show great potential in monitoring applications. However, due to harsh environmental conditions and unreliable communication links, WSN often encounter partial data loss during data collection, which inevitably affects the quality of service. To address this challenge, researchers have employed matrix completion techniques to recover missing data by exploiting the low-rank features in the data, but its accuracy is not satisfactory. This paper argues that the spatiotemporal characteristics of the data underlie its low-rank nature, enabling a more accurate capture of the intrinsic patterns within the data. Drawing on this insight, we propose a missing data recovery algorithm based on Temporal Smoothness and Time-Varying Similarity (TSTVS). Unlike traditional low-rank methods, the TSTVS algorithm directly utilizes the structural features of data in the spatiotemporal domain to establish a missing data completion model. Subsequently, the model is converted into an unconstrained optimization problem using the penalty function method, and the gradient descent method is applied to solve it, reconstructing the complete data matrix. Finally, simulation experiments were conducted on three real-world monitoring datasets, comparing the TSTVS with three low-rank methods, Efficient Data Collection Approach (EDCA), Matrix factorization with Smoothness constraints (MFS) and Data Recovery Based on Low Rank and Short-Term Stability(DRLRSS). The experimental results indicate that the proposed TSTVS algorithm consistently outperforms the three low-rank based algorithms in terms of recovery accuracy across different datasets and missing rate scenarios.

无线传感器网络(WSN)在物联网(IoT)中发挥着重要作用,并在监测应用中展现出巨大潜力。然而,由于恶劣的环境条件和不可靠的通信链路,WSN 在数据收集过程中经常会出现部分数据丢失的情况,这不可避免地会影响服务质量。为解决这一难题,研究人员采用了矩阵补全技术,通过利用数据中的低秩特征来恢复丢失的数据,但其准确性并不理想。本文认为,数据的时空特征是其低秩特性的基础,从而能够更准确地捕捉数据的内在模式。基于这一观点,我们提出了一种基于时空平滑性和时变相似性(TSTVS)的丢失数据恢复算法。与传统的低秩方法不同,TSTVS 算法直接利用数据在时空领域的结构特征来建立缺失数据补全模型。随后,利用惩罚函数法将该模型转化为无约束优化问题,并应用梯度下降法进行求解,从而重建完整的数据矩阵。最后,在三个真实世界的监测数据集上进行了仿真实验,比较了 TSTVS 和三种低秩方法,即高效数据收集方法(EDCA)、带平滑性约束的矩阵因式分解(MFS)和基于低秩和短期稳定性的数据恢复(DRLRSS)。实验结果表明,在不同的数据集和缺失率情况下,所提出的 TSTVS 算法的恢复精度始终优于三种基于低秩的算法。
{"title":"Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network","authors":"Ke Zhang ,&nbsp;Jianyong Dai ,&nbsp;Xiuwu Yu ,&nbsp;Guang Zhang","doi":"10.1016/j.iot.2024.101349","DOIUrl":"10.1016/j.iot.2024.101349","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSN) play a vital role in the Internet of Things (IoT) and show great potential in monitoring applications. However, due to harsh environmental conditions and unreliable communication links, WSN often encounter partial data loss during data collection, which inevitably affects the quality of service. To address this challenge, researchers have employed matrix completion techniques to recover missing data by exploiting the low-rank features in the data, but its accuracy is not satisfactory. This paper argues that the spatiotemporal characteristics of the data underlie its low-rank nature, enabling a more accurate capture of the intrinsic patterns within the data. Drawing on this insight, we propose a missing data recovery algorithm based on Temporal Smoothness and Time-Varying Similarity (TSTVS). Unlike traditional low-rank methods, the TSTVS algorithm directly utilizes the structural features of data in the spatiotemporal domain to establish a missing data completion model. Subsequently, the model is converted into an unconstrained optimization problem using the penalty function method, and the gradient descent method is applied to solve it, reconstructing the complete data matrix. Finally, simulation experiments were conducted on three real-world monitoring datasets, comparing the TSTVS with three low-rank methods, Efficient Data Collection Approach (EDCA), Matrix factorization with Smoothness constraints (MFS) and Data Recovery Based on Low Rank and Short-Term Stability(DRLRSS). The experimental results indicate that the proposed TSTVS algorithm consistently outperforms the three low-rank based algorithms in terms of recovery accuracy across different datasets and missing rate scenarios.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101349"},"PeriodicalIF":6.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fair multi-attribute data transaction mechanism supporting cross-chain 支持跨链的公平多属性数据交易机制
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.iot.2024.101339
Kuan Fan , Chaozhi Zhou , Ning Lu , Wenbo Shi , Victor Chang

Reliable storage and high-speed data networks enable individuals to access high-quality Internet of Things (IoT) data for scientific research through global transactions. Blockchain technology provides transparency for institutions to securely store and manage IoT data, while cross-chain transaction mechanisms facilitate the flow of IoT data. However, fairness issues may arise when it comes to cross-chain transactions of IoT data. This paper proposes a mechanism for multi-attribute data transactions to support cross-chain. The solution utilizes Vickrey–Clarke–Groves (VCG) auction, Paillier, Intel SGX, and other technologies to design a secure and equitable data seller selection scheme. The scheme ensures that the selection process for data sellers is both informed and private. Additionally, we generate a key pair for each attribute in the dataset to produce the corresponding attribute data signature. The dataset’s legitimacy is verified through batch verification to ensure that the data seller’s purchased attributes align with their requirements. The exchange of crypto assets and private keys between data sellers and buyers is designed to achieve fair payment. Our research suggests that the scheme meets the necessary security standards, and simulation results confirm its feasibility and effectiveness.

可靠的存储和高速数据网络使个人能够通过全球交易获取用于科学研究的高质量物联网(IoT)数据。区块链技术为机构安全存储和管理物联网数据提供了透明度,而跨链交易机制则促进了物联网数据的流动。然而,物联网数据的跨链交易可能会出现公平性问题。本文提出了一种支持跨链的多属性数据交易机制。该解决方案利用 Vickrey-Clarke-Groves (VCG) auction、Paillier、Intel SGX 等技术设计了一种安全、公平的数据卖方选择方案。该方案确保数据卖方的选择过程既知情又保密。此外,我们还为数据集中的每个属性生成一对密钥,以生成相应的属性数据签名。数据集的合法性通过批量验证进行验证,以确保数据卖方购买的属性符合其要求。数据卖方和买方之间的加密资产和私钥交换旨在实现公平支付。我们的研究表明,该方案符合必要的安全标准,模拟结果也证实了其可行性和有效性。
{"title":"A fair multi-attribute data transaction mechanism supporting cross-chain","authors":"Kuan Fan ,&nbsp;Chaozhi Zhou ,&nbsp;Ning Lu ,&nbsp;Wenbo Shi ,&nbsp;Victor Chang","doi":"10.1016/j.iot.2024.101339","DOIUrl":"10.1016/j.iot.2024.101339","url":null,"abstract":"<div><p>Reliable storage and high-speed data networks enable individuals to access high-quality Internet of Things (IoT) data for scientific research through global transactions. Blockchain technology provides transparency for institutions to securely store and manage IoT data, while cross-chain transaction mechanisms facilitate the flow of IoT data. However, fairness issues may arise when it comes to cross-chain transactions of IoT data. This paper proposes a mechanism for multi-attribute data transactions to support cross-chain. The solution utilizes Vickrey–Clarke–Groves (VCG) auction, Paillier, Intel SGX, and other technologies to design a secure and equitable data seller selection scheme. The scheme ensures that the selection process for data sellers is both informed and private. Additionally, we generate a key pair for each attribute in the dataset to produce the corresponding attribute data signature. The dataset’s legitimacy is verified through batch verification to ensure that the data seller’s purchased attributes align with their requirements. The exchange of crypto assets and private keys between data sellers and buyers is designed to achieve fair payment. Our research suggests that the scheme meets the necessary security standards, and simulation results confirm its feasibility and effectiveness.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101339"},"PeriodicalIF":6.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002804/pdfft?md5=6f20d81b3e138117809153011553ec58&pid=1-s2.0-S2542660524002804-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1