首页 > 最新文献

Internet of Things最新文献

英文 中文
Video streaming on fog and edge computing layers: A systematic mapping study 雾计算和边缘计算层上的视频流:系统映射研究
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.iot.2024.101359
André Luiz S. de Moraes , Douglas D.J. de Macedo , Laércio Pioli Junior
Video streaming has become increasingly dominant in internet traffic and daily applications, significantly influenced by emerging technologies such as autonomous cars, augmented reality, and immersive videos. The computing community has extensively discussed aspects like latency, device power consumption, 5G, and computing. The advent of 6G technology, an emerging communication paradigm beyond existing technologies, promises to revolutionize these areas with enhanced bandwidth, reduced latency, and advanced connectivity features. Fog and Edge Computing environments intensify data generation, control, and analysis at the network edge. Consequently, adopting metrics such as QoE (Quality of Experience) and QoS (Quality of Service) is crucial for developing adaptive streaming services that dynamically adjust video quality based on network conditions. This work systematically maps the literature on video streaming approaches in Fog and Edge Computing that utilize QoS and QoE metrics to evaluate performance in managing Live Streaming and Streaming on Demand. The results highlight the most used metrics and discuss resource management strategies, providing valuable insights for developing new approaches and enhancing existing communication protocols like DASH (Dynamic Adaptive Streaming over HTTP) and HLS (HTTP Live Streaming).
受自动驾驶汽车、增强现实和沉浸式视频等新兴技术的重大影响,视频流在互联网流量和日常应用中的地位日益重要。计算界对延迟、设备功耗、5G 和计算等方面进行了广泛讨论。6G 技术是一种超越现有技术的新兴通信模式,它的出现有望通过增强带宽、减少延迟和先进的连接功能彻底改变这些领域。雾和边缘计算环境加强了网络边缘的数据生成、控制和分析。因此,采用 QoE(体验质量)和 QoS(服务质量)等指标对于开发基于网络条件动态调整视频质量的自适应流媒体服务至关重要。本研究系统地梳理了有关雾计算和边缘计算视频流方法的文献,这些方法利用 QoS 和 QoE 指标来评估管理实时流媒体和按需流媒体的性能。研究结果强调了最常用的指标并讨论了资源管理策略,为开发新方法和增强现有通信协议(如 DASH(HTTP 动态自适应流)和 HLS(HTTP 实时流))提供了宝贵的见解。
{"title":"Video streaming on fog and edge computing layers: A systematic mapping study","authors":"André Luiz S. de Moraes ,&nbsp;Douglas D.J. de Macedo ,&nbsp;Laércio Pioli Junior","doi":"10.1016/j.iot.2024.101359","DOIUrl":"10.1016/j.iot.2024.101359","url":null,"abstract":"<div><div>Video streaming has become increasingly dominant in internet traffic and daily applications, significantly influenced by emerging technologies such as autonomous cars, augmented reality, and immersive videos. The computing community has extensively discussed aspects like latency, device power consumption, 5G, and computing. The advent of 6G technology, an emerging communication paradigm beyond existing technologies, promises to revolutionize these areas with enhanced bandwidth, reduced latency, and advanced connectivity features. Fog and Edge Computing environments intensify data generation, control, and analysis at the network edge. Consequently, adopting metrics such as QoE (Quality of Experience) and QoS (Quality of Service) is crucial for developing adaptive streaming services that dynamically adjust video quality based on network conditions. This work systematically maps the literature on video streaming approaches in Fog and Edge Computing that utilize QoS and QoE metrics to evaluate performance in managing Live Streaming and Streaming on Demand. The results highlight the most used metrics and discuss resource management strategies, providing valuable insights for developing new approaches and enhancing existing communication protocols like DASH (Dynamic Adaptive Streaming over HTTP) and HLS (HTTP Live Streaming).</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101359"},"PeriodicalIF":6.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142310850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical evaluation of feature selection methods for machine learning based intrusion detection in IoT scenarios 物联网场景中基于机器学习的入侵检测特征选择方法的经验评估
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.iot.2024.101367
José García, Jorge Entrena, Álvaro Alesanco
This paper delves into the critical need for enhanced security measures within the Internet of Things (IoT) landscape due to inherent vulnerabilities in IoT devices, rendering them susceptible to various forms of cyber-attacks. The study emphasizes the importance of Intrusion Detection Systems (IDS) for continuous threat monitoring. The objective of this study was to conduct a comprehensive evaluation of feature selection (FS) methods using various machine learning (ML) techniques for classifying traffic flows within datasets containing intrusions in IoT environments. An extensive benchmark analysis of ML techniques and FS methods was performed, assessing feature selection under different approaches including Filter Feature Ranking (FFR), Filter-Feature Subset Selection (FSS), and Wrapper-based Feature Selection (WFS). FS becomes pivotal in handling vast IoT data by reducing irrelevant attributes, addressing the curse of dimensionality, enhancing model interpretability, and optimizing resources in devices with limited capacity. Key findings indicate the outperformance for traffic flows classification of certain tree-based algorithms, such as J48 or PART, against other machine learning techniques (naive Bayes, multi-layer perceptron, logistic, adaptive boosting or k-Nearest Neighbors), showcasing a good balance between performance and execution time. FS methods' advantages and drawbacks are discussed, highlighting the main differences in results obtained among different FS approaches. Filter-feature Subset Selection (FSS) approaches such as CFS could be more suitable than Filter Feature Ranking (FFR), which may select correlated attributes, or than Wrapper-based Feature Selection (WFS) methods, which may tailor attribute subsets for specific ML techniques and have lengthy execution times. In any case, reducing attributes via FS has allowed optimization of classification without compromising accuracy. In this study, F1 score classification results above 0.99, along with a reduction of over 60% in the number of attributes, have been achieved in most experiments conducted across four datasets, both in binary and multiclass modes. This work emphasizes the importance of a balanced attribute selection process, taking into account threat detection capabilities and computational complexity.
由于物联网设备存在固有漏洞,容易受到各种形式的网络攻击,本文深入探讨了在物联网(IoT)领域加强安全措施的迫切需要。研究强调了入侵检测系统(IDS)对持续威胁监控的重要性。本研究的目的是使用各种机器学习(ML)技术对特征选择(FS)方法进行全面评估,以便对包含物联网环境中入侵的数据集中的流量进行分类。对 ML 技术和 FS 方法进行了广泛的基准分析,评估了不同方法下的特征选择,包括过滤特征排序(FFR)、过滤特征子集选择(FSS)和基于封装的特征选择(WFS)。通过减少无关属性、解决维度诅咒、增强模型的可解释性以及优化容量有限的设备资源,FS 在处理海量物联网数据时变得至关重要。主要研究结果表明,与其他机器学习技术(天真贝叶斯、多层感知器、逻辑、自适应提升或 k-近邻)相比,某些基于树的算法(如 J48 或 PART)在交通流分类方面表现更优,在性能和执行时间之间实现了良好的平衡。本文讨论了 FS 方法的优点和缺点,强调了不同 FS 方法在结果上的主要差异。过滤特征子集选择(FSS)方法(如 CFS)可能比过滤特征排序(FFR)或基于封装的特征选择(WFS)方法更适合,前者可能会选择相关的属性,后者可能会为特定的多重层析技术定制属性子集,并且执行时间较长。无论如何,通过 FS 减少属性可以在不影响准确性的情况下优化分类。在这项研究中,在四个数据集上进行的大多数实验中,无论是二分类模式还是多分类模式,F1 分数分类结果都超过了 0.99,同时属性数量减少了 60% 以上。这项工作强调了平衡属性选择过程的重要性,同时考虑到了威胁检测能力和计算复杂性。
{"title":"Empirical evaluation of feature selection methods for machine learning based intrusion detection in IoT scenarios","authors":"José García,&nbsp;Jorge Entrena,&nbsp;Álvaro Alesanco","doi":"10.1016/j.iot.2024.101367","DOIUrl":"10.1016/j.iot.2024.101367","url":null,"abstract":"<div><div>This paper delves into the critical need for enhanced security measures within the Internet of Things (IoT) landscape due to inherent vulnerabilities in IoT devices, rendering them susceptible to various forms of cyber-attacks. The study emphasizes the importance of Intrusion Detection Systems (IDS) for continuous threat monitoring. The objective of this study was to conduct a comprehensive evaluation of feature selection (FS) methods using various machine learning (ML) techniques for classifying traffic flows within datasets containing intrusions in IoT environments. An extensive benchmark analysis of ML techniques and FS methods was performed, assessing feature selection under different approaches including Filter Feature Ranking (FFR), Filter-Feature Subset Selection (FSS), and Wrapper-based Feature Selection (WFS). FS becomes pivotal in handling vast IoT data by reducing irrelevant attributes, addressing the curse of dimensionality, enhancing model interpretability, and optimizing resources in devices with limited capacity. Key findings indicate the outperformance for traffic flows classification of certain tree-based algorithms, such as J48 or PART, against other machine learning techniques (naive Bayes, multi-layer perceptron, logistic, adaptive boosting or k-Nearest Neighbors), showcasing a good balance between performance and execution time. FS methods' advantages and drawbacks are discussed, highlighting the main differences in results obtained among different FS approaches. Filter-feature Subset Selection (FSS) approaches such as CFS could be more suitable than Filter Feature Ranking (FFR), which may select correlated attributes, or than Wrapper-based Feature Selection (WFS) methods, which may tailor attribute subsets for specific ML techniques and have lengthy execution times. In any case, reducing attributes via FS has allowed optimization of classification without compromising accuracy. In this study, F1 score classification results above 0.99, along with a reduction of over 60% in the number of attributes, have been achieved in most experiments conducted across four datasets, both in binary and multiclass modes. This work emphasizes the importance of a balanced attribute selection process, taking into account threat detection capabilities and computational complexity.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101367"},"PeriodicalIF":6.0,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003081/pdfft?md5=2c59c06adc897db3e81bd94a83f7572e&pid=1-s2.0-S2542660524003081-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASAP: A lightweight authenticated secure association protocol for IEEE 802.15.6 based medical BAN ASAP:基于 IEEE 802.15.6 的医疗 BAN 的轻量级认证安全关联协议
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.iot.2024.101363
Walid I. Khedr , Aya Salama , Marwa M. Khashaba , Osama M. Elkomy

Medical Body Area Networks (MBANs), a specialized subset of Wireless Body Area Networks (WBANs), are crucial for enabling medical data collection, processing, and transmission. The IEEE 802.15.6 standard governs these networks but falls short in practical MBAN scenarios. This paper introduces ASAP, a Lightweight Authenticated Secure Association Protocol integrated with IEEE 802.15.6. ASAP prioritizes patient privacy with randomized node ID generation and temporary shared keys, preventing node tracking and privacy violations. It optimizes network performance by consolidating Master Keys (MK), Pairwise Temporal Keys (PTK), and Group Temporal Keys (GTK) creation into a unified process, ensuring the efficiency of the standard four-message association protocol. ASAP enhances security by eliminating the need for pre-shared keys, reducing the attack surface, and improving forward secrecy. The protocol achieves mutual authentication without pre-shared keys or passwords and supports advanced cryptographic algorithms on nodes with limited processing capabilities. Additionally, it imposes connection initiation restrictions, requiring valid certificates for nodes, thereby addressing gaps in IEEE 802.15.6. Formal verification using Verifpal confirms ASAP's resilience against various attacks. Implementation results show ASAP's superiority over standard IEEE 802.15.6 protocols, establishing it as a robust solution for securing MBAN communications in medical environments.

医疗体域网(MBAN)是无线体域网(WBAN)的一个专门子集,对于实现医疗数据的收集、处理和传输至关重要。IEEE 802.15.6 标准对这些网络进行了规范,但在实际 MBAN 应用场景中仍有不足。本文介绍了 ASAP,一种与 IEEE 802.15.6 集成的轻量级认证安全关联协议。ASAP 通过随机化节点 ID 生成和临时共享密钥优先保护患者隐私,防止节点跟踪和隐私侵犯。它将主密钥 (MK)、对时密钥 (PTK) 和组时密钥 (GTK) 的创建合并为一个统一的流程,确保了标准四消息关联协议的效率,从而优化了网络性能。ASAP 无需预共享密钥,减少了攻击面,提高了前向保密性,从而增强了安全性。该协议无需预共享密钥或密码即可实现相互验证,并支持处理能力有限的节点使用高级加密算法。此外,它还施加了连接启动限制,要求节点具有有效证书,从而弥补了 IEEE 802.15.6 的不足。使用 Verifpal 进行的正式验证证实了 ASAP 抵御各种攻击的能力。实施结果表明,ASAP 优于标准 IEEE 802.15.6 协议,是确保医疗环境中 MBAN 通信安全的可靠解决方案。
{"title":"ASAP: A lightweight authenticated secure association protocol for IEEE 802.15.6 based medical BAN","authors":"Walid I. Khedr ,&nbsp;Aya Salama ,&nbsp;Marwa M. Khashaba ,&nbsp;Osama M. Elkomy","doi":"10.1016/j.iot.2024.101363","DOIUrl":"10.1016/j.iot.2024.101363","url":null,"abstract":"<div><p>Medical Body Area Networks (MBANs), a specialized subset of Wireless Body Area Networks (WBANs), are crucial for enabling medical data collection, processing, and transmission. The IEEE 802.15.6 standard governs these networks but falls short in practical MBAN scenarios. This paper introduces ASAP, a Lightweight Authenticated Secure Association Protocol integrated with IEEE 802.15.6. ASAP prioritizes patient privacy with randomized node ID generation and temporary shared keys, preventing node tracking and privacy violations. It optimizes network performance by consolidating Master Keys (MK), Pairwise Temporal Keys (PTK), and Group Temporal Keys (GTK) creation into a unified process, ensuring the efficiency of the standard four-message association protocol. ASAP enhances security by eliminating the need for pre-shared keys, reducing the attack surface, and improving forward secrecy. The protocol achieves mutual authentication without pre-shared keys or passwords and supports advanced cryptographic algorithms on nodes with limited processing capabilities. Additionally, it imposes connection initiation restrictions, requiring valid certificates for nodes, thereby addressing gaps in IEEE 802.15.6. Formal verification using Verifpal confirms ASAP's resilience against various attacks. Implementation results show ASAP's superiority over standard IEEE 802.15.6 protocols, establishing it as a robust solution for securing MBAN communications in medical environments.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101363"},"PeriodicalIF":6.0,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142233832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the boundaries of energy-efficient Wireless Mesh Networks with IEEE 802.11ba 利用 IEEE 802.11ba 探索高能效无线网格网络的边界
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1016/j.iot.2024.101366
Roger Sanchez-Vital, Carles Gomez, Eduard Garcia-Villegas

In traditional IoT applications, energy saving is essential while high bandwidth is not always required. However, a new wave of IoT applications exhibit stricter requirements in terms of bandwidth and latency. Broadband technologies like Wi-Fi could meet such requirements. Nevertheless, these technologies come with limitations: high energy consumption and limited coverage range. In order to address these two shortcomings, and based on the recent IEEE 802.11ba amendment, we propose a Wi-Fi-based mesh architecture where devices are outfitted with a supplementary Wake-up Radio (WuR) interface. According to our analytical and simulation studies, this design maintains latency figures comparable to conventional single-interface networks while significantly reducing energy consumption (by up to almost two orders of magnitude). Additionally, we verify via real device measurements that battery lifetime can be increased by as much as 500% with our approach.

在传统的物联网应用中,节能至关重要,而高带宽并非总是必需的。然而,新一波物联网应用对带宽和延迟提出了更严格的要求。Wi-Fi 等宽带技术可以满足这些要求。不过,这些技术也有局限性:能耗高、覆盖范围有限。为了解决这两个缺点,我们根据最近的 IEEE 802.11ba 修正案,提出了一种基于 Wi-Fi 的网状架构,在这种架构中,设备配备了一个辅助唤醒无线电(WuR)接口。根据我们的分析和仿真研究,这种设计可保持与传统单接口网络相当的延迟数据,同时显著降低能耗(几乎降低了两个数量级)。此外,我们通过实际设备测量验证,采用我们的方法,电池寿命可延长多达 500%。
{"title":"Exploring the boundaries of energy-efficient Wireless Mesh Networks with IEEE 802.11ba","authors":"Roger Sanchez-Vital,&nbsp;Carles Gomez,&nbsp;Eduard Garcia-Villegas","doi":"10.1016/j.iot.2024.101366","DOIUrl":"10.1016/j.iot.2024.101366","url":null,"abstract":"<div><p>In traditional IoT applications, energy saving is essential while high bandwidth is not always required. However, a new wave of IoT applications exhibit stricter requirements in terms of bandwidth and latency. Broadband technologies like Wi-Fi could meet such requirements. Nevertheless, these technologies come with limitations: high energy consumption and limited coverage range. In order to address these two shortcomings, and based on the recent IEEE 802.11ba amendment, we propose a Wi-Fi-based mesh architecture where devices are outfitted with a supplementary Wake-up Radio (WuR) interface. According to our analytical and simulation studies, this design maintains latency figures comparable to conventional single-interface networks while significantly reducing energy consumption (by up to almost two orders of magnitude). Additionally, we verify via real device measurements that battery lifetime can be increased by as much as 500% with our approach.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101366"},"PeriodicalIF":6.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S254266052400307X/pdfft?md5=bb82afe0042ffeccf2459f8320a44178&pid=1-s2.0-S254266052400307X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Multi-Agent Systems and Artificial Intelligence of Things: Technical challenges and gains 多代理系统与人工智能物联网的结合:技术挑战与收益
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.iot.2024.101364
Pedro Hilario Luzolo , Zeina Elrawashdeh , Igor Tchappi , Stéphane Galland , Fatma Outay
<div><p>A Multi-Agent System (MAS) usually refers to a network of autonomous agents that interact with each other to achieve a common objective. This system is therefore composed of several software components or hardware components (agents) that are simpler to construct and manage. Additionally, these agents can dynamically and swiftly adapt to changes in their environment. The MAS proves advantageous in addressing intricate issues by employing the divide-and-conquer approach. It finds application in diverse fields where the emphasis is on distributed computing and control, enabling the development of resilient, adaptable, and scalable systems.</p><p>MAS is not a substitute or rival for Artificial Intelligence (AI). Instead, AI techniques can be integrated within agents to enhance their computational and decision-making capabilities. The diversity or uniformity of goals, actions, domain knowledge, sensor inputs, and outputs among the agents in the MAS can determine whether each agent is heterogeneous or homogeneous.</p><p>The Internet of Things (IoT) and AI are two technologies that have been applied for a long time to the development of smart systems. These systems cover various areas, such as smart cities, energy management, autonomous cars, etc. Smart behavior, autonomy, and real-time monitoring are the fundamental elements that characterize these application areas. The convergence of AI and IoT, known as AIoT, allows these electronic devices to make more intelligent, autonomous, and automatic decisions. This integration leverages the power of MAS to enable intelligent communication and collaboration among various entities, while IoT provides a vast network of interconnected sensors and devices that collect and transmit real-time data. On the other hand, AI algorithms process and analyze these data to derive valuable insights and make informed decisions. The authors devoted their efforts to the critical analysis of AIoT research, highlighting specific areas with insufficient solutions and pointing out gaps for future advances. Essentially, <em>the contribution of the authors is in the formulation of innovative research directions, which outline a clear guide for researchers and professionals in the expansion of knowledge in AIoT integration. The results of the research are significant contributions to the continuous advance of the area, enriching the understanding of the challenges and boosting the development of solutions and strategies in this technological convergence</em>. Eleven research questions are considered at the beginning of the review, including typical research topics and application domains. From the SLR results, the research directions are: (<em>i</em>) Development of a methodology showing how to integrate the different applications independently of the scenarios in which they are deployed. Additionally, elaboration of the tools used in the integration process. (<em>ii</em>) Deployment of an agent in a microprocessor. (<em>iii
多代理系统(MAS)通常是指一个由自主代理组成的网络,这些代理相互影响,以实现共同的目标。因此,这种系统由多个软件组件或硬件组件(代理)组成,构建和管理起来都比较简单。此外,这些代理可以动态、迅速地适应环境的变化。事实证明,通过采用 "分而治之 "的方法,MAS 在解决错综复杂的问题方面具有优势。它可应用于强调分布式计算和控制的各个领域,从而开发出具有弹性、适应性和可扩展性的系统。MAS 并不是人工智能(AI)的替代品或竞争对手,相反,人工智能技术可以集成到代理中,以增强其计算和决策能力。MAS 中各代理之间的目标、行动、领域知识、传感器输入和输出的多样性或统一性可以决定每个代理是异构还是同构。这些系统涉及多个领域,如智慧城市、能源管理、自动驾驶汽车等。智能行为、自主性和实时监控是这些应用领域的基本特征。人工智能与物联网的融合(即 AIoT)使这些电子设备能够做出更加智能、自主和自动的决策。这种融合利用了 MAS 的强大功能,实现了不同实体之间的智能通信与协作,而物联网则提供了一个由相互连接的传感器和设备组成的庞大网络,用于收集和传输实时数据。另一方面,人工智能算法处理和分析这些数据,以获得有价值的见解并做出明智的决策。作者致力于对人工智能物联网研究进行批判性分析,强调了解决方案不足的具体领域,并指出了未来发展的差距。从根本上说,作者的贡献在于提出了创新性的研究方向,为研究人员和专业人员拓展人工智能物联网集成知识勾勒出清晰的指南。研究成果为该领域的持续发展做出了重要贡献,丰富了对挑战的理解,促进了该技术融合领域解决方案和战略的发展。综述开篇考虑了 11 个研究问题,包括典型的研究课题和应用领域。根据 SLR 的结果,研究方向包括(i) 制定一种方法,说明如何将不同的应用系统集成在不同的应用场景中。此外,还要详细说明整合过程中使用的工具。(ii) 在微处理器中部署代理。(iii) 如何实施和连接 MAS 技术与物联网设备(处理器、控制器、传感器和执行器)。
{"title":"Combining Multi-Agent Systems and Artificial Intelligence of Things: Technical challenges and gains","authors":"Pedro Hilario Luzolo ,&nbsp;Zeina Elrawashdeh ,&nbsp;Igor Tchappi ,&nbsp;Stéphane Galland ,&nbsp;Fatma Outay","doi":"10.1016/j.iot.2024.101364","DOIUrl":"10.1016/j.iot.2024.101364","url":null,"abstract":"&lt;div&gt;&lt;p&gt;A Multi-Agent System (MAS) usually refers to a network of autonomous agents that interact with each other to achieve a common objective. This system is therefore composed of several software components or hardware components (agents) that are simpler to construct and manage. Additionally, these agents can dynamically and swiftly adapt to changes in their environment. The MAS proves advantageous in addressing intricate issues by employing the divide-and-conquer approach. It finds application in diverse fields where the emphasis is on distributed computing and control, enabling the development of resilient, adaptable, and scalable systems.&lt;/p&gt;&lt;p&gt;MAS is not a substitute or rival for Artificial Intelligence (AI). Instead, AI techniques can be integrated within agents to enhance their computational and decision-making capabilities. The diversity or uniformity of goals, actions, domain knowledge, sensor inputs, and outputs among the agents in the MAS can determine whether each agent is heterogeneous or homogeneous.&lt;/p&gt;&lt;p&gt;The Internet of Things (IoT) and AI are two technologies that have been applied for a long time to the development of smart systems. These systems cover various areas, such as smart cities, energy management, autonomous cars, etc. Smart behavior, autonomy, and real-time monitoring are the fundamental elements that characterize these application areas. The convergence of AI and IoT, known as AIoT, allows these electronic devices to make more intelligent, autonomous, and automatic decisions. This integration leverages the power of MAS to enable intelligent communication and collaboration among various entities, while IoT provides a vast network of interconnected sensors and devices that collect and transmit real-time data. On the other hand, AI algorithms process and analyze these data to derive valuable insights and make informed decisions. The authors devoted their efforts to the critical analysis of AIoT research, highlighting specific areas with insufficient solutions and pointing out gaps for future advances. Essentially, &lt;em&gt;the contribution of the authors is in the formulation of innovative research directions, which outline a clear guide for researchers and professionals in the expansion of knowledge in AIoT integration. The results of the research are significant contributions to the continuous advance of the area, enriching the understanding of the challenges and boosting the development of solutions and strategies in this technological convergence&lt;/em&gt;. Eleven research questions are considered at the beginning of the review, including typical research topics and application domains. From the SLR results, the research directions are: (&lt;em&gt;i&lt;/em&gt;) Development of a methodology showing how to integrate the different applications independently of the scenarios in which they are deployed. Additionally, elaboration of the tools used in the integration process. (&lt;em&gt;ii&lt;/em&gt;) Deployment of an agent in a microprocessor. (&lt;em&gt;iii","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101364"},"PeriodicalIF":6.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TinyWolf — Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization TinyWolf - 利用增强型灰狼优化技术为物联网提供高效的设备上 TinyML 训练
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.iot.2024.101365
Subhrangshu Adhikary , Subhayu Dutta , Ashutosh Dhar Dwivedi

Training a deep learning model generally requires a huge amount of memory and processing power. Once trained, the learned model can make predictions very fast with very little resource consumption. The learned weights can be fitted into a microcontroller to build affordable embedded intelligence systems which is also known as TinyML. Although few attempts have been made, the limits of the state-of-the-art training of a deep learning model within a microcontroller can be pushed further. Generally deep learning models are trained with gradient optimizers which predict with high accuracy but require a very high amount of resources. On the other hand, nature-inspired meta-heuristic optimizers can be used to build a fast approximation of the model’s optimal solution with low resources. After a rigorous test, we have found that Grey Wolf Optimizer can be modified for enhanced uses of main memory, paging and swap space among α,β,δ and ω wolves. This modification saved up to 71% memory requirements compared to gradient optimizers. We have used this modification to train the TinyML model within a microcontroller of 256KB RAM. The performances of the proposed framework have been meticulously benchmarked on 13 open-sourced datasets.

训练深度学习模型通常需要大量内存和处理能力。一旦经过训练,所学模型就能以极低的资源消耗快速做出预测。学习到的权重可以安装到微控制器中,从而构建出经济实惠的嵌入式智能系统,这也被称为 TinyML。虽然已经进行了一些尝试,但在微控制器中训练深度学习模型的最新技术极限还可以进一步提高。一般来说,深度学习模型是通过梯度优化器进行训练的,这种方法预测准确率高,但需要大量资源。另一方面,受自然启发的元启发式优化器可用于以较低的资源建立模型最优解的快速近似值。经过严格测试,我们发现灰狼优化器可以进行修改,以提高α、β、δ和ω狼的主内存、分页和交换空间的使用率。与梯度优化器相比,这种修改最多可节省 71% 的内存需求。我们利用这一修改在 256KB RAM 的微控制器中训练 TinyML 模型。我们在 13 个开源数据集上对拟议框架的性能进行了细致的基准测试。
{"title":"TinyWolf — Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization","authors":"Subhrangshu Adhikary ,&nbsp;Subhayu Dutta ,&nbsp;Ashutosh Dhar Dwivedi","doi":"10.1016/j.iot.2024.101365","DOIUrl":"10.1016/j.iot.2024.101365","url":null,"abstract":"<div><p>Training a deep learning model generally requires a huge amount of memory and processing power. Once trained, the learned model can make predictions very fast with very little resource consumption. The learned weights can be fitted into a microcontroller to build affordable embedded intelligence systems which is also known as TinyML. Although few attempts have been made, the limits of the state-of-the-art training of a deep learning model within a microcontroller can be pushed further. Generally deep learning models are trained with gradient optimizers which predict with high accuracy but require a very high amount of resources. On the other hand, nature-inspired meta-heuristic optimizers can be used to build a fast approximation of the model’s optimal solution with low resources. After a rigorous test, we have found that Grey Wolf Optimizer can be modified for enhanced uses of main memory, paging and swap space among <span><math><mrow><mi>α</mi><mo>,</mo><mspace></mspace><mi>β</mi><mo>,</mo><mspace></mspace><mi>δ</mi></mrow></math></span> and <span><math><mi>ω</mi></math></span> wolves. This modification saved up to 71% memory requirements compared to gradient optimizers. We have used this modification to train the TinyML model within a microcontroller of 256KB RAM. The performances of the proposed framework have been meticulously benchmarked on 13 open-sourced datasets.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101365"},"PeriodicalIF":6.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003068/pdfft?md5=ab42e32e095597b7bee6c567498b913a&pid=1-s2.0-S2542660524003068-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles DISFIDA:为健康物联网和车联网提供在线学习的分布式自监督联合入侵检测算法
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1016/j.iot.2024.101340
Erol Gelenbe , Baran Can Gül , Mert Nakıp

Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.

联网医疗系统经常成为网络攻击的受害者,给患者和医疗成本带来严重后果,而物联网(IoT)则是另一个主要攻击目标。我们可以想象,在未来的系统中,车联网(IoV)也将被用于运送病人,以进行综合诊断和治疗。因此,医疗领域面临着非常重大和特殊的挑战,因为即使是一个病人,也可能有多家医疗服务提供商进行检测或提供医疗服务,并且可能有不同的互联分包商提供服务,如救护车和联网汽车、联网设备或临时人员提供商,这些服务提供商除了可能存在商业竞争外,还具有不同的保密要求。另一方面,这些不同的实体可能会受到类似或协调的攻击,可以从彼此的网络安全经验中获益,从而更好地检测和缓解网络攻击。因此,本研究提出了一种新颖的分布式自监督联合入侵检测算法(DISFIDA),该算法使用密集随机神经网络(DRNN)进行在线自监督联合学习。在 DISFIDA 中,学习数据是私有的,神经元权重由联盟伙伴共享。DISFIDA 中的每个伙伴都会将自己的突触权重与其他伙伴收到的权重结合起来,并优先选择那些与自己的权重数值更接近的权重,因为这些权重是自己学习的。DISFIDA 利用三个开放数据集与五种基准方法进行了测试,涉及两个相关的物联网医疗应用:设备网络(如人体传感器)和互联智能车辆(如运送病人的救护车)。这些测试表明,DISFIDA 方法对攻击的真阳性率为 100%(比达到 99% 的同类先进方法高出一个百分点),因此在检测攻击方面表现更佳,对分布式拒绝服务 (DDoS) 攻击的真阴性率为 99%,与最先进的联合学习方法类似。
{"title":"DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles","authors":"Erol Gelenbe ,&nbsp;Baran Can Gül ,&nbsp;Mert Nakıp","doi":"10.1016/j.iot.2024.101340","DOIUrl":"10.1016/j.iot.2024.101340","url":null,"abstract":"<div><p>Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101340"},"PeriodicalIF":6.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002816/pdfft?md5=3f8cac47e530cac8c010a7b776652d64&pid=1-s2.0-S2542660524002816-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained vulnerability detection for medical sensor systems 医疗传感器系统的细粒度漏洞检测
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.iot.2024.101362
Le Sun , Yueyuan Wang , Huiyun Li , Ghulam Muhammad

The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.

物联网(IoT)通过将医疗传感器连接到互联网,彻底改变了医疗系统,同时也对医疗传感器网络(MSN)的安全性提出了挑战。鉴于医疗数据的极端敏感性,任何漏洞都可能导致数据泄露和滥用,影响患者的安全和隐私。因此,保障 MSN 安全至关重要。由于医疗传感器设备依赖智能医疗软件系统进行数据管理和通信,因此精确检测系统代码漏洞对确保网络安全至关重要。有效的软件漏洞检测有两个关键目标:(i) 实现高精确度;(ii) 直接识别有漏洞的代码行,以便开发人员进行修复。为了应对这些挑战,我们引入了 Vulcoder,这是一种新颖的以漏洞为导向的编码器驱动模型,基于双向编码器表示变换器(BERT)架构。我们提出了一种一对一的映射功能,通过抽象语法树(AST)来捕捉代码语义。Vulcoder 与多头关注相结合,实现了对 MSN 中软件漏洞的函数级和行级精确检测。这加快了漏洞修复过程,从而加强了网络安全。各种数据集的实验结果表明,Vulcoder 在识别 MSN 中的漏洞方面优于之前的模型。具体来说,它在函数级预测 F1 分数上提高了 1%-419%,在行级定位精度上提高了 12.5%-380%。因此,Vulcoder 有助于加强 MSN 的安全防御和保护患者隐私,促进智能医疗的发展。
{"title":"Fine-grained vulnerability detection for medical sensor systems","authors":"Le Sun ,&nbsp;Yueyuan Wang ,&nbsp;Huiyun Li ,&nbsp;Ghulam Muhammad","doi":"10.1016/j.iot.2024.101362","DOIUrl":"10.1016/j.iot.2024.101362","url":null,"abstract":"<div><p>The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101362"},"PeriodicalIF":6.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003032/pdfft?md5=ec517a1daef40dd544058b39166a1eae&pid=1-s2.0-S2542660524003032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques 加强机器人物联网的安全性:利用加密和区块链技术回顾近期趋势、做法和建议
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101357
Ehsanul Islam Zafir , Afifa Akter , M.N. Islam , Shahid A. Hasib , Touhid Islam , Subrata K. Sarker , S.M. Muyeen

The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.

机器人物联网(IoRT)集成了机器人和自主设备,改变了制造、医疗保健和运输等行业。然而,IoRT 系统中的安全漏洞给数据隐私和系统完整性带来了巨大挑战。为了解决这些问题,加密对于保护设备间传输的敏感数据至关重要。通过将数据转换为密文,加密可确保数据的保密性和完整性,降低未经授权访问和数据泄露的风险。区块链技术还能提供去中心化、防篡改的数据存储解决方案,从而增强 IoRT 的安全性。本文旨在通过提供全面的见解、实用的建议和未来的发展方向,推动互联机器人系统安全知识和实践的进步,从而确保 IoRT 生态系统内数据交换的完整性和保密性。通过对加密的要求、范围和当前在物联网中的实施情况进行深入研究,本文为参与物联网安全工作的研究人员、工程师和决策者提供了有价值的见解。通过将加密和区块链技术整合到物联网系统中,利益相关者可以营造一个安全可靠的环境,有效管理风险,增强用户信心,并加快物联网在各行各业的广泛应用。本研究的结论强调了加密和区块链技术在增强物联网安全方面的关键作用,并突出了进一步探索和创新的潜在途径。此外,本文还提出了未来的研究领域,如威胁情报和分析、安全设计、多因素身份验证和用于威胁检测的人工智能。这些建议有助于不断创新,确保不断发展的物联网技术安全。
{"title":"Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques","authors":"Ehsanul Islam Zafir ,&nbsp;Afifa Akter ,&nbsp;M.N. Islam ,&nbsp;Shahid A. Hasib ,&nbsp;Touhid Islam ,&nbsp;Subrata K. Sarker ,&nbsp;S.M. Muyeen","doi":"10.1016/j.iot.2024.101357","DOIUrl":"10.1016/j.iot.2024.101357","url":null,"abstract":"<div><p>The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101357"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002981/pdfft?md5=a4332066960a6d42faa3e5a09581d2cb&pid=1-s2.0-S2542660524002981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks CLARA:基于集群的节点关联,用于传感器网络中的采样率适应和容错
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101345
Hassan Harb , Clara Abou Nader , Ali Jaber , Mourad Hakem , Jean-Claude Charr , Chady Abou Jaoude , Chamseddine Zaki

Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.

近来,无线传感器网络(WSN)已被证明是监测各种应用的高效、低成本解决方案。然而,传感器节点收集和传输的大量数据(大多是冗余数据)会迅速消耗其有限的电池电量,而电池电量有时很难更换或充电。尽管研究人员为解决这一问题做出了巨大努力,但提出的大多数技术都存在精度和复杂性问题,不适合资源有限的传感器。因此,设计新的数据缩减技术来减少在此类网络中收集的原始数据,对延长其使用寿命至关重要。在本文中,我们提出了一种基于集群的节点相关性的采样率适应和故障容忍机制,简称 CLARA,专门用于周期性传感器网络应用。CLARA 主要分为两个阶段:节点关联和容错。第一阶段引入一种数据聚类方法,旨在搜索相邻节点之间的相关性。然后,它相应地调整节点的传感频率,以减少此类网络中收集的数据量,同时保持信息汇的信息完整性。在第二阶段,我们提出了一个容错模型,允许汇根据移动平均(MA)和指数平滑(ES)两种方法重新生成原始传感器数据。我们通过模拟和实验证明了我们技术的效率。获得的最佳结果表明,第一阶段可以降低传感器采样率,从而降低传感器能耗达 64%,而第二阶段可以准确地再生原始数据,误差损失小于 0.15。
{"title":"CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks","authors":"Hassan Harb ,&nbsp;Clara Abou Nader ,&nbsp;Ali Jaber ,&nbsp;Mourad Hakem ,&nbsp;Jean-Claude Charr ,&nbsp;Chady Abou Jaoude ,&nbsp;Chamseddine Zaki","doi":"10.1016/j.iot.2024.101345","DOIUrl":"10.1016/j.iot.2024.101345","url":null,"abstract":"<div><p>Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101345"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1