首页 > 最新文献

Internet of Things最新文献

英文 中文
GeMID: Generalizable models for IoT device identification GeMID:物联网设备识别的通用模型
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101806
Kahraman Kostas , Rabia Yasa Kostas , Mike Just , Michael A. Lones
With the proliferation of devices on the Internet of Things (IoT), ensuring their security has become paramount. Device identification (DI), which distinguishes IoT devices based on their traffic patterns, plays a crucial role in both differentiating devices and identifying vulnerable ones, closing a serious security gap. However, existing approaches to DI that build machine learning models often overlook the challenge of model generalizability across diverse network environments. In this study, we propose a novel framework to address this limitation and to evaluate the generalizability of DI models across data sets collected within different network environments. Our approach involves a two-step process: first, we develop a feature and model selection method that is more robust to generalization issues by using a genetic algorithm with external feedback and datasets from distinct environments to refine the selections. Second, the resulting DI models are then tested on further independent datasets to robustly assess their generalizability. We demonstrate the effectiveness of our method by empirically comparing it to alternatives, highlighting how fundamental limitations of commonly employed techniques such as sliding window and flow statistics limit their generalizability. Moreover, we show that statistical methods, widely used in the literature, are unreliable for device identification due to their dependence on network-specific characteristics rather than device-intrinsic properties, challenging the validity of a significant portion of existing research. Our findings advance research in IoT security and device identification, offering insight into improving model effectiveness and mitigating risks in IoT networks.
随着物联网(IoT)上设备的激增,确保其安全性变得至关重要。设备识别(DI)是一种基于物联网设备的流量模式来区分物联网设备的技术,在区分设备和识别易受攻击的设备方面发挥着至关重要的作用,弥补了严重的安全漏洞。然而,构建机器学习模型的现有DI方法往往忽略了在不同网络环境中模型泛化的挑战。在本研究中,我们提出了一个新的框架来解决这一限制,并评估在不同网络环境中收集的数据集之间的DI模型的泛化性。我们的方法包括两个步骤:首先,我们开发了一种特征和模型选择方法,该方法通过使用带有外部反馈和来自不同环境的数据集的遗传算法来改进选择,从而对泛化问题更具鲁棒性。其次,然后在进一步的独立数据集上测试所得的DI模型,以稳健地评估其泛化性。通过经验比较,我们证明了方法的有效性,强调了常用技术(如滑动窗口和流量统计)的基本局限性如何限制了它们的通用性。此外,我们表明,在文献中广泛使用的统计方法对于设备识别是不可靠的,因为它们依赖于网络特定特征而不是设备固有属性,这挑战了现有研究的很大一部分的有效性。我们的研究结果推动了物联网安全和设备识别的研究,为提高模型有效性和降低物联网网络风险提供了见解。
{"title":"GeMID: Generalizable models for IoT device identification","authors":"Kahraman Kostas ,&nbsp;Rabia Yasa Kostas ,&nbsp;Mike Just ,&nbsp;Michael A. Lones","doi":"10.1016/j.iot.2025.101806","DOIUrl":"10.1016/j.iot.2025.101806","url":null,"abstract":"<div><div>With the proliferation of devices on the Internet of Things (IoT), ensuring their security has become paramount. Device identification (DI), which distinguishes IoT devices based on their traffic patterns, plays a crucial role in both differentiating devices and identifying vulnerable ones, closing a serious security gap. However, existing approaches to DI that build machine learning models often overlook the challenge of model generalizability across diverse network environments. In this study, we propose a novel framework to address this limitation and to evaluate the generalizability of DI models across data sets collected within different network environments. Our approach involves a two-step process: first, we develop a feature and model selection method that is more robust to generalization issues by using a genetic algorithm with external feedback and datasets from distinct environments to refine the selections. Second, the resulting DI models are then tested on further independent datasets to robustly assess their generalizability. We demonstrate the effectiveness of our method by empirically comparing it to alternatives, highlighting how fundamental limitations of commonly employed techniques such as sliding window and flow statistics limit their generalizability. Moreover, we show that statistical methods, widely used in the literature, are unreliable for device identification due to their dependence on network-specific characteristics rather than device-intrinsic properties, challenging the validity of a significant portion of existing research. Our findings advance research in IoT security and device identification, offering insight into improving model effectiveness and mitigating risks in IoT networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101806"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software engineering in IoT: Insights from a survey of 361 experts 物联网中的软件工程:来自361位专家调查的见解
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101805
Maura Cerioli, Maurizio Leotta, Gianna Reggio
The Internet of Things (IoT) has rapidly integrated into almost every aspect of daily life. The exponential growth in connected devices has established IoT as a critical component in various domains, including industrial automation, building management, healthcare, transportation, and logistics. These complex systems combine digital and physical elements distributed across networks from the Edge to the Cloud, supporting real-time decision-making and automation. Software plays a fundamental role in IoT systems, underpinning every layer from sensor firmware to cloud infrastructure, and is essential for the design, development, and maintenance of robust and scalable IoT solutions. Effective Software Engineering (SE) practices are vital to meeting these systems’ diverse and evolving demands. This study aims to gain a detailed understanding of IoT system development, focusing on identifying prevalent software technologies, adopted SE practices, and IoT-specific approaches. We also seek to explore the challenges and needs faced by SE experts in this field. To achieve this, we conducted a survey gathering insights directly from 361 IoT practitioners and experts across 53 countries. This diverse participation provided a comprehensive view of IoT systems, offering valuable insights into current practices and future trends in the industry.
物联网(IoT)已经迅速融入人们日常生活的方方面面。连接设备的指数级增长使物联网成为工业自动化、楼宇管理、医疗保健、运输和物流等各个领域的关键组成部分。这些复杂的系统结合了分布在从边缘到云的网络上的数字和物理元素,支持实时决策和自动化。软件在物联网系统中起着至关重要的作用,支撑着从传感器固件到云基础设施的每一层,对于设计、开发和维护强大且可扩展的物联网解决方案至关重要。有效的软件工程(SE)实践对于满足这些系统的多样化和不断发展的需求至关重要。本研究旨在详细了解物联网系统开发,重点是确定流行的软件技术,采用的SE实践和物联网特定方法。我们也会探讨东南专家在这个领域所面临的挑战和需求。为了实现这一目标,我们进行了一项调查,直接收集了来自53个国家的361名物联网从业者和专家的见解。这种多样化的参与提供了物联网系统的全面视图,为行业的当前实践和未来趋势提供了有价值的见解。
{"title":"Software engineering in IoT: Insights from a survey of 361 experts","authors":"Maura Cerioli,&nbsp;Maurizio Leotta,&nbsp;Gianna Reggio","doi":"10.1016/j.iot.2025.101805","DOIUrl":"10.1016/j.iot.2025.101805","url":null,"abstract":"<div><div>The Internet of Things (IoT) has rapidly integrated into almost every aspect of daily life. The exponential growth in connected devices has established IoT as a critical component in various domains, including industrial automation, building management, healthcare, transportation, and logistics. These complex systems combine digital and physical elements distributed across networks from the Edge to the Cloud, supporting real-time decision-making and automation. Software plays a fundamental role in IoT systems, underpinning every layer from sensor firmware to cloud infrastructure, and is essential for the design, development, and maintenance of robust and scalable IoT solutions. Effective Software Engineering (SE) practices are vital to meeting these systems’ diverse and evolving demands. This study aims to gain a detailed understanding of IoT system development, focusing on identifying prevalent software technologies, adopted SE practices, and IoT-specific approaches. We also seek to explore the challenges and needs faced by SE experts in this field. To achieve this, we conducted a survey gathering insights directly from 361 IoT practitioners and experts across 53 countries. This diverse participation provided a comprehensive view of IoT systems, offering valuable insights into current practices and future trends in the industry.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101805"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SB-WRW: Balancing fairness and security in IoT-adapted tip selection for the tangle SB-WRW:平衡物联网缠结的公平和安全性
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101819
Imen Ahmed , Mariem Turki , Mouna Baklouti , Bouthaina Dammak
IOTA (Internet Of Things Application) is an innovative Distributed Ledger Technology (DLT) that operates on a unique Directed Acyclic Graph (DAG) architecture called the Tangle. Particularly proposed for the Internet of Things (IoT) ecosystem, IOTA technology aims to address the limitations of Blockchain in terms of scalability, energy efficiency, and transaction cost. Unlike blockchain’s linear structure, the Tangle processes transactions asynchronously, requiring each new transaction to validate two prior ones via a Tip Selection Algorithm (TSA). While the widely adopted Weighted Random Walk (WRW) TSA balances efficiency and decentralization, it suffers from persistent “Permanent Tips” (PT), unconfirmed transactions that degrade network stability, a critical concern for IoT applications. This paper introduces Sector-Based Weighted Random Walk (SB-WRW), an optimized TSA that integrates node localization with WRW’s cumulative weight criteria to mitigate permanent tips. By partitioning the network into geographic sectors and prioritizing tip selection within localized regions, SB-WRW reduces orphaned transactions while preserving WRW’s benefits. Extensive simulations demonstrate that SB-WRW significantly enhances ledger stability and reduces the accumulation of permanent tips by 90 % compared to baseline WRW. It achieves this improvement without compromising average confirmation times.
IOTA(物联网应用)是一种创新的分布式账本技术(DLT),它在一种名为Tangle的独特有向无环图(DAG)架构上运行。IOTA技术特别针对物联网(IoT)生态系统提出,旨在解决区块链在可扩展性、能源效率和交易成本方面的局限性。与b区块链的线性结构不同,Tangle异步处理事务,要求每个新事务通过Tip Selection Algorithm (TSA)验证两个先前的事务。虽然被广泛采用的加权随机漫步(WRW) TSA平衡了效率和去中心化,但它受到持续的“永久提示”(PT)的影响,未经确认的交易会降低网络稳定性,这是物联网应用的一个关键问题。本文介绍了基于扇区的加权随机漫步(SB-WRW),这是一种优化的TSA,它将节点定位与WRW的累积权重标准相结合,以减少永久性提示。通过将网络划分为地理区域并在局部区域内优先选择提示,SB-WRW减少了孤立交易,同时保留了WRW的好处。广泛的模拟表明,与基线WRW相比,SB-WRW显著提高了分类账的稳定性,并将永久提示的积累减少了90%。它在不影响平均确认时间的情况下实现了这种改进。
{"title":"SB-WRW: Balancing fairness and security in IoT-adapted tip selection for the tangle","authors":"Imen Ahmed ,&nbsp;Mariem Turki ,&nbsp;Mouna Baklouti ,&nbsp;Bouthaina Dammak","doi":"10.1016/j.iot.2025.101819","DOIUrl":"10.1016/j.iot.2025.101819","url":null,"abstract":"<div><div>IOTA (Internet Of Things Application) is an innovative Distributed Ledger Technology (DLT) that operates on a unique Directed Acyclic Graph (DAG) architecture called the Tangle. Particularly proposed for the Internet of Things (IoT) ecosystem, IOTA technology aims to address the limitations of Blockchain in terms of scalability, energy efficiency, and transaction cost. Unlike blockchain’s linear structure, the Tangle processes transactions asynchronously, requiring each new transaction to validate two prior ones via a Tip Selection Algorithm (TSA). While the widely adopted Weighted Random Walk (WRW) TSA balances efficiency and decentralization, it suffers from persistent “Permanent Tips” (PT), unconfirmed transactions that degrade network stability, a critical concern for IoT applications. This paper introduces Sector-Based Weighted Random Walk (SB-WRW), an optimized TSA that integrates node localization with WRW’s cumulative weight criteria to mitigate permanent tips. By partitioning the network into geographic sectors and prioritizing tip selection within localized regions, SB-WRW reduces orphaned transactions while preserving WRW’s benefits. Extensive simulations demonstrate that SB-WRW significantly enhances ledger stability and reduces the accumulation of permanent tips by 90 % compared to baseline WRW. It achieves this improvement without compromising average confirmation times.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101819"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145519941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLAP: Cooperative learning through partial model exchange for heterogeneous wireless sensor networks 基于部分模型交换的异构无线传感器网络合作学习
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101817
Joannes Sam Mertens , Laura Galluccio , Giacomo Morabito
In the recent past there has been an increasing interest in the execution of Machine Learning (ML) in resource-constrained devices, for example in wireless sensor networks (WSNs). In such a context, the development of cooperative learning protocols has gained considerable attention for its privacy-preserving and communication-efficient capabilities. However, the application of such cooperative learning techniques presents some criticalities in wireless sensor networks, especially when there is diversity in ML tasks to be executed or in the type of data collected by sensors. In this paper, we propose a cooperative learning algorithm called CLAP that partitions the neural network into layers specific of the type of data collected by the sensors and layers specific of the ML task executed. Furthermore, in CLAP a WSN setting is considered where certain nodes can perform both training and inference, while others can only perform inference, due to intrinsic differences in hardware and processing capabilities. To take such heterogeneity into account, CLAP employs a clustering strategy in which Cluster Heads are nodes with large computing resources and long-range communication radios, whereas Cluster Members are low capability nodes with short-range radios. CLAP performs a cooperative learning algorithm where only parts of the ML model parameters are exchanged, so improving communication efficiency and privacy. Numerical results assess the effectiveness of the proposed approach.
最近,人们对在资源受限的设备中执行机器学习(ML)越来越感兴趣,例如在无线传感器网络(wsn)中。在这样的背景下,合作学习协议的发展因其隐私保护和高效通信的能力而获得了相当大的关注。然而,这种合作学习技术的应用在无线传感器网络中提出了一些关键问题,特别是当要执行的机器学习任务或传感器收集的数据类型存在多样性时。在本文中,我们提出了一种称为CLAP的合作学习算法,该算法将神经网络划分为特定于传感器收集的数据类型的层和特定于执行的ML任务的层。此外,由于硬件和处理能力的内在差异,在CLAP中考虑了WSN设置,其中某些节点可以执行训练和推理,而其他节点只能执行推理。为了考虑到这种异构性,CLAP采用了一种集群策略,其中簇头是具有大量计算资源和远程通信无线电的节点,而簇成员是具有短程无线电的低能力节点。CLAP采用合作学习算法,只交换部分ML模型参数,从而提高了通信效率和隐私性。数值结果验证了该方法的有效性。
{"title":"CLAP: Cooperative learning through partial model exchange for heterogeneous wireless sensor networks","authors":"Joannes Sam Mertens ,&nbsp;Laura Galluccio ,&nbsp;Giacomo Morabito","doi":"10.1016/j.iot.2025.101817","DOIUrl":"10.1016/j.iot.2025.101817","url":null,"abstract":"<div><div>In the recent past there has been an increasing interest in the execution of Machine Learning (ML) in resource-constrained devices, for example in <em>wireless sensor networks</em> (WSNs). In such a context, the development of cooperative learning protocols has gained considerable attention for its privacy-preserving and communication-efficient capabilities. However, the application of such cooperative learning techniques presents some criticalities in wireless sensor networks, especially when there is diversity in ML tasks to be executed or in the type of data collected by sensors. In this paper, we propose a cooperative learning algorithm called <em>CLAP</em> that partitions the neural network into layers specific of the type of data collected by the sensors and layers specific of the ML task executed. Furthermore, in CLAP a WSN setting is considered where certain nodes can perform both training and inference, while others can only perform inference, due to intrinsic differences in hardware and processing capabilities. To take such heterogeneity into account, <em>CLAP</em> employs a clustering strategy in which Cluster Heads are nodes with large computing resources and long-range communication radios, whereas Cluster Members are low capability nodes with short-range radios. CLAP performs a cooperative learning algorithm where only parts of the ML model parameters are exchanged, so improving communication efficiency and privacy. Numerical results assess the effectiveness of the proposed approach.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101817"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy solutions in intelligent transportation systems: A survey 智能交通系统中的安全和隐私解决方案:一项调查
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101812
Ujunwa Madububambachu , Rabeea Fatima , Ahmed Sherif , Kasem Khalil
In recent years, the automotive industry has experienced a digital revolution, with vehicles increasingly equipped with computer systems, transitioning from purely mechanical machines to sophisticated autonomous entities. This evolution extends beyond individual vehicles to encompass Intelligent Transportation Systems (ITS), fundamentally altering transportation networks. While these advancements promise enhanced efficiency, safety, and travel experience, they also introduce new challenges, particularly in security and privacy. For example, AI-based systems are now used for real-time congestion prediction, allowing for optimized traffic flow; and predictive car maintenance, minimizing breakdowns and enhancing safety. However, these systems can be vulnerable to cyberattacks and data breaches. Integrating diverse technologies into transportation systems offers undeniable benefits, but it also has vulnerabilities that are susceptible to exploitation by malicious actors. To address these concerns, a robust and privacy-conscious framework for ITS security is paramount. This paper provides a comprehensive overview of the current state of ITS research, focusing on security and privacy solutions. It proposes a taxonomy of security and privacy solutions, discusses challenges, and identifies future research directions to empower engineers and researchers in enhancing ITS security.
近年来,汽车行业经历了一场数字革命,汽车越来越多地配备了计算机系统,从纯粹的机械机器过渡到复杂的自主实体。这种演变超越了单个车辆,涵盖了智能交通系统(ITS),从根本上改变了交通网络。虽然这些进步有望提高效率、安全性和旅行体验,但它们也带来了新的挑战,特别是在安全和隐私方面。例如,基于人工智能的系统现在用于实时拥堵预测,从而优化交通流量;预测性汽车维护,最大限度地减少故障,提高安全性。然而,这些系统可能容易受到网络攻击和数据泄露。将各种技术集成到交通系统中带来了不可否认的好处,但它也存在容易被恶意行为者利用的漏洞。为了解决这些问题,一个强大的、注重隐私的智能交通安全框架至关重要。本文全面概述了ITS的研究现状,重点介绍了安全和隐私解决方案。它提出了安全和隐私解决方案的分类,讨论了挑战,并确定了未来的研究方向,以授权工程师和研究人员增强ITS安全性。
{"title":"Security and privacy solutions in intelligent transportation systems: A survey","authors":"Ujunwa Madububambachu ,&nbsp;Rabeea Fatima ,&nbsp;Ahmed Sherif ,&nbsp;Kasem Khalil","doi":"10.1016/j.iot.2025.101812","DOIUrl":"10.1016/j.iot.2025.101812","url":null,"abstract":"<div><div>In recent years, the automotive industry has experienced a digital revolution, with vehicles increasingly equipped with computer systems, transitioning from purely mechanical machines to sophisticated autonomous entities. This evolution extends beyond individual vehicles to encompass Intelligent Transportation Systems (ITS), fundamentally altering transportation networks. While these advancements promise enhanced efficiency, safety, and travel experience, they also introduce new challenges, particularly in security and privacy. For example, AI-based systems are now used for real-time congestion prediction, allowing for optimized traffic flow; and predictive car maintenance, minimizing breakdowns and enhancing safety. However, these systems can be vulnerable to cyberattacks and data breaches. Integrating diverse technologies into transportation systems offers undeniable benefits, but it also has vulnerabilities that are susceptible to exploitation by malicious actors. To address these concerns, a robust and privacy-conscious framework for ITS security is paramount. This paper provides a comprehensive overview of the current state of ITS research, focusing on security and privacy solutions. It proposes a taxonomy of security and privacy solutions, discusses challenges, and identifies future research directions to empower engineers and researchers in enhancing ITS security.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101812"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing computation and security in MEC-Aided IoT for medical imaging with QCNNs and post-Quantum cryptography 利用qcnn和后量子密码增强mec辅助物联网医疗成像的计算和安全性
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101810
P. Suman Prakash , P. Kiran Rao , T. Gokaramaiah , Surbhi B. B․ Khan , Mohammad Alojail , Mohammad Shabaz
Efficient optimization of computational resources in Mobile Edge Computing (MEC)-enabled Internet of Things (IoT) environments is critical for enhancing energy efficiency and minimizing latency. This research focuses on medical image analysis, specifically kidney tumor segmentation using CT scan images from the KiTS19 dataset. To address the challenges of high computational demands and complex feature extraction, we propose an integrated framework that combines two advanced technologies: quantum-inspired operations implemented through classical simulation along with a Residual U-Net architecture for improved computation and post-quantum cryptography for robust security. The quantum-inspired neural network design leverages principles from quantum computing to create classical algorithms that boost computational efficiency, enabling faster and more accurate segmentation of medical images within resource-constrained IoT environments. Additionally, the framework employs a quantum-inspired Double Deep Reinforcement Learning (QiDDRL) strategy to dynamically optimize resource allocation, further enhancing segmentation accuracy while reducing latency. To safeguard data transmission between IoT devices and MEC servers, the system incorporates post-quantum cryptographic techniques-specifically Kyber for encryption and Dilithium for digital signatures-providing resistance against potential quantum-computing attacks. The proposed approach achieves 98 % segmentation accuracy on the KiTS19 dataset while addressing deep learning challenges such as the vanishing gradient problem, resulting in stable model performance. Overall, this combination of quantum-inspired computing and reinforcement learning with post-quantum cryptographic protection demonstrates the potential for secure and efficient medical image analysis in IoT environments, contributing to improved diagnostics and treatment planning in resource- and security-constrained healthcare settings.
在支持移动边缘计算(MEC)的物联网(IoT)环境中,高效优化计算资源对于提高能源效率和最小化延迟至关重要。本研究的重点是医学图像分析,特别是使用KiTS19数据集的CT扫描图像进行肾脏肿瘤分割。为了应对高计算需求和复杂特征提取的挑战,我们提出了一个集成框架,该框架结合了两种先进技术:通过经典模拟实现的量子启发操作,以及用于改进计算的残余U-Net架构和用于鲁棒安全性的后量子加密。受量子启发的神经网络设计利用量子计算原理创建经典算法,提高计算效率,在资源受限的物联网环境中实现更快、更准确的医学图像分割。此外,该框架采用量子启发的双深度强化学习(QiDDRL)策略来动态优化资源分配,进一步提高分割精度,同时减少延迟。为了保护物联网设备和MEC服务器之间的数据传输,该系统结合了后量子加密技术——特别是用于加密的Kyber和用于数字签名的Dilithium——提供对潜在量子计算攻击的抵抗。该方法在解决梯度消失等深度学习难题的同时,在KiTS19数据集上实现了98%的分割准确率,使模型性能稳定。总体而言,这种量子启发的计算和强化学习与后量子加密保护的结合展示了在物联网环境中安全高效的医学图像分析的潜力,有助于在资源和安全受限的医疗保健环境中改进诊断和治疗计划。
{"title":"Enhancing computation and security in MEC-Aided IoT for medical imaging with QCNNs and post-Quantum cryptography","authors":"P. Suman Prakash ,&nbsp;P. Kiran Rao ,&nbsp;T. Gokaramaiah ,&nbsp;Surbhi B. B․ Khan ,&nbsp;Mohammad Alojail ,&nbsp;Mohammad Shabaz","doi":"10.1016/j.iot.2025.101810","DOIUrl":"10.1016/j.iot.2025.101810","url":null,"abstract":"<div><div>Efficient optimization of computational resources in Mobile Edge Computing (MEC)-enabled Internet of Things (IoT) environments is critical for enhancing energy efficiency and minimizing latency. This research focuses on medical image analysis, specifically kidney tumor segmentation using CT scan images from the KiTS19 dataset. To address the challenges of high computational demands and complex feature extraction, we propose an integrated framework that combines two advanced technologies: quantum-inspired operations implemented through classical simulation along with a Residual U-Net architecture for improved computation and post-quantum cryptography for robust security. The quantum-inspired neural network design leverages principles from quantum computing to create classical algorithms that boost computational efficiency, enabling faster and more accurate segmentation of medical images within resource-constrained IoT environments. Additionally, the framework employs a quantum-inspired Double Deep Reinforcement Learning (QiDDRL) strategy to dynamically optimize resource allocation, further enhancing segmentation accuracy while reducing latency. To safeguard data transmission between IoT devices and MEC servers, the system incorporates post-quantum cryptographic techniques-specifically Kyber for encryption and Dilithium for digital signatures-providing resistance against potential quantum-computing attacks. The proposed approach achieves 98 % segmentation accuracy on the KiTS19 dataset while addressing deep learning challenges such as the vanishing gradient problem, resulting in stable model performance. Overall, this combination of quantum-inspired computing and reinforcement learning with post-quantum cryptographic protection demonstrates the potential for secure and efficient medical image analysis in IoT environments, contributing to improved diagnostics and treatment planning in resource- and security-constrained healthcare settings.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101810"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedAWT: Adaptive federated learning via dynamic epoch adjustment for heterogeneous clients in ad-hoc networks FedAWT:通过对ad-hoc网络中的异构客户机进行动态历元调整的自适应联邦学习
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101771
Geonhee Kim , Seunghyun Park , Hyunhee Park
Recent advancements in IoT devices have enabled on-device processing for tasks such as real-time inference and autonomous control. However, federated learning (FL) in such environments remains challenging due to limited computation resources, unstable connectivity, and severe data and system heterogeneity. To overcome these challenges, this paper proposes FedAWT (Federated learning with Adaptive Weighted Tree), a decentralized FL framework designed for ad-hoc IoT networks. A latency-aware system model is constructed to reflect communication delay, bandwidth constraints, and variations in device-level computational performance. FedAWT introduces two core mechanisms. The first is a dynamic epoch adjustment method that allocates training epochs according to local convergence status and training stability. The second is a minimum spanning tree based communication strategy that reduces model transfer latency. Experimental results confirm that FedAWT improves test accuracy by up to 33.86 % compared to baseline methods in heterogeneous environments. These results demonstrate the effectiveness of FedAWT in enhancing convergence stability and training efficiency under resource-constrained and decentralized environment.
物联网设备的最新进展使实时推理和自主控制等任务的设备上处理成为可能。然而,由于有限的计算资源、不稳定的连接以及严重的数据和系统异构性,在这种环境中进行联邦学习(FL)仍然具有挑战性。为了克服这些挑战,本文提出了FedAWT(联邦学习与自适应加权树),这是一个为自组织物联网网络设计的分散FL框架。构建了一个延迟感知系统模型来反映通信延迟、带宽约束和设备级计算性能的变化。FedAWT引入了两个核心机制。首先是一种动态历元调整方法,根据局部收敛状态和训练稳定性分配训练历元。第二种是基于最小生成树的通信策略,该策略减少了模型传输延迟。实验结果证实,与异构环境下的基线方法相比,FedAWT的测试精度提高了33.86%。这些结果证明了FedAWT在资源约束和分散环境下提高收敛稳定性和训练效率的有效性。
{"title":"FedAWT: Adaptive federated learning via dynamic epoch adjustment for heterogeneous clients in ad-hoc networks","authors":"Geonhee Kim ,&nbsp;Seunghyun Park ,&nbsp;Hyunhee Park","doi":"10.1016/j.iot.2025.101771","DOIUrl":"10.1016/j.iot.2025.101771","url":null,"abstract":"<div><div>Recent advancements in IoT devices have enabled on-device processing for tasks such as real-time inference and autonomous control. However, federated learning (FL) in such environments remains challenging due to limited computation resources, unstable connectivity, and severe data and system heterogeneity. To overcome these challenges, this paper proposes FedAWT (Federated learning with Adaptive Weighted Tree), a decentralized FL framework designed for ad-hoc IoT networks. A latency-aware system model is constructed to reflect communication delay, bandwidth constraints, and variations in device-level computational performance. FedAWT introduces two core mechanisms. The first is a dynamic epoch adjustment method that allocates training epochs according to local convergence status and training stability. The second is a minimum spanning tree based communication strategy that reduces model transfer latency. Experimental results confirm that FedAWT improves test accuracy by up to 33.86 % compared to baseline methods in heterogeneous environments. These results demonstrate the effectiveness of FedAWT in enhancing convergence stability and training efficiency under resource-constrained and decentralized environment.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101771"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of code quality metrics and best practices in non-IoT and IoT systems 非物联网和物联网系统中代码质量指标和最佳实践的比较
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101803
Nour Khezemi , Sikandar Ejaz , Naouel Moha , Yann-Gaël Guéhéneuc
IoT systems are a network of connected devices powered by software, requiring the study of software quality for maintenance. Despite extensive studies on non-IoT systems’ software quality, research on IoT systems’ software quality is lacking. It is uncertain whether non-IoT and IoT systems’ software are comparable, limiting the application of results and best practices from non-IoT to IoT systems. Therefore, we compare the code quality of two equivalent sets of non-IoT and IoT systems to determine whether there are similarities and differences between the two kinds of software systems. We design and apply a systematic method to select two sets of 94 non-IoT and IoT system software from GitHub with comparable characteristics. We compute quality metrics on the systems in these two sets and then analyse and compare the metric values. We conduct an in-depth analysis and provide specific examples of the IoT systems’ complexity and how it manifests in their source code. We conclude that software for IoT systems is more complex, coupled, larger, less maintainable, and cohesive than non-IoT systems. Several factors, such as integrating multiple hardware and software components and managing data communication between them, contribute to these differences. After the comparison, we systematically select and present a list of best practices to address the observed differences between non-IoT and IoT code. We present a list of revisited best practices with approaches, tools, or techniques for developing IoT systems. For example, applying modularity and refactoring are best practices for lowering complexity. Based on our work, researchers can now make informed decisions using existing studies on the quality of non-IoT systems for IoT systems. Developers can use the list of best practices to minimise disparities in complexity, size, and cohesion and enhance maintainability and code readability.
物联网系统是由软件驱动的连接设备网络,需要对软件质量进行研究以进行维护。尽管对非物联网系统软件质量的研究非常广泛,但对物联网系统软件质量的研究却很少。不确定非物联网和物联网系统的软件是否具有可比性,这限制了从非物联网到物联网系统的结果和最佳实践的应用。因此,我们比较两组等效的非IoT和IoT系统的代码质量,以确定两种软件系统之间是否存在异同。我们设计并应用了一种系统的方法,从GitHub中选择了94款具有可比特性的非IoT和IoT系统软件。我们计算这两组系统的质量度量,然后对度量值进行分析和比较。我们进行了深入的分析,并提供了物联网系统复杂性的具体示例,以及它如何在其源代码中体现出来。我们得出的结论是,物联网系统的软件比非物联网系统更复杂、更耦合、更大、更难以维护和更有凝聚力。有几个因素导致了这些差异,例如集成多个硬件和软件组件以及管理它们之间的数据通信。经过比较,我们系统地选择并提出了一份最佳实践列表,以解决非物联网和物联网代码之间观察到的差异。我们提供了一份关于开发物联网系统的方法、工具或技术的最佳实践清单。例如,应用模块化和重构是降低复杂性的最佳实践。基于我们的工作,研究人员现在可以利用现有的关于物联网系统的非物联网系统质量的研究做出明智的决策。开发人员可以使用最佳实践列表来最小化复杂性、大小和内聚方面的差异,并增强可维护性和代码可读性。
{"title":"A comparison of code quality metrics and best practices in non-IoT and IoT systems","authors":"Nour Khezemi ,&nbsp;Sikandar Ejaz ,&nbsp;Naouel Moha ,&nbsp;Yann-Gaël Guéhéneuc","doi":"10.1016/j.iot.2025.101803","DOIUrl":"10.1016/j.iot.2025.101803","url":null,"abstract":"<div><div>IoT systems are a network of connected devices powered by software, requiring the study of software quality for maintenance. Despite extensive studies on non-IoT systems’ software quality, research on IoT systems’ software quality is lacking. It is uncertain whether non-IoT and IoT systems’ software are comparable, limiting the application of results and best practices from non-IoT to IoT systems. Therefore, we compare the code quality of two equivalent sets of non-IoT and IoT systems to determine whether there are similarities and differences between the two kinds of software systems. We design and apply a systematic method to select two sets of 94 non-IoT and IoT system software from GitHub with comparable characteristics. We compute quality metrics on the systems in these two sets and then analyse and compare the metric values. We conduct an in-depth analysis and provide specific examples of the IoT systems’ complexity and how it manifests in their source code. We conclude that software for IoT systems is more complex, coupled, larger, less maintainable, and cohesive than non-IoT systems. Several factors, such as integrating multiple hardware and software components and managing data communication between them, contribute to these differences. After the comparison, we systematically select and present a list of best practices to address the observed differences between non-IoT and IoT code. We present a list of revisited best practices with approaches, tools, or techniques for developing IoT systems. For example, applying modularity and refactoring are best practices for lowering complexity. Based on our work, researchers can now make informed decisions using existing studies on the quality of non-IoT systems for IoT systems. Developers can use the list of best practices to minimise disparities in complexity, size, and cohesion and enhance maintainability and code readability.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101803"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-aware and game-theoretic cooperative detection of misbehavior in connected vehicles 基于信任感知和博弈论的互联车辆不当行为协同检测
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-20 DOI: 10.1016/j.iot.2025.101799
Adil Attiaoui , Mouna Elmachkour , Abdellatif Kobbane , Marwane Ayaida , Hamidou Tembine
The rise of self-driving and connected vehicles is reshaping modern transportation, combining advanced communication with intelligent decision-making to revolutionize road safety and traffic flow. However, the open and dynamic nature of vehicular ad hoc networks (VANETs) exposes them to significant security threats, including false data injection and message tampering, which can disrupt trust and cooperation among nodes. In this work, we propose a novel cooperative misbehavior detection mechanism that integrates a Pre-Bayesian Q-learning framework with a majority game model to effectively identify and isolate malicious nodes. Our approach introduces dynamic coalition formation to exclude nodes with low trust values, and incorporates message classification by source to assess the reliability of information from roadside units (RSUs), same-manufacturer vehicles, and different-manufacturer vehicles. Iterative belief updates dynamically adjust trust levels among nodes, while ex-post validation ensures stable and consistent decision-making. Extensive simulations demonstrate that our model achieves high accuracy in distinguishing benign and malicious nodes, even in scenarios with up to 45 % adversarial influence. The results confirm that combining Q-learning with dynamic coalitions and message classification significantly enhances resilience, reliability, and consensus in VANETs under adversarial conditions. This framework provides a scalable and adaptable solution for securing connected autonomous systems and strengthening trust in real-world intelligent transportation networks.
自动驾驶和互联汽车的兴起正在重塑现代交通,将先进的通信与智能决策相结合,彻底改变道路安全和交通流量。然而,车辆自组织网络(vanet)的开放性和动态性使其面临严重的安全威胁,包括虚假数据注入和消息篡改,这可能会破坏节点之间的信任和合作。在这项工作中,我们提出了一种新的合作不当行为检测机制,该机制将预贝叶斯q -学习框架与多数博弈模型相结合,以有效识别和隔离恶意节点。我们的方法引入动态联盟来排除低信任值的节点,并结合消息来源分类来评估来自路边单元(rsu)、同一制造商车辆和不同制造商车辆的信息的可靠性。迭代信念更新动态调整节点间信任水平,事后验证保证决策稳定一致。大量的仿真表明,即使在敌对影响高达45%的情况下,我们的模型在区分良性和恶意节点方面也达到了很高的准确性。结果证实,将q学习与动态联盟和信息分类相结合,可以显著提高对抗条件下VANETs的弹性、可靠性和一致性。该框架提供了一种可扩展和适应性强的解决方案,用于保护互联的自主系统,并加强对现实世界智能交通网络的信任。
{"title":"Trust-aware and game-theoretic cooperative detection of misbehavior in connected vehicles","authors":"Adil Attiaoui ,&nbsp;Mouna Elmachkour ,&nbsp;Abdellatif Kobbane ,&nbsp;Marwane Ayaida ,&nbsp;Hamidou Tembine","doi":"10.1016/j.iot.2025.101799","DOIUrl":"10.1016/j.iot.2025.101799","url":null,"abstract":"<div><div>The rise of self-driving and connected vehicles is reshaping modern transportation, combining advanced communication with intelligent decision-making to revolutionize road safety and traffic flow. However, the open and dynamic nature of vehicular ad hoc networks (VANETs) exposes them to significant security threats, including false data injection and message tampering, which can disrupt trust and cooperation among nodes. In this work, we propose a novel cooperative misbehavior detection mechanism that integrates a Pre-Bayesian Q-learning framework with a majority game model to effectively identify and isolate malicious nodes. Our approach introduces dynamic coalition formation to exclude nodes with low trust values, and incorporates message classification by source to assess the reliability of information from roadside units (RSUs), same-manufacturer vehicles, and different-manufacturer vehicles. Iterative belief updates dynamically adjust trust levels among nodes, while ex-post validation ensures stable and consistent decision-making. Extensive simulations demonstrate that our model achieves high accuracy in distinguishing benign and malicious nodes, even in scenarios with up to 45 % adversarial influence. The results confirm that combining Q-learning with dynamic coalitions and message classification significantly enhances resilience, reliability, and consensus in VANETs under adversarial conditions. This framework provides a scalable and adaptable solution for securing connected autonomous systems and strengthening trust in real-world intelligent transportation networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101799"},"PeriodicalIF":7.6,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization 通过关键字识别和路径优化检测物联网固件中的漏洞
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-20 DOI: 10.1016/j.iot.2025.101808
Jie Liu , Yanqi Li , Rui Yao , Yang Zhang , Hongliang Liang
The rapid growth of IoT devices has led to increased interconnectivity, exposing vulnerabilities in firmware, particularly in back-end programs that handle untrusted inputs such as HTTP requests. Existing static taint analysis methods can detect such vulnerabilities, but they often suffer from missing keywords and exploration of unnecessary paths, which reduces efficiency and coverage. In this paper, we present IotSleuth, an approach that detects vulnerabilities in firmware by identifying keywords in back-end binaries. Our key insight is that functions receiving requests from the front-end frequently invoke the same data processing routines multiple times with different strings. By analyzing these invocations, IotSleuth extracts keywords and propagates them to discover additional taint sources, effectively extending the coverage of traditional taint analysis. We further introduce path optimization strategies to reduce redundant path exploration, significantly improving analysis efficiency. We implemented IotSleuth and evaluated it on 117 IoT firmware samples from nine vendors. Experimental results show that IotSleuth discovered 27 new vulnerabilities, all of which were assigned Common Vulnerabilities and Exposures (CVE) identifiers, and outperformed KARONTE, SaTC, CINDY, and HermeScan in both detection effectiveness and analysis speed.
物联网设备的快速增长导致互联性增加,暴露了固件中的漏洞,特别是在处理HTTP请求等不可信输入的后端程序中。现有的静态污染分析方法可以检测到此类漏洞,但往往缺少关键字和探索不必要的路径,从而降低了效率和覆盖率。在本文中,我们介绍了IotSleuth,一种通过识别后端二进制文件中的关键字来检测固件漏洞的方法。我们的关键见解是,从前端接收请求的函数经常使用不同的字符串多次调用相同的数据处理例程。通过分析这些调用,IotSleuth提取关键字并传播它们以发现额外的污染源,有效地扩展了传统污染分析的覆盖范围。进一步引入路径优化策略,减少冗余路径探索,显著提高分析效率。我们实施了IotSleuth,并对来自9家供应商的117个IoT固件样本进行了评估。实验结果表明,IotSleuth发现了27个新的漏洞,所有漏洞都被分配了Common vulnerabilities and Exposures (CVE)标识符,在检测效率和分析速度上都优于KARONTE、SaTC、CINDY和HermeScan。
{"title":"Detecting vulnerabilities in IoT firmware via keyword identification and path optimization","authors":"Jie Liu ,&nbsp;Yanqi Li ,&nbsp;Rui Yao ,&nbsp;Yang Zhang ,&nbsp;Hongliang Liang","doi":"10.1016/j.iot.2025.101808","DOIUrl":"10.1016/j.iot.2025.101808","url":null,"abstract":"<div><div>The rapid growth of IoT devices has led to increased interconnectivity, exposing vulnerabilities in firmware, particularly in back-end programs that handle untrusted inputs such as HTTP requests. Existing static taint analysis methods can detect such vulnerabilities, but they often suffer from missing keywords and exploration of unnecessary paths, which reduces efficiency and coverage. In this paper, we present IotSleuth, an approach that detects vulnerabilities in firmware by identifying keywords in back-end binaries. Our key insight is that functions receiving requests from the front-end frequently invoke the same data processing routines multiple times with different strings. By analyzing these invocations, IotSleuth extracts keywords and propagates them to discover additional taint sources, effectively extending the coverage of traditional taint analysis. We further introduce path optimization strategies to reduce redundant path exploration, significantly improving analysis efficiency. We implemented IotSleuth and evaluated it on 117 IoT firmware samples from nine vendors. Experimental results show that IotSleuth discovered 27 new vulnerabilities, all of which were assigned Common Vulnerabilities and Exposures (CVE) identifiers, and outperformed KARONTE, SaTC, CINDY, and HermeScan in both detection effectiveness and analysis speed.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101808"},"PeriodicalIF":7.6,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1