首页 > 最新文献

Internet of Things最新文献

英文 中文
Understanding the dynamics of social interaction in SIoT: Human-machine engagement 了解 SIoT 中社交互动的动态:人机互动
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101337
Kuo Cheng Chung , Paul Juinn Bing Tan

The Social Internet of Things (SIoT) amalgamates social networks with the Internet of Things (IoT) to enable intelligent devices to form social connections analogous to human networks. This research is grounded in psychological contract theory, which examines the reciprocal mechanisms arising from diverse customer interactions to encourage user engagement and provide recommendations on social media platforms. This study in particular identifies the factors that drive customer engagement on social media. It is unique in its exploration of customer interactions within the framework of psychological contracts across multiple levels of customer engagement (through customer empowerment). The findings reveal that psychological ownership among customers is influenced by empowering interactions on social media, which ultimately drive engagement behaviors.

社交物联网(SIoT)将社交网络与物联网(IoT)相结合,使智能设备能够形成类似于人类网络的社交联系。本研究以心理契约理论为基础,探讨了不同客户互动所产生的互惠机制,以鼓励用户参与并在社交媒体平台上提供推荐。本研究特别确定了推动客户参与社交媒体的因素。这项研究的独特之处在于,它在心理契约的框架内探讨了多层次客户参与(通过客户授权)中的客户互动。研究结果表明,社交媒体上的赋权互动会影响客户的心理所有权,并最终推动参与行为。
{"title":"Understanding the dynamics of social interaction in SIoT: Human-machine engagement","authors":"Kuo Cheng Chung ,&nbsp;Paul Juinn Bing Tan","doi":"10.1016/j.iot.2024.101337","DOIUrl":"10.1016/j.iot.2024.101337","url":null,"abstract":"<div><p>The Social Internet of Things (SIoT) amalgamates social networks with the Internet of Things (IoT) to enable intelligent devices to form social connections analogous to human networks. This research is grounded in psychological contract theory, which examines the reciprocal mechanisms arising from diverse customer interactions to encourage user engagement and provide recommendations on social media platforms. This study in particular identifies the factors that drive customer engagement on social media. It is unique in its exploration of customer interactions within the framework of psychological contracts across multiple levels of customer engagement (through customer empowerment). The findings reveal that psychological ownership among customers is influenced by empowering interactions on social media, which ultimately drive engagement behaviors.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101337"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset 电动汽车充电站的 DDoS 检测:通过 CICEV2023 数据集的深度学习视角
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101343
Yagiz Alp Anli , Zeki Ciplak , Murat Sakaliuzun , Seniz Zekiye Izgu , Kazim Yildiz

Distributed Denial of Service (DDoS) attacks have always been an important research topic in the field of information security. Regarding specialized infrastructures such as electric vehicle charging stations, detecting and preventing such attacks becomes even more critical. In the existing literature, most studies on DDoS attack detection focus on traditional methods that analyze network metrics such as network traffic, packet rates, and number of connections. These approaches attempt to detect attacks by identifying anomalies and irregularities in the network, but can have high error rates and fail to identify advanced attacks. Conversely though, detection methods based on system metrics use deeper and more insightful parameters such as processor utilization, memory usage, disk I/O operations, and system behavior. Such metrics provide a more detailed perspective than network-based approaches, allowing for more accurate detection of attacks. However, work in this area is not yet widespread enough further research and improvement are needed. The adoption of advanced system metrics-based methods can significantly improve the effectiveness of DDoS defense strategies, especially in next-generation and specialized infrastructures. This paper evaluates the applicability and effectiveness of Long Short-Term Memory (LSTM) and Feed-Forward Network (FFN) in detecting DDoS attacks against electric vehicle charging stations through system metrics using CICEV2023 dataset. Experimental results show that the LSTM based model offers advantages in terms of speed and processing capacity, while the FFN is superior in terms of the accuracy.

分布式拒绝服务(DDoS)攻击一直是信息安全领域的重要研究课题。对于电动汽车充电站等专业基础设施而言,检测和预防此类攻击变得更加重要。在现有文献中,大多数有关 DDoS 攻击检测的研究都集中在分析网络流量、数据包速率和连接数等网络指标的传统方法上。这些方法试图通过识别网络中的异常和不正常现象来检测攻击,但错误率可能很高,而且无法识别高级攻击。相反,基于系统指标的检测方法使用更深入、更有洞察力的参数,如处理器利用率、内存使用率、磁盘 I/O 操作和系统行为。与基于网络的方法相比,此类指标能提供更详细的视角,从而更准确地检测攻击。不过,这一领域的工作还不够广泛,需要进一步研究和改进。采用先进的基于系统指标的方法可以显著提高 DDoS 防御策略的有效性,尤其是在下一代和专用基础设施中。本文利用 CICEV2023 数据集,通过系统指标评估了长短期记忆(LSTM)和前馈网络(FFN)在检测针对电动汽车充电站的 DDoS 攻击中的适用性和有效性。实验结果表明,基于 LSTM 的模型在速度和处理能力方面具有优势,而 FFN 则在准确性方面更胜一筹。
{"title":"DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset","authors":"Yagiz Alp Anli ,&nbsp;Zeki Ciplak ,&nbsp;Murat Sakaliuzun ,&nbsp;Seniz Zekiye Izgu ,&nbsp;Kazim Yildiz","doi":"10.1016/j.iot.2024.101343","DOIUrl":"10.1016/j.iot.2024.101343","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks have always been an important research topic in the field of information security. Regarding specialized infrastructures such as electric vehicle charging stations, detecting and preventing such attacks becomes even more critical. In the existing literature, most studies on DDoS attack detection focus on traditional methods that analyze network metrics such as network traffic, packet rates, and number of connections. These approaches attempt to detect attacks by identifying anomalies and irregularities in the network, but can have high error rates and fail to identify advanced attacks. Conversely though, detection methods based on system metrics use deeper and more insightful parameters such as processor utilization, memory usage, disk I/O operations, and system behavior. Such metrics provide a more detailed perspective than network-based approaches, allowing for more accurate detection of attacks. However, work in this area is not yet widespread enough further research and improvement are needed. The adoption of advanced system metrics-based methods can significantly improve the effectiveness of DDoS defense strategies, especially in next-generation and specialized infrastructures. This paper evaluates the applicability and effectiveness of Long Short-Term Memory (LSTM) and Feed-Forward Network (FFN) in detecting DDoS attacks against electric vehicle charging stations through system metrics using CICEV2023 dataset. Experimental results show that the LSTM based model offers advantages in terms of speed and processing capacity, while the FFN is superior in terms of the accuracy.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101343"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing SPM-SeCTIS:用于智能增材制造中可计算威胁信息安全共享的严重性模式匹配
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101334
Mahender Kumar, Gregory Epiphaniou, Carsten Maple

Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to defend against cyberattacks. However, current methods often fail to adequately protect sensitive information, leading to security risks, especially in Intelligent Additive Manufacturing (IAM) systems. In these systems, the security and privacy of incident data collected by IoT devices are essential, as revealing threat information, such as types, impacts, and organisational interests, could be harmful. To address these challenges, we propose the Severity Pattern Matching for a Secure Computable Threat Information Sharing System (SPM-SeCTIS). This system is designed to maintain privacy by allowing intermediaries to pass along threat information without accessing sensitive details, such as the type or severity of the threats. SPM-SeCTIS ensures that attackers cannot determine which incidents organisations are interested in or what specific threats they monitor. The system employs Homomorphic Encryption (HE) to conduct threat pattern matching on encrypted data, keeping sensitive information confidential even during analysis. Our performance tests indicate that SPM-SeCTIS operates efficiently, requiring minimal time for encryption and decryption processes. Additionally, the system scales effectively, handling a large number of subscribers and incidents with ease. Compared to existing methods, SPM-SeCTIS provides improved security measures and better overall performance, making it a robust solution for protecting sensitive threat information.

共享网络威胁情报 (CTI) 使各组织能够共同抵御网络攻击。然而,目前的方法往往无法充分保护敏感信息,从而导致安全风险,尤其是在智能增材制造(IAM)系统中。在这些系统中,物联网设备收集的事件数据的安全性和隐私性至关重要,因为泄露威胁信息(如类型、影响和组织利益)可能会造成危害。为了应对这些挑战,我们提出了安全可计算威胁信息共享系统(SPM-SeCTIS)的严重性模式匹配。该系统旨在维护隐私,允许中间人传递威胁信息,而不会获取敏感细节,如威胁的类型或严重程度。SPM-SeCTIS 可确保攻击者无法确定组织对哪些事件感兴趣,也无法确定组织监控的具体威胁。该系统采用同态加密(HE)技术对加密数据进行威胁模式匹配,即使在分析过程中也能保持敏感信息的机密性。我们的性能测试表明,SPM-SeCTIS 运行高效,加密和解密过程所需的时间极短。此外,该系统还能有效扩展,轻松处理大量用户和事件。与现有方法相比,SPM-SeCTIS 改进了安全措施,提高了整体性能,是保护敏感威胁信息的强大解决方案。
{"title":"SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing","authors":"Mahender Kumar,&nbsp;Gregory Epiphaniou,&nbsp;Carsten Maple","doi":"10.1016/j.iot.2024.101334","DOIUrl":"10.1016/j.iot.2024.101334","url":null,"abstract":"<div><p>Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to defend against cyberattacks. However, current methods often fail to adequately protect sensitive information, leading to security risks, especially in Intelligent Additive Manufacturing (IAM) systems. In these systems, the security and privacy of incident data collected by IoT devices are essential, as revealing threat information, such as types, impacts, and organisational interests, could be harmful. To address these challenges, we propose the Severity Pattern Matching for a Secure Computable Threat Information Sharing System (SPM-SeCTIS). This system is designed to maintain privacy by allowing intermediaries to pass along threat information without accessing sensitive details, such as the type or severity of the threats. SPM-SeCTIS ensures that attackers cannot determine which incidents organisations are interested in or what specific threats they monitor. The system employs Homomorphic Encryption (HE) to conduct threat pattern matching on encrypted data, keeping sensitive information confidential even during analysis. Our performance tests indicate that SPM-SeCTIS operates efficiently, requiring minimal time for encryption and decryption processes. Additionally, the system scales effectively, handling a large number of subscribers and incidents with ease. Compared to existing methods, SPM-SeCTIS provides improved security measures and better overall performance, making it a robust solution for protecting sensitive threat information.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101334"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002750/pdfft?md5=de14d9cf242bc80bc1d64e608fdfcd74&pid=1-s2.0-S2542660524002750-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems 确保医疗物联网系统安全的两阶段区块链框架
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1016/j.iot.2024.101335
Kainat Fiaz , Asim Zeb , Shahid Hussain , Kinza Khurshid , Reyazur Rashid Irshad , Maher Alharby , Taj Rahman , Ibrahim M. Alwayle , Fabiano Pallonetto

The healthcare industry has witnessed a transformative impact due to recent advancements in sensing technology, coupled with the Internet of Medical Things (IoMTs)-based healthcare systems. Remote monitoring and informed decision-making have become possible by leveraging an integrated platform for efficient data analysis and processing, thereby optimizing data management in healthcare. However, this data is collected, processed, and transmitted across an interconnected network of devices, which introduces notable security risks and escalates the potential for vulnerabilities throughout the entire data processing pipeline. Traditional security approaches rely on computational complexity and face challenges in adequately securing sensitive healthcare data against evolving threats, thus necessitating robust solutions that ensure trust, enhance security, and maintain data confidentiality and integrity. To address these challenges, this paper introduces a two-phase framework that integrates blockchain technology with IoMT to enhance trust computation, resulting in a secure cluster that supports the quality-of-service (QoS) for sensitive data. The first phase utilizes the decentralized interplanetary file system and hashing functions to create a smart contract for device registration, establishing a resilient storage platform that encrypts data, improves fault tolerance, and facilitates data access. In the second phase, communication overhead is optimized by considering power levels, communication ranges, and computing capabilities alongside the smart contract. The smart contract evaluates the trust index and QoS of each node to facilitate device clustering based on processing capabilities. We implemented the proposed framework using OMNeT++ simulator and C++ programming language and evaluated against the cutting-edge IoMT security approaches in terms of attack detection, energy consumption, packet delivery ratio, throughput, and latency. The qualitative results demonstrated that the proposed framework enhanced attack detection by 6.00%, 18.00%, 20.00%, and 27.00%, reduced energy consumption by 6.91%, 8.19%, 12.07%, and 17.94%, improved packet delivery ratio by 3.00%, 6.00%, 9.00%, and 10.00%, increased throughput by 7.00%, 8.00%, 11.00%, and 13.00%, and decreased latency by 4.90%, 8.81%, 11.54%, and 20.63%, against state-of-the-art methods and was supported by statistical analysis.

由于最近传感技术的进步,再加上基于医疗物联网(IoMTs)的医疗保健系统,医疗保健行业见证了一场变革。利用集成平台进行高效的数据分析和处理,从而优化医疗保健领域的数据管理,使远程监控和知情决策成为可能。然而,这些数据是通过设备互连网络收集、处理和传输的,这就带来了显著的安全风险,并增加了整个数据处理管道出现漏洞的可能性。传统的安全方法依赖于计算的复杂性,在充分保护敏感的医疗保健数据免受不断变化的威胁方面面临挑战,因此需要能够确保信任、增强安全性并维护数据机密性和完整性的强大解决方案。为了应对这些挑战,本文介绍了一个分两个阶段的框架,该框架将区块链技术与 IoMT 相集成,以增强信任计算,从而形成一个支持敏感数据服务质量(QoS)的安全集群。第一阶段利用去中心化的星际文件系统和哈希函数创建设备注册智能合约,建立一个弹性存储平台,对数据进行加密,提高容错能力,方便数据访问。在第二阶段,通过考虑功率水平、通信范围和智能合约的计算能力,优化通信开销。智能合约会评估每个节点的信任指数和服务质量,以促进基于处理能力的设备集群。我们使用 OMNeT++ 模拟器和 C++ 编程语言实现了所提出的框架,并在攻击检测、能耗、数据包交付率、吞吐量和延迟等方面与最先进的 IoMT 安全方法进行了对比评估。定性结果表明,拟议框架的攻击检测率分别提高了 6.00%、18.00%、20.00% 和 27.00%,能耗分别降低了 6.91%、8.19%、12.07% 和 17.94%,数据包交付率分别提高了 3.00%、6.00%、9.00% 和 10.00%,吞吐量提高了 7.00%、8.00%、11.00% 和 13.00%,延迟降低了 4.90%、8.81%、11.54% 和 20.63%。
{"title":"A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems","authors":"Kainat Fiaz ,&nbsp;Asim Zeb ,&nbsp;Shahid Hussain ,&nbsp;Kinza Khurshid ,&nbsp;Reyazur Rashid Irshad ,&nbsp;Maher Alharby ,&nbsp;Taj Rahman ,&nbsp;Ibrahim M. Alwayle ,&nbsp;Fabiano Pallonetto","doi":"10.1016/j.iot.2024.101335","DOIUrl":"10.1016/j.iot.2024.101335","url":null,"abstract":"<div><p>The healthcare industry has witnessed a transformative impact due to recent advancements in sensing technology, coupled with the Internet of Medical Things (IoMTs)-based healthcare systems. Remote monitoring and informed decision-making have become possible by leveraging an integrated platform for efficient data analysis and processing, thereby optimizing data management in healthcare. However, this data is collected, processed, and transmitted across an interconnected network of devices, which introduces notable security risks and escalates the potential for vulnerabilities throughout the entire data processing pipeline. Traditional security approaches rely on computational complexity and face challenges in adequately securing sensitive healthcare data against evolving threats, thus necessitating robust solutions that ensure trust, enhance security, and maintain data confidentiality and integrity. To address these challenges, this paper introduces a two-phase framework that integrates blockchain technology with IoMT to enhance trust computation, resulting in a secure cluster that supports the quality-of-service (QoS) for sensitive data. The first phase utilizes the decentralized interplanetary file system and hashing functions to create a smart contract for device registration, establishing a resilient storage platform that encrypts data, improves fault tolerance, and facilitates data access. In the second phase, communication overhead is optimized by considering power levels, communication ranges, and computing capabilities alongside the smart contract. The smart contract evaluates the trust index and QoS of each node to facilitate device clustering based on processing capabilities. We implemented the proposed framework using OMNeT++ simulator and C++ programming language and evaluated against the cutting-edge IoMT security approaches in terms of attack detection, energy consumption, packet delivery ratio, throughput, and latency. The qualitative results demonstrated that the proposed framework enhanced attack detection by 6.00%, 18.00%, 20.00%, and 27.00%, reduced energy consumption by 6.91%, 8.19%, 12.07%, and 17.94%, improved packet delivery ratio by 3.00%, 6.00%, 9.00%, and 10.00%, increased throughput by 7.00%, 8.00%, 11.00%, and 13.00%, and decreased latency by 4.90%, 8.81%, 11.54%, and 20.63%, against state-of-the-art methods and was supported by statistical analysis.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101335"},"PeriodicalIF":6.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002762/pdfft?md5=a09955f31a5ac83ee06a0cb5866b7585&pid=1-s2.0-S2542660524002762-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing 航空边缘计算中基于强化学习的任务卸载技术综述
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.iot.2024.101342
Ahmadun Nabi, Tanmay Baidya, Sangman Moh

Aerial edge computing (AEC) has emerged as a pivotal platform offering low-latency computation services, seamless deployability, rapid operationality, and high maneuverability to the Internet of things (IoT) devices of end users. Different aerial computing platforms offer different computation support to process the tasks of IoT devices, which affects the offloading decision. However, effective task offloading (TO) decision-making in this context remains a critical challenge because it impacts the quality of service, energy consumption, resource allocation, and latency requirements. Most current research uses reinforcement learning (RL)-based offloading decisions in AEC owing to the uncertainty of the environment and the heterogeneity of computation platforms. Therefore, this survey explores the prevailing use of RL-based algorithms for TO in AEC, addressing the inherent uncertainty of the environment and the heterogeneity of computation platforms. This study systematically reviews and compares RL-based techniques employed for efficient offloading decisions in heterogeneous aerial computing platforms. It delves into recent research findings, highlighting the various approaches and methodologies applied. Additionally, the paper provides a comprehensive overview of the performance metrics widely used to evaluate the efficacy of RL-based offloading decision techniques. In conclusion, this survey identifies research gaps and outlines future directions, aiming to guide scholars and practitioners in advancing the field of RL-based TO in AEC.

空中边缘计算(AEC)已成为一个关键平台,可为终端用户的物联网(IoT)设备提供低延迟计算服务、无缝部署、快速运行和高机动性。不同的空中计算平台为处理物联网设备的任务提供不同的计算支持,这影响了卸载决策。然而,在这种情况下,有效的任务卸载(TO)决策仍然是一个严峻的挑战,因为它会影响服务质量、能源消耗、资源分配和延迟要求。由于环境的不确定性和计算平台的异质性,目前的大多数研究都在 AEC 中使用基于强化学习(RL)的卸载决策。因此,本调查针对环境的固有不确定性和计算平台的异构性,探讨了 AEC 中基于 RL 的卸载算法的普遍使用情况。本研究系统地回顾和比较了在异构航空计算平台中用于高效卸载决策的基于 RL 的技术。它深入探讨了近期的研究成果,重点介绍了所应用的各种方法和手段。此外,本文还全面概述了广泛用于评估基于 RL 的卸载决策技术有效性的性能指标。最后,本调查报告指出了研究空白并概述了未来方向,旨在指导学者和从业人员在 AEC 中推进基于 RL 的卸载决策领域的发展。
{"title":"Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing","authors":"Ahmadun Nabi,&nbsp;Tanmay Baidya,&nbsp;Sangman Moh","doi":"10.1016/j.iot.2024.101342","DOIUrl":"10.1016/j.iot.2024.101342","url":null,"abstract":"<div><p>Aerial edge computing (AEC) has emerged as a pivotal platform offering low-latency computation services, seamless deployability, rapid operationality, and high maneuverability to the Internet of things (IoT) devices of end users. Different aerial computing platforms offer different computation support to process the tasks of IoT devices, which affects the offloading decision. However, effective task offloading (TO) decision-making in this context remains a critical challenge because it impacts the quality of service, energy consumption, resource allocation, and latency requirements. Most current research uses reinforcement learning (RL)-based offloading decisions in AEC owing to the uncertainty of the environment and the heterogeneity of computation platforms. Therefore, this survey explores the prevailing use of RL-based algorithms for TO in AEC, addressing the inherent uncertainty of the environment and the heterogeneity of computation platforms. This study systematically reviews and compares RL-based techniques employed for efficient offloading decisions in heterogeneous aerial computing platforms. It delves into recent research findings, highlighting the various approaches and methodologies applied. Additionally, the paper provides a comprehensive overview of the performance metrics widely used to evaluate the efficacy of RL-based offloading decision techniques. In conclusion, this survey identifies research gaps and outlines future directions, aiming to guide scholars and practitioners in advancing the field of RL-based TO in AEC.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101342"},"PeriodicalIF":6.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT 全面评估 IIoT 中 CRYSTALS-Kyber 的侧信道泄漏情况
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101331
Zitian Huang , Huanyu Wang , Bijia Cao , Dalin He , Junnian Wang

Following the establishment of the draft standardization for Post-Quantum Cryptography (PQC), cryptographic systems across various sectors have undergone a paradigm shift. Although the theoretical strength of PQC has provided a robust foundation for securing communications against quantum threats, physical implementations of PQC algorithms remain vulnerable to Side-Channel Attacks (SCAs). Existing SCA studies predominantly focus on the attack process, lacking thorough side-channel leakage assessments and comparisons of inherent vulnerabilities at different attack points and with different countermeasures. In this paper, we first present a comprehensive assessment of side-channel leakage and resistance of four attack points within an ARM Cortex-M4 implementation of Kyber, including its masked version. This assessment employs a range of countermeasures such as noise addition, random delays, clock jitter, and their combinations. Besides, we also build deep-learning models for attacking, thereby verifying the results of the leakage assessments. By collaboratively utilizing three distinct leakage assessment approaches and deep learning-based attack results, we experimentally demonstrate that different algorithmic intermediate values of Kyber are suited to different countermeasures, which advances our understanding of the capacity and vulnerability of PQC implementations.

后量子加密(PQC)标准化草案制定后,各行各业的加密系统都发生了范式转变。虽然 PQC 的理论优势为确保通信安全抵御量子威胁奠定了坚实的基础,但 PQC 算法的物理实现仍然容易受到侧信道攻击(SCA)的影响。现有的 SCA 研究主要关注攻击过程,缺乏对侧信道泄漏的全面评估,也缺乏对不同攻击点和不同应对措施的内在脆弱性进行比较。在本文中,我们首先对 ARM Cortex-M4 实现的 Kyber(包括其屏蔽版本)中四个攻击点的侧信道泄漏和抗性进行了全面评估。该评估采用了一系列对策,如噪声添加、随机延迟、时钟抖动及其组合。此外,我们还建立了用于攻击的深度学习模型,从而验证了泄漏评估的结果。通过合作利用三种不同的泄漏评估方法和基于深度学习的攻击结果,我们通过实验证明了 Kyber 的不同算法中间值适合不同的对策,从而推进了我们对 PQC 实现的能力和脆弱性的理解。
{"title":"A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT","authors":"Zitian Huang ,&nbsp;Huanyu Wang ,&nbsp;Bijia Cao ,&nbsp;Dalin He ,&nbsp;Junnian Wang","doi":"10.1016/j.iot.2024.101331","DOIUrl":"10.1016/j.iot.2024.101331","url":null,"abstract":"<div><p>Following the establishment of the draft standardization for Post-Quantum Cryptography (PQC), cryptographic systems across various sectors have undergone a paradigm shift. Although the theoretical strength of PQC has provided a robust foundation for securing communications against quantum threats, physical implementations of PQC algorithms remain vulnerable to Side-Channel Attacks (SCAs). Existing SCA studies predominantly focus on the attack process, lacking thorough side-channel leakage assessments and comparisons of inherent vulnerabilities at different attack points and with different countermeasures. In this paper, we first present a comprehensive assessment of side-channel leakage and resistance of four attack points within an ARM Cortex-M4 implementation of Kyber, including its masked version. This assessment employs a range of countermeasures such as noise addition, random delays, clock jitter, and their combinations. Besides, we also build deep-learning models for attacking, thereby verifying the results of the leakage assessments. By collaboratively utilizing three distinct leakage assessment approaches and deep learning-based attack results, we experimentally demonstrate that different algorithmic intermediate values of Kyber are suited to different countermeasures, which advances our understanding of the capacity and vulnerability of PQC implementations.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101331"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on metaverse-empowered 6G wireless systems: A security perspective 关于元宇宙赋能 6G 无线系统的调查:安全视角
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101325
Latif U. Khan , Mohsen Guizani , Ibrar Yaqoob , Dusit Niyato , Ala Al-Fuqaha , Choong Seon Hong

Recent trends in emerging applications have motivated researchers to design advanced wireless systems to meet their evolving requirements. These emerging applications include digital healthcare, intelligent transportation systems, Industry 5.0, and more. To address the evolving requirements, leveraging a metaverse to empower 6G wireless systems is a viable solution. A metaverse-empowered 6G wireless system can offer numerous benefits, but it may also be vulnerable to a wide variety of security attacks. In this survey, we discuss potential security attacks in metaverse-empowered 6G wireless systems. We introduce an architecture designed to enhance security within metaverse-empowered 6G wireless systems. This architecture comprises two key spaces: the meta space and the physical space. We present physical space attacks and outline effective solutions to secure metaverse-empowered 6G wireless systems. We provide invaluable insights and discussions on meta space attacks, along with promising solutions. Finally, we discuss open challenges and provide future recommendations.

新兴应用的最新趋势促使研究人员设计先进的无线系统,以满足不断发展的需求。这些新兴应用包括数字医疗、智能交通系统、工业 5.0 等。为了满足不断变化的需求,利用元宇宙来增强 6G 无线系统是一个可行的解决方案。由元宇宙赋能的 6G 无线系统可以带来诸多好处,但也可能容易受到各种安全攻击。在本调查报告中,我们将讨论由元宇宙赋能的 6G 无线系统中潜在的安全攻击。我们介绍了一种旨在增强元宇宙赋能 6G 无线系统安全性的架构。该架构包括两个关键空间:元空间和物理空间。我们介绍了物理空间攻击,并概述了有效的解决方案,以确保元宇宙赋能的 6G 无线系统的安全。我们就元空间攻击提供了宝贵的见解和讨论,并提供了有前景的解决方案。最后,我们讨论了尚未解决的挑战,并提出了未来的建议。
{"title":"A survey on metaverse-empowered 6G wireless systems: A security perspective","authors":"Latif U. Khan ,&nbsp;Mohsen Guizani ,&nbsp;Ibrar Yaqoob ,&nbsp;Dusit Niyato ,&nbsp;Ala Al-Fuqaha ,&nbsp;Choong Seon Hong","doi":"10.1016/j.iot.2024.101325","DOIUrl":"10.1016/j.iot.2024.101325","url":null,"abstract":"<div><p>Recent trends in emerging applications have motivated researchers to design advanced wireless systems to meet their evolving requirements. These emerging applications include digital healthcare, intelligent transportation systems, Industry 5.0, and more. To address the evolving requirements, leveraging a metaverse to empower 6G wireless systems is a viable solution. A metaverse-empowered 6G wireless system can offer numerous benefits, but it may also be vulnerable to a wide variety of security attacks. In this survey, we discuss potential security attacks in metaverse-empowered 6G wireless systems. We introduce an architecture designed to enhance security within metaverse-empowered 6G wireless systems. This architecture comprises two key spaces: the meta space and the physical space. We present physical space attacks and outline effective solutions to secure metaverse-empowered 6G wireless systems. We provide invaluable insights and discussions on meta space attacks, along with promising solutions. Finally, we discuss open challenges and provide future recommendations.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101325"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G enabled smart cities: A real-world evaluation and analysis of 5G using a pilot smart city application 支持 5G 的智慧城市:利用智慧城市试点应用对 5G 进行实际评估和分析
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101326
Abhik Banerjee , Breno Costa , Abdur Rahim Mohammad Forkan , Yong-Bin Kang , Felip Marti , Chris McCarthy , Hadi Ghaderi , Dimitrios Georgakopoulos , Prem Prakash Jayaraman

Ubiquitous sensing in smart cities is expected to be one of the key beneficiaries of the high bandwidth and low latency capabilities of 5G. However, current 5G deployments still have low population coverage, and are unlikely to reach global coverage of above 80% before 2028. This means that new smart city applications are likely to experience a combination of 4G and 5G, limiting their data-intensive capabilities. Thus, it is necessary to assess the ability of current 5G deployments to support emerging smart city applications, and how they perform in 5G environments. Existing performance evaluations focus either on the 5G core or use instantaneous speed tests, which do not effectively assess the suitability of 5G deployments for smart city applications. In this paper, we present a comprehensive evaluation and analysis of real-world 5G network performance observed through the outcomes of a pilot smart city application, an innovative mobile 5G Internet of Things (IoT) solution to automatically identify and report road assets requiring maintenance. The pilot smart city application was deployed on 11 waste collection service trucks over a 6 month period (June 2022–Dec 2022). We undertook both application-specific and application independent network performance evaluation to assess the ability of the 5G deployment to support uninterrupted smart city services. Our analysis shows that while 5G is capable of supporting mobile video streaming applications, there are significant variations in network performance, which may make it unsuitable for applications that require higher data intensive or near real-time responsiveness.

智慧城市中的泛在感知有望成为 5G 高带宽、低延迟功能的主要受益者之一。然而,目前 5G 部署的人口覆盖率仍然较低,在 2028 年之前全球覆盖率不太可能达到 80% 以上。这意味着新的智慧城市应用很可能会经历 4G 和 5G 的结合,从而限制了其数据密集型能力。因此,有必要评估当前 5G 部署支持新兴智慧城市应用的能力,以及这些应用在 5G 环境中的表现。现有的性能评估要么侧重于 5G 核心网,要么使用瞬时速度测试,无法有效评估 5G 部署对智慧城市应用的适用性。在本文中,我们介绍了通过智慧城市试点应用成果观察到的真实世界 5G 网络性能的综合评估和分析,这是一种创新的移动 5G 物联网(IoT)解决方案,用于自动识别和报告需要维护的道路资产。智慧城市试点应用部署在 11 辆垃圾收集服务车上,为期 6 个月(2022 年 6 月至 2022 年 12 月)。我们进行了针对特定应用和独立于应用的网络性能评估,以评估 5G 部署支持不间断智慧城市服务的能力。我们的分析表明,虽然 5G 能够支持移动视频流应用,但网络性能存在显著差异,可能不适合需要较高数据密集度或接近实时响应的应用。
{"title":"5G enabled smart cities: A real-world evaluation and analysis of 5G using a pilot smart city application","authors":"Abhik Banerjee ,&nbsp;Breno Costa ,&nbsp;Abdur Rahim Mohammad Forkan ,&nbsp;Yong-Bin Kang ,&nbsp;Felip Marti ,&nbsp;Chris McCarthy ,&nbsp;Hadi Ghaderi ,&nbsp;Dimitrios Georgakopoulos ,&nbsp;Prem Prakash Jayaraman","doi":"10.1016/j.iot.2024.101326","DOIUrl":"10.1016/j.iot.2024.101326","url":null,"abstract":"<div><p>Ubiquitous sensing in smart cities is expected to be one of the key beneficiaries of the high bandwidth and low latency capabilities of 5G. However, current 5G deployments still have low population coverage, and are unlikely to reach global coverage of above 80% before 2028. This means that new smart city applications are likely to experience a combination of 4G and 5G, limiting their data-intensive capabilities. Thus, it is necessary to assess the ability of current 5G deployments to support emerging smart city applications, and how they perform in 5G environments. Existing performance evaluations focus either on the 5G core or use instantaneous speed tests, which do not effectively assess the suitability of 5G deployments for smart city applications. In this paper, we present a comprehensive evaluation and analysis of real-world 5G network performance observed through the outcomes of a pilot smart city application, an innovative mobile 5G Internet of Things (IoT) solution to automatically identify and report road assets requiring maintenance. The pilot smart city application was deployed on 11 waste collection service trucks over a 6 month period (June 2022–Dec 2022). We undertook both application-specific and application independent network performance evaluation to assess the ability of the 5G deployment to support uninterrupted smart city services. Our analysis shows that while 5G is capable of supporting mobile video streaming applications, there are significant variations in network performance, which may make it unsuitable for applications that require higher data intensive or near real-time responsiveness.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101326"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002671/pdfft?md5=bc439e7e87a4ac69e430b345ca8fa42a&pid=1-s2.0-S2542660524002671-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142058359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability-oriented risk identification framework for IoT risk assessment 面向脆弱性的物联网风险评估风险识别框架
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.iot.2024.101333
Mohammad Beyrouti , Ahmed Lounis , Benjamin Lussier , Abdelmadjid Bouabdallah , Abed Ellatif Samhat

The proliferation of Internet of Things (IoT) systems across diverse applications has led to a notable increase in connected smart devices. Nevertheless, this surge in connectivity has induced a broad spectrum of vulnerabilities and threats, jeopardizing the security and safety of IoT applications. Security risk assessment methods are commonly employed to analyze risks. However, traditional IT and existing IoT-tailored security assessment methods often fail to fully address key IoT aspects: complex assets intercommunication, dynamic system changes, assets’ potential as attack platforms, safety impacts of security breaches, and assets resource constraints. Such oversights lead to significant risks being overlooked in the IoT ecosystem. In this paper, we propose a novel vulnerability-oriented risk identification framework comprising a four-step process as a core element of IoT security risk assessment, applicable to any IoT system. Our process enhances both traditional and IoT-specific security risk assessment methods by providing tailored approaches that address their crucial oversights for comprehensive IoT risk assessment. We validate our process with a case study of an IoT smart healthcare system using a proposed expert-driven approach. The results confirm that our process effectively identifies critical attack scenarios originating from the lack of proper security measures, mobility, and intercommunication processes of IoT devices in the healthcare system. Furthermore, our analysis reveals potential attacks that exploit the IoT devices as platforms to target the backend and user domains. We demonstrate the feasibility of our process for identifying realistic risks by conducting simulations of two derived attack scenarios using the Contiki Cooja network simulator.

随着物联网(IoT)系统在各种应用中的普及,联网智能设备显著增加。然而,连接性的激增诱发了大量的漏洞和威胁,危及物联网应用的安全保障。安全风险评估方法通常用于分析风险。然而,传统的信息技术和现有的物联网定制安全评估方法往往不能充分解决物联网的关键问题:复杂的资产互通、动态系统变化、资产作为攻击平台的潜力、安全漏洞对安全的影响以及资产资源限制。这些疏忽导致物联网生态系统中的重大风险被忽视。在本文中,我们提出了一个新颖的以脆弱性为导向的风险识别框架,包括一个四步流程,作为物联网安全风险评估的核心要素,适用于任何物联网系统。我们的流程增强了传统安全风险评估方法和针对物联网的安全风险评估方法,提供了量身定制的方法,解决了全面物联网风险评估中的关键疏漏。我们通过对一个物联网智能医疗系统的案例研究,采用建议的专家驱动方法验证了我们的流程。结果证实,我们的流程能有效识别因医疗系统中物联网设备缺乏适当的安全措施、移动性和互联互通流程而产生的关键攻击场景。此外,我们的分析还揭示了利用物联网设备作为平台来攻击后端和用户域的潜在攻击。我们使用 Contiki Cooja 网络模拟器对两个衍生攻击场景进行了模拟,从而证明了我们识别现实风险过程的可行性。
{"title":"Vulnerability-oriented risk identification framework for IoT risk assessment","authors":"Mohammad Beyrouti ,&nbsp;Ahmed Lounis ,&nbsp;Benjamin Lussier ,&nbsp;Abdelmadjid Bouabdallah ,&nbsp;Abed Ellatif Samhat","doi":"10.1016/j.iot.2024.101333","DOIUrl":"10.1016/j.iot.2024.101333","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) systems across diverse applications has led to a notable increase in connected smart devices. Nevertheless, this surge in connectivity has induced a broad spectrum of vulnerabilities and threats, jeopardizing the security and safety of IoT applications. Security risk assessment methods are commonly employed to analyze risks. However, traditional IT and existing IoT-tailored security assessment methods often fail to fully address key IoT aspects: complex assets intercommunication, dynamic system changes, assets’ potential as attack platforms, safety impacts of security breaches, and assets resource constraints. Such oversights lead to significant risks being overlooked in the IoT ecosystem. In this paper, we propose a novel vulnerability-oriented risk identification framework comprising a four-step process as a core element of IoT security risk assessment, applicable to any IoT system. Our process enhances both traditional and IoT-specific security risk assessment methods by providing tailored approaches that address their crucial oversights for comprehensive IoT risk assessment. We validate our process with a case study of an IoT smart healthcare system using a proposed expert-driven approach. The results confirm that our process effectively identifies critical attack scenarios originating from the lack of proper security measures, mobility, and intercommunication processes of IoT devices in the healthcare system. Furthermore, our analysis reveals potential attacks that exploit the IoT devices as platforms to target the backend and user domains. We demonstrate the feasibility of our process for identifying realistic risks by conducting simulations of two derived attack scenarios using the Contiki Cooja network simulator.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101333"},"PeriodicalIF":6.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141998349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient data communication for WSN based resource constrained IoT devices 基于 WSN 的资源受限物联网设备的节能数据通信
IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.iot.2024.101329
Shreeram Hudda, K. Haribabu, Rishabh Barnwal

In the Internet of Things (IoTs) and wireless sensor networks (WSNs), improving security and energy efficiency are key concerns. Clustering, which involves managing cluster heads, plays a pivotal role in extending network lifetime. The selection of a cluster head, responsible for data transfer between nodes, is a key aspect of network management. This paper proposes two variants of a novel algorithm designed for energy efficient communication in a resource constrained IoT environments. One variant considers remaining energy, distance, and node degree for cluster head selection, while the other focuses on remaining energy and distance only. Including node degree ensures cluster heads do not waste energy by remaining idle or performing unnecessary tasks such as the cluster head selection process in every round. The authors tested these variants against several well known algorithms using MATLAB simulation environment, evaluating factors such as operating nodes, number of clusters, transmission energy, and remaining energy. The proposed algorithm extends network lifetime by maintaining more operating nodes for longer, not changing clusters or cluster heads frequently, minimizing energy consumption for transmission, and conserving more remaining energy. Consequently, the proposed algorithm outperforms existing approaches by addressing issues like zero cluster head selection, compulsory cluster head selection in every round, avoiding cluster heads that connect to no nodes, and preventing network destabilization due to unnecessary re-elections.

在物联网(IoTs)和无线传感器网络(WSNs)中,提高安全性和能源效率是主要关注点。聚类涉及管理簇头,在延长网络寿命方面发挥着关键作用。选择负责节点间数据传输的簇头是网络管理的一个关键环节。本文提出了一种新型算法的两种变体,旨在资源受限的物联网环境中实现高能效通信。其中一个变体在选择簇头时考虑了剩余能量、距离和节点度,而另一个变体只关注剩余能量和距离。包含节点度可确保簇头不会因为闲置或执行不必要的任务(如每轮的簇头选择过程)而浪费能量。作者使用 MATLAB 仿真环境对这些变体与几种已知算法进行了测试,评估了运行节点、簇数、传输能量和剩余能量等因素。所提出的算法可以延长网络的使用寿命,因为它可以让更多的运行节点保持更长的时间,不频繁更换簇或簇首,最大限度地减少传输能耗,并保存更多的剩余能量。因此,通过解决零簇头选择、每轮强制簇头选择、避免簇头与无节点连接以及防止网络因不必要的重新选择而不稳定等问题,所提出的算法优于现有方法。
{"title":"Energy efficient data communication for WSN based resource constrained IoT devices","authors":"Shreeram Hudda,&nbsp;K. Haribabu,&nbsp;Rishabh Barnwal","doi":"10.1016/j.iot.2024.101329","DOIUrl":"10.1016/j.iot.2024.101329","url":null,"abstract":"<div><p>In the Internet of Things (IoTs) and wireless sensor networks (WSNs), improving security and energy efficiency are key concerns. Clustering, which involves managing cluster heads, plays a pivotal role in extending network lifetime. The selection of a cluster head, responsible for data transfer between nodes, is a key aspect of network management. This paper proposes two variants of a novel algorithm designed for energy efficient communication in a resource constrained IoT environments. One variant considers remaining energy, distance, and node degree for cluster head selection, while the other focuses on remaining energy and distance only. Including node degree ensures cluster heads do not waste energy by remaining idle or performing unnecessary tasks such as the cluster head selection process in every round. The authors tested these variants against several well known algorithms using MATLAB simulation environment, evaluating factors such as operating nodes, number of clusters, transmission energy, and remaining energy. The proposed algorithm extends network lifetime by maintaining more operating nodes for longer, not changing clusters or cluster heads frequently, minimizing energy consumption for transmission, and conserving more remaining energy. Consequently, the proposed algorithm outperforms existing approaches by addressing issues like zero cluster head selection, compulsory cluster head selection in every round, avoiding cluster heads that connect to no nodes, and preventing network destabilization due to unnecessary re-elections.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101329"},"PeriodicalIF":6.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1