首页 > 最新文献

Future Internet最新文献

英文 中文
SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain 种子链:革新种子供应链的安全透明区块链驱动框架
IF 3.4 Q1 Computer Science Pub Date : 2024-04-15 DOI: 10.3390/fi16040132
Rohit Ahuja, Sahil Chugh, Raman Singh
Farming is a major sector required for any nation to become self-sustainable. Quality seeds heavily influence the effectiveness of farming. Seeds cultivated by breeders pass through several entities in order to reach farmers. The existing seed supply chain is opaque and intractable, which not only hinders the growth of crops but also makes the life of a farmer miserable. Blockchain has been widely employed to enable fair and secure transactions between farmers and buyers, but concerns related to transparency and traceability in the seed supply chain, counterfeit seeds, middlemen involvement, and inefficient processes in the agricultural ecosystem have not received enough attention. To address these concerns, a blockchain-based solution is proposed that brings breeders, farmers, warehouse owners, transporters, and food corporations to a single platform to enhance transparency, traceability, and trust among trust-less parties. A smart contract updates the status of seeds from a breeder from submitted to approved. Then, a non-fungible token (NFT) corresponding to approved seeds is minted for the breeder, which records the date of cultivation and its owner (breeder). The NFT enables farmers to keep track of seeds right from the date of their cultivation and their owner, which helps them to make better decisions about picking seeds from the correct owner. Farmers directly interact with warehouses to purchase seeds, which removes the need for middlemen and improves the trust among trust-less entities. Furthermore, a tender for the transportation of seeds is auctioned on the basis of the priority location locp, Score, and bid_amount of every transporter, which provides a fair chance to every transporter to restrict the monopoly of a single transporter. The proposed system achieves immutability, decentralization, and efficiency inherently from the blockchain. We implemented the proposed scheme and deployed it on the Ethereum network. Smart contracts deployed over the Ethereum network interact with React-based web pages. The analysis and results of the proposed model indicate that it is viable and secure, as well as superior to the current seed supply chain system.
农业是任何国家实现自给自足所需的主要部门。优质种子在很大程度上影响着耕作的成效。育种者培育的种子要经过多个实体才能到达农民手中。现有的种子供应链不透明且难以解决,这不仅阻碍了农作物的生长,也使农民的生活苦不堪言。区块链已被广泛应用于实现农民和买家之间公平、安全的交易,但与种子供应链的透明度和可追溯性、假冒种子、中间商参与以及农业生态系统中的低效流程有关的问题尚未得到足够重视。为了解决这些问题,我们提出了一种基于区块链的解决方案,将育种者、农民、仓库所有者、运输商和食品公司集中到一个平台上,以提高透明度、可追溯性和缺乏信任的各方之间的信任。智能合约将育种者的种子状态从提交更新为批准。然后,与批准种子相对应的不可篡改代币(NFT)将被铸造给育种者,其中记录了培育日期及其所有者(育种者)。NFT 使农民能够从种子的培育日期和所有者开始跟踪种子,这有助于他们做出更好的决定,从正确的所有者那里挑选种子。农民直接与仓库互动购买种子,无需中间商,提高了无信任实体之间的信任度。此外,种子运输招标是根据每个运输商的优先位置 locp、Score 和投标金额进行拍卖的,这为每个运输商提供了公平的机会,限制了单个运输商的垄断。提议的系统实现了区块链的不可篡改性、去中心化和内在效率。我们在以太坊网络上实施并部署了所提出的方案。部署在以太坊网络上的智能合约与基于 React 的网页进行交互。对拟议模型的分析和结果表明,该模型是可行的、安全的,并且优于当前的种子供应链系统。
{"title":"SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain","authors":"Rohit Ahuja, Sahil Chugh, Raman Singh","doi":"10.3390/fi16040132","DOIUrl":"https://doi.org/10.3390/fi16040132","url":null,"abstract":"Farming is a major sector required for any nation to become self-sustainable. Quality seeds heavily influence the effectiveness of farming. Seeds cultivated by breeders pass through several entities in order to reach farmers. The existing seed supply chain is opaque and intractable, which not only hinders the growth of crops but also makes the life of a farmer miserable. Blockchain has been widely employed to enable fair and secure transactions between farmers and buyers, but concerns related to transparency and traceability in the seed supply chain, counterfeit seeds, middlemen involvement, and inefficient processes in the agricultural ecosystem have not received enough attention. To address these concerns, a blockchain-based solution is proposed that brings breeders, farmers, warehouse owners, transporters, and food corporations to a single platform to enhance transparency, traceability, and trust among trust-less parties. A smart contract updates the status of seeds from a breeder from submitted to approved. Then, a non-fungible token (NFT) corresponding to approved seeds is minted for the breeder, which records the date of cultivation and its owner (breeder). The NFT enables farmers to keep track of seeds right from the date of their cultivation and their owner, which helps them to make better decisions about picking seeds from the correct owner. Farmers directly interact with warehouses to purchase seeds, which removes the need for middlemen and improves the trust among trust-less entities. Furthermore, a tender for the transportation of seeds is auctioned on the basis of the priority location locp, Score, and bid_amount of every transporter, which provides a fair chance to every transporter to restrict the monopoly of a single transporter. The proposed system achieves immutability, decentralization, and efficiency inherently from the blockchain. We implemented the proposed scheme and deployed it on the Ethereum network. Smart contracts deployed over the Ethereum network interact with React-based web pages. The analysis and results of the proposed model indicate that it is viable and secure, as well as superior to the current seed supply chain system.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140699139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks 远距离广域网中工业物联网应用的轮询机制
IF 3.4 Q1 Computer Science Pub Date : 2024-04-12 DOI: 10.3390/fi16040130
D. Todoli-Ferrandis, Javier Silvestre-Blanes, V. Sempere-Payá, S. Santonja-Climent
LoRaWAN is a low-power wide-area network (LPWAN) technology that is well suited for industrial IoT (IIoT) applications. One of the challenges of using LoRaWAN for IIoT is the need to collect data from a large number of devices. Polling is a common way to collect data from devices, but it can be inefficient for LoRaWANs, which are designed for low data rates and long battery life. LoRaWAN devices operating in two specific modes can receive messages from a gateway even when they are not sending data themselves. This allows the gateway to send commands to devices at any time, without having to wait for them to check for messages. This paper proposes various polling mechanisms for industrial IoT applications in LoRaWANs and presents specific considerations for designing efficient polling mechanisms in the context of industrial IoT applications leveraging LoRaWAN technology.
LoRaWAN 是一种低功耗广域网 (LPWAN) 技术,非常适合工业物联网 (IIoT) 应用。将 LoRaWAN 用于 IIoT 的挑战之一是需要从大量设备中收集数据。轮询是从设备中收集数据的常用方法,但对于专为低数据传输速率和长电池寿命而设计的 LoRaWAN 而言,这种方法可能效率不高。以两种特定模式运行的 LoRaWAN 设备,即使本身不发送数据,也能接收来自网关的信息。这样,网关就可以随时向设备发送命令,而无需等待设备检查信息。本文为 LoRaWAN 中的工业物联网应用提出了各种轮询机制,并介绍了在利用 LoRaWAN 技术的工业物联网应用中设计高效轮询机制的具体注意事项。
{"title":"Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks","authors":"D. Todoli-Ferrandis, Javier Silvestre-Blanes, V. Sempere-Payá, S. Santonja-Climent","doi":"10.3390/fi16040130","DOIUrl":"https://doi.org/10.3390/fi16040130","url":null,"abstract":"LoRaWAN is a low-power wide-area network (LPWAN) technology that is well suited for industrial IoT (IIoT) applications. One of the challenges of using LoRaWAN for IIoT is the need to collect data from a large number of devices. Polling is a common way to collect data from devices, but it can be inefficient for LoRaWANs, which are designed for low data rates and long battery life. LoRaWAN devices operating in two specific modes can receive messages from a gateway even when they are not sending data themselves. This allows the gateway to send commands to devices at any time, without having to wait for them to check for messages. This paper proposes various polling mechanisms for industrial IoT applications in LoRaWANs and presents specific considerations for designing efficient polling mechanisms in the context of industrial IoT applications leveraging LoRaWAN technology.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140711957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All about Delay-Tolerant Networking (DTN) Contributions to Future Internet 关于容错网络 (DTN) 对未来互联网的贡献的全部内容
IF 3.4 Q1 Computer Science Pub Date : 2024-04-09 DOI: 10.3390/fi16040129
Georgios Koukis, Konstantina Safouri, V. Tsaoussidis
Although several years have passed since its first introduction, the significance of Delay-Tolerant Networking (DTN) remains evident, particularly in challenging environments where traditional networks face operational limitations such as disrupted communication or high latency. This survey paper aims to explore the diverse array of applications where DTN technologies have proven successful, with a focus on emerging and novel application paradigms. In particular, we focus on the contributions of DTN in the Future Internet, including its contribution to space applications, smart cities and the Internet of Things, but also to underwater communications. We also discuss its potential to be used jointly with information-centric networks to change the internet communication paradigm in the future.
尽管容错网络(DTN)首次问世已过去数年,但其重要性依然显而易见,尤其是在传统网络面临通信中断或高延迟等运行限制的挑战性环境中。本调查报告旨在探讨 DTN 技术已被证明成功的各种应用,重点关注新兴和新型应用范例。我们尤其关注 DTN 在未来互联网中的贡献,包括其对空间应用、智能城市和物联网的贡献,以及对水下通信的贡献。我们还讨论了 DTN 与以信息为中心的网络联合使用以改变未来互联网通信模式的潜力。
{"title":"All about Delay-Tolerant Networking (DTN) Contributions to Future Internet","authors":"Georgios Koukis, Konstantina Safouri, V. Tsaoussidis","doi":"10.3390/fi16040129","DOIUrl":"https://doi.org/10.3390/fi16040129","url":null,"abstract":"Although several years have passed since its first introduction, the significance of Delay-Tolerant Networking (DTN) remains evident, particularly in challenging environments where traditional networks face operational limitations such as disrupted communication or high latency. This survey paper aims to explore the diverse array of applications where DTN technologies have proven successful, with a focus on emerging and novel application paradigms. In particular, we focus on the contributions of DTN in the Future Internet, including its contribution to space applications, smart cities and the Internet of Things, but also to underwater communications. We also discuss its potential to be used jointly with information-centric networks to change the internet communication paradigm in the future.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140722318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaverse Meets Smart Cities—Applications, Benefits, and Challenges 元宇宙与智慧城市--应用、优势与挑战
IF 3.4 Q1 Computer Science Pub Date : 2024-04-08 DOI: 10.3390/fi16040126
Florian Maier, Markus Weinberger
The metaverse aims to merge the virtual and real worlds. The target is to generate a virtual community where social components play a crucial role and combine different areas such as entertainment, work, shopping, and services. This idea is explicitly appealing in the context of smart cities. The metaverse offers digitalization approaches and can strengthen citizens’ social community. While the existing literature covers the exemplary potential of smart city metaverse applications, this study aims to provide a comprehensive overview of the potential and already implemented metaverse applications in the context of cities and municipalities. In addition, challenges related to these applications are identified. The study combines literature reviews and expert interviews to ensure a broad overview. Forty-eight smart city metaverse applications from eleven areas were identified, and actual projects from eleven cities demonstrate the current state of development. Still, further research should evaluate the benefits of the various applications and find strategies to overcome the identified challenges.
元宇宙旨在融合虚拟世界和现实世界。其目标是创建一个虚拟社区,在这个社区中,社交元素发挥着至关重要的作用,并将娱乐、工作、购物和服务等不同领域结合起来。在智慧城市的背景下,这一理念具有明确的吸引力。元宇宙提供了数字化方法,可以加强市民的社会社区。现有文献涵盖了智慧城市元宇宙应用的示范潜力,本研究旨在全面概述城市和市政背景下元宇宙应用的潜力和已实施情况。此外,还确定了与这些应用相关的挑战。本研究结合了文献综述和专家访谈,以确保提供广泛的概述。确定了来自 11 个领域的 48 个智慧城市元数据应用,来自 11 个城市的实际项目展示了当前的发展状况。不过,进一步的研究应评估各种应用的益处,并找到克服已发现挑战的策略。
{"title":"Metaverse Meets Smart Cities—Applications, Benefits, and Challenges","authors":"Florian Maier, Markus Weinberger","doi":"10.3390/fi16040126","DOIUrl":"https://doi.org/10.3390/fi16040126","url":null,"abstract":"The metaverse aims to merge the virtual and real worlds. The target is to generate a virtual community where social components play a crucial role and combine different areas such as entertainment, work, shopping, and services. This idea is explicitly appealing in the context of smart cities. The metaverse offers digitalization approaches and can strengthen citizens’ social community. While the existing literature covers the exemplary potential of smart city metaverse applications, this study aims to provide a comprehensive overview of the potential and already implemented metaverse applications in the context of cities and municipalities. In addition, challenges related to these applications are identified. The study combines literature reviews and expert interviews to ensure a broad overview. Forty-eight smart city metaverse applications from eleven areas were identified, and actual projects from eleven cities demonstrate the current state of development. Still, further research should evaluate the benefits of the various applications and find strategies to overcome the identified challenges.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device Multi-WiIR:基于 WiFi 设备的多用户身份合法性认证
IF 3.4 Q1 Computer Science Pub Date : 2024-04-08 DOI: 10.3390/fi16040127
Zhongcheng Wei, Yanhu Dong
With the proliferation of WiFi devices, WiFi-based identification technology has garnered attention in the security domain and has demonstrated initial success. Nonetheless, when untrained illegitimate users appear, the classifier tends to categorize them as if they were trained users. In response to this issue, researchers have proposed identity legitimacy authentication systems to identify illicit users, albeit only applicable to individual users. In this article, we propose a multi-user legitimacy authentication system based on WiFi, termed Multi-WiIR. Leveraging WiFi signals, the system captures users’ walking patterns to ascertain their legitimacy. The core concept entails training a multi-branch deep neural network, designated WiIR-Net, for feature extraction of individual users. Binary classifiers are then applied to each user, and legitimacy is established by comparing the model’s output to predefined thresholds, thus facilitating multi-user legitimacy authentication. Moreover, the study experimentally investigated the impact of the number of legitimate individuals on accuracy rates. The results demonstrated that The Multi-WiIR system showed commendable performance with low latency, being capable of conducting legitimacy recognition in scenarios involving up to four users, with an accuracy rate reaching 85.11%.
随着 WiFi 设备的普及,基于 WiFi 的识别技术在安全领域备受关注,并取得了初步成功。然而,当未经训练的非法用户出现时,分类器往往会把他们当作训练有素的用户来分类。针对这一问题,研究人员提出了身份合法性认证系统来识别非法用户,尽管只适用于单个用户。在本文中,我们提出了一种基于 WiFi 的多用户合法性认证系统,称为 Multi-WiIR。该系统利用 WiFi 信号捕捉用户的行走模式,以确定其合法性。其核心概念是训练一个多分支深度神经网络,即 WiIR-Net,以提取单个用户的特征。然后将二元分类器应用于每个用户,并通过比较模型输出与预定义阈值来确定合法性,从而促进多用户合法性认证。此外,研究还通过实验调查了合法用户数量对准确率的影响。结果表明,Multi-WiIR 系统在低延迟方面表现出色,能够在多达四个用户的情况下进行合法性识别,准确率达到 85.11%。
{"title":"Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device","authors":"Zhongcheng Wei, Yanhu Dong","doi":"10.3390/fi16040127","DOIUrl":"https://doi.org/10.3390/fi16040127","url":null,"abstract":"With the proliferation of WiFi devices, WiFi-based identification technology has garnered attention in the security domain and has demonstrated initial success. Nonetheless, when untrained illegitimate users appear, the classifier tends to categorize them as if they were trained users. In response to this issue, researchers have proposed identity legitimacy authentication systems to identify illicit users, albeit only applicable to individual users. In this article, we propose a multi-user legitimacy authentication system based on WiFi, termed Multi-WiIR. Leveraging WiFi signals, the system captures users’ walking patterns to ascertain their legitimacy. The core concept entails training a multi-branch deep neural network, designated WiIR-Net, for feature extraction of individual users. Binary classifiers are then applied to each user, and legitimacy is established by comparing the model’s output to predefined thresholds, thus facilitating multi-user legitimacy authentication. Moreover, the study experimentally investigated the impact of the number of legitimate individuals on accuracy rates. The results demonstrated that The Multi-WiIR system showed commendable performance with low latency, being capable of conducting legitimacy recognition in scenarios involving up to four users, with an accuracy rate reaching 85.11%.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis 年轻数字原住民对数字营销的看法:通过眼动追踪分析探究恼怒与效果
IF 3.4 Q1 Computer Science Pub Date : 2024-04-08 DOI: 10.3390/fi16040125
Stefanos Balaskas, Georgia Kotsari, Maria Rigou
Currently, there are a wide range of approaches to deploying digital ads, with advanced technologies now being harnessed to craft advertising that is engaging and even tailored to personal interests and preferences, yet potentially distracting and irritating. This research seeks to evaluate contemporary digital advertising methods by assessing how annoying they are to users, particularly when they distract users from intended tasks or cause delays in regular online activities. To pursue this, an eye-tracking study was conducted, with 51 participants navigating a specially designed website featuring seven distinct types of advertisements without a specific content to avoid the effect of ad content on the collected data. Participants were asked to execute specific information-seeking tasks during the experiment and afterwards to report if they recalled seeing each ad and the degree of annoyance by each ad type. Ad effectiveness is assessed by eye-tracking metrics (time to first fixation, average fixation duration, dwell time, fixation count, and revisit count) depicting how appealing an ad is as a marketing stimulus. Findings indicated that pop-ups, ads with content reorganization, and non-skippable videos ranked as the most annoying forms of advertising. Conversely, in-content ads without content reorganization, banners, and right rail ads were indicated as less intrusive options, seeming to strike a balance between effectiveness and user acceptance.
目前,部署数字广告的方法多种多样,人们利用先进技术制作出引人入胜的广告,甚至根据个人兴趣和偏好量身定制广告,但这些广告也可能会分散注意力,使人厌烦。本研究旨在通过评估当代数字广告方法对用户的烦扰程度,尤其是当这些方法分散用户注意力或导致常规在线活动延迟时,对其进行评估。为此,我们进行了一项眼动跟踪研究,让 51 名参与者浏览一个专门设计的网站,网站上有七种不同类型的广告,但没有特定内容,以避免广告内容对所收集数据的影响。参与者被要求在实验过程中执行特定的信息搜索任务,并在实验结束后报告他们是否记得看到过每种广告以及每种广告类型的烦扰程度。广告效果通过眼动跟踪指标(首次定格时间、平均定格时间、停留时间、定格次数和重访次数)来评估,这些指标描述了广告作为营销刺激的吸引力。研究结果表明,弹出式广告、内容重组广告和不可跳转视频是最令人讨厌的广告形式。相反,无内容重组的内容内广告、横幅广告和右栏广告则被认为是干扰性较小的选择,似乎在有效性和用户接受度之间取得了平衡。
{"title":"Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis","authors":"Stefanos Balaskas, Georgia Kotsari, Maria Rigou","doi":"10.3390/fi16040125","DOIUrl":"https://doi.org/10.3390/fi16040125","url":null,"abstract":"Currently, there are a wide range of approaches to deploying digital ads, with advanced technologies now being harnessed to craft advertising that is engaging and even tailored to personal interests and preferences, yet potentially distracting and irritating. This research seeks to evaluate contemporary digital advertising methods by assessing how annoying they are to users, particularly when they distract users from intended tasks or cause delays in regular online activities. To pursue this, an eye-tracking study was conducted, with 51 participants navigating a specially designed website featuring seven distinct types of advertisements without a specific content to avoid the effect of ad content on the collected data. Participants were asked to execute specific information-seeking tasks during the experiment and afterwards to report if they recalled seeing each ad and the degree of annoyance by each ad type. Ad effectiveness is assessed by eye-tracking metrics (time to first fixation, average fixation duration, dwell time, fixation count, and revisit count) depicting how appealing an ad is as a marketing stimulus. Findings indicated that pop-ups, ads with content reorganization, and non-skippable videos ranked as the most annoying forms of advertising. Conversely, in-content ads without content reorganization, banners, and right rail ads were indicated as less intrusive options, seeming to strike a balance between effectiveness and user acceptance.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140732125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Energy-Aware Security Mechanisms for the Internet of Things 物联网能源意识安全机制调查
IF 3.4 Q1 Computer Science Pub Date : 2024-04-08 DOI: 10.3390/fi16040128
Peixiong He, Yi Zhou, Xiao Qin
The Internet of Things (IoT) employs sensors and the Internet for information exchange, enabling intelligent identification, monitoring, and management, which has deeply impacted various sectors such as power, medical care, and security, transforming social activities and lifestyles. Regrettably, IoT systems suffer from two main challenges, namely sustainability and security. Hence, pondering how to enhance sustainable and energy-efficient practices for IoT systems to mitigate risks becomes a worthwhile endeavor. To address this issue, we conduct a survey of energy-aware security mechanisms in the Internet of Things. Specifically, we examine the challenges that IoT is facing in terms of energy efficiency and security, and we inspect current energy-saving and privacy-preserving technologies for IoT systems. Moreover, we delineate a vision for the future of IoT, emphasizing energy-aware security mechanisms. Finally, we outline the challenges encountered in achieving energy-aware security mechanisms, as well as the direction of future research. Motivated by this study, we envision advancements in the IoT that not only harness the benefits of science and technology but also enhance the security and safety of our data.
物联网(IoT)利用传感器和互联网进行信息交换,实现智能识别、监控和管理,它已深深影响到电力、医疗和安全等各个领域,改变着社会活动和生活方式。遗憾的是,物联网系统面临两大挑战,即可持续性和安全性。因此,思考如何加强物联网系统的可持续发展和能效实践以降低风险成为一项值得努力的工作。为了解决这个问题,我们对物联网中的能源感知安全机制进行了调查。具体来说,我们研究了物联网在能效和安全方面面临的挑战,并考察了当前物联网系统的节能和隐私保护技术。此外,我们还描绘了物联网的未来愿景,强调了能源感知安全机制。最后,我们概述了在实现能源感知安全机制方面遇到的挑战以及未来的研究方向。在这项研究的推动下,我们设想物联网的进步不仅能利用科学技术的优势,还能增强数据的安全性。
{"title":"A Survey on Energy-Aware Security Mechanisms for the Internet of Things","authors":"Peixiong He, Yi Zhou, Xiao Qin","doi":"10.3390/fi16040128","DOIUrl":"https://doi.org/10.3390/fi16040128","url":null,"abstract":"The Internet of Things (IoT) employs sensors and the Internet for information exchange, enabling intelligent identification, monitoring, and management, which has deeply impacted various sectors such as power, medical care, and security, transforming social activities and lifestyles. Regrettably, IoT systems suffer from two main challenges, namely sustainability and security. Hence, pondering how to enhance sustainable and energy-efficient practices for IoT systems to mitigate risks becomes a worthwhile endeavor. To address this issue, we conduct a survey of energy-aware security mechanisms in the Internet of Things. Specifically, we examine the challenges that IoT is facing in terms of energy efficiency and security, and we inspect current energy-saving and privacy-preserving technologies for IoT systems. Moreover, we delineate a vision for the future of IoT, emphasizing energy-aware security mechanisms. Finally, we outline the challenges encountered in achieving energy-aware security mechanisms, as well as the direction of future research. Motivated by this study, we envision advancements in the IoT that not only harness the benefits of science and technology but also enhance the security and safety of our data.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm 基于改进羊群优化算法的异构多无人机系统任务分配
IF 3.4 Q1 Computer Science Pub Date : 2024-04-07 DOI: 10.3390/fi16040124
Haibo Liu, Yang Liao, Changting Shi, Jing Shen
The objective of task allocation in unmanned systems is to complete tasks at minimal costs. However, the current algorithms employed for coordinating multiple unmanned systems in task allocation tasks frequently converge to local optima, thus impeding the identification of the best solutions. To address these challenges, this study builds upon the sheep flock optimization algorithm (SFOA) by preserving individuals eliminated during the iterative process within a prior knowledge set, which is continuously updated. During the reproduction phase of the algorithm, this prior knowledge is utilized to guide the generation of new individuals, preventing their rapid reconvergence to local optima. This approach aids in reducing the frequency at which the algorithm converges to local optima, continually steering the algorithm towards the global optimum and thereby enhancing the efficiency of task allocation. Finally, various task scenarios are presented to evaluate the performances of various algorithms. The results show that the algorithm proposed in this paper is more likely than other algorithms to escape from local optima and find the global optimum.
无人系统任务分配的目标是以最小的成本完成任务。然而,目前用于协调多个无人系统执行任务分配任务的算法经常收敛到局部最优,从而阻碍了最佳解决方案的确定。为了应对这些挑战,本研究以羊群优化算法(SFOA)为基础,将迭代过程中淘汰的个体保留在先验知识集中,并不断更新先验知识集。在算法的繁殖阶段,利用这些先验知识来指导新个体的生成,防止它们快速重新趋同于局部最优。这种方法有助于降低算法收敛到局部最优的频率,不断引导算法走向全局最优,从而提高任务分配的效率。最后,介绍了各种任务场景,以评估各种算法的性能。结果表明,本文提出的算法比其他算法更有可能摆脱局部最优并找到全局最优。
{"title":"Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm","authors":"Haibo Liu, Yang Liao, Changting Shi, Jing Shen","doi":"10.3390/fi16040124","DOIUrl":"https://doi.org/10.3390/fi16040124","url":null,"abstract":"The objective of task allocation in unmanned systems is to complete tasks at minimal costs. However, the current algorithms employed for coordinating multiple unmanned systems in task allocation tasks frequently converge to local optima, thus impeding the identification of the best solutions. To address these challenges, this study builds upon the sheep flock optimization algorithm (SFOA) by preserving individuals eliminated during the iterative process within a prior knowledge set, which is continuously updated. During the reproduction phase of the algorithm, this prior knowledge is utilized to guide the generation of new individuals, preventing their rapid reconvergence to local optima. This approach aids in reducing the frequency at which the algorithm converges to local optima, continually steering the algorithm towards the global optimum and thereby enhancing the efficiency of task allocation. Finally, various task scenarios are presented to evaluate the performances of various algorithms. The results show that the algorithm proposed in this paper is more likely than other algorithms to escape from local optima and find the global optimum.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140733611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks 物联网-雾网络下基于最小成本的容错邻居节点发现方案
IF 3.4 Q1 Computer Science Pub Date : 2024-04-03 DOI: 10.3390/fi16040123
Premalatha Baskar, P. Periasamy
The exponential growth in data traffic in the real world has drawn attention to the emerging computing technique called Fog Computing (FC) for offloading tasks in fault-free environments. This is a promising computing standard that offers higher computing benefits with a reduced cost, higher flexibility, and increased availability. With the increased number of tasks, the occurrence of faults increases and affects the offloading of tasks. A suitable mechanism is essential to rectify the faults that occur in the Fog network. In this research, the fault-tolerance (FT) mechanism is proposed based on cost optimization and fault minimization. Initially, the faulty nodes are identified based on the remaining residual energy with the proposed Priority Task-based Fault-Tolerance (PTFT) mechanism. The Minimum-Cost Neighbour Candidate Node Discovery (MCNCND) algorithm is proposed to discover the neighbouring candidate Fog access node that can replace the faulty Fog node. The Replication and Pre-emptive Forwarding (RPF) algorithm is proposed to forward the task information to the new candidate Fog access node for reliable transmission. These proposed mechanisms are simulated, analysed, and compared with existing FT methods. It is observed that the proposed FT mechanism improves the utilization of an active number of Fog access nodes. It also saved a residual energy of 1.55 J without replicas, compared to the 0.85 J of energy that is used without the FT method.
现实世界中数据流量的指数级增长引起了人们对新兴计算技术的关注,这种技术被称为雾计算(FC),用于在无故障环境中卸载任务。这是一种前景广阔的计算标准,可在降低成本、提高灵活性和可用性的同时提供更高的计算效益。随着任务数量的增加,故障发生率也随之增加,并影响任务的卸载。一个合适的机制对于纠正雾网络中出现的故障至关重要。本研究提出了基于成本优化和故障最小化的容错(FT)机制。首先,利用提出的基于优先任务的容错(PTFT)机制,根据剩余能量识别故障节点。提出了最小成本邻近候选节点发现(MCNCND)算法,以发现可替代故障雾节点的邻近候选雾接入节点。提出了复制和抢先转发(RPF)算法,将任务信息转发到新的候选雾接入节点,以实现可靠传输。对这些建议的机制进行了模拟、分析,并与现有的 FT 方法进行了比较。结果表明,所提出的 FT 机制提高了活跃的雾接入节点数量的利用率。与不使用 FT 方法的 0.85 J 能量相比,它还节省了 1.55 J 的无副本剩余能量。
{"title":"Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks","authors":"Premalatha Baskar, P. Periasamy","doi":"10.3390/fi16040123","DOIUrl":"https://doi.org/10.3390/fi16040123","url":null,"abstract":"The exponential growth in data traffic in the real world has drawn attention to the emerging computing technique called Fog Computing (FC) for offloading tasks in fault-free environments. This is a promising computing standard that offers higher computing benefits with a reduced cost, higher flexibility, and increased availability. With the increased number of tasks, the occurrence of faults increases and affects the offloading of tasks. A suitable mechanism is essential to rectify the faults that occur in the Fog network. In this research, the fault-tolerance (FT) mechanism is proposed based on cost optimization and fault minimization. Initially, the faulty nodes are identified based on the remaining residual energy with the proposed Priority Task-based Fault-Tolerance (PTFT) mechanism. The Minimum-Cost Neighbour Candidate Node Discovery (MCNCND) algorithm is proposed to discover the neighbouring candidate Fog access node that can replace the faulty Fog node. The Replication and Pre-emptive Forwarding (RPF) algorithm is proposed to forward the task information to the new candidate Fog access node for reliable transmission. These proposed mechanisms are simulated, analysed, and compared with existing FT methods. It is observed that the proposed FT mechanism improves the utilization of an active number of Fog access nodes. It also saved a residual energy of 1.55 J without replicas, compared to the 0.85 J of energy that is used without the FT method.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140746890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios 基于 SDN 的铁路与公路共存场景下的安全共同应急服务
IF 3.4 Q1 Computer Science Pub Date : 2024-04-02 DOI: 10.3390/fi16040122
Radheshyam Singh, Léo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau, Lars Dittmann
In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Transport Systems (C-ITSs). In this paper, a software-defined networking (SDN)-based common emergency service is developed and validated for a railway and road telecommunication shared infrastructure. Along with this, the developed application is capable of reducing the chances of distributed denial-of-service (DDoS) situations. A level-crossing scenario is considered to demonstrate the developed solution where railway tracks are perpendicular to the roads. Two cases are considered to validate and analyze the developed SDN application for common emergency scenarios. In case 1, no cross-communication is available between the road and railway domains. In this case, emergency message distribution is carried out by the assigned emergency servers with the help of the SDN controller. In case 2, nodes (cars and trains) are defined with two wireless interfaces, and one interface is reserved for emergency data communication. To add the DDoS resiliency to the developed system the messaging behavior of each node is observed and if an abnormality is detected, packets are dropped to avoid malicious activity.
在不久的将来,人们将更加重视公路和铁路之间的网络资源共享,以提高运输效率,降低基础设施成本。这将促进全球合作智能交通系统(C-ITS)的发展。本文为铁路和公路电信共享基础设施开发并验证了基于软件定义网络(SDN)的通用应急服务。此外,所开发的应用程序还能降低分布式拒绝服务(DDoS)情况的发生几率。为演示所开发的解决方案,考虑了铁路轨道与公路垂直的平交场景。为验证和分析针对常见紧急情况开发的 SDN 应用,考虑了两种情况。在情况 1 中,公路和铁路域之间没有交叉通信。在这种情况下,由指定的应急服务器在 SDN 控制器的帮助下进行应急信息分发。在情况 2 中,节点(汽车和火车)被定义为具有两个无线接口,其中一个接口被保留用于应急数据通信。为了在开发的系统中增加 DDoS 弹性,每个节点的信息传输行为都会被观察到,如果检测到异常,数据包就会被丢弃,以避免恶意活动。
{"title":"SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios","authors":"Radheshyam Singh, Léo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau, Lars Dittmann","doi":"10.3390/fi16040122","DOIUrl":"https://doi.org/10.3390/fi16040122","url":null,"abstract":"In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Transport Systems (C-ITSs). In this paper, a software-defined networking (SDN)-based common emergency service is developed and validated for a railway and road telecommunication shared infrastructure. Along with this, the developed application is capable of reducing the chances of distributed denial-of-service (DDoS) situations. A level-crossing scenario is considered to demonstrate the developed solution where railway tracks are perpendicular to the roads. Two cases are considered to validate and analyze the developed SDN application for common emergency scenarios. In case 1, no cross-communication is available between the road and railway domains. In this case, emergency message distribution is carried out by the assigned emergency servers with the help of the SDN controller. In case 2, nodes (cars and trains) are defined with two wireless interfaces, and one interface is reserved for emergency data communication. To add the DDoS resiliency to the developed system the messaging behavior of each node is observed and if an abnormality is detected, packets are dropped to avoid malicious activity.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140751690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1