首页 > 最新文献

2020 IEEE International Conference on Smart Internet of Things (SmartIoT)最新文献

英文 中文
Research of Power Energy Management Control Strategy with IOT in NZEB NZEB基于物联网的电力能源管理控制策略研究
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00057
Qingguang Yu, Zhicheng Jiang, Yuming Liu, G. Long
With the development of the nearly zero energy buildings (NEZB) technology and IOT, people have higher requirements for power energy management. In this paper, design and accomplishment of control strategy with IOT based on NEZB in smart microgrid were proposed. The structure of smart microgrid supervisory control and data acquisition (SCADA) system was designed to achieve online monitoring of energy consumption and environment parameters. The control strategy of power management was carried out. Finally, the designed control strategy of smart microgrid is adopted in the actual project of NEZB.
随着近零能耗建筑(NEZB)技术和物联网的发展,人们对电能管理提出了更高的要求。本文提出了基于NEZB的物联网智能微电网控制策略的设计与实现。设计了智能微电网监控与数据采集(SCADA)系统结构,实现对能耗和环境参数的在线监测。提出了电源管理控制策略。最后,将所设计的智能微电网控制策略应用于新京城实际工程中。
{"title":"Research of Power Energy Management Control Strategy with IOT in NZEB","authors":"Qingguang Yu, Zhicheng Jiang, Yuming Liu, G. Long","doi":"10.1109/SmartIoT49966.2020.00057","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00057","url":null,"abstract":"With the development of the nearly zero energy buildings (NEZB) technology and IOT, people have higher requirements for power energy management. In this paper, design and accomplishment of control strategy with IOT based on NEZB in smart microgrid were proposed. The structure of smart microgrid supervisory control and data acquisition (SCADA) system was designed to achieve online monitoring of energy consumption and environment parameters. The control strategy of power management was carried out. Finally, the designed control strategy of smart microgrid is adopted in the actual project of NEZB.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115216819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Theoretical Modelling of Smart Meter Privacy Protection with Multi-meter Energy Routing 基于多表能量路由的智能电表隐私保护理论建模
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00029
Cankut Ergen, B. Gulbahar
Potential of intrusion during smart meter data collection is an important problem for household privacy in next-generation smart homes. There are various privacy protection methods such as hiding the real usage with renewable batteries (RBs) and encrypted communication. There are privacy threats due to the detection of the energy transfer through RBs while encryption-based methods result in high computational complexity. In this study, a novel privacy improvement mechanism is proposed based on the routing of energy through multiple smart meters among multiple houses in a neighborhood. The optimization of privacy based on uniform randomization is theoretically modeled and some heuristic solutions are presented. In this method, energy transfer is randomly distributed among multiple smart meters, real usage of a house is buffered with the RB and smart meter indices are randomly selected. In numerical simulations, privacy improvement is shown by utilizing the random selection of smart meter indices for randomizing the energy routing and the buffers of RBs. Furthermore, energy privacy (EP) metric validating the simulation results is defined. Energy routing with multiple smart meters provides a practical and low complexity privacy protection mechanism for next-generation smart grid architectures.
智能电表数据采集过程中的入侵隐患是下一代智能家居中家庭隐私的重要问题。有多种隐私保护方法,如隐藏可再生电池(RBs)的真实使用情况和加密通信。由于检测到通过RBs的能量传输,存在隐私威胁,而基于加密的方法导致高计算复杂度。在本研究中,提出了一种新的隐私改善机制,该机制基于社区中多个房屋之间通过多个智能电表进行能源路由。对基于均匀随机化的隐私优化问题进行了理论建模,并给出了一些启发式解决方案。该方法将能量传递随机分布在多个智能电表之间,用RB缓冲房屋的实际用电量,随机选择智能电表指标。在数值模拟中,利用随机选择智能电表指标来随机化RBs的能量路由和缓冲区,可以提高隐私性。此外,还定义了验证仿真结果的能量隐私度量。多智能电表的能量路由为下一代智能电网架构提供了一种实用、低复杂度的隐私保护机制。
{"title":"Theoretical Modelling of Smart Meter Privacy Protection with Multi-meter Energy Routing","authors":"Cankut Ergen, B. Gulbahar","doi":"10.1109/SmartIoT49966.2020.00029","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00029","url":null,"abstract":"Potential of intrusion during smart meter data collection is an important problem for household privacy in next-generation smart homes. There are various privacy protection methods such as hiding the real usage with renewable batteries (RBs) and encrypted communication. There are privacy threats due to the detection of the energy transfer through RBs while encryption-based methods result in high computational complexity. In this study, a novel privacy improvement mechanism is proposed based on the routing of energy through multiple smart meters among multiple houses in a neighborhood. The optimization of privacy based on uniform randomization is theoretically modeled and some heuristic solutions are presented. In this method, energy transfer is randomly distributed among multiple smart meters, real usage of a house is buffered with the RB and smart meter indices are randomly selected. In numerical simulations, privacy improvement is shown by utilizing the random selection of smart meter indices for randomizing the energy routing and the buffers of RBs. Furthermore, energy privacy (EP) metric validating the simulation results is defined. Energy routing with multiple smart meters provides a practical and low complexity privacy protection mechanism for next-generation smart grid architectures.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Study on Impact of Node Selfishness on Performance of MANETs 节点自利对manet性能影响的定量研究
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00011
Axida Shan, Xiumei Fan, Xinghui Zhang
Mobile ad hoc networks (MANETs) are kinds of wireless networks that are various features like dynamic mobility, constraint resources, fully decentralized etc. The communication among the nodes highly depends on the cooperation between nodes. Data forwarding is the main task during the communication process. Because of constraint of limited resources, it is rational that some nodes behave selfishly and refuse to burden forwarding tasks for others. In this paper, we quantitatively investigate the impacts of node selfishness in MANETs from various aspects, including mobility, presence, and combination of selfish nodes. The network performance is assessed in terms of average packet delivery ratio and average end-to-end delay. We carried out extensive simulations on OMNeT++ platform and analyzed the results. Our results quantitatively showed that node selfishness has significant impacts on the communication performance in MANETs. As a result, our experimental results imply that the impact of node selfishness should be evaluated in an integrated way of mobility, presence and combination.
移动自组织网络(manet)是一种具有动态移动性、资源约束、完全去中心化等特点的无线网络。节点之间的通信高度依赖于节点之间的协作。数据转发是通信过程中的主要任务。由于有限资源的约束,一些节点表现出自私的行为,拒绝为其他节点承担转发任务是合理的。本文从自利节点的移动性、存在性和组合等方面定量研究了自利节点对manet的影响。网络性能是根据平均分组传送率和平均端到端延迟来评估的。在omnet++平台上进行了大量的仿真,并对仿真结果进行了分析。我们的研究结果定量地表明,节点自利对manet的通信性能有显著影响。因此,我们的实验结果表明,应该以移动性、存在性和组合性的综合方式来评估节点自利的影响。
{"title":"Quantitative Study on Impact of Node Selfishness on Performance of MANETs","authors":"Axida Shan, Xiumei Fan, Xinghui Zhang","doi":"10.1109/SmartIoT49966.2020.00011","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00011","url":null,"abstract":"Mobile ad hoc networks (MANETs) are kinds of wireless networks that are various features like dynamic mobility, constraint resources, fully decentralized etc. The communication among the nodes highly depends on the cooperation between nodes. Data forwarding is the main task during the communication process. Because of constraint of limited resources, it is rational that some nodes behave selfishly and refuse to burden forwarding tasks for others. In this paper, we quantitatively investigate the impacts of node selfishness in MANETs from various aspects, including mobility, presence, and combination of selfish nodes. The network performance is assessed in terms of average packet delivery ratio and average end-to-end delay. We carried out extensive simulations on OMNeT++ platform and analyzed the results. Our results quantitatively showed that node selfishness has significant impacts on the communication performance in MANETs. As a result, our experimental results imply that the impact of node selfishness should be evaluated in an integrated way of mobility, presence and combination.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Resource Allocation Overheads in Vehicle Ad Hoc Network Considering CSI 考虑CSI的车载自组网资源分配开销分析
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00058
M. Ao, Xin Zhang
The problem of overheads caused by resource allocation in vehicle ad hoc network (VANET) has become an issue attracting more and more attention. Recently, 3GPP has introduced channel state information (CSI) report into NR V2X as a new and important technical feature. Therefore, by considering the channel state of the vehicle nodes, this paper proposes an improved permutation model based on our previous work where the overheads related to channel state were not treated in a differentiated manner. It is assumed that the nodes in good channel state would have priority to occupy resources first, while the nodes in bad channel state are not allowed to participate in resource allocation, and the CSIs representing bad channel state are assumed to be compressed or saved. In this way, the overheads of resource allocation in VANET can be reduced, thus leading to the potential performance improvement of the overall system. This result is verified by simulation experiments, which show the proposed model may work as a better optimizing guideline for achieving good performance gain.
车载自组织网络(VANET)中资源分配引起的开销问题越来越受到人们的关注。最近,3GPP将信道状态信息(CSI)报告作为一项新的重要技术特性引入了NR V2X。因此,考虑到车辆节点的通道状态,本文在前人的基础上提出了一种改进的排列模型,该模型不区分处理与通道状态相关的开销。假设处于良好通道状态的节点优先占用资源,而处于不良通道状态的节点不允许参与资源分配,并假设表示不良通道状态的csi被压缩或保存。这样,可以减少VANET中资源分配的开销,从而导致整个系统的潜在性能改进。仿真实验验证了这一结果,表明该模型可以作为较好的优化准则,获得较好的性能增益。
{"title":"Analysis of Resource Allocation Overheads in Vehicle Ad Hoc Network Considering CSI","authors":"M. Ao, Xin Zhang","doi":"10.1109/SmartIoT49966.2020.00058","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00058","url":null,"abstract":"The problem of overheads caused by resource allocation in vehicle ad hoc network (VANET) has become an issue attracting more and more attention. Recently, 3GPP has introduced channel state information (CSI) report into NR V2X as a new and important technical feature. Therefore, by considering the channel state of the vehicle nodes, this paper proposes an improved permutation model based on our previous work where the overheads related to channel state were not treated in a differentiated manner. It is assumed that the nodes in good channel state would have priority to occupy resources first, while the nodes in bad channel state are not allowed to participate in resource allocation, and the CSIs representing bad channel state are assumed to be compressed or saved. In this way, the overheads of resource allocation in VANET can be reduced, thus leading to the potential performance improvement of the overall system. This result is verified by simulation experiments, which show the proposed model may work as a better optimizing guideline for achieving good performance gain.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement 一种M2M通信和物联网安全的自动密钥更新机制
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00067
Weng-Chung Tsai, Tzu-Hsuan Tsai, Guang-Hao Xiao, Te-Jen Wang, Yu-Ruei Lian, Song-Hao Huang
An Internet-of-Things (IoT) system is generally composed of endpoint clients, network devices, and cloud servers. As such, data transfers in the network are full of security concerns. Besides, coming booming IoT applications will accelerate the network infrastructure to provide timely and safe information exchange services. Existing network could have a shortcoming of static key authentication. To enable an automatic key-update mechanism for IoT devices to enhance security in Machine-toĮMachine (M2M) communications, we implemented a lightweight key-update mechanism based on the libcoap library. Experimental results show that just 1.03% latency overhead is added for a better security performance.
物联网(IoT)系统通常由终端客户端、网络设备和云服务器组成。因此,网络中的数据传输充满了安全问题。此外,未来蓬勃发展的物联网应用将加速网络基础设施提供及时、安全的信息交换服务。现有网络存在静态密钥认证的缺点。为了使物联网设备的自动密钥更新机制能够增强Machine-toĮMachine (M2M)通信的安全性,我们实现了基于libcoap库的轻量级密钥更新机制。实验结果表明,只需增加1.03%的延迟开销即可获得更好的安全性能。
{"title":"An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement","authors":"Weng-Chung Tsai, Tzu-Hsuan Tsai, Guang-Hao Xiao, Te-Jen Wang, Yu-Ruei Lian, Song-Hao Huang","doi":"10.1109/SmartIoT49966.2020.00067","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00067","url":null,"abstract":"An Internet-of-Things (IoT) system is generally composed of endpoint clients, network devices, and cloud servers. As such, data transfers in the network are full of security concerns. Besides, coming booming IoT applications will accelerate the network infrastructure to provide timely and safe information exchange services. Existing network could have a shortcoming of static key authentication. To enable an automatic key-update mechanism for IoT devices to enhance security in Machine-toĮMachine (M2M) communications, we implemented a lightweight key-update mechanism based on the libcoap library. Experimental results show that just 1.03% latency overhead is added for a better security performance.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"111 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Approach for Intrusive Appliance Load Monitoring in Smart Home 智能家居中侵入式电器负荷监测的混合方法
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00031
V. K. Nguyen, Minh-Hieu Phan, W. Zhang, Quan Z. Sheng, T. D. Vo
Appliance Load Monitoring (ALM) has become a crucial task in energy sector since the residential loads have been ever-increasing in the recent years. Several studies have been undertaken to monitor energy consumption of household appliances while also analyze the power data to obtain more useful insights of consumers’ behaviors. The remaining challenge of the recent approaches is automatic appliance recognition. In this work, we propose a novel hybrid method which includes two main processes, namely the feature importance process and the appliance identification process. In the first phase, feature importance process extracts the temporal trends. We then replace the classification layer of Convolutional Neural Network (CNN) by the SVM classifier; thereby achieving a set of important features which is data input for the next phase. After that, we set the CNN’s weights based on the analyzed feature importance of SVM, instead of initializing weights randomly. As a result, the proposed method of this study outperformed other approaches with more than 90% for both of accuracy and macro F1-score.
近年来,随着居民用电负荷的不断增加,家电负荷监测已成为能源领域的一项重要任务。已经进行了几项研究,以监测家用电器的能源消耗,同时分析电力数据,以获得对消费者行为更有用的见解。最近的方法面临的另一个挑战是自动设备识别。在这项工作中,我们提出了一种新的混合方法,该方法包括两个主要过程,即特征重要性过程和器具识别过程。在第一阶段,特征重要性过程提取时间趋势。然后用SVM分类器替换卷积神经网络(CNN)的分类层;从而获得一组重要的特征,这些特征是下一阶段的数据输入。之后,我们根据SVM分析的特征重要度来设置CNN的权值,而不是随机初始化权值。因此,本研究提出的方法在准确率和宏观f1评分方面都优于其他方法,均超过90%。
{"title":"A Hybrid Approach for Intrusive Appliance Load Monitoring in Smart Home","authors":"V. K. Nguyen, Minh-Hieu Phan, W. Zhang, Quan Z. Sheng, T. D. Vo","doi":"10.1109/SmartIoT49966.2020.00031","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00031","url":null,"abstract":"Appliance Load Monitoring (ALM) has become a crucial task in energy sector since the residential loads have been ever-increasing in the recent years. Several studies have been undertaken to monitor energy consumption of household appliances while also analyze the power data to obtain more useful insights of consumers’ behaviors. The remaining challenge of the recent approaches is automatic appliance recognition. In this work, we propose a novel hybrid method which includes two main processes, namely the feature importance process and the appliance identification process. In the first phase, feature importance process extracts the temporal trends. We then replace the classification layer of Convolutional Neural Network (CNN) by the SVM classifier; thereby achieving a set of important features which is data input for the next phase. After that, we set the CNN’s weights based on the analyzed feature importance of SVM, instead of initializing weights randomly. As a result, the proposed method of this study outperformed other approaches with more than 90% for both of accuracy and macro F1-score.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SmartIoT 2020 Commentary
Pub Date : 2020-08-01 DOI: 10.1109/smartiot49966.2020.00002
{"title":"SmartIoT 2020 Commentary","authors":"","doi":"10.1109/smartiot49966.2020.00002","DOIUrl":"https://doi.org/10.1109/smartiot49966.2020.00002","url":null,"abstract":"","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"60 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130836522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor 基于MULTOS物联网信任锚的Kyber性能评估与优化
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00010
K. Mayes
The Internet of Things (IoT) may be considered as a distributed, critical infrastructure, consisting of billions of devices, many of which having limited processing capability. However, the security of IoT must not be compromised by these limitations, and defenses need to protect against today's threats, and those predicted for the future. This requires protection against implementation attacks, as well as the ability to load, replace and run, best-practice cryptographic algorithms. Post-Quantum cryptographic algorithms are attracting great interest, and NIST standardization has a competition to find the best. Prior research demonstrated that a Learning With Errors candidate algorithm could be implemented on a smart card chip, however this was a low-level implementation, and not representative of loading the algorithm onto a secured IoT chip platform. In this paper we present analysis from a practical implementation of the Kyber768 CPAPKE public key encryption component on a MULTOS IoT Trust-Anchor chip. The investigation considered memory and speed requirements, and optimizations, and compared the NTT transform version of Kyber, presented in Round 1 of the NIST competition, with the Kroenecker multiplier technique that exploits a hardware crypto-coprocessor. The work began with a generic multi-round multiplier approach, which was then improved using a novel modification of the input data, allowing a built-in modular multiply function to be used, significantly increasing the speed of a multiplication round, and doubling the useable size of the hardware multiplier.
物联网(IoT)可以被视为一个分布式的关键基础设施,由数十亿个设备组成,其中许多设备的处理能力有限。然而,物联网的安全性绝不能受到这些限制的影响,防御措施需要防范当前和未来的威胁。这需要防止实现攻击,以及加载、替换和运行最佳实践加密算法的能力。后量子加密算法正引起人们极大的兴趣,NIST的标准化工作正在进行竞争,以找到最好的算法。先前的研究表明,有错误的学习候选算法可以在智能卡芯片上实现,但这是一个低级的实现,并不能代表将算法加载到安全的物联网芯片平台上。在本文中,我们分析了Kyber768 capke公钥加密组件在MULTOS物联网信任锚芯片上的实际实现。该调查考虑了内存和速度需求以及优化,并将NTT转换版本的Kyber(在NIST竞赛的第一轮中提出)与利用硬件加密协处理器的Kroenecker乘法器技术进行了比较。这项工作从通用的多轮乘法器方法开始,然后通过对输入数据的新颖修改对其进行改进,允许使用内置的模块化乘法函数,从而显着提高乘法轮的速度,并将硬件乘法器的可用大小增加一倍。
{"title":"Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor","authors":"K. Mayes","doi":"10.1109/SmartIoT49966.2020.00010","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00010","url":null,"abstract":"The Internet of Things (IoT) may be considered as a distributed, critical infrastructure, consisting of billions of devices, many of which having limited processing capability. However, the security of IoT must not be compromised by these limitations, and defenses need to protect against today's threats, and those predicted for the future. This requires protection against implementation attacks, as well as the ability to load, replace and run, best-practice cryptographic algorithms. Post-Quantum cryptographic algorithms are attracting great interest, and NIST standardization has a competition to find the best. Prior research demonstrated that a Learning With Errors candidate algorithm could be implemented on a smart card chip, however this was a low-level implementation, and not representative of loading the algorithm onto a secured IoT chip platform. In this paper we present analysis from a practical implementation of the Kyber768 CPAPKE public key encryption component on a MULTOS IoT Trust-Anchor chip. The investigation considered memory and speed requirements, and optimizations, and compared the NTT transform version of Kyber, presented in Round 1 of the NIST competition, with the Kroenecker multiplier technique that exploits a hardware crypto-coprocessor. The work began with a generic multi-round multiplier approach, which was then improved using a novel modification of the input data, allowing a built-in modular multiply function to be used, significantly increasing the speed of a multiplication round, and doubling the useable size of the hardware multiplier.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fork Probability Analysis of PoUW Consensus Mechanism pow共识机制的分叉概率分析
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00060
Zhijie Ma, Qinglin Zhao, Jianwen Yuan, Xiaobo Zhou, Li Feng
In Blockchain, fork is a fundamental impediment to consensus mechanisms such as Proof-of-Work (PoW). In this paper, we study the fork probability of the famous Proof-of-Useful-Work (PoUW) consensus mechanism, which has recently been proposed to solve the huge waste of computing resources in PoW. With PoUW, each miner first does useful work (e.g., data classification), and then competes for the leader according to the number of the executed CPU instructions. Compared with conventional factors such as network delay, the time of doing useful work is a new and salient factor leading to a fork for a PoUW-based blockchain. Taking into account some important factors (e.g., the time of doing useful work, computational power, network delay), we propose a theoretical model to characterize the impact of these factors on the PoUW fork probability. Extensive simulations verify that our model is very accurate. This study is helpful for providing guidance of configuring PoUW parameters.
在区块链中,分叉是工作量证明(PoW)等共识机制的根本障碍。在本文中,我们研究了著名的PoW (proof -of-有用工作证明)共识机制的分叉概率,该机制是最近提出的,用于解决PoW中计算资源的巨大浪费。使用PoUW,每个矿工首先做有用的工作(例如,数据分类),然后根据执行的CPU指令的数量竞争领导者。与网络延迟等传统因素相比,做有用工作的时间是导致基于power的区块链分叉的一个新的突出因素。考虑到一些重要的因素(例如,做有用工作的时间,计算能力,网络延迟),我们提出了一个理论模型来表征这些因素对pow分叉概率的影响。大量的仿真验证了我们的模型是非常准确的。本文的研究结果有助于为电源参数的配置提供指导。
{"title":"Fork Probability Analysis of PoUW Consensus Mechanism","authors":"Zhijie Ma, Qinglin Zhao, Jianwen Yuan, Xiaobo Zhou, Li Feng","doi":"10.1109/SmartIoT49966.2020.00060","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00060","url":null,"abstract":"In Blockchain, fork is a fundamental impediment to consensus mechanisms such as Proof-of-Work (PoW). In this paper, we study the fork probability of the famous Proof-of-Useful-Work (PoUW) consensus mechanism, which has recently been proposed to solve the huge waste of computing resources in PoW. With PoUW, each miner first does useful work (e.g., data classification), and then competes for the leader according to the number of the executed CPU instructions. Compared with conventional factors such as network delay, the time of doing useful work is a new and salient factor leading to a fork for a PoUW-based blockchain. Taking into account some important factors (e.g., the time of doing useful work, computational power, network delay), we propose a theoretical model to characterize the impact of these factors on the PoUW fork probability. Extensive simulations verify that our model is very accurate. This study is helpful for providing guidance of configuring PoUW parameters.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Link Prediction Based on Information Preference Connection for Directed Network 基于信息偏好连接的有向网络链路预测
Pub Date : 2020-08-01 DOI: 10.1109/SmartIoT49966.2020.00035
Xuelei Zhao, Xinsheng Ji, Shuxin Liu, Zanyuan He
Link prediction aims to predict undetected or unknown links through network information. Most prediction indicators depend on local topology but ignore the pivot role of nodes. Aiming at the problem of topological sparseness in some directed scale-free networks, a preference attachment method based on Shannon theory is proposed to measure the relevance of information from the perspective of nodes. This paper defined the nodes self-information while analyzing nodes interaction process and the conditional information while analyzing the conditional probability of effective interaction based on information theory, and use them designed a new predict indicator. Experiments on 9 scale-free networks show that the proposed method has a better improvement under the Precision metrics.
链路预测的目的是通过网络信息对未检测到或未知的链路进行预测。大多数预测指标依赖于局部拓扑,而忽略了节点的支点作用。针对一些有向无标度网络的拓扑稀疏性问题,提出了一种基于Shannon理论的偏好依恋方法,从节点的角度度量信息的相关性。本文基于信息论,在分析节点交互过程时定义节点自信息,在分析有效交互条件概率时定义节点条件信息,并利用它们设计了新的预测指标。在9个无标度网络上的实验表明,该方法在精度指标下有较好的改进。
{"title":"Link Prediction Based on Information Preference Connection for Directed Network","authors":"Xuelei Zhao, Xinsheng Ji, Shuxin Liu, Zanyuan He","doi":"10.1109/SmartIoT49966.2020.00035","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00035","url":null,"abstract":"Link prediction aims to predict undetected or unknown links through network information. Most prediction indicators depend on local topology but ignore the pivot role of nodes. Aiming at the problem of topological sparseness in some directed scale-free networks, a preference attachment method based on Shannon theory is proposed to measure the relevance of information from the perspective of nodes. This paper defined the nodes self-information while analyzing nodes interaction process and the conditional information while analyzing the conditional probability of effective interaction based on information theory, and use them designed a new predict indicator. Experiments on 9 scale-free networks show that the proposed method has a better improvement under the Precision metrics.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE International Conference on Smart Internet of Things (SmartIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1