Mohit Taneja, A. Davy
Hasil untuk "iot"
Menampilkan 20 dari ~486175 hasil · dari arXiv, DOAJ, Semantic Scholar, CrossRef
Vasileios A. Memos, K. Psannis, Y. Ishibashi et al.
Abstract Internet of Things (IoT) is the new technological revolution that aspires to connect all the everyday physical objects to the Internet, making a huge global network of uniquely things which can share information amongst each other and complete scheduled tasks, bringing significant benefits to users and companies of a Smart City (SC). A Smart City represents a new future framework, which integrates multiple information and communication technology (ICT) and Internet of Things (IoT) solutions, so as to improve the quality life of its citizens. However, there are many security and privacy issues which must be taken into account before the official launching of this new technological concept. Many methods which focus on media security of wireless sensor networks have been proposed and can be adopted in the new expandable network of IoT. In this paper, we describe the upcoming IoT network architecture and its security challenges and analyze the most important researches on media security and privacy in wireless sensor networks (WSNs). Subsequently, we propose an Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT network for Smart City Framework, which merges two algorithms introduced by other researchers for WSN packet routing and security, while it reclaims the new media compression standard, High Efficiency Video Coding (HEVC). Experimental analysis shows the efficacy of our proposed scheme in terms of users’ privacy, media security, and sensor node memory requirements. This scheme can be successfully integrated into the IoT network of the upcoming Smart City concept.
D. Minoli, B. Occhiogrosso
Abstract The deployment of Internet of Things (IoT) results in an enlarged attack surface that requires end-to-end security mitigation. IoT applications range from mission-critical predicaments (e.g., Smart Grid, Intelligent Transportation Systems, video surveillance, e-health) to business-oriented applications (e.g., banking, logistics, insurance, and contract law). There is a need for comprehensive support of security in the IoT, especially for mission-critical applications, but also for the down-stream business applications. A number of security techniques and approaches have been proposed and/or utilized. Blockchain mechanisms (BCMs) play a role in securing many IoT-oriented applications by becoming part of a security mosaic, in the context of a defenses-in-depth/Castle Approach. A blockchain is a database that stores all processed transactions – or data – in chronological order, in a set of computer memories that are tamperproof to adversaries. These transactions are then shared by all participating users. Information is stored and/or published as a public ledger that is infeasible to modify; every user or node in the system retains the same ledger as all other users or nodes in the network. This paper highlights some IoT environments where BCMs play an important role, while at the same time pointing out that BCMs are only part of the IoT Security (IoTSec) solution.
F. Alam, Rashid Mehmood, Iyad A. Katib et al.
The Internet of Things (IoT) is set to become one of the key technological developments of our times provided we are able to realize its full potential. The number of objects connected to IoT is expected to reach 50 billion by 2020 due to the massive influx of diverse objects emerging progressively. IoT, hence, is expected to be a major producer of big data. Sharing and collaboration of data and other resources would be the key for enabling sustainable ubiquitous environments, such as smart cities and societies. A timely fusion and analysis of big data, acquired from IoT and other sources, to enable highly efficient, reliable, and accurate decision making and management of ubiquitous environments would be a grand future challenge. Computational intelligence would play a key role in this challenge. A number of surveys exist on data fusion. However, these are mainly focused on specific application areas or classifications. The aim of this paper is to review literature on data fusion for IoT with a particular focus on mathematical methods (including probabilistic methods, artificial intelligence, and theory of belief) and specific IoT environments (distributed, heterogeneous, nonlinear, and object tracking environments). The opportunities and challenges for each of the mathematical methods and environments are given. Future developments, including emerging areas that would intrinsically benefit from data fusion and IoT, autonomous vehicles, deep learning for data fusion, and smart cities, are discussed.
Tareq Khan
Gun violence in U.S. schools not only causes loss of life and physical injury but also leaves enduring psychological trauma, damages property, and results in significant economic losses. One way to reduce this loss is to detect the gun early, notify the police as soon as possible, and implement lockdown procedures immediately. In this project, a novel gun detector Internet of Things (IoT) system is developed that automatically detects the presence of a gun either from images or from gunshot sounds, and sends notifications with exact location information to the first responder’s smartphones using the Internet within a second. The device also sends wireless commands using Message Queuing Telemetry Transport (MQTT) protocol to close the smart door locks in classrooms and announce to act using public address (PA) system automatically. The proposed system will remove the burden of manually calling the police and implementing the lockdown procedure during such traumatic situations. Police will arrive sooner, and thus it will help to stop the shooter early, the injured people can be taken to the hospital quickly, and more lives can be saved. Two custom deep learning AI models are used: (a) to detect guns from image data having an accuracy of 94.6%, and (b) the gunshot sounds from audio data having an accuracy of 99%. No single gun detector device is available in the literature that can detect guns from both image and audio data, implement lockdown and make PA announcement automatically. A prototype of the proposed gunshot detector IoT system, and a smartphone app is developed, and tested with gun replicas and blank guns in real-time.
Bakhan Tofiq Ahmed, Noor Ghazi M. Jameel, Bakhtiar Ibrahim Saeed
Malware’s proliferation in the Internet of Things (IoT) ecosystem requires precise, efficient detection systems capable of operating on IoT devices. Existing static analysis approaches often fail due to computational inefficiency stemming from high feature dimensionality inherent in raw opcode features. This research addresses this limitation by proposing a novel machine-learning (ML)-driven Intelligent Hybrid Feature Selection (IHFS) framework with two distinct architectures. IHFS1 combines a filter method (variance threshold) with an embedded method (LGBM feature importance). Conversely, IHFS2 integrates variance thresholding with a wrapper method (Recursive Feature Elimination with Cross-Validation using LGBM) for optimal selection. This framework is specifically designed to select an optimally stable and minimal feature subset from the initial 1183 opcode frequency vector extracted from ARM binaries. Applying this framework to a multi-family IoT malware dataset, the IHFS architectures yielded distinct and highly efficient feature subsets: IHFS1 achieved a 95.77% reduction (to 50 features), while IHFS2 attained a 98.06% reduction (to 23 features). Evaluation across eight ML models confirmed that the Random Forest (with IHFS1 subset) and Decision Tree (with IHFS2 subset) classifiers were the best performing, achieving robust classification metrics that outperform current state-of-the-art solutions. The Decision Tree model demonstrated exceptional detection capabilities, with an accuracy of 99.87%, a precision of 99.82%, a recall of 99.88%, and an F1-score of 99.85%. It achieved an average inference time of 0.058 ms per sample. Experimental results attained on a native ARM64 environment validate the deployment feasibility of the proposed system for resource-constrained IoT devices, such as the Raspberry Pi. The proposed system achieves a high-throughput, low-overhead security posture while maintaining host operational stability, processing a single ELF binary in just 3.431 ms.
Dan Wang, Dong Chen, Bin Song et al.
The Internet of Things is a novel paradigm with access to wireless communication systems and artificial intelligence technologies, which is considered to be applicable to a variety of promising fields and applications. Meanwhile, the development of the fifth-generation cellular network technologies creates the possibility to deploy enormous sensors in the framework of the IoT and to process massive data, challenging the technologies of communications and data mining. In this article, we propose a novel paradigm, 5G Intelligent Internet of Things (5G I-IoT), to process big data intelligently and optimize communication channels. First, we articulate the concept of the 5G I-IoT and introduce three major components of the 5G I-IoT. Then we expound the interaction among these components and introduce the key methods and techniques based on our proposed paradigm, including big data mining, deep learning, and reinforcement learning. In addition, an experimental result evaluates the performance of 5G I-IoT, and the effective utilization of channels and QoS have been greatly improved. Finally, several application fields and open issues are discussed.
Baotong Chen, J. Wan, A. Celesti et al.
Edge computing extends the capabilities of computation, network connection, and storage from the cloud to the edge of the network. It enables the application of business logic between the downstream data of the cloud service and the upstream data of the Internet of Things (IoT). In the field of Industrial IoT, edge computing provides added benefits of agility, real-time processing, and autonomy to create value for intelligent manufacturing. With the focus on the concept of edge computing, this article proposes an architecture of edge computing for IoT-based manufacturing. It also analyzes the role of edge computing from four aspects including edge equipment, network communication, information fusion, and cooperative mechanism with cloud computing. Finally, we give a case study to implement the active maintenance based on a prototype platform. This article aims to provide a technical reference for the deployment of edge computing in the smart factory.
Rushan Arshad, Saman Zahoor, M. Shah et al.
Internet of Things (IoT) is an emerging concept, which aims to connect billions of devices with each other. The IoT devices sense, collect, and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the overview of green IoT and the challenges that are faced due to excessive usage of energy hungry IoT devices. We then discuss and evaluate the strategies that can be used to minimize the energy consumption in IoT, such as designing energy efficient datacenters, energy efficient transmission of data from sensors, and design of energy efficient policies. Moreover, we critically analyze the green IoT strategies and propose five principles that can be adopted to achieve green IoT. Finally, we consider a case study of very important aspect of IoT, i.e., smart phones and we provide an easy and concise view for improving the current practices to make the IoT greener for the world in 2020 and beyond.
Shadi Al-Sarawi, Mohammed Anbar, Kamal Alieyan et al.
Mengru Tu
Bhargav Dave, A. Buda, Antti Nurminen et al.
The built environment provides significant opportunities for IoT (Internet of Things) deployment, and can be singled out as one of the most important aspects for IoT related research. While the IoT ...
Montbel Thibaud, Huihui Chi, Wei Zhou et al.
M. Chernyshev, Zubair A. Baig, O. Bello et al.
The Internet of Things (IoT) vision is increasingly being realized to facilitate convenient and efficient human living. To conduct effective IoT research using the most appropriate tools and techniques, we discuss recent research trends in the IoT area along with current challenges faced by the IoT research community. Several existing and emerging IoT research areas such as lightweight energy-efficient protocol development, object cognition and intelligence, as well as the critical need for robust security and privacy mechanisms will continue to be significant fields of research for IoT. IoT research can be a challenging process spanning both virtual and physical domains through the use of simulators and testbeds to develop and validate the initial proof-of-concepts and subsequent prototypes. To support researchers in planning IoT research activities, we present a comparative analysis of existing simulation tools categorized based on the scope of coverage of the IoT architecture layers. We compare existing large-scale IoT testbeds that have been adopted by researchers for examining the physical IoT prototypes. Finally, we discuss several open challenges of current IoT simulators and testbeds that need to be addressed by the IoT research community to conduct large-scale, robust and effective IoT simulation, and prototype evaluations.
Jianbing Ni, Xiaodong Lin, X. Shen
Nikos Kostopoulos, Yannis C. Stamatiou, Constantinos Halkiopoulos et al.
<i>Background:</i> Blockchain technology can transform military operations, increasing security and transparency and gaining efficiency. It addresses many problems related to data security, privacy, communication, and supply chain management. The most researched aspects are its integration with emerging technologies, such as artificial intelligence, the IoT, application in uncrewed aerial vehicles, and secure communications. <i>Methods:</i> A systematic review of 43 peer-reviewed articles was performed to discover the applications of blockchain in defense. Key areas analyzed include the role of blockchain in securing communications, fostering transparency, promoting real-time data sharing, and using smart contracts for maintenance management. Challenges were assessed, including scalability, interoperability, and integration with the legacy system, alongside possible solutions, such as sharding and optimized consensus mechanisms. <i>Results</i>: In the case of blockchain, great potential benefits were shown in enhancing military operations, including secure communication, immutable record keeping, and real-time integration of data with the IoT and AI. Smart contracts optimized resource allocation and reduced maintenance procedures. However, challenges remain, such as scalability, interoperability, and high energy requirements. Proposed solutions, like sharding and hybrid architecture, show promise to address these issues. <i>Conclusions</i>: Blockchain is set to revolutionize the efficiency and security of the military. Its potential is enormous, but it must overcome scalability, interoperability, and integration issues. Further research and strategic adoption will thus allow blockchain to become one of the cornerstones of future military operations.
Abhishek Tripathi, Kumar Rajan, Vishwajit Kumar et al.
SHEN Chen, HE Yong, PENG Anlang
In Internet of Things (IoT) scenarios, data are susceptible to noise during collection and transmission, resulting in outliers and missing data. Existing temporal regularized matrix factorization models typically consider the squared loss as a measure of reconstruction errors, ignoring the fact that the quality of matrix factorization is also a key factor affecting a model's prediction performance when dealing with multidimensional time series in the presence of anomalous data. Therefore, this paper proposes a Time Aware Robust Non-negative Matrix Factorization multidimensional temporal prediction framework (TARNMF) based on the L<sub>2, log</sub> norm. TARNMF establishes the spatiotemporal correlation of multidimensional time series data through Nonnegative Matrix Factorization (NMF) and autoregressive temporal regular terms with learnable parameters. In the presence of outliers, data obey the Laplace distribution. Based on this assumption, the L<sub>2, log</sub> norm is used to estimate the error between the original data and the reconstructed matrices in the nonnegative robust matrix factorization to minimize the interference of the anomalous data on the prediction model. The L<sub>2, log</sub> norm is as robust as existing metric functions, solves the problem of approximating the L<sub>1</sub> loss, and reduces its effect on the objective function by compressing the residuals of the outliers. The paper also proposes a projected gradient descent-based optimization method to optimize the model. Experiments on a high-dimensional Solar dataset show that TARNMF is scalable and robust, and the relative mean absolute error of the suboptimal results is reduced by 8.64%. Meanwhile, results on noisy data verify that TARNMF can efficiently process and predict IoT time series data in the presence of anomalous data.
YANG Fan, SUN Yi, LIN Wei, GAO Qi
With the popularization of intelligent IoT applications,IoT devices are required to continuously collect a large amount of streaming data for real-time processing.Due to their resource constraints,a large amount of stream data must be outsourced to server storage management.How to ensure the integrity of stream data with strong real-time and infinite growth is a complex and challenging problem.Although research has proposed schemes for streaming data integrity verification,the correctness and data integrity of query results returned by malicious servers in untrustworthy outsourced storage service environments are still not guaranteed.Recently,the emergence of blockchain technology based on distributed consensus implementation brings new solution ideas and methods to the data integrity verification problem,therefore,this paper proposes a highly trustworthy streaming data query verification scheme based on the immutability of blockchain,and designs a low-maintenance data structure CS-DCAT on the blockchain,which only stores the root node hash value of the authentication tree on the blockchain.It is suitable for processing streaming data with unpredictable data volume and can realize range query verification of streaming data.The security analysis proves the correctness and security of this scheme,and the performance evaluation shows that this scheme can realize low gas overhead on the blockchain,and the computational complexity of range query and verification is only related to the current data volume,which does not introduce too much extra computational cost and communication overhead.
Halaman 18 dari 24309