首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

2.
一种面向智慧协同网络的自适配路由策略研究   总被引:1,自引:0,他引:1       下载免费PDF全文
现有互联网网络体系和机制相对"静态"和"僵化",缺乏支持智慧网络的有效机制.要从根本上解决现有互联网存在的严重弊端,必须创建新的网络理论体系.本文在智慧协同网络"三层"、"两域"体系结构下,针对"网络组件层"的路由自适配问题展开研究,提出基于生物启发的转发网络族群自适配路由策略,实现族群内路由组件之间的智慧协调、动态重构和优化决策,有效解决现有路由策略的静态、僵化等问题.通过数学分析证明:如果设定模型参数μ∈(0,1),提出的自适配路由策略可以始终保持稳定性.最后,通过原型系统验证了提出自适配路由策略是切实可行的,能够提高网络的承载业务数量和提升用户体验.  相似文献   

3.
Content sharing via device‐to‐device (D2D) communications has become a promising method to increase system throughput and reduce traffic load. Due to the characteristic of spectrum sharing in D2D network, confidentiality is becoming a key issue in content transmission. Secure communication in D2D networks is generally guaranteed by a physical‐layer security mechanism. However, this method sacrifices the system transmission rate while ensuring security. Since mobile devices are carried by humans, we can leverage their trust relations to enhance the security of communications. As much, considering the psychology structure and social attributes of mobile users, we build a multidimensional trust evaluation mechanism to evaluate the trust relationship between users, and we pick out the trusted users based on the decision‐theoretic rough sets. By sharing content only between trust users, we can enhance the security of content transmissions without relying on physical‐layer security measures. Meanwhile, content caching is now widely used to improve accessing efficiency and reduce traffic load on cellular networks. However, caching content for other users incurs additional cost, which results in selfish and noncooperative behavior in users. Considering such selfishness, we introduce a cooperative caching game based on multidimensional trust relations to motivate users to cache contents for other devices. In this game, the trust relations and physical distance between two users are considered to formulate the cost function. Furthermore, we introduce an incentive caching algorithm based on social trust to minimize the total cost in the D2D network.  相似文献   

4.
物联网分布范围的广泛性、节点的移动性以及业务应用的复杂性给物联网的安全带来严峻挑战。根据物联网的架构和特点,划分物联网的安全体系,并分析了不同层面所面临的多种安全问题。分别从物联网末端节点、感知层、网络层、应用层、管理控制五个层面全面分析了物联网可能面临的多种安全威胁,并在此基础上提出了物联网面临的安全需求。  相似文献   

5.
Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities these devices bring. In this paper, we evaluate the current efforts to integrate sensors and actuators into the Internet and identify the limitations at the level of cooperation of these Internet-connected objects and the possible intelligence at the end points. As a solution, we propose the concept of Managed Ecosystem of Networked Objects, which aims to create a smart network architecture for groups of Internet-connected objects by combining network virtualization and clean-slate end-to-end protocol design. The concept maps to many real-life scenarios and should empower application developers to use sensor data in an easy and natural way. At the same time, the concept introduces many new challenging research problems, but their realization could offer a meaningful contribution to the realization of the Internet of Things.  相似文献   

6.
Welcome to the third issue of 2009 of the IEEE Communications Surveys and Tutorials. Paper in this issue survey the research effort in several areas such as security in web service, autonomic network management, Internet traffic classification, network survivability, ad hoc MAC protocols, resource management and location awareness in wireless networks, communications in mines and the design of smart cards.  相似文献   

7.
认知无线电网络的MAC层关键技术   总被引:2,自引:0,他引:2  
认知无线电作为一种智能的频谱共享技术,已成为无线通信领域的研究热点。为达到在不干扰授权用户的条件下有效地实现机会式频谱利用,认知无线电网络的媒体接入控制(MAC)层不仅需要提供传统的服务,还要求能支持一套全新的功能。频谱检测管理通过对检测模式的选取、检测周期及检测时长的设置、检测信道的选取和检测静默期的设置等实现检测策略和参数的选取及优化。接入控制主要采用与授权用户协调接入和透明接入两种方式避免与授权用户的接入产生碰撞。动态频谱分配针对二进制干扰模型和累积干扰模型进行不确定频谱资源的优化分配。安全机制通过增加MAC帧的认证和保密以防御MAC层的安全攻击。跨层设计结合物理层和网络层、传输层等上层信息设计和实现全局优化的MAC层技术。  相似文献   

8.
基于能量监测的传感器信任评估方法研究   总被引:1,自引:0,他引:1  
目前解决无线传感网节点安全的方式多种多样,无线传感器也将随着物联网的发展而呈现多样化.根据物联网传感层的特点和其特有的安全问题,本文提出了一种基于能量监测的信任评估方法来解决无线传感网节点的信任问题.该方法首先针对无线传感器能耗情况,创建了传感器能量监测机制;然后,根据监测能量机制中的监测信息,通过互相关系数方法分析计算,得出传感器所处的几种信任度;最后,对传感器进行信任评估,并给出评估结果.仿真对比结果表明,本文提出的方法具有较高的准确性.  相似文献   

9.
The smart grid is an innovative energy network that will improve the conventional electrical grid network to be more reliable, cooperative, responsive, and economical. Within the context of the new capabilities, advanced data sensing, communication, and networking technology will play a significant role in shaping the future of the smart grid. The smart grid will require a flexible and efficient framework to ensure the collection of timely and accurate information from various locations in power grid to provide continuous and reliable operation. This article presents a tutorial on the sensor data collection, communications, and networking issues for the smart grid. First, the applications of data sensing in the smart grid are reviewed. Then, the requirements for data sensing and collection, the corresponding sensors and actuators, and the communication and networking architecture are discussed. The communication technologies and the data communication network architecture and protocols for the smart grid are described. Next, different emerging techniques for data sensing, communications, and sensor data networking are reviewed. The issues related to security of data sensing and communications in the smart grid are then discussed. To this end, the standardization activities and use cases related to data sensing and communications in the smart grid are summarized. Finally, several open issues and challenges are outlined. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
物联网感知层的IPv6协议标准化动态   总被引:1,自引:0,他引:1  
物联网感知层汇聚了数量众多的智能物体,支持IPv6协议的感知层网络带来了充足的码号空间、良好的互通性以及便利的应用开发环境。本文介绍了物联网感知层IPv6协议标准化的动态,概括了相关技术标准的主要内容以及应用发展状况,主要介绍了IETF,IPSO,Zigbee,ISA-100组织的标准化动态。  相似文献   

11.
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT.  相似文献   

12.
智慧网络组件协同机制研究   总被引:6,自引:0,他引:6       下载免费PDF全文
郜帅  王洪超  王凯  张宏科 《电子学报》2013,41(7):1261-1267
现有互联网网络体系和机制相对"静态"和"僵化",缺乏支持智慧网络的有效机制.要从根本上解决现有互联网存在的严重弊端,必须创建新的网络体系、理论及机制.本文在多年信息网络基础理论研究和前期973项目"一体化可信网络与普适服务体系基础研究"的基础上,在智慧协同网络"三层"、"两域"总体结构模型的指导下,提出了一种智慧网络组件协同体系结构模型,提出了智慧网络组件模型与族群聚类机制,给出了网络复杂行为博弈决策机制及智慧网络组件协同工作机制等,实现了基于网络组件协同配合的网络智慧通信,有效解决了现有互联网资源利用率低、网络能耗高等问题.  相似文献   

13.
The Internet of thing (IoT) emerges as a possible solution to realize a smart life in the modern age. In this article, we design and realize a novel near field communication (NFC)-driven smart home system for IoT, which integrates the wireless sensor network (WSN), social networks, and the cloud computing. NFC technology provides a way for users to exchange information between them and the system by simply contacting. So, we propose to use NFC as the system drive in the architecture, such that users can intuitively interact with the system and deliver their intentions. Then, the corresponding service over the system will control or adjust the things at home to fit users' needs. Furthermore, the proposed system provides a platform for developers to easily and rapidly implement their smart home related services. In the system, WSN sensing and control, NFC communications and identification, user profile management and preference analysis, and social network integration are all provided as platform services. We will show how the system works for home automation, intruder detection, and social network sharing.  相似文献   

14.
Internet of Things (IoT) is an internet of smart objects where smart objects communicate with each other. IoT objects are deployed in open medium with dynamic topology. Due lack of infrastructure and centralized management, IoT present serious vulnerabilities to security attacks. Therefore, security is an essential prerequisite for the real-world deployment of IoT. In this work, we propose reputation-based RPL protocol where reputation-based mechanism is embedded into RPL protocol to enhance its capabilities against selective forwarding attack. Reputation is calculated by evaluating data forwarding behavior of IoT node. Data forwarding behavior of IoT node is evaluated by the difference between monitored actual packet loss and estimated normal loss. Calculated reputation value is considered in parent selection. Simulation results show that the proposed approach can accurately detect and isolate selective forwarding attack with improving data delivery ratio of the IoT network.  相似文献   

15.
Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health‐care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge‐based IoT environment has several security and privacy issues similar to those for the cloud‐based IoT environment. Various types of attacks, such as “replay, man‐in‐the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge‐based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge‐based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end‐to‐end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge‐based IoT environment called as RAD‐EI. We simulate RAD‐EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD‐EI to prove its resilience against routing attacks. RAD‐EI accomplishes around 95.0% “detection rate” and 1.23% “false positive rate” that are notably better than other related existing schemes. In addition, RAD‐EI is efficient in terms of computation and communication costs. As a result, RAD‐EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.  相似文献   

16.
A wireless body area network (WBAN) consists of low‐power devices that are capable of sensing, processing, and wireless communication. WBANs can be used in many applications such as military, ubiquitous health care, entertainment, and sport. The IEEE Std 802.15.6‐2012 is the latest international standard for WBAN. In this paper, we scrutinize the security structure of the IEEE 802.15.6‐2012 standard and perform a security analysis on the cryptographic protocols in the standard. We show that some protocols have subtle security problems and are vulnerable to different attacks. Such vulnerabilities neutralize the security provisions in the standard specifically for medical applications that deal with sensitive information and security problems can be life‐threatening. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

17.
随着智能电网技术的发展,传统的NB-PLC技术已经不能满足其不断增长的网络数据量和对安全性以及数据传输可靠性的要求,具有更高速率、更加强健、更加安全的NB-PLC技术必将成为未来发展的趋势。G3-PLC技术是新一代NB-PLC技术规范,规范定义了强健的物理层和基于IEEE 802.15.4的MAC层以及网络层、传输层和基于COSEM的应用层,是一个面向现在和未来的开放性NB-PLC规范。在对规范作了简要介绍基础上,探讨了该技术在智能电网AMI中的应用前景和方案。  相似文献   

18.

Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.

  相似文献   

19.
Internet of things (IoT) has evolved as an innovation of next generation in this world of smart devices. IoT tends to provide services for data collection, data management, and data and device security required for application development. Things or devices in IoT communicate and compute to make our lives comfortable and safe. In inventory automation, real‐time check on items, their information management, and status management, monitoring can be carried out using IoT. The huge amount of data that flows among the devices in the network demands for a security framework that ensures authentication, authorization, integrity, and confidentiality of data. The existing security solutions like SIMON or SPECK offer lightweight security solutions but are vulnerable to differential attack because of their simplicity. Moreover, existing solutions do not offer inbuilt authentication. Therefore, this research work contributes a secure and lightweight IoT‐based framework using wireless sensor network (WSN) as a technology. The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator. The results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact.  相似文献   

20.
Machine‐type communication (MTC) has attracted much attention due to the fact that it provides pervasive connections for billions of MTC devices, forming a basis for the Internet of things. Most works in the literatures on machine‐to‐machine (M2M) communications focused on media access layer (MAC) layer or other upper layer applications, such as e‐health, energy management and entertainment services. On the other hand, physical (PHY) layer plays a pivotal role in M2M communications. To accommodate a large number of MTC devices, M2M should be made efficient enough in terms of its power consumption and spectrum utilisation. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号