共查询到20条相似文献,搜索用时 78 毫秒
1.
2.
3.
4.
随着物联网络的快速发展,一系列的物联网技术应运而生,进行更好的完成物联网络信息数据的传递。而随着信息时代的到来,这些物联网信息技术引起了人们的关注,成为了信息技术的研究热点。因此,基于这种情况,本文对物联网信息感知与交互技术进行了研究,进而为关注物联网络信息技术发展情况的人们提供一些参考。 相似文献
5.
基于物联网技术的智能家居系统构想 总被引:2,自引:2,他引:0
分析了传统智能家居系统的现状,根据物联网技术及其应用,构想了基于物联网技术的智能家居系统,包括感知家居、感知生活、感知社区三大模块,符合“以人为本、实用为主”的家居设计理念。 相似文献
6.
本文将从传感器在物联网中的技术地位、当前传感器在物联网领域内的应用、传感器技术在我国发展情况三个方面,来论述传感器对我国物联网发展的意义之所在。 相似文献
7.
8.
9.
本文主要结合物联网发展的实际情况,基于物联网感知层RFID技术的实现原理,研究和分析感知物联网技术在体育竞技中的应用情况及实践案例等。 相似文献
10.
本文主要结合物联网发展的实际情况,基于物联网感知层RFID技术的实现原理,研究和分析感知物联网技术在体育竞技中的应用情况及实践案例等。 相似文献
11.
12.
13.
分析了物联网与移动互联网融合发展的趋势,结合我国融合发展的现状,提出我国在融合背景下提升ICT技术产业能力、建立竞争优势的策略。 相似文献
14.
通过物联网的研究历史和现状进行了总结和分析,阐述和分析物联网以及RFID的组成和工作原理,并根据这些内容对现有技术中存在的一些安全隐私问题进行重点研究。针对关于RFID的攻击手段,分别介绍基于物理机制的解决方案以及基于密码技术的解决方案。为了满足RFID系统对安全隐私方面的需求,并改善原有安全协议中的缺陷,提出一个基于时间戳的挑战——应答模式的双向认证协议。 相似文献
15.
近几年内,物联网技术引起社会各界的关注,结合物联网的发展,首先介绍了物联网的概念和背景及在我国的发展及应用状况,最后着重论述了物联网在我国的发展所遇到的一些问题。 相似文献
16.
17.
Zhikui Chen Ruochuan Ling Chung‐Ming Huang Xu Zhu 《International Journal of Communication Systems》2016,29(4):694-706
The rapid increase in the complexity and the extent of personalization of services in the Internet of Things (IoT) has led to a greater demand for frequent collaboration among heterogeneous devices. Moreover, with the inseparable relations between human and devices, the paradigm of Social IoT (SIoT) is gaining popularity in recent years. How to effectively facilitate the access to quality services and credible devices in large‐scale networks via defining, establishing, and managing social architectures among things has become a critical issue. In this paper, a scheme of access service recommendation for the SIoT is presented with the understanding of inherent constraints and factors that influence the security and stability of IoT networks. In which, timeliness properties are considered in each transaction for dynamic performance enhancements. With the benefits of promoting service discovery and composition, social relationships among things are introduced in the proposed scheme. An energy‐aware mechanism is also utilized as a restrictive factor in trustworthiness evaluation. Finally, the recommendation is based not only on the past performance but also on the social relationship and the energy status of nodes. Simulation experiments demonstrate the effectiveness and benefits of our scheme from three aspects including rating accuracy, dynamic behavior, and network stability. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
18.
19.
20.
Jaya Singh Ashish Gimekar Subramanian Venkatesan 《International Journal of Communication Systems》2023,36(12):e4189
Internet of Things (IoT) specifies a transparent and coherent integration of assorted and composite nodes. Unification of these nodes with large resources and servers has brought advancement in technology for industrial and government services. The industrial IoT (IIoT), with smart nodes, enhance the development and manufacturing of industrial process, which is on demand now. However, the security concern is substantial, and it is required to control to perform prosperous assimilation of IIoT. Authentication of these smart nodes and establishing mutual trust among them is essential to keep vulnerabilities and potential risks out. Hence, this paper presents an efficient lightweight secure authentication protocol from the perspective of human-centered IIoT. This proposed scheme assumes a registration center which simply generates public and secret information for a node when it initially joins the network. Once registration is done, the registration center is not needed anymore, and advanced processes like mutual authentication, secure key exchange, and communications are independently done by nodes involved. Furthermore, we show that this scheme can reduce exponential computations and computational overhead and resolves various possible attacks. 相似文献