首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 118 毫秒
1.
智能物联网AIoT研究综述   总被引:2,自引:0,他引:2  
智能物联网(artificial intelligence of things,AIoT)是人工智能与物联网技术相融合的产物,这一新兴概念在智慧城市、智能家居、智慧制造、无人驾驶等领域得到了广泛应用。然而AIoT相关技术研究仍处于初级阶段, 存在大量问题和挑战。首先简述了AIoT技术产生的背景,明晰其定义和应用场景。以此为契机,构建了一个新型的面向智能信息处理的云边端融合AIoT架构。在给出AIoT研究体系的基础上, 详细探讨并比较了其各组成技术模块,包括AI融合IoT数据采集、复杂事件处理及协同、云边端融合研究、AI融合IoT安全及隐私保护和AI融合应用服务等方面的研究现状和解决方案。最后, 论述了AIoT未来的研究方向和发展趋势。  相似文献   

2.
随着物联网(IoT)的快速发展,人工智能(AI)与边缘计算(EC)的深度融合形成了边缘智能(Edge AI)。但由于IoT设备计算与通信资源有限,并且这些设备通常具有隐私保护的需求,那么在保护隐私的同时,如何加速Edge AI仍然是一个挑战。联邦学习(FL)作为一种新兴的分布式学习范式,在隐私保护和提升模型性能等方面,具有巨大的潜力,但是通信及本地训练效率低。为了解决上述难题,该文提出一种FL加速框架AccFed。首先,根据网络状态的不同,提出一种基于模型分割的端边云协同训练算法,加速FL本地训练;然后,设计一种多轮迭代再聚合的模型聚合算法,加速FL聚合;最后实验结果表明,AccFed在训练精度、收敛速度、训练时间等方面均优于对照组。  相似文献   

3.
杨震  赵建军  黄勇军  李洁  陈楠 《电信科学》2022,38(12):27-34
国家战略把人工智能(AI)及物联网(IoT)/5G同时定位为信息基础设施的重要组成部分,其中人工智能属于新技术基础设施,IoT/5G属于通信网络基础设施。这引出了“通信技术与人工智能技术融合发展”的技术方向。对于电信运营商而言,如何将人工智能技术与网络融合,重构网络技术架构,将“AI能力”作为“服务”开放,将是重要的技术演进方向。基于这一命题,探讨了未来AI和网络技术的发展方向,为未来AI技术与IoT/5G网络架构的融合发展方向提供了参考思路。  相似文献   

4.
多接入边缘计算(multi-access edge computing,MEC)能为城市轨道交通中的计算密集型业务和时延敏感型业务提供高质量的服务能力,然而轨道交通边缘计算网络中的大量边缘设施暴露在开放式环境中,其隐私保护和传输安全面临着很大的挑战。区块链(blockchain)具有分布式账本、共识机制、智能合约、去中心化应用等功能特性,因此,区块链技术可以为分布式轨道交通边缘计算网络构建系统性的安全防护机制,从而保障网络安全和数据安全,实现高质量的城市轨道交通服务。首先,介绍了区块链的基本概念;其次,设计了轨道交通边缘计算网络架构,提出了融合区块链的轨道交通边缘计算网络安全防护机制和应用实例;最后,对该安全防护机制面临的问题和挑战进行了分析和展望。  相似文献   

5.
5G技术的广泛应用给人们生活带来极大便利,同时也对移动通信安全架构提出了新的要求。从5G应用场景出发,分析了新场景下的主要应用特点和面临的安全挑战,阐述了5G网络安全需求和5G安全技术架构,从安全认证、隐私保护、切片安全、终端安全等几个关键领域对5G安全技术和研究现状进行了介绍,并从技术架构、部署理念、应用需求三方面总结了5G安全技术的发展趋势。  相似文献   

6.
<正>车辆到电网(Vehicle to Grid,V2G)是智能电网中新兴的重要技术,它通过电动汽车和智能电网间的电力双向流动,增加了电网的灵活性和弹性。然而,由于大量的电力双向交互,V2G网络面临着严峻的隐私和安全挑战。针对上述挑战,本文提出了一种基于区块链的V2G隐私保护方案,通过构建双层区块链,实现电力交互信息的安全存储与共享;引入车辆假名机制实现电动汽车身份隐私保护;利用无证书聚合签密技术保证数据安全和密文的高效验证。安全性分析表明,本文所提方案具有公开验证性和不可伪造性。  相似文献   

7.
内生安全网络架构   总被引:7,自引:6,他引:1       下载免费PDF全文
IP 网络通过连接全球大量的网络设备给人类带来了便利,但网络面临持续性的安全和隐私问题令人担忧。由于网络缺乏内生安全的设计,IP地址伪造、隐私泄露、中间人攻击、分布式拒绝服务(DDoS)攻击等顽固安全问题难以根治,传统的补丁式解决方案补不胜补。在研究IP网络面临的各类安全威胁及相关安全技术的基础上,剖析了IP网络固有的安全缺陷,提出了具有内生安全特性的网络架构,包括具有内生安全的隐私ID/Loc、安全验证和审计协议、跨域联合防御机制等,能够为端到端通信保驾护航。  相似文献   

8.
随着云计算、容器技术、软件定义网络等新技术不断发展,带来了一系列新的安全挑战,如身份验证,访问控制,数据隐私和数据完整性等。软件定义边界SDP的提出为网络安全模型提供了一种新的解决思路,该模型与VPN最大的区别在于需要先验证用户身份并验证设备才能建立连接。简要描述SDP体系结构,关键技术及应用场景,并对相关产品进行简单对比,结果表明SDP作为一种安全模型可以动态保护访问安全。  相似文献   

9.
无线传感器网络隐私保护方法   总被引:1,自引:0,他引:1  
钱萍  吴蒙 《电信科学》2013,(1):23-30
如何保护隐私信息在无线传感器网络的应用过程中不被泄露,同时能得到较为准确的结果,是无线传感器网络面临的重大挑战。近年来国内外学者对无线传感器网络的隐私保护技术进行了很多研究,本文从位置隐私保护和数据隐私保护两方面,总结了现有的隐私保护方法,分析了其基本原理和特点。针对现有方法的不足,本文提出了一种能同时保护位置隐私和数据隐私的隐私保护方法,该方法基于多节点幻影路由技术和椭圆曲线同态加密技术。与现有技术相比,该方法具有更好的隐私保护性和更低的能量消耗性。  相似文献   

10.
移动设备加密流量分析可以用主动或被动的方式获取多种类型的用户信息,为网络安全管理和用户隐私保护提供保障.重点分析、归纳了用户信息探测所涉及的数据采集、特征选择、模型与方法以及评价体系的基本原理和关键方法.总结了现有方案中存在的问题,以及未来研究方向和面临的挑战.  相似文献   

11.
物联网是一种虚拟网络与现实世界实时交互的新型系统,随着物联网技术的迅猛发展,物联网终端的安全问题也逐渐被重视。文中通过分析物联网终端设备存在的认证、私隐等安全问题,针对终端设备计算能力、网络资源有限的特点,研究了基于IBE密钥参数协商和身份鉴别技术、轻量级加密算法和密码自同步技术,提出了将几种技术相结合的加密技术方案,并对这种方案的安全性进行了分析。  相似文献   

12.
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out.  相似文献   

13.
物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其核心共性技术、网络与信息安全技术以及关键应用是物联网的主要研究内容。物联网感知节点大都部署在无人监控环境,并且由于物联网是在现有的网络基础上扩展了感知网络和应用平台,传统网络安全措施不足以提供可靠的安全保障。物联网安全研究将主要集中在物联网安全体系、物联网个体隐私保护模式、终端安全功能、物联网安全相关法律的制订等方面。  相似文献   

14.
With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.  相似文献   

15.
物联网的发展如火如荼,作为新兴高技术产业的重要组成部分,物联网技术广泛应用于各行各业。介绍物联网在公共安全领域的应用,对现阶段面向公共安全监测的物联网的网络架构、关键技术、应用现状以及发展中的若干问题进行了分析,同时对面向公共安全监测的物联网的发展前景进行了探讨,着重探讨了技术、应用发展方向。  相似文献   

16.
Machine‐type communication (MTC) is defined as an automatic aggregation, processing, and exchange of information among intelligent devices without humans intervention. With the development of immense embedded devices, MTC is emerging as the leading communication technology for a wide range of applications and services in the Internet of Things (IoT). For achieving the reliability and to fulfill the security requirements of IoT‐based applications, researchers have proposed some group‐based handover authentication and key agreement (AKA) protocols for mass MTCDs in LTE‐A networks. However, the realization of secure handover authentication for the group of MTCDs in IoT enabled LTE‐A network is an imminent issue. Whenever mass MTCDs enter into the coverage area of target base‐station simultaneously, the protocols incur high signaling congestion. In addition, the existing group‐based handover protocols suffer from the huge network overhead and numerous identified problems such as lack of key forward/backward secrecy, privacy‐preservation. Moreover, the protocols fail to avoid the key escrow problem and vulnerable to malicious attacks. To overcome these issues, we propose a secure and robust group‐based handover (SRGH) AKA protocol for mass MTCDs in LTE‐A network. The protocol establishes the group key update mechanism with forward/backward secrecy. The formal security proof demonstrates that the protocol achieves all the security properties including session key secrecy and data integrity. Furthermore, the formal verification using the AVISPA tool shows the correctness and informal analysis discusses the resistance from various security problems. The performance evaluation illustrates that the proposed protocol obtains substantial efficiency compared with the existing group‐based handover AKA protocols.  相似文献   

17.

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

  相似文献   

18.
阐述了目前智能交通的典型应用场景,并从物联网的网络分层架构对智能交通中涉及的关键技术及其发展现状进行了分析,指出了我国目前在智能交通技术方面的发展现状和发展方向。  相似文献   

19.
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which need to be addressed. To protect information about users’ location, an efficient technique should be devised. Several techniques have already been proposed for preserving location privacy in IoT. However, the existing research lags in preserving location privacy in IoT and has highlighted several issues such as being specific or being restricted to a certain location. In this paper, we propose a new location privacy technique called the enhanced semantic obfuscation technique (ESOT) to preserve the location information of a user. Experimental results show that ESOT achieves improved location privacy and service utility when compared with a well-known existing approach, the semantic obfuscation technique.  相似文献   

20.
物联网是一种能将物体连接至互联网使其更加智能的技术.但是物联网设备产生的大数据难以处理,网络架构的可扩展性差,以及用户的安全隐私容易泄露等问题都限制了物联网的发展.为了解决这些问题,通过分析雾计算所具有的优势提出基于雾计算的物联网架构.基于该架构,同时考虑到用户的安全隐私问题,又提出分层的网络架构.最后对文章进行总结和展望.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号