首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
智能物联网AIoT研究综述   总被引:2,自引:0,他引:2  
智能物联网(artificial intelligence of things,AIoT)是人工智能与物联网技术相融合的产物,这一新兴概念在智慧城市、智能家居、智慧制造、无人驾驶等领域得到了广泛应用。然而AIoT相关技术研究仍处于初级阶段, 存在大量问题和挑战。首先简述了AIoT技术产生的背景,明晰其定义和应用场景。以此为契机,构建了一个新型的面向智能信息处理的云边端融合AIoT架构。在给出AIoT研究体系的基础上, 详细探讨并比较了其各组成技术模块,包括AI融合IoT数据采集、复杂事件处理及协同、云边端融合研究、AI融合IoT安全及隐私保护和AI融合应用服务等方面的研究现状和解决方案。最后, 论述了AIoT未来的研究方向和发展趋势。  相似文献   

2.
Flooding-based distributed denial-of-service (DDoS) attack presents a very serious threat to the stability of the Internet. In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets to jam a victim, or its Internet connection, or both. In the last two years, it was discovered that DDoS attack methods and tools are becoming more sophisticated, effective, and also more difficult to trace to the real attackers. On the defense side, current technologies are still unable to withstand large-scale attacks. The main purpose of this article is therefore twofold. The first one is to describe various DDoS attack methods, and to present a systematic review and evaluation of the existing defense mechanisms. The second is to discuss a longer-term solution, dubbed the Internet-firewall approach, that attempts to intercept attack packets in the Internet core, well before reaching the victim.  相似文献   

3.
Fiber Distributed Data Interface (FDDI), a set of standards developed by the American National Standards Institute (ANSI) X3T9.5 Task Group, is reviewed. The timed token access method, used to share the medium among stations in this 100-Mbit/s local area network (LAN), differs from the traditional token access method in that the time for the token to walk around the ring is accurately measured by each station and used to determine the usability of the token. FDDI-II, which provides support for isochronous service in addition to the asynchronous and synchronous service provided by FDDI, the media-dependent physical layer (PMD) standard called low-cost fiber PMD (LCF-PMD), and the implementation of FDDI on the synchronous optical network (SONET) are discussed  相似文献   

4.
5.
Network survivability is gaining increasing attention from the Internet research community. The ubiquity of IP services has fueled increasing interest in ensuring their dependability, by making IP networks more disruption-tolerant. After providing a brief overview of how routing is accomplished in the Internet, this article reviews how the protocols react to failures or changes in network state within an autonomous system. The problems associated with current restoration schemes, with respect to newer and more stringent requirements posed by emerging services such as voice over IP, are identified. We present an overview of the schemes proposed to ameliorate fault recovery and critique their contributions. We also outline future research directions for improving IP resilience.  相似文献   

6.

Vehicular Ad hoc Networks (VANETs) have drawn incredible interest in both academic and industrial sectors due to their potential applications and services. Vehicles’ position plays a significant role in many location-based applications and services such as public emergency, vehicles tracking, resource discovery, traffic monitoring and position-based routing. A location service is used to keep up-to-date records of current positions of vehicles. However, locating vehicles’ positions and maintaining an accurate view of the entire network are quite challenging tasks due to the high number of nodes, and high and fast nodes mobility which results in rapid topological changes and sudden network disconnections. In the past literature, various location-based services have been proposed to solve the above mentioned issues. Moreover, the cluster-based location service schemes have gained a growing interest due to their advantages over non-cluster-based schemes. The cluster-based schemes improve the network scalability, reduce the communications overhead and resolve the mobility issues within the clusters preventing them from propagating in the whole network. Therefore, this paper presents the taxonomy of the existing location service schemes, inspects the cluster-based location service by highlighting their strengths and limitations, and provides a comparison between location-based clustering and application specific clustering such as the one used in routing, information dissemination, channel access management and security. In addition, the existing clustering schemes, challenges and future directions for efficient cluster-based location service are also discussed.

  相似文献   

7.
Most research efforts in the area of MANETs focus on developing efficient routing protocols. Although routing protocols assume unique node addresses, the question of how to provide them remains open. In order to allow truly spontaneous and infrastructureless networking, a protocol for dynamic allocation of unique addresses is needed. Recently, various address autoconfiguration protocols for MANETs have been proposed. This article gives an overview of the challenges of address autoconfiguration in MANETs, presents current approaches, and discusses their advantages and drawbacks.  相似文献   

8.
Social Networking Services (SNSs) connect people worldwide, where they communicate through sharing contents, photos, videos, posting their first-hand opinions, comments, and following their friends. Social networks are characterized by velocity, volume, value, variety, and veracity, the 5 V’s of big data. Hence, big data analytic techniques and frameworks are commonly exploited in Social Network Analysis (SNA). By the ever-increasing growth of social networks, the analysis of social data, to describe and find communication patterns among users and understand their behaviors, has attracted much attention. In this paper, we demonstrate how big data analytics meets social media, and a comprehensive review is provided on big data analytic approaches in social networks to search published studies between 2013 and August 2020, with 74 identified papers. The findings of this paper are presented in terms of main journals/conferences, yearly distributions, and the distribution of studies among publishers. Furthermore, the big data analytic approaches are classified into two main categories: Content-oriented approaches and network-oriented approaches. The main ideas, evaluation parameters, tools, evaluation methods, advantages, and disadvantages are also discussed in detail. Finally, the open challenges and future directions that are worth further investigating are discussed.  相似文献   

9.
This publication contains reprint articles for which IEEE does not hold copyright. You may purchase this article from the Ask*IEEE Document Delivery Service at http://www.ieee.org/services/askieee/  相似文献   

10.
The Internet of Vehicles (IoV) is an emerging network of connected vehicles as a branch of dynamic objects in the Internet of Things (IoT) ecosystem. With the rapid development of IoV, real-time data-centric applications would be a significant concern in academia and industry to promote efficiency and realize modern services in such high dynamic networks. In this paper, we aim to present a systematic literature review (SLR) for the IoV networks to investigate the different attitudes in the field of data-centric approaches. This paper systematically categorizes the 48 recent articles on data-driven techniques in the IoV field published from 2017 to March 2022. A complete technical taxonomy is presented for the data-centric approaches in IoV according to the content of current studies. Collected methods are chosen with the SLR process, and they are investigated considering some technical classifications including IoV security, data traffic, vehicular social network, data propagation, energy, and multimedia categories. The achievements, drawbacks, and new findings of studies are carefully investigated for addressing the deficiencies, as well as emphasizing future research direction and open issues of data-driven approaches in IoV.  相似文献   

11.
Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.  相似文献   

12.
Key management has remained a challenging issue in wireless sensor networks (WSNs) due to the constraints of sensor node resources. Various key management schemes that trade off security and operational requirements have been proposed in recent years. In this article, we first examine the security and operational requirements of WSNs and then review five key management protocols: Eschenauer, Du, LEAP, SHELL, and Panja. Eschenauer's scheme is a classical random key distribution scheme for WSNs. Du's scheme improves on Eschenauer's scheme by using key matrices. LEAP provides a highly flexible key management scheme using four types of keys. SHELL focuses on achieving high robustness, and Panja is optimized for hierarchical WSNs. LEAP, SHELL, and Panja support cluster-based operations and are more aligned with current trends as shown by the new standards, IEEE 802.15.4b and the ZigBee "enhanced" standard. Future developments likely will incorporate the features of LEAP and adjustable robustness enhancements from Eschenauer or Du; extremely security-critical applications may benefit from restructuring SHELL to ease implementation and maintenance. Developments for extremely large WSNs should consider improving Panja's scheme due to its hierarchical scalability feature.  相似文献   

13.
The proposed paper addresses the overarching reliability issue of transistor aging in nanometer-scaled circuits. Specifically, a comprehensive survey and taxonomy of techniques used to model, monitor and mitigate Bias Temperature Instability (BTI) effects in logic circuits are presented. The challenges and overheads of these techniques are covered through the course of this paper. Important metrics of area overhead, power and energy overhead, performance overhead, and lifetime extension are discussed. Furthermore, the techniques are assessed with regards to ease of implementation and the ability to cope with challenges such as increase in manufacturing induced process variations. Finally, a taxonomy of the surveyed techniques is presented to facilitate generalization of the discussed approaches and to foster new inspiring techniques for this important reliability phenomenon leading to advancements in the design of defect-tolerant digital circuits.  相似文献   

14.
文章介绍了一种利用虚假无线AP的钓鱼攻击方法,攻击者可容易地架设伪接入点,诱骗用户连接进而窃取用户信息或对连接用户发动主动攻击。为了预防移动端也受到此类虚假无线AP钓鱼攻击,文章开发了一款用在移动端检测连接Wi Fi是否安全的软件,对连接的Wi Fi进行检测,可有效防止钓鱼攻击,保护个人信息安全。  相似文献   

15.
An examination is made of the rationale behind the need for ever higher networking speeds, the technological developments that are making them possible on a commercial basis, the directions being taken in their development, and the issues surrounding their construction and use. Roadblocks to providing high-speed networks are discussed. The impact of standardization efforts on development efforts is considered, focusing on the HSC channels, the fiber distributed data interface (FDDI), and metropolitan- and wide-area networks (MANs and WANs). Possibilities for future technologies and architectures are described  相似文献   

16.
This paper presents an on-chip current flattening circuit designed in 0.18-μm CMOS technology, which can be integrated with secure microsystems, such as smart cards, as a countermeasure against power analysis attacks. The robustness of the proposed countermeasure is evaluated by measuring the number of current traces required for a differential power analysis attack. We analyze the relationship between the required number of current traces and the dynamic current variations, and we show empirically that the required numbers of current traces is proportional to an inverse of the square of the rms value of the flattened current. Finally, we evaluate the effectiveness of the proposed design by using the experimental results of the fabricated chip. The analysis of the experimental results confirms the effectiveness of the current flattening circuit.  相似文献   

17.
This paper highlights the complexity and challenges of providing reliable services in the evolving communications infrastructure. The hurdles in providing end-to-end availability guarantees are discussed and research problems identified. Avenues for overcoming some of the challenges examined are presented. This includes the use of a highly available network spine embedded in a physical network together with efficient crosslayer mapping to offer survivability and differentiation of traffic into classes of resilience.  相似文献   

18.
19.
Telecommunication Systems - Wireless sensor networks (WSNs) and Internet of Things domain comprise of numerous small sized battery powered sensor nodes. Energy efficiency and energy balancing are...  相似文献   

20.
This paper introduces, investigates, and proposes power‐efficient equalization jamming attacks against the orthogonal frequency division multiplexing (OFDM) and possible countermeasures. Signals known a priori, called pilot tones, are employed in the conventional OFDM‐based systems to estimate the channel response and perform equalization. Attacks against these pilot tones can hamper equalization and degrade target's performance. This paper begins with noise‐based pilot tone jamming and moves onto pilot nulling attack. The paper embraces two mitigation strategies of randomizing the pilot tones. The paper presents mathematical model of effective noise per symbol and simulation results for OFDM systems with conventional and randomized pilot‐tones under such attacks. The paper concludes that the noise‐based pilot tone attacks are power efficient than conventional attacks, and the pilot nulling is capable of doing the most damage, but in the expense of additional channel state information. The paper also claims that the mitigation strategies offer a remedy, but works relatively poorly when no jammer is present. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号