首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The present trends in smart world reflects the extensive use of limited resources through information and communication technology. The limited resources like space, mobility, energy, etc., have been consumed rigorously towards creating optimized but smart instances. Thus, a new concept of IoT integrated smart city vision is yet to be proposed which includes a combination of systems like noise and air loss monitoring, web monitoring and fire detection systems, smart waste bin systems, etc., that have not been clearly addressed in the previous researches. This paper focuses on developing an effective system for possible monitoring of losses, traffic management, thus innovating smart city at large with digitalized and integrated systems and software for fast and effective implementations. In our proposed system, a real time data analysis is performed. These data are collected by various sensors to analyze different factors that are responsible for such losses. The proposed work is validated on a real case study.  相似文献   

2.
Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending the network lifetime of sensors. In this paper, a linear network coding (LNC) for WSNs with blockchain-enabled IoT devices has been proposed. The consumption of energy is reduced for each node by applying LNC. The efficiency and the reliability of the proposed model are evaluated and compared to those of the existing models. Results from the simulation demonstrate that the proposed model increases the efficiency in terms of the number of live nodes, packet delivery ratio, throughput, and the optimized residual energy compared to other current techniques.  相似文献   

3.
The Internet of Things (IoT) has allowed for significant advancements in applications not only in the home, business, and environment, but also in factory automation. Industrial Internet of Things (IIoT) brings all of the benefits of the IoT to industrial contexts, allowing for a wide range of applications ranging from remote sensing and actuation to decentralization and autonomy. The expansion of the IoT has been set by serious security threats and obstacles, and one of the most pressing security concerns is the secure exchange of IoT data and fine-grained access control. A privacy-preserving multi-dimensional secure query technique for fog-enhanced IIoT was proposed in light of the fact that most existing range query schemes for fog-enhanced IoT cannot provide both multi-dimensional query and privacy protection. The query matrix was then decomposed using auxiliary vectors, and the auxiliary vector was then processed using BGN homomorphic encryption to create a query trapdoor. Finally, the query trapdoor may be matched to its sensor data using the homomorphic computation used by an IoT device terminal. With the application of particular auxiliary vectors, the spatial complexity might be efficiently decreased. The homomorphic encryption property might ensure the security of sensor data and safeguard the privacy of the user's inquiry mode. The results of the experiments reveal that the computing and communication expenses are modest.  相似文献   

4.
The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require remote access for both users and resources. Since the user/building communication channel is insecure, a lightweight and secure authentication protocol is required. In this paper, we propose a new secure remote user mutual authentication protocol based on transitory identities and multi-factor authentication for IoT smart building environment. The protocol ensures that only legitimate users can authenticate with smart building controllers in an anonymous, unlinkable, and untraceable manner. The protocol also avoids clock synchronization problem and can resist quantum computing attacks. The security of the protocol is evaluated using two different methods: (1) informal analysis; (2) model check using the automated validation of internet security protocols and applications (AVISPA) toolkit. The communication overhead and computational cost of the proposed are analyzed. The security and performance analysis show that our protocol is secure and efficient.  相似文献   

5.
The Internet of Medical Things (IoMT) offers an infrastructure made of smart medical equipment and software applications for healthcare services. Through the internet, the IoMT is capable of providing remote medical diagnosis and timely health services. The patients can use their smart devices to create, store and share their electronic health records (EHR) with a variety of medical personnel including medical doctors and nurses. However, unless the underlying commination within IoMT is secured, malicious users can intercept, modify and even delete the sensitive EHR data of patients. Patients also lose full control of their EHR since most healthcare services within IoMT are constructed under a centralized platform outsourced in the cloud. Therefore, it is appealing to design a decentralized, auditable and secure EHR system that guarantees absolute access control for the patients while ensuring privacy and security. Using the features of blockchain including decentralization, auditability and immutability, we propose a secure EHR framework which is mainly maintained by the medical centers. In this framework, the patients’ EHR data are encrypted and stored in the servers of medical institutions while the corresponding hash values are kept on the blockchain. We make use of security primitives to offer authentication, integrity and confidentiality of EHR data while access control and immutability is guaranteed by the blockchain technology. The security analysis and performance evaluation of the proposed framework confirms its efficiency.  相似文献   

6.
The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason for cloud- and IoT-enabled smart city application failure is improper security practices at the early stages of development. This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications. Its three-layered architecture includes privacy preserved stakeholder analysis (PPSA), security requirement modeling and validation (SRMV), and secure cloud-assistance (SCA). A case study highlights the applicability and effectiveness of the proposed framework. A hybrid survey enables the identification and evaluation of significant challenges.  相似文献   

7.
目的 为满足疫苗运输在最后一公里的信息可视化和透明化的需求,研究一款信息型智能包装的远程温度监控系统。方法 通过结合物联网技术,设计一款基于GD32F330C8T6芯片为核心的子机节点与主机LoRa网关,以及基于Qt Creator 5.12软件和SQLite数据库编写的上位机软件,最终实现具体实例——远程温度监控系统,将子机节点硬件嵌入疫苗冷藏箱中,以及把多点测温探头置于箱内不同位置上,实现对疫苗冷藏箱温度的区间监控。结论 通过该温度远程监控系统,用户可以实时监测运输车内不同冷藏箱内的温度情况,超温时系统可自动闭合主机继电器模块开启外部制冷器,实现了疫苗冷藏箱智能包装。  相似文献   

8.
A high precision 10-bit successive approximation register analog to digital converter (ADC) designed and implemented in 32nm CNTFET process technology at the supply of 0.6V, with 73.24 dB SNDR at a sampling rate of 640 MS/s with the average power consumption of 120.2 μW for the Internet of things node. The key components in CNTFET SAR ADCs are binary scaled charge redistribution digital to analog converter using MOS capacitors, CNTFET based dynamic latch comparator and simple SAR digital code error correction logic. These techniques are used to increase the sampling rate and precision while ensuring the linearity, power consumption and noise level are within the limit. The proposed architecture has high scalability to CNTFET technology and also has higher energy efficiency. We compared the results of CNTFET based SAR ADC with other known architectures and confirm that this proposed SAR ADC can provide higher precision, power efficiency to the Internet of things node.  相似文献   

9.
吴卫  姚文静 《包装工程》2017,38(12):200-203
目的研究商品在包装功能发生改变时如何尽量减少二次包装给资源和环境造成的浪费和污染。方法结合目前市场上的商品包装形式,探析在物联网时代背景下的商品包装,明确研究的目的与意义。结论物流功能方面尝试减少物流过程中的二次包装,减少包装材料的浪费和二次污染;市场需求方面包装设计为了满足物流需要应在包装纹饰上简约、明了,这有利于节约成本。物联网时代包装的发展出现了信息化和互动性的新趋向,信息化体现在能够准确查询物品的位置信息、物品安全、物品送达以及库存信息;互动性体现在包装设计中应充分考虑包装的信息功能,从消费者的角度出发,通过利用物联网技术融入互动性的元素,寻求商品与消费者之间的情感交流。  相似文献   

10.
Increasingly, Wireless Sensor Networks (WSNs) are contributing enormous amounts of data. Since the recent deployments of wireless sensor networks in Smart City infrastructures, significant volumes of data have been produced every day in several domains ranging from the environment to the healthcare system to transportation. Using wireless sensor nodes, a Smart City environment may now be shown for the benefit of residents. The Smart City delivers intelligent infrastructure and a stimulating environment to citizens of the Smart Society, including the elderly and others. Weak, Quality of Service (QoS) and poor data performance are common problems in WSNs, caused by the data fusion method, where a small amount of bad data can significantly impact the total fusion outcome. In our proposed research, a WSN multi-sensor data fusion technique employing fuzzy logic for event detection. Using the new proposed Algorithm, sensor nodes will collect less repeated data, and redundant data will be used to increase the data's overall reliability. The network's fusion delay problem is investigated, and a minimum fusion delay approach is provided based on the nodes’ fusion waiting time. The proposed algorithm performs well in fusion, according to the results of the experiment. As a result of these discoveries, It is concluded that the algorithm describe here is effective and dependable instrument with a wide range of applications.  相似文献   

11.
魏旭  王安霞 《包装工程》2018,39(23):38-42
目的 从实用角度对电商平台下物联网智能快递箱的现状进行研究。方法 根据市场调研情况,综合分析我国当前包装中信息标签隐患较多、外观造型设计品牌识别度较低、RFID芯片利用不够充分和快递箱需要特定条件的循环再利用等方面问题。结论 结合实例论述了未来物联网智能快递箱的改进策略,能为RFID芯片赋能包装安全升级、大数据助力提升包装用户黏性和体验定制个性化包装服务设计,能为物联网智能快递箱设计提供设计思路和切实可行的理论参考。  相似文献   

12.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but are also easily detected by adversaries. In this paper, we propose an effective dual-chaining watermark scheme, called DCW, for data integrity protection in smart campus IoT applications. The proposed DCW scheme has the following three characteristics: (1) In order to authenticate the integrity of the data, fragile watermarks are generated and embedded into the data in a chaining way using dynamic grouping; (2) Instead of additional fixed group delimiters, chained watermark delimiters are proposed to synchronize the both transmission sides in case of the synchronization points are tampered; (3) To achieve lossless integrity authentication, a reversible watermarking technique is applied. The experimental results and security analysis can prove that the proposed DCW scheme is able to effectively authenticate the integrity of the data with free distortion at low cost in our smart meteorological Internet of Things system.  相似文献   

13.
Security measures and contingency plans have been established in order to ensure human safety especially in the floating elements like ferry, ro-ro, catamaran, frigate, yacht that are the vehicles services for the purpose of logistic and passenger transport. In this paper, all processes in the event of Man overboard (MOB)are initiated for smart transportation. In MOB the falling person is totally dependent on the person who first saw the falling person. The main objective of this paper is to develop a solution to this significant problem. If a staff member or a passenger does not see the fall into the sea, undesirable situations such as disappearance, injury and death can occur during the period until the absence of the fallen person is noticed. In this paper, a comprehensive and improved solution is provided in terms of personnel and passenger security especially in all the floating elements, in which human resources are intensively involved like passengers, freight, logistics, fishing, business, yacht, leisure and naval vessels. In this case, if the ship's personnel or passengers fall into the sea in any way, it detected the fallen person into the sea by the sensors in the portable emergency device, which each person will carry. The warning system is activated via the in-ship automation system to which the information is transmitted by wireless communication. Thus, the case of MOB will be determined quickly. Internet of things (IoT) has a key role in identifying the location and information of the person falling into the sea through sensors, radio frequency, GPS and connected devices. Simultaneously, the alarm system on board will be activated and MOB flag (Oscar) will automatically be opened. This paper enables the Search and rescue (SAR) operations to be initiated and accelerated without losing time through decision-making process.  相似文献   

14.
物联网时代智慧型移动设备设计探索   总被引:1,自引:1,他引:0  
金璐  李世国 《包装工程》2011,32(22):39-42
基于物联网技术的发展与智慧型移动设备关系的研究,从友好人机交互的起点、自然交互体验的实现过程,创新移动应用的发展方向3个方面,分析了智慧型移动设备具有的感知化、宜人化和多维化的"智慧特征"。在此基础上,阐述了如何通过物联网改变人们使用移动终端的体验,提出了区别于传统的未来智慧型移动设备的设计理念,信息跨平台传播、交互方式的多通道拓展以及设计对象的转变。  相似文献   

15.
16.
Driven by the visions of the Internet of Things (IoT), Artificial Intelligence (AI), and 5G communications, the Internet of Cultural Things (IoCT) realize the comprehensive interconnection among cultural products, cultural services, cultural resources, and cultural platforms, bringing individuals with richer humanistic experience, increasing economic benefits for the cultural sector, and promoting the development of cultural heritage protection and education. At present, IoCT has received widespread attention in both industry and academia. To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications, this survey provides a comprehensive overview of the IoCT components and key technologies. A comparison study of representative IoCT systems is presented according to their applicability. A general platform architecture of IoCT is proposed to link cultural objects with the internet and human. Finally, open issues for research challenges and future opportunities of IoCT are also studied in this paper.  相似文献   

17.
Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an operation, and monitor their temperature and humidity to prepare for the operation. Also, in the event of a problem, an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved. The platform is tested using a Raspberry PI card and sensors. The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation. The result of experimentations is visualized through a web application and an Android application. The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications. We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards. Finally, the proposed framework is extended with a model based testing technique that may be adopted for validating thesecurity aspects.  相似文献   

18.
金鑫城  孙浩睿 《发电技术》2020,41(2):137-205
泛在电力物联网是物联网在电力领域的具体体现,建设泛在电力物联网是推进三型两网建设的关键环节,也是实现能源转型的必要手段。阐述了泛在电力物联网的定义,从供电公司角度出发,根据北京经济技术开发区实际情况,讨论了依托地区特点的泛在电力物联网实施策略和实际应用场景,分析了可能遇到的问题。得出结论:随着泛在电力物联网的深入建设,供电公司能够为电力客户提供多元化服务,提高客户满意度;地市供电公司能够依托泛在电力物联网开展更多电力相关业务;泛在电力物联网的安全性、实用性、有效性是发展面临的首要问题。  相似文献   

19.
20.
Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective and responsible manner to fulfil consumer needs. Herein, we propose an energy-effi- cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and the security of data stored at the cloud server. The proposed Simon cipher uses the TSO algorithm to select the optimal keys that will minimize the deterioration of quality between the original and reconstructed (decrypted) images. In this study, the decrypted image quality is preserved by the peak signal-to-noise ratio (PSNR) such that consumers can generate precise medical reports from IoHT devices at the application level. Moreover, a lightweight encryption step is implemented in the fog to improve energy efficiency and reduce additional computations at the cloud server. Experimental results indicate that the TSO-Simon model achieved a high PSNR of 61.37 dB and a pixel change rate of 95.31.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号