首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security.  相似文献   

3.
Multimedia Tools and Applications - The Internet of Things (IoT) enabled various types of applications in the field of information technology, smart and connected health care is notably a crucial...  相似文献   

4.
Abhik Chaudhuri 《EDPACS》2017,56(4):7-18
This article discusses the various dimensions of philosophy of information for the Internet of Things (IoT) technology. The aspects of attention, subjectivity, objectivity, happiness, key ethical concerns, and the need for algorithmic transparency and accountability in autonomous IoT applications that are necessary to build an IoT belief system have been highlighted here. The interplay of smart devices, smart services, and humans has been depicted to highlight trust permeability in human and IoT interfaces.  相似文献   

5.
Multimedia Tools and Applications - The Internet of Things (IoT), fast-growing smart equipment and high-speed networks, has become generally embraced and popular. Most IoT devices are nevertheless...  相似文献   

6.
RFID是物联网的重要构件之一,是物联网的基础技术。RFID在物联网信息采集中担当重任,ZigBee和无线传感网技术也越来越成熟,使得其在物联网中应用也有重要作用,将RFID技术与传感器技术融合,构建更广义的物联网,具有重要意义。  相似文献   

7.
RFID是物联网的重要构件之一,是物联网的基础技术。RFID在物联网信息采集中担当重任,ZigBee和无线传感网技术也越来越成熟,使得其在物联网中应用也有重要作用,将RFID技术与传感器技术融合,构建更广义的物联网,具有重要意义。  相似文献   

8.
This paper addresses the problem of opportunistic access of secondary users to licensed spectrum in cognitive radio networks. In order to avoid interference to the licensed primary users, efficient spectrum detection methods need to be developed. For this purpose, in recent years several sensing techniques have been proposed to monitor and regulate the spectrum access to the shared spectrum resources. However, spectrum sensing may be affected by errors in the form of missed-detections (i.e., an occupied spectrum is erroneously detected as free) or false-alarms (i.e., a free spectrum is erroneously detected as occupied). These two magnitudes pose a tradeoff on the design of the spectrum sensing mechanisms meaning that low missed-detection can only be achieved at the expense of high false-alarm and vice versa. Thus, the network designers should adaptively tune the sensing techniques such that the highest perceived Quality of Service (QoS) is achieved by both primary and secondary users. In this paper, a framework is introduced for determining the sensing operating points. Also the definition of Grade-of-Service (GoS) metrics is adopted to the case of primary/secondary users spectrum sharing. It is shown that the operating points of the sensing mechanisms can be easily adjusted according to the current traffic load of both primary and secondary users so that the perceived GoS is maximized. In addition, the Erlang Capacity of the spectrum sharing system for both primary and secondary users is also evaluated considering the effects of erroneous sensing.  相似文献   

9.
10.
ABSTRACT

Computer integrated manufacturing (CIM) has enormous benefits as it increases the rate of production, reduces errors and production waste, and streamlines manufacturing sub-systems. However, there are some new challenges related to CIM operating in the Internet of Things/Internet of Data (IoT/IoD) scenarios associated with Industry 4.0 and cyber-physical systems. The main challenge is to deal with the massive volume of data flowing between various CIM components functioning in virtual settings of IoT. This paper proposes decisional DNA-based knowledge representation framework to manage the storage, analysis, and processing of data, information, and knowledge of a typical CIM. The framework utilizes the concept of virtual engineering object and virtual engineering process for developing knowledge models of various CIM components such as automatic storage and retrieval systems, automatic guided vehicles, robots, and numerically controlled machines. The proposed model is capable of capturing in real time the manufacturing data, information and knowledge at every stage of production, that is, at the object level, the process level, and at the factory level. The significance of this study is that it will support decision-making by reusing the experience, which will not only help in effective real-time data monitoring and processing, but also make CIM system intelligent and ready to function in the virtual Industry 4.0 environment.  相似文献   

11.
This study investigates the theoretical mechanisms by which the variations in source attribution (multiple sources vs. single source) and specialization (multifunctionality vs. single functionality) of Internet of Things (IoT) devices influence the quality of human–IoT interaction. Results from a between‐subjects experiment (N = 100) indicate that IoT devices that elicit the sense of multiple agencies and are specialized in a single function induce greater social presence and perceived expertise, which, in turn, lead individuals to show a more positive attitude toward the devices and to ascribe greater quality to the information transmitted by them. The results also reveal that the effect of multiple source attribution is more pronounced for individuals for whom the content of the information has low personal relevance.  相似文献   

12.
Online social networks play an important role in today’s Internet. These social networks contain huge amounts of data and the integrated framework of SN with Internet of things (IoT) presents a challenging problem. IoT is the ubiquitous interconnection of everyday items of interest (things), providing connectivity anytime, anywhere, and with anything. Like biological, co-authorship, and virus-spread networks, IoT and Social Network (SN) can be characterized to be complex networks containing substantial useful information. In the past few years, community detection in graphs has been an active area of research (Lee and Won in Proceedings of IEEE SoutheastCon, pp. 1–5, 2012). Many graph mining algorithms have been proposed, but none of them can help in capturing an important dimension of SNs, which is friendship. A friend circle expands with the help of mutual friends, and, thus, mutual friends play an important role in social networks’ growth. We propose two graph clustering algorithms: one for undirected graphs such as Facebook and Google+, and the other for directed graphs such as Twitter. The algorithms extract communities, and based on the access control policy nodes share resources (things). In the proposed Community Detection in Integrated IoT and SN (CDIISN) algorithm, we divide the nodes/actors of complex networks into basic, and IoT nodes. We, then, execute the community detection algorithm on them. We take nodes of a graph as members of a SN, and edges depicting the relations between the nodes. The CDIISN algorithm is purely deterministic, and no fuzzy communities are formed. It is known that one community detection algorithm is not suitable for all types of networks. For different network structures, different algorithms exhibit different results, and methods of execution. However, in our proposed method, the community detection algorithm can be modified as desired by a user based on the network connections. The proposed community detection approach is unique in the sense that a user can define his community detection criteria based on the kind of network.  相似文献   

13.
总结了当前矿山网络现状;结合矿山物联网的发展目标及未来矿山在信息处理方式上的变化趋势,分析了矿山网络在网络容量、可管理性、密集接入、实时性、智能化、灾后应急通信等方面的发展需求及趋势;提出了扁平化、智能化、资源抽象化等矿山物联网网络设计原则,并对无线传输编码、软件定义网络、流量卸载、边缘计算、网络功能虚拟化、认知无线电、能量捕获、语义网络等关键技术在矿山物联网中的应用和发展需求进行了介绍。  相似文献   

14.
Peer-to-Peer Networking and Applications - Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have...  相似文献   

15.
The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange and Encryption Mechanism. It also presents a random number generation technique for secret key generation and a new authentication methodology to enhance the security level. Finally, in terms of security, communication and computational overhead, the performance analysis of the proposed work is compared with the existing protocols.  相似文献   

16.
The Journal of Supercomputing - The Internet has immeasurably changed all aspects of life, from work to social relationships. The Internet of things (IoT) promises to add a new dimension by making...  相似文献   

17.
为了使网络大数据应用的范围更广,更大程度地提高网络数据存储与管理精度,减少网络数据处理与控制的时间,需要对网络大数据进行研究。当前的网络大数据研究方法多是采用Hadoop基础架构对网络大数据进行研究,在数据存储中没有设定具体的安全存储指标,无法得到数据安全存储指标权重,存在数据存储安全性能低,网络大数据研究精度偏差大等问题。为此,提出一种基于云计算和物联网的网络大数据研究方法。该方法首先利用分级网络编码对网络数据进行传输,以传输的数据为基础,采用CRC算法实现网络数据的计算,然后依据分组存储的方式将数据进行存储,最后利用分层逆序叠加定位法对网络数据进行高精度查询,由此完成对网络大数据的研究。实验结果表明,所提方法可以全面具体地对网络大数据进行研究,提高了数据处理精度和网络数据计算速度,增加了网络数据存储空间容量和查询效率,减少了网络数据运行时的丢失率,扩展了网络数据的运作范围,为后续网络大数据的研究提供了强有力的依据。  相似文献   

18.
随着新型基础设施建设的不断推进,物联网受到了越来越多的关注。在高速化、智能化、数据化的万物互联时代,如何保障物联网及物联网设备安全成为当前安全领域的一个重要课题。文章阐述了一种以安全贯穿物联网设备的设计、研发、测试、运行、迭代的全生命周期的安全体系建设方法与实践。首先,结合近年国内外物联网安全事件和物联网的信息化特性分析物联网安全风险;然后,基于物联网安全实践提出技术解决思路,并以物联网的设计、研发、测试、运行、迭代的生命周期过程为基础,将安全能力和解决方法分阶段进行整合,形成基于物联网生命周期的安全体系;最后,通过具体项目实践,分析该安全体系的可行性及效果。  相似文献   

19.
从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,提出了物联网安全的系统架构,并对一些安全关键技术进行了深入研究,希望为建立物联网可靠的信息安全体系提供参考依据。  相似文献   

20.
Multimedia Tools and Applications - Internet of things (IoT) enables a number of embedded systems to interact for the purpose of various IoT applications such as home security, medical, smart...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号