首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security.  相似文献   

2.
Multimedia Tools and Applications - The Internet of Things (IoT) enabled various types of applications in the field of information technology, smart and connected health care is notably a crucial...  相似文献   

3.
Abhik Chaudhuri 《EDPACS》2017,56(4):7-18
This article discusses the various dimensions of philosophy of information for the Internet of Things (IoT) technology. The aspects of attention, subjectivity, objectivity, happiness, key ethical concerns, and the need for algorithmic transparency and accountability in autonomous IoT applications that are necessary to build an IoT belief system have been highlighted here. The interplay of smart devices, smart services, and humans has been depicted to highlight trust permeability in human and IoT interfaces.  相似文献   

4.
Multimedia Tools and Applications - The Internet of Things (IoT), fast-growing smart equipment and high-speed networks, has become generally embraced and popular. Most IoT devices are nevertheless...  相似文献   

5.
RFID是物联网的重要构件之一,是物联网的基础技术。RFID在物联网信息采集中担当重任,ZigBee和无线传感网技术也越来越成熟,使得其在物联网中应用也有重要作用,将RFID技术与传感器技术融合,构建更广义的物联网,具有重要意义。  相似文献   

6.
RFID是物联网的重要构件之一,是物联网的基础技术。RFID在物联网信息采集中担当重任,ZigBee和无线传感网技术也越来越成熟,使得其在物联网中应用也有重要作用,将RFID技术与传感器技术融合,构建更广义的物联网,具有重要意义。  相似文献   

7.
8.
This paper addresses the problem of opportunistic access of secondary users to licensed spectrum in cognitive radio networks. In order to avoid interference to the licensed primary users, efficient spectrum detection methods need to be developed. For this purpose, in recent years several sensing techniques have been proposed to monitor and regulate the spectrum access to the shared spectrum resources. However, spectrum sensing may be affected by errors in the form of missed-detections (i.e., an occupied spectrum is erroneously detected as free) or false-alarms (i.e., a free spectrum is erroneously detected as occupied). These two magnitudes pose a tradeoff on the design of the spectrum sensing mechanisms meaning that low missed-detection can only be achieved at the expense of high false-alarm and vice versa. Thus, the network designers should adaptively tune the sensing techniques such that the highest perceived Quality of Service (QoS) is achieved by both primary and secondary users. In this paper, a framework is introduced for determining the sensing operating points. Also the definition of Grade-of-Service (GoS) metrics is adopted to the case of primary/secondary users spectrum sharing. It is shown that the operating points of the sensing mechanisms can be easily adjusted according to the current traffic load of both primary and secondary users so that the perceived GoS is maximized. In addition, the Erlang Capacity of the spectrum sharing system for both primary and secondary users is also evaluated considering the effects of erroneous sensing.  相似文献   

9.
This study investigates the theoretical mechanisms by which the variations in source attribution (multiple sources vs. single source) and specialization (multifunctionality vs. single functionality) of Internet of Things (IoT) devices influence the quality of human–IoT interaction. Results from a between‐subjects experiment (N = 100) indicate that IoT devices that elicit the sense of multiple agencies and are specialized in a single function induce greater social presence and perceived expertise, which, in turn, lead individuals to show a more positive attitude toward the devices and to ascribe greater quality to the information transmitted by them. The results also reveal that the effect of multiple source attribution is more pronounced for individuals for whom the content of the information has low personal relevance.  相似文献   

10.
Peer-to-Peer Networking and Applications - Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have...  相似文献   

11.
总结了当前矿山网络现状;结合矿山物联网的发展目标及未来矿山在信息处理方式上的变化趋势,分析了矿山网络在网络容量、可管理性、密集接入、实时性、智能化、灾后应急通信等方面的发展需求及趋势;提出了扁平化、智能化、资源抽象化等矿山物联网网络设计原则,并对无线传输编码、软件定义网络、流量卸载、边缘计算、网络功能虚拟化、认知无线电、能量捕获、语义网络等关键技术在矿山物联网中的应用和发展需求进行了介绍。  相似文献   

12.
The Journal of Supercomputing - The Internet has immeasurably changed all aspects of life, from work to social relationships. The Internet of things (IoT) promises to add a new dimension by making...  相似文献   

13.
ABSTRACT

With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.  相似文献   

14.
Multimedia Tools and Applications - Internet of things (IoT) enables a number of embedded systems to interact for the purpose of various IoT applications such as home security, medical, smart...  相似文献   

15.
从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,提出了物联网安全的系统架构,并对一些安全关键技术进行了深入研究,希望为建立物联网可靠的信息安全体系提供参考依据。  相似文献   

16.
The Journal of Supercomputing - With the increase in mining depth and intensity, the threat of rockburst caused by high stress in stope to coal mining (CM) safety production is becoming ever more...  相似文献   

17.
18.
The traditional view of Internet of Things (IoT) attempts to connect all the physical objects to build a global, infrastructure-based IoT. In this paper, however, we will present opportunistic IoT, which is formed based on the ad hoc, opportunistic networking of devices (e.g., mobile phones and smart vehicles) using short-range radio techniques (e.g., Bluetooth and Wi-Fi). The opportunistic IoT demonstrates inherently the close relationship between human and opportunistic connection of smart things. It enables information forwarding and dissemination within and among the opportunistic communities formed based on the movement and opportunistic contact nature of human. We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic IoT systems. Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application areas and technical solutions of opportunistic IoT.  相似文献   

19.
The Journal of Supercomputing - The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services....  相似文献   

20.
随着通信技术、网络技术、信息技术、数据库技术以及计算机技术的快速发展,物联网的产生是必然的,同时智能电网的发展是现代电网发展的主要方向,引领以信息化、自动化、互动化为基本特征的新一代电力工业革命。物联网应用在智能电网中将显著提高电力系统信息化水平、安全性与稳定性,改善现有电力系统基础设施的利用效率,满足节能环保的效果。介绍了物联网和智能电网的相关概念以及发展现状.并提出了物联网在智能电网中的具体应用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号