首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.

Nowadays, next-generation networks such as the Internet of Things (IoT) and 6G are played a vital role in providing an intelligent environment. The development of technologies helps to create smart city applications like the healthcare system, smart industry, and smart water plan, etc. Any user accesses the developed applications; at the time, security, privacy, and confidentiality arechallenging to manage. So, this paper introduces the blockchain-defined networks with a grey wolf optimized modular neural network approach for managing the smart environment security. During this process, construction, translation, and application layers are created, in which user authenticated based blocks are designed to handle the security and privacy property. Then the optimized neural network is applied to maintain the latency and computational resource utilization in IoT enabled smart applications. Then the efficiency of the system is evaluated using simulation results, in which system ensures low latency, high security (99.12%) compared to the multi-layer perceptron, and deep learning networks.

  相似文献   

2.
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it—leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers, potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.  相似文献   

3.
Wireless Personal Communications - This paper presents Carbon Nanotube FET (CNFET) based ultra-low-power Schmitt trigger SRAM designs which can operate at voltage levels as low as 200 mV, with high...  相似文献   

4.

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

  相似文献   

5.
Wireless Personal Communications - Internet of things (IoT) is a very unique platform which is getting very popular day by day. The very reason for this to happen is the advancement in technology...  相似文献   

6.
Advances in hardware, software, communication, embedding computing technologies along with their decreasing costs and increasing performance have led to the emergence of the Internet of Things (IoT) paradigm. Today, several billions of Internet‐connected devices are part of the IoT ecosystem. IoT devices have become an integral part of the information and communication technology (ICT) infrastructure that supports many of our daily activities. The security of these IoT devices has been receiving a lot of attention in recent years. Another major recent trend is the amount of data that is being produced every day which has reignited interest in technologies such as machine learning and artificial intelligence. We investigate the potential of machine learning techniques in enhancing the security of IoT devices. We focus on the deployment of supervised, unsupervised learning techniques, and reinforcement learning for both host‐based and network‐based security solutions in the IoT environment. Finally, we discuss some of the challenges of machine learning techniques that need to be addressed in order to effectively implement and deploy them so that they can better protect IoT devices.  相似文献   

7.
Wireless Personal Communications - IoT-based smart farming techniques have come up as one of the solutions to tackle the effect of climate change, water scarcity, etc. which are the prime reason...  相似文献   

8.
Wireless Personal Communications - The Internet of Things (IoT) is a concept that has attracted significant attention since the emergence of wireless technology. The knowledge diffusion of IoT...  相似文献   

9.
Wireless Personal Communications - VANETs are wireless sensor networks that suffer from the drawback of highly mobile nodes. The main objective of any type of network is to achieve efficient...  相似文献   

10.
The role of investors in the growth of startups has been continuously studied. Our paper complements this stream of research by adding a new role of the investor in the Internet of Things (IoT) field, as a channel of knowledge sharing among startups. The relationship between “Internet of Things” startups located in the US and its investors leads to technology convergence as a result of knowledge sharing from investors. Using network analysis and a co-occurrence method, we find that investors in the IoT field play an intermediate role connecting startups by forming an ideal topology for knowledge sharing among them in the IoT industry. IoT startups having investors and more connections to other startups show greater technology convergence. Based on the above findings, this study argues that technology convergence occurs in the venture network as a result of investors playing the role of a channel of knowledge flow.  相似文献   

11.

In the century of automation, which is digitized, and more and more technology is used, automatic systems' replacement of old manual systems makes people's lives easier. Nowadays, people have made the Internet an integral part of humans' daily lives unless they are insecure. The Internet of Things (IoT) secures a platform that authorizes devices and sensors to be remotely detected, connected, and controlled over the Internet. Due to the developments in sensor technologies, the production of tiny and low-cost sensors has increased. Many sensors, such as temperature, pressure, vibration, sound, light, can be used in the IoT. As a result of the development of these sensors with new generations, the power of the IoT technology increases, and accordingly, the revolution of IoT applications are developing rapidly. Therefore, their security issues and threats are challenging topics. In this paper, the benefits and open issues, threats, limitations of IoT applications are presented. The assessment shows that the most influential factor for evaluating IoT applications is the cost that is used in 79% of all articles, then the real-time-ness that is used in 64%, and security and error are used in 57% of all reviewed articles.

  相似文献   

12.
Wireless Personal Communications - The deployment of blockchain technologies for multiple use cases has been widely investigated in the academic and business sectors over the last few years. The...  相似文献   

13.
Mobile Networks and Applications - In the last few years, many smart objects found in the physical world are interconnected and communicate through the existing internet infrastructure which...  相似文献   

14.
15.
The emergence of Internet of Things (IoT) is empowered by the availability of the high volume of smart sensors, Radio Frequency Identification, a suitable communication technologies and protocols. In the near future, the Internet will be full of heterogeneous connected devices. In recent years, the IoT has drawn significant attention as it can solve difficult problems. However, the heterogeneity of devices and the large scale networks expose the IoT to many challenges that must be addressed; otherwise, the systems performance will deteriorate. As an attempt to identify these challenges, this paper comprehensibly cites the main IoT concepts, the serious IoT challenges and the quality of services presented in the recent literature. It also investigates the corresponding main research directions and the proposed solutions. This paper can increase the knowledge of the reader since it is the first IoT survey that presents load balancing algorithms utilized in solving the extreme data storage challenge.  相似文献   

16.
Wireless Personal Communications - The application of VANET can be divided into two types: security and non-security. Non-secure applications are primarily used to provide entertainment...  相似文献   

17.
作为全球领先的国际物联网平台标准化组织,oneM2M在M2M(机器对机器)和IoT(物联网)标准制定方面发挥着不可替代的作用。文章介绍oneM2M的成立过程、发起组织、业务范围和工作模式,描述包含指导委员会和技术全会在内的oneM2M组织架构,归纳oneM2M已经发布的第3版技术报告详细信息,列举oneM2M已发布技术规范最新版的编号、名称、最新版本和发布时间等信息。  相似文献   

18.
19.
The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly connected.To realize it,there exist many challenges.One key challenge is the battery problem for small devices,such as sensors or tags.Batteryless backscatter,also referred to as or battery-free backscatter,is a new potential technology to address this problem.One early and typical type of batteryless backscatter is ambient backscatter.Generally,batteryless backscatter utilizes environmental wireless signals to enable battery-free devices to communicate with each other.These devices first harvest energy from ambient wireless signals and then backscatter these signals so as to transmit their own information.This paper reviews the current studies about batteryless backscatter,including various backscatter schemes and theoretical works,and then introduces open problems for future research.  相似文献   

20.
物联网浅谈   总被引:2,自引:0,他引:2  
物联网将是继互联网之后引领IT世界向下一个15年发展的关键领域。本文对物联网的相关概念进行了辨析,对物联网的关键技术、产业链条、发展阶段、商业模式进行了探讨。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号