首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
随着国家电网电力物联网的逐步推进,作为其核心支撑技术的边缘计算框架逐渐成为研究热点.首先,总结了物联网和边缘计算框架方面的已有研究工作;其次,通过分析电力物联网在业务场景、边缘计算、信息安全等方面的关键技术难题,提出了一种适应于电力物联网的可信边缘计算框架SG-Edge;随后,结合边缘框架的可信防护关键难题,给出了硬件可信引导、软件行为动态度量等关键技术方法;最后,从业务适应性、安全性以及性能等方面对SG-Edge进行了全面评估,并对未来研究可能面临的挑战进行了展望.  相似文献   

2.
    
The emergent paradigm of fog computing advocates that the computational resources can be extended to the edge of the network, so that the transmission latency and bandwidth burden caused by cloud computing can be effectively reduced. Moreover, fog computing can support and facilitate some kinds of applications that do not cope well with some features of cloud computing, for instance, applications that require low and predictable latency, and geographically distributed applications. However, fog computing is not a substitute but instead a powerful complement to the cloud computing. This paper focuses on studying the interplay and cooperation between the edge (fog) and the core (cloud) in the context of the Internet of Things (IoT). We first propose a three-tier system architecture and mathematically characterize each tier in terms of energy consumption and latency. After that, simulations are performed to evaluate the system performance with and without the fog involvement. The simulation results show that the three-tier system outperforms the two-tier system in terms of the assessed metrics.  相似文献   

3.
程冬梅  李志 《计算机科学》2015,42(7):170-173, 190
针对移动应用对本地信息的需求和云计算框架在支持移动应用方面的不足,提出了一种基于“智能前端化”思想的雾计算框架。该框架在云计算框架的云服务和移动终端之间扩展一个“雾层”,以便将云服务器上的数据和计算服务更快更经济地提供给移动终端。针对医院场景,设计并研发了能提供就医时相关信息浏览服务、排队时长查询服务和多媒体点播服务等的信息服务系统,并提出了多频段负载均衡接入和基于本地信息融合的排队时长查询两项关键技术。通过真实场景中的测试实验验证了系统的可用性和关键技术的高效性。  相似文献   

4.
    
In recent times, the Internet of Things (IoT) applications, including smart transportation, smart healthcare, smart grid, smart city, etc. generate a large volume of real-time data for decision making. In the past decades, real-time sensory data have been offloaded to centralized cloud servers for data analysis through a reliable communication channel. However, due to the long communication distance between end-users and centralized cloud servers, the chances of increasing network congestion, data loss, latency, and energy consumption are getting significantly higher. To address the challenges mentioned above, fog computing emerges in a distributed environment that extends the computation and storage facilities at the edge of the network. Compared to centralized cloud infrastructure, a distributed fog framework can support delay-sensitive IoT applications with minimum latency and energy consumption while analyzing the data using a set of resource-constraint fog/edge devices. Thus our survey covers the layered IoT architecture, evaluation metrics, and applications aspects of fog computing and its progress in the last four years. Furthermore, the layered architecture of the standard fog framework and different state-of-the-art techniques for utilizing computing resources of fog networks have been covered in this study. Moreover, we included an IoT use case scenario to demonstrate the fog data offloading and resource provisioning example in heterogeneous vehicular fog networks. Finally, we examine various challenges and potential solutions to establish interoperable communication and computation for next-generation IoT applications in fog networks.  相似文献   

5.
物联网作为当前迅猛发展的新技术,势必带来一场深刻的科技变革.但是,作为一种新兴的信息产业,发展物联网存在各个方面的问题.对物联网的技术及应用进行了研究,分析了物联网的发展及应用现状,指出了影响物联网发展的因素,以及对物联网发展的探索.  相似文献   

6.
    
The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organisations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that is provided by federations of such IoT devices (which are often referred to as IoT things) provides unprecedented opportunities to solve internet-scale problems that have been too big and too difficult to tackle before. Just like other web-based information systems, IoT must also deal with the plethora of Cyber Security and privacy threats that currently disrupt organisations and can potentially hold the data of entire industries and even countries for ransom. To realise its full potential, IoT must deal effectively with such threats and ensure the security and privacy of the information collected and distilled from IoT devices. However, IoT presents several unique challenges that make the application of existing security and privacy techniques difficult. This is because IoT solutions encompass a variety of security and privacy solutions for protecting such IoT data on the move and in store at the device layer, the IoT infrastructure/platform layer, and the IoT application layer. Therefore, ensuring end-to-end privacy across these three IoT layers is a grand challenge in IoT. In this paper, we tackle the IoT privacy preservation problem. In particular, we propose innovative techniques for privacy preservation of IoT data, introduce a privacy preserving IoT Architecture, and also describe the implementation of an efficient proof of concept system that utilises all these to ensure that IoT data remains private. The proposed privacy preservation techniques utilise multiple IoT cloud data stores to protect the privacy of data collected from IoT. The proposed privacy preserving IoT Architecture and proof of concept implementation are based on extensions of OpenIoT - a widely used open source platform for IoT application development. Experimental evaluations are also provided to validate the efficiency and performance outcomes of the proposed privacy preserving techniques and architecture.  相似文献   

7.
物联网安全问题与对策   总被引:1,自引:0,他引:1  
随着物联网的发展,其安全问题日益重要。其感知层、传输层及处理层面临不同的安全隐患,面对各种常见安全隐患,需要针对性地采用相应的安全策略和解决思路,以便保障物联网安全地运行。  相似文献   

8.
    
With the advent of the Internet of Things (IoT) that offers capabilities to identify and connect worldwide physical objects into a unified system, the importance of modeling and processing IoT data has become significantly accentuated. IoT data is substantial in quantity, noisy, heterogeneous, inconsistent, and arrives at the system in a streaming fashion. Due to the unique characteristics of IoT data, the manipulation of IoT data for practical applications has encountered many fundamental challenging problems, such as data modeling and processing. This paper proposes the infrastructure for an IoT prototype system that aims to develop foundation models for IoT data. We illustrate major modules in the IoT prototype, as well as their functionalities, and provide our vision of the key techniques used for tacking the critical problems in each module.  相似文献   

9.
物联网服务作为信息世界软件服务通过物联网向现实世界的延伸,其在物联网系统具有重要的作用.然而,不同于传统Web服务,物联网服务具有现实感知、数据驱动、异构分布、时空相关等新特点,使得现有的服务模型不足以对物联网服务有效刻画,进而也不能满足物联网应用中的后续服务发现、服务卸载、服务组合等需求.在凝练分析物联网服务建模需求和已有物联网服务模型的基础上,提出了一种基于实体-数据的物联网服务建模框架,该框架提出了服务、实体、数据三元信息融合的物联网服务模型概念及概念关系,重点定义了服务、实体、数据的时空属性及时空依赖关系,以支持基于时空相关性的物联网服务关联表示与分析,并通过扩展OWL-S(ontology Web language for services)给出了基于实体-数据的物联网服务描述方式.最后,结合一个高速公路物联网应用案例对模型的使用方式和效果进行了讨论.  相似文献   

10.
随着物联网(Internet of Things, IoT)技术的高速发展,各类智能设备数量激增,身份认证成为保障IoT安全的首要需求.区块链作为一种分布式账本技术,提供了去信任的协作环境和安全的数据管理平台,使用区块链技术驱动IoT认证成为学术界和工业界关注的热点.基于云计算和云边协同两种架构分析IoT身份认证机制设计的主要需求,总结区块链技术应用于IoT场景面临的挑战;梳理现有IoT身份认证机制的工作,并将其归结为基于密钥的认证、基于证书的认证和基于身份的认证;分析应用区块链技术的IoT认证工作,并根据认证对象和附加属性对相关文献进行归纳和总结.从形式化和非形式化两个方向总结基于区块链的IoT认证机制的安全性分析方法.最后展望了未来研究方向.  相似文献   

11.
本篇论文总结和分析了网络空间物联网信息搜索相关研究工作,作为物联网信息搜索的综述性工作。物联网信息是网络空间中最重要的资产,在各个领域行业发挥着越来越重要的作用。探测、发现和识别网络空间中的物联网信息,已经成为了保障网络空间关键基础设施安全的前提和有效手段。本文,首先提出了网络空间物联网信息搜索的基本架构。其次,论文讨论了四类典型物联网信息的相关研究工作,包括操作系统信息、应用服务、设备种类和标识信息。网络空间存在着海量、动态和异构的物联网信息,本文总结和分析了物联网信息搜索关键技术的研究,包括探测技术和识别技术。最后,论文探讨了两类基于物联网信息搜索的应用,包括互联网空间测量和大规模安全事件分析。  相似文献   

12.
智能城市、智慧工厂等对物联网设备(Internet of Things,IoT)的性能和连接性提出了挑战。边缘计算的出现弥补了这些能力受限的设备,通过将密集的计算任务从它们迁移到边缘节点(Edge Node,EN),物联网设备能够在节约更多能耗的同时,仍保持服务质量。计算卸载决策涉及协作和复杂的资源管理,应该根据动态工作负载和网络环境实时确定计算卸载决策。采用模拟实验的方法,通过在物联网设备和边缘节点上都部署深度强化学习代理来最大化长期效用,并引入联盟学习来分布式训练深度强化学习代理。首先构建支持边缘计算的物联网系统,IoT从EN处下载已有模型进行训练,密集型计算任务卸载至EN进行训练;IoT上传更新的参数至EN,EN聚合该参数与EN处的模型得到新的模型;云端可在EN处获得新的模型并聚合,IoT也可以从EN获得更新的参数应用在设备上。经过多次迭代,该IoT能获得接近集中式训练的性能,并且降低了物联网设备和边缘节点之间的传输成本,实验证实了决策方案和联盟学习在动态物联网环境中的有效性。  相似文献   

13.
    
In this paper, we propose an architecture, design and build a prototype of a novel IoT system with intelligence, distributed at multiple tiers including the network edge. Our proposed architecture hosts a modular, three-tier IoT system including the edge, gateway (fog) and cloud tiers. The proposed system relies on data acquired by edge devices to realize a distributed machine learning model and achieve timely response at the edge using a lightweight machine learning model. In addition, it employs more sophisticated machine learning models at the higher fog and cloud tiers for wider-scope, long-term decision making. One of the prime objectives of the proposed system is reducing the volume of data transferred across tiers. This is attained through intelligent data filtering at the edge/gateway tiers to distill key events that avail the most relevant data points to higher-tier machine learning models at the gateway and cloud. This, in turn, reduces the outliers and the redundant data that may impact the gateway and cloud models and reduces the inter-tier communications overhead. To demonstrate the merits of our proposed system, we build a proof-of-concept prototype hosting the three tiers, using COTS components and supporting networking technologies. We demonstrate through extensive experiments the merits of the proposed system. A major finding is that our system is capable of achieving prediction performance comparable to the centralized machine learning baseline model, while reducing the inter-tier communications overhead by up to 80%.  相似文献   

14.
随着物联网的快速发展,其安全问题渐渐被重视起来。通过对物联网的基本概念、技术的阐述,分析了物联网安全需求方面的特点,及其在安全性方面需要解决的问题,针对不同的安全问题给出了相应的安全对策。  相似文献   

15.
物联网设备数量的大规模增长以及人工智能技术的逐步升级给物联网安全带来了严峻的挑战.由于大部分物联网设备具有无键盘输入、CPU结构简单、存储容量小、计算和通信能力弱等特点,以及物联网网络的体系结构和计算机网络的不同,传统的认证协议无法在物联网环境中通用.因此,设计适用于物联网环境的认证协议是保证物联网安全必不可少的环节.本文介绍了物联网认证协议研究的背景以及近几年物联网认证协议的研究进展,分析了物联网认证协议与传统计算机网络认证协议的不同,指出了物联网认证协议中常用的技术和数学方法,包括椭圆曲线加密、秘密共享、量子密码学等,然后从用户与设备认证、设备与服务器认证、设备与设备认证三个方面来介绍物联网认证协议研究的最新研究成果,最后讨论了物联网认证协议未来研究方向.  相似文献   

16.
针对边缘节点体系结构支持功能单一、模块划分混乱、向云端传输数据中的带宽开销大以及数据传输安全问题,设计开发了一套面向IoT的边缘节点平台架构.该平台架构包括设备管理、数据管理、资源管理、应用管理以及导出服务管理5个模块,使用最小二乘法等算法在边缘侧实现数据采集、数据过滤、数据加密、指标分析等功能.测试结果表明,该平台能...  相似文献   

17.
王菲菲  汪定 《软件学报》2023,34(7):3272-3291
在智能医疗中,将云计算技术与物联网技术结合,可有效解决大规模医疗数据的实时访问问题.然而,数据上传到远程云服务器,将带来额外的通信开销与传输时延.借助雾计算技术,以终端设备作为雾节点,辅助云服务器在本地完成数据存储与访问,能够实现数据访问的低延迟与高移动性.如何保障基于雾计算的智能医疗环境的安全性成为近期研究热点.面向基于雾计算的智能医疗场景,设计认证协议的挑战在于:一方面,医疗数据是高度敏感的隐私数据,与病人身体健康密切相关,若用户身份泄漏或者数据遭到非法篡改将导致严重后果;另一方面,用户设备和雾节点往往资源受限,认证协议在保护用户隐私的同时,需要实现用户、雾节点、云服务器之间的三方数据安全传输.对智能医疗领域两个具有代表性的认证方案进行安全分析,指出Hajian等人的协议无法抵抗验证表丢失攻击、拒绝服务攻击、仿冒攻击、设备捕获攻击、会话密钥泄漏攻击;指出Wu等人的协议无法抵抗离线口令猜测攻击、仿冒攻击.提出一个基于雾计算的智能医疗三方认证与密钥协商协议,采用随机预言机模型下安全归约、BAN逻辑证明和启发式分析,证明所提方案能实现双向认证与会话密钥协商,并且对已知攻击是安全的;与同类...  相似文献   

18.
提出了一种基于ROS与OpenWrt、Contiki的新型物联网系统方案ROS-IOT.分为两个部分:物联网系统的搭建与此系统下数据采集机器人的设计.感知层传感节点采用Contiki协议栈实现传感节点的组网与数据传递;接入网关采用运行Openwrt操作系统的无线路由器,网关接入模块实现协议动态转换,设置转换地址池、数据汇聚、处理,并基于rosserial_embeddedLinux上递至ROS网络等功能,实现各层数据流通;应用层基于websocket技术设计了与ROS网络数据交互的web服务,可实现与感知层、机器人的双向交互.机器人采用运行ROS环境的树莓派作为主控设备,电机驱动板采用stm32单片机.机器人的软件设计采用基于ROS Topic与ROS_bridge的通讯机制,使得机器人更加容易地融入物联网系统,并且在此基础上拓展更多服务.  相似文献   

19.
    
Web of Things or Internet of Things (IoT) was an emerging technology where things of everyday objects could be connected to the Internet. Cloud computing is an important technology for IoT. We proposed six levels of IoT architectures with respect to cloud, and these architectures describe the storage, controlling, and monitoring of various sensors and actuators in IoT applications. Better selection of protocols produce better results for constrained IoT environment. In this paper, we analyzed IoT architecture levels with respect to cloud, various IoT applications, and layer wise protocols and proposed two optimized protocol suites named as MQTT protocol suite and CoAP protocol suite. We implemented these protocols in a small IoT application and compared these two suites with respect to transmission delay, number of packets transferred, the overhead due to re‐transmission, and the battery power usage. We also proposed optimized suite for some IoT applications with respect to their characteristics.  相似文献   

20.
随着物联网技术的发展,物联网设备广泛应用于生产和生活的各个领域,但也为设备资产管理和安全管理带来了严峻的挑战.首先,由于物联网设备类型和接入方式的多样性,网络管理员通常难以得知网络中的物联网设备类型及运行状态.其次,物联网设备由于其计算、存储资源有限,难以部署传统防御措施,正逐渐成为网络攻击的焦点.因此,通过设备识别了解网络中的物联网设备并基于设备识别结果进行异常检测,以保证其正常运行尤为重要.近几年来,学术界围绕上述问题开展了大量的研究.系统地梳理物联网设备识别和异常检测方面的相关工作.在设备识别方面,根据是否向网络中发送数据包,现有研究可分为被动识别方法和主动识别方法.针对被动识别方法按照识别方法、识别粒度和应用场景进行进一步的调研,针对主动识别方法按照识别方法、识别粒度和探测粒度进行进一步的调研.在异常检测方面,按照基于机器学习算法的检测方法和基于行为规范的规则匹配方法进行梳理.在此基础上,总结物联网设备识别和异常检测领域的研究挑战并展望其未来发展方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号