首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 138 毫秒
1.
智能物联网AIoT研究综述   总被引:2,自引:0,他引:2  
智能物联网(artificial intelligence of things,AIoT)是人工智能与物联网技术相融合的产物,这一新兴概念在智慧城市、智能家居、智慧制造、无人驾驶等领域得到了广泛应用。然而AIoT相关技术研究仍处于初级阶段, 存在大量问题和挑战。首先简述了AIoT技术产生的背景,明晰其定义和应用场景。以此为契机,构建了一个新型的面向智能信息处理的云边端融合AIoT架构。在给出AIoT研究体系的基础上, 详细探讨并比较了其各组成技术模块,包括AI融合IoT数据采集、复杂事件处理及协同、云边端融合研究、AI融合IoT安全及隐私保护和AI融合应用服务等方面的研究现状和解决方案。最后, 论述了AIoT未来的研究方向和发展趋势。  相似文献   

2.
物联网搜索技术综述   总被引:1,自引:0,他引:1  
随着物联网的普及和发展,物联网搜索是摆在学术界和工业界面前迫切需要解决的问题,物联网搜索因此成为当前的一个研究热点。面对越来越多的传感器以及它们所产生的数据,只有结合智能的物联网搜索,才能体现这些数据的生命力。与传统的Baidu、Google、Bing、Yahoo等搜索引擎不同,物联网搜索从搜索对象、物理网数据的特点(大规模的、实时变化的、高度动态的、异构的、复杂的安全环境等)到物联网搜索的架构均与传统互联网不同,这导致了物联网搜所面临的挑战将更大。由此,阐述了物联网搜索的概念、特点、相关技术,对现有的典型系统和算法进行了比较性总结,分析了目前研究中存在的问题和挑战,并展望了其未来的发展方向。  相似文献   

3.
With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.  相似文献   

4.
谢萍  刘孝颂 《电信科学》2020,36(12):139-146
与传统互联网相比,由于基于SDN的物联网覆盖面更广、连接的设备更多、传输的数据更复杂等原因,还存在很多安全方面的技术挑战。提出了在SDN物联网中加入一个基于区块链的安全层作为安全网关,对进入物联网的数据进行一次性的精确验证,各安全网关作为平等的区块链节点加入区块链系统,结合区块链系统的可追踪和不可篡改性,提高了SDN物联网部署的安全性能和效率。  相似文献   

5.
应杰耀 《电子科技》2023,36(3):76-80
为了保护智能电网设备中的核心数据与用户的个人隐私,分布式计算和同态加密等多项物联网安全技术逐渐受到了关注。近年来,物联网技术的发展推动了电网智能化的快速普及,而智能电网的应用又促进了物联网技术的更新。文中通过介绍智能电网所面临的多种攻击方法,回顾、梳理了智能电网数据安全问题的研究背景和现状。在此基础上,探讨与分析了虚假数据注入攻击及个人隐私保护问题的定义,展望了智能电网数据安全技术未来的研究方向和思路。  相似文献   

6.
In order to meet various challenges in the Internet of things (IoT), such as identity authentication, privacy preservation of distributed data and network security, the integration of blockchain and IoT became a new trend in recent years. As the key supporting technology of blockchain, the consensus algorithm is a hotspot of distributed system research. At present, the research direction of the consensus algorithm is mainly focused on improving throughput and reducing delay. However, when blockchain is applied to IoT scenario, the storage capacity of lightweight IoT devices is limited, and the normal operations of blockchain system cannot be guaranteed. To solve this problem, an improved version of Raft (Imp Raft) based on Raft and the storage compression consensus (SCC) algorithm is proposed, where initialization process and compression process are added into the flow of Raft. Moreover, the data validation process aims to ensure that blockchain data cannot be tampered with. It is obtained from experiments and analysis that the new proposed algorithm can effectively reduce the size of the blockchain and the storage burden of lightweight IoT devices.  相似文献   

7.
物联网是一种能将物体连接至互联网使其更加智能的技术.但是物联网设备产生的大数据难以处理,网络架构的可扩展性差,以及用户的安全隐私容易泄露等问题都限制了物联网的发展.为了解决这些问题,通过分析雾计算所具有的优势提出基于雾计算的物联网架构.基于该架构,同时考虑到用户的安全隐私问题,又提出分层的网络架构.最后对文章进行总结和展望.  相似文献   

8.
Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.  相似文献   

9.
With the rapid popularization and wide application of the Internet of things (IoT),the security problems of IoT operating system,which is the essential part,become more and more urgent.Firstly,the famous IoT operating systems and their different features were introduced,then it was compared with present embedded systems.Secondly,On the basis of the survey of research related to IoT operating system,the research was discussed and analyzed from the view of building a comprehensive security system,then security challenges and opportunities which the IoT system faced were pointed out,and the research status of the security of the IoT operating system was summarized.Finally,the promising future study directions in the IoT operating system security field were discussed based on the drawbacks of the existing researches,particularly,the IoT system survival technology as a new research direction was pointed out.  相似文献   

10.
针对移动通信网中物联网卡难管理和客户业务难识别的现状,本文基于网络大数据,开展物联网行业客户端到端保障能力研究,以"4层3维"感知评估模型和"定性分类"方法为理论基础,充分挖掘和分析物联网卡网络数据,摸清不同制式、不同行业和不同客户的业务特性,通过人工智能技术与大数据能力相融合,使运维能力智能化、自动化升级,最终实现物...  相似文献   

11.
凌颖  邱芸 《电信科学》2017,(12):114-120
物联网是通过部署具有一定感知、计算、执行和通信等能力的各种设备,获得物理世界的信息或对物理世界的物体进行控制,通过网络实现信息的传输、协同和处理,从而实现人与物通信、物与物通信的网络,每一个物联网传感节点都是一个信息源,数据流源源不断.电信网络运营商可以通过对网络数据的分析,及时发现物联网终端的异常情况,从而保证物联网终端的正常使用.阐述了一种通过分析电信网络中的网络数据、制定物联网终端的网络行为标签、对物联网终端网络行为进行实时监控的方法.并以穿戴行业应用为例,描述了对物联网终端网络行为进行监控的分析过程.  相似文献   

12.
With the development of the internet of things (IoT),5G and industrial technology,industrial IoT has become a new research field.Due to the specific requirements of delay,security and stability in industrial production,the traditional DNS has limitations to meet the needs of industrial IoT because of its single identity object,rigid resolution results,and weak security.In this context,how to provide efficient,flexible and secure resolution services for universal objects has become a hot area worldwide.Firstly,we discussed the design principles and key supporting technologies of the identity resolution system in industrial IoT.Then summarized and compared the existing identity resolution systems in detail.Next,the new identity resolution schemes in academic research were introduced.Finally,the core problems and the future research trend in this field were discussed.  相似文献   

13.
Almusaylim  Zahrah A.  Zaman  Noor 《Wireless Networks》2019,25(6):3193-3204

The smart home is considered as an essential domain in Internet of Things (IoT) applications, it is an interconnected home where all types of things interact with each other via the Internet. This helps to automate the home by making it smart and interconnected. However, at the same time, it raises a great concern of the privacy and security for the users due to its capability to be controlled remotely. Hence, the rapid technologically growth of IoT raises abundant challenges such as how to provide the home users with safe and secure services keeping privacy in the account and how to manage the smart home successfully under the controlled condition to avoid any further secrecy or theft of personal data. A number of the research papers are available to address these critical issues, researchers presented different approaches to overcome these stated issues. This research review will analyze smart home approaches, challenges and will suggest possible solutions for them and illustrate open issues that still need to be addressed.

  相似文献   

14.
Wireless Personal Communications - The internet of things (IoT) has become an emerging technology owing to the rapidly increasing number of devices and their connectivity to the internet. Routing...  相似文献   

15.
针对物联网(internet of things,IoT)技术大规模商用,现有终端评测体系无法满足海量、多种类、多形态的物联网终端评测新需求的问题,开展面向物联网终端的评测体系发展研究,从基础性、应用性、安全性3个维度并结合测试手段的发展趋势,提出物联网终端评测体系方法,以促进物联网终端质量提升,保障终端和网络良好的互通性,提升端到端业务质量。  相似文献   

16.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

17.
Wireless Personal Communications - On the internet of things (IoT), cloud computing renders the dominant computing capability. Nevertheless, this brings about the security as well as privacy...  相似文献   

18.
王春红 《电子科技》2012,25(12):30-33
IT与通信技术的发展将物联网课题引出。发展以RFID技术为核心的物联网成为新的技术潮流。文中通过调查统计,对物联网的成功案例进行了分析,讨论设计了RFID技术在数字校园管理中的一些应用。物联网产品的应用将助力校园数字化管理快速发展,提高学校管理水平。  相似文献   

19.
在物联网环境下,随着终端技术的发展、用户拥有智能终端数量的增加、越来越多终端对近距离通信技术的支持,同一用户或不同用户终端之间,可以通过相互协同,提升单个用户终端的功能和性能,为用户提供更加智能化的业务体验。本文分析和列举了多终端协同的7种应用场景,并提炼出了3种多终端协同下的网络控制需求,为物联网多终端协同的网络控制技术研究奠定了基础。  相似文献   

20.

Security and privacy are useful concerns in the context of big data. The Internet of Things (IoT) serves both to bolster and to ease security worries. IoT gadgets raise immense new security challenges, particularly with regards to things like basic framework. Be that as it may, they additionally offer approaches to help keep clients progressively secure by adding additional obstructions of safeguard to information and people. In order to sustain the integrity of data and to provide in order to implicit security for any big database, data slicing is constructive. Data slicing implicitly provides the preservation and the query performance to the database users. The sliced data are stored at servers in a distributed system to protect the data from the attackers. In this article, an intelligent and efficient model is developed to partition the polynomial data securely and to store at various servers in a distributed system. An auto-key generator spawns an encryption key to encrypt the polynomial data as a higher level security. Encrypted data is partitioned by an efficient Fast Fourier transform Technique. A novel clustering methodology entitled as Binary Reverse Clustering is introduced to optimize the performance as well as to reduce the servers’ requisition. Moreover, the novel clustering technique is compared with the traditional clustering algorithm.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号