Internet of Things and Cyber-Physical Systems最新文献

筛选
英文 中文
Consensus mechanism for software-defined blockchain in internet of things 物联网中软件定义区块链的共识机制
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2022.12.004
Ruihang Huang , Xiaoming Yang , P. Ajay
{"title":"Consensus mechanism for software-defined blockchain in internet of things","authors":"Ruihang Huang ,&nbsp;Xiaoming Yang ,&nbsp;P. Ajay","doi":"10.1016/j.iotcps.2022.12.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.004","url":null,"abstract":"<div><p>This article aims to discuss the consensus mechanism of software-defined blockchain in the Internet of Things, analyze the characteristics of the traditional consensus mechanism algorithms, on the basis of comparing the advantages of each model, the traditional consensus mechanism algorithm is improved. Later, a supervisable consensus scheme based on improved DPOS-PBFT (Delegated proof of stake-Practical Byzantine Fault Tolerance) was proposed. In the context of the development of the Internet of Things technology, the decentralized distributed computing paradigm is used to improve the blockchain smart contract technology, and the DPOS blockchain consensus mechanism is optimized based on the DPOS protocol of the credit model. In addition, through the dynamic grouping algorithm of credibility, the research ranks the credit level of the consensus nodes of the blockchain network, thus further realizing the supervision of the Internet of Things system. The results of the case analysis show that the success rate of the mechanism algorithm can still be maintained at about 97% after 3000 user requests, the maximum delay remains below 8s after 3000 user requests, the minimum delay is always around 3s, the average delay is 2.38s, the overall performance of the algorithm is superior. It can ensure the final consistency of data transmission of each node in the Internet of Things, the research on the blockchain consensus mechanism in the Internet of Things has practical reference value.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 52-60"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Seagull optimization algorithm based multi-objective VM placement in edge-cloud data centers 基于海鸥优化算法的边缘云数据中心多目标虚拟机布局
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.01.002
Sayyidshahab Nabavi , Linfeng Wen , Sukhpal Singh Gill , Minxian Xu
{"title":"Seagull optimization algorithm based multi-objective VM placement in edge-cloud data centers","authors":"Sayyidshahab Nabavi ,&nbsp;Linfeng Wen ,&nbsp;Sukhpal Singh Gill ,&nbsp;Minxian Xu","doi":"10.1016/j.iotcps.2023.01.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.01.002","url":null,"abstract":"<div><p>Edge-Cloud Datacenters (ECDCs) have been massively exploited by the owners of technology and industrial centers to satisfy the user demand. At the same time, the amount of energy used by these data centers is considerable. To address this challenge, Virtual Machine (VM) placement of the ECDCs plays an important role; therefore, assigning VM properly to physical machines (PM) can significantly decrease the amount of energy consumption. The applied assigning technique simultaneously must consider additional objectives involving traffic and power usage of the network elements, which makes it a challenging problem. This paper proposes a multi-objective VM placement approach in edge-cloud data centers, which uses Seagull optimization to optimize power and network traffic together. In this strategy, the network traffic among PMs is reduced by concentrating the communications of VMs on the same PMs to reduce the amount of transferred data through the network and reduce the PMs’ power consumption by consolidating VMs to fewer PMs, which consumes less energy. We evaluate with simulations in CloudSim and test two different network topologies, VL2 (Virtual Layer 2) and three-tier, to validate that the proposed approach can effectively reduce traffic and power consumption in ECDCs. The experimental results show that our proposed method can decrease energy consumption by 5.5% while simultaneously reducing network traffic by 70% and the power consumption of the network components by 80%.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 28-36"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Metaverse from Philosophy 《哲学》中的元宇宙
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.01.001
Zhihan Lv
{"title":"Metaverse from Philosophy","authors":"Zhihan Lv","doi":"10.1016/j.iotcps.2023.01.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.01.001","url":null,"abstract":"<div><p>When Facebook changed its name to Meta, the upsurge of the metaverse was violently set off. Every company starts claiming they're working on the Metaverse, and everybody talks about the Metaverse. There isn't any formal definition of the Metaverse. This article first introduces the relationship between human beings and the universe, then uses philosophical methods to explore the definitions of the universe and the metaverse, and then tells several philosophical stories related to the metaverse to map the definition of the metaverse.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 24-27"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ChatGPT: Vision and challenges ChatGPT:愿景和挑战
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.05.004
Sukhpal Singh Gill , Rupinder Kaur
{"title":"ChatGPT: Vision and challenges","authors":"Sukhpal Singh Gill ,&nbsp;Rupinder Kaur","doi":"10.1016/j.iotcps.2023.05.004","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.05.004","url":null,"abstract":"<div><p>Artificial intelligence (AI) and machine learning have changed the nature of scientific inquiry in recent years. Of these, the development of virtual assistants has accelerated greatly in the past few years, with ChatGPT becoming a prominent AI language model. In this study, we examine the foundations, vision, research challenges of ChatGPT. This article investigates into the background and development of the technology behind it, as well as its popular applications. Moreover, we discuss the advantages of bringing everything together through ChatGPT and Internet of Things (IoT). Further, we speculate on the future of ChatGPT by considering various possibilities for study and development, such as energy-efficiency, cybersecurity, enhancing its applicability to additional technologies (Robotics and Computer Vision), strengthening human-AI communications, and bridging the technological gap. Finally, we discuss the important ethics and current trends of ChatGPT.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 262-271"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A robust transmission with enhancement of 5G PHY using FBMC and AMC for machine-to-machine communication node 采用FBMC和AMC作为机器对机器通信节点,增强5G物理层的鲁棒传输
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.06.001
Vipin Sharma , Rajeev Kumar Arya , Sandeep Kumar
{"title":"A robust transmission with enhancement of 5G PHY using FBMC and AMC for machine-to-machine communication node","authors":"Vipin Sharma ,&nbsp;Rajeev Kumar Arya ,&nbsp;Sandeep Kumar","doi":"10.1016/j.iotcps.2023.06.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.06.001","url":null,"abstract":"<div><p>Advancement of 5G new radios has enabled more robust communication for the Machine-to-Machine (M2M) communication node, using filter bank multicarrier (FBMC). This paper focuses on robust transmission over random fluctuations of the channel and also enhances the battery life for the massive machine type communication (mMTC) node. Filter bank multicarrier and Adaptive Modulation Coding (AMC) have been utilized together to enhance the performance of the 5G (NR) PHY layer. A frame-to-frame implementation is used to diminish the impact of fading using AMC, while efficient utilization of spectrum is achieved using FBMC. The selection of the AMC profile is obtained through the analysis of uplink packets using the Distance Statistics (DS). The FBMC is incorporated with 5G PHY in place of OFDM to achieve the optimum utilization of spectrum and also obtain a significant reduction in peak to average power ratio (PAPR) for robust transmission, which saves 10% of the battery requirement. On the basis of channel state information, distance statistics were employed to optimize the AMC. The optimum selection of AMC with FBMC will reduce the bit error rate (BER) against multipath fading and ensure the better utilization of available spectrum to attain the optimum utilization of the power amplifier.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 323-332"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks PRAFT和RPBFT:一类区块链共识算法及其在V2G网络电动汽车充电场景中的应用
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.02.003
Haoxiang Luo , Hongfang Yu , Jian Luo
{"title":"PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks","authors":"Haoxiang Luo ,&nbsp;Hongfang Yu ,&nbsp;Jian Luo","doi":"10.1016/j.iotcps.2023.02.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.02.003","url":null,"abstract":"<div><p>With the improvement of people's awareness of environmental protection, electric vehicles (EVs) are becoming more and more popular, and the issue of vehicle to grid (V2G) energy trading is also put on the agenda. To protect the security and privacy of EVs when they trade energy with the grid, many scholars have introduced the emerging blockchain technology. However, there are few studies on the blockchain consensus algorithm for the EVs charging scenario, while the consensus is exactly the core technology in blockchain for reaching agreement in distributed systems, which to some extent determines the efficiency of V2G. Therefore, aiming at the above scenario, this paper proposes two low-complexity consensus algorithms, namely (PBFT-enabled RAFT) PRAFT and (RAFT-enable PBFT) RPBFT, which are combined the typical blockchain consensus PBFT and RAFT, and can be respectively applied to two EVs charging scenarios. In our V2G model, charging piles (CPs) and charging stations (CSs) will participate in the blockchain consensus as nodes. Through theoretical analysis and simulation, and compared with other methods, these two consensus algorithms have high scalability, low communication complexity, low storage overhead, high throughput, and low latency. Meanwhile they can also avoid the risk of Byzantine leader in RAFT. Finally, we demonstrate the two consensus algorithms in a real charging scenario, which show their transaction latency and energy consumption can well adapt to the EVs charging scenario in V2G networks.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 61-70"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
REST and EDA architectures in IoT actuation 物联网驱动中的REST和EDA架构
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.05.002
Rolando Herrero
{"title":"REST and EDA architectures in IoT actuation","authors":"Rolando Herrero","doi":"10.1016/j.iotcps.2023.05.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.05.002","url":null,"abstract":"<div><p>While most <em>Internet of Things</em> (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) <em>Representational State Transfer</em> (REST) and (2) <em>Event Driven Architecture</em> (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that drives an algorithm that enables the dynamic selection of the right technology based on network impairments.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 205-212"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things for smart factories in industry 4.0, a review 工业4.0中的物联网智能工厂,综述
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.04.006
Mohsen Soori , Behrooz Arezoo , Roza Dastres
{"title":"Internet of things for smart factories in industry 4.0, a review","authors":"Mohsen Soori ,&nbsp;Behrooz Arezoo ,&nbsp;Roza Dastres","doi":"10.1016/j.iotcps.2023.04.006","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.04.006","url":null,"abstract":"<div><p>The Internet of Things (IoT) is playing a significant role in the transformation of traditional factories into smart factories in Industry 4.0 by using network of interconnected devices, sensors, and software to monitor and optimize the production process. Predictive maintenance using the IoT in smart factories can also be used to prevent machine failures, reduce downtime, and extend the lifespan of equipment. To monitor and optimize energy usage during part manufacturing, manufacturers can obtain real-time insights into energy consumption patterns by deploying IoT sensors in smart factories. Also, IoT can provide a more comprehensive view of the factory environment to enhance workplace safety by identifying potential hazards and alerting workers to potential dangers. Suppliers can use IoT-enabled tracking devices to monitor shipments and provide real-time updates on delivery times and locations in order to analyze and optimize the supply chain in smart factories. Moreover, IoT is a powerful technology which can optimize inventory management in smart factories to reduce costs, improve efficiency, and provide real-time visibility into inventory levels and movements. To analyze and enhance the impact of internet of thing in smart factories of industry 4.0, a review is presented. Applications of internet of things in smart factories such as predictive maintenance, asset tracking, inventory management, quality control, production process monitoring, energy efficiency and supply chain optimization are reviewed. Thus, by analyzing the application of IoT in smart factories of Industry 4.0, new ideas and advanced methodologies can be provided to improve quality control and optimize part production processes.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 192-204"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Android malware classification using optimum feature selection and ensemble machine learning 基于最优特征选择和集成机器学习的Android恶意软件分类
Internet of Things and Cyber-Physical Systems Pub Date : 2023-01-01 DOI: 10.1016/j.iotcps.2023.03.001
Rejwana Islam , Moinul Islam Sayed , Sajal Saha , Mohammad Jamal Hossain , Md Abdul Masud
{"title":"Android malware classification using optimum feature selection and ensemble machine learning","authors":"Rejwana Islam ,&nbsp;Moinul Islam Sayed ,&nbsp;Sajal Saha ,&nbsp;Mohammad Jamal Hossain ,&nbsp;Md Abdul Masud","doi":"10.1016/j.iotcps.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.03.001","url":null,"abstract":"<div><p>The majority of smartphones on the market run on the Android operating system. Security has been a core concern with this platform since it allows users to install apps from unknown sources. With thousands of apps being produced and launched daily, malware detection using Machine Learning (ML) has attracted significant attention compared to traditional detection techniques. Despite academic and commercial efforts, developing an efficient and reliable method for classifying malware remains challenging. As a result, several datasets for malware analysis have been generated and made available during the past ten years. These datasets may contain static features, such as API calls, intents, and permissions, or dynamic features, like logcat errors, shared memory, and system calls. Dynamic analysis is more resilient when it comes to code obfuscation. Though binary classification and multi-classification have been carried out in recent studies, the latter provides valuable insight into the nature of malware. Because each malware variant operates differently, identifying its category might help prevent it. Using the well-known ensemble ML approach called weighted voting, this study performed dynamic feature analysis for multi-classification. Random Forest, K-nearest Neighbors, Multi-Level Perceptrons, Decision Trees, Support Vector Machines, and Logistic Regression are all studied in this ensemble model. We used a recent dataset named CCCS-CIC-AndMal-2020, which contains an extensive collection of Android applications and malware samples. A well-researched data preparation phase followed by weighted voting based on R<sup>2</sup> scores of the ML classifiers presents an accuracy of 95.0% even after excluding 60.2% features, outperforming all recent studies.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 100-111"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49882292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense-in-depth against insider attacks in cyber-physical systems 深度防御网络物理系统内部攻击
Internet of Things and Cyber-Physical Systems Pub Date : 2022-12-01 DOI: 10.1016/j.iotcps.2022.12.001
Xirong Ning, Jin Jiang
{"title":"Defense-in-depth against insider attacks in cyber-physical systems","authors":"Xirong Ning, Jin Jiang","doi":"10.1016/j.iotcps.2022.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78939803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信