Internet of Things最新文献

筛选
英文 中文
Advanced security frameworks for UAV and IoT: A deep learning approach 无人机和物联网的高级安全框架:一种深度学习方法
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-22 DOI: 10.1016/j.iot.2025.101594
Nordine Quadar , Abdellah Chehri , Benoit Debaque
{"title":"Advanced security frameworks for UAV and IoT: A deep learning approach","authors":"Nordine Quadar ,&nbsp;Abdellah Chehri ,&nbsp;Benoit Debaque","doi":"10.1016/j.iot.2025.101594","DOIUrl":"10.1016/j.iot.2025.101594","url":null,"abstract":"<div><div>The integration of unmanned aerial vehicles (UAVs) has opened new avenues for enhanced security and functionality. The security of UAVs through the detection and analysis of unique signal patterns is a critical aspect of this technological advancement. This approach leverages intrinsic signal characteristics to distinguish between UAVs of identical models, providing a robust layer of security at the communication level. The application of artificial intelligence in UAV signal analysis has shown significant potential in improving UAV identification and authentication. Recent advancements utilize deep learning techniques with raw In-phase and Quadrature (I/Q) data to achieve high-precision UAV signal recognition. However, existing deep learning models face challenges with unfamiliar data scenarios involving I/Q data. This work explores alternative transformations of I/Q data and investigates the integration of statistical features such as mean, median, and mode across these transformations. It also evaluates the generalization capability of the proposed methods in various environments and examines the impact of signal-to-noise ratio (SNR) on recognition accuracy. Experimental results underscore the promise of our approach, establishing a solid foundation for practical deep-learning-based UAV security solutions and contributing to the field of IoT.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101594"},"PeriodicalIF":6.0,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143864456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NIDS-CNNRF integrating CNN and random forest for efficient network intrusion detection model NIDS-CNNRF集成了CNN和随机森林的高效网络入侵检测模型
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-17 DOI: 10.1016/j.iot.2025.101607
Kai Yang , JiaMing Wang , GeGe Zhao , XuAn Wang , Wei Cong , ManZheng Yuan , JiaXiong Luo , XiaoFang Dong , JiaRui Wang , Jing Tao
{"title":"NIDS-CNNRF integrating CNN and random forest for efficient network intrusion detection model","authors":"Kai Yang ,&nbsp;JiaMing Wang ,&nbsp;GeGe Zhao ,&nbsp;XuAn Wang ,&nbsp;Wei Cong ,&nbsp;ManZheng Yuan ,&nbsp;JiaXiong Luo ,&nbsp;XiaoFang Dong ,&nbsp;JiaRui Wang ,&nbsp;Jing Tao","doi":"10.1016/j.iot.2025.101607","DOIUrl":"10.1016/j.iot.2025.101607","url":null,"abstract":"<div><div>Network intrusion detection is crucial for enhancing network security; however, existing models face three prominent challenges. First, many models place too much emphasis on overall accuracy, often neglecting the accurate distinction between different types of attacks. Second, due to feature redundancy in complex high-dimensional attack traffic, these models struggle to extract key information from large feature sets. Lastly, when dealing with imbalanced datasets, models tend to focus on learning from classes with larger sample sizes, thus overlooking those with fewer instances. To address these issues, this paper proposes a novel network intrusion detection model, NIDS-CNNRF. This model integrates Convolutional Neural Networks (CNN) for feature extraction and Random Forest (RF) for classifying attack traffic, enabling precise identification of various attack types. The Adaptive Synthetic Sampling (ADASYN) algorithm is employed to mitigate the bias toward classes with larger sample sizes, while Principal Component Analysis (PCA) is used to address feature redundancy, allowing the model to effectively extract key information. Experimental results demonstrate that the NIDS-CNNRF model significantly outperforms traditional intrusion detection models in enhancing network security, with superior performance observed on the KDD CUP99, NSL_KDD, CIC-IDS2017, and CIC-IDS2018 datasets.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101607"},"PeriodicalIF":6.0,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143842735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT H-TERF:一种将模糊多准则决策技术与增强随机森林相结合的改进wlan - iot的混合方法
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-17 DOI: 10.1016/j.iot.2025.101613
Parisa Khoshvaght , Jawad Tanveer , Amir Masoud Rahmani , Mohammad Mohammadi , Amin Mehranzadeh , Jan Lansky , Mehdi Hosseinzadeh
{"title":"H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT","authors":"Parisa Khoshvaght ,&nbsp;Jawad Tanveer ,&nbsp;Amir Masoud Rahmani ,&nbsp;Mohammad Mohammadi ,&nbsp;Amin Mehranzadeh ,&nbsp;Jan Lansky ,&nbsp;Mehdi Hosseinzadeh","doi":"10.1016/j.iot.2025.101613","DOIUrl":"10.1016/j.iot.2025.101613","url":null,"abstract":"<div><div>The Internet of Things (IoT) technology today has grown rapidly compared to the last few years, and the use of this technology has increased the quality of service to users day by day. The various applications of IoT have caused the attention of this innovation to enhance among different organizations. One of the important challenges of the IoT is routing, which can affect having a stable network. In this research, a hybrid approach called H-TERF (Hybrid TOPSIS and Enhanced Random Forest) is proposed for achieving efficient routing in IoT networks, specifically in Wireless Body Area Networks (WBAN). This method initially cluster nodes by using the DBSCAN clustering algorithm to optimize intra-cluster communication. Then, for routing, the nodes are ranked using the Fuzzy TOPSIS and Fuzzy AHP. This ranking is determined by several criteria, including the remaining energy of nodes, node memory, and throughput. Additionally, to manage more complex criteria such as node historical records and traffic rate, the initial ranking by the TOPSIS approach, along with the other mentioned criteria, is fed into an enhanced random forest model to identify the optimal path. This hybrid method enhances network performance in terms of lifespan, efficiency, delay, and packet delivery ratio. The outcomes of the simulation show that the suggested method surpasses existing approaches and is highly effective for application in IoT and WBAN networks. For example, the performance improvement of the proposed approach over the F-EVM, DECR, and DHH-EFO approaches in energy consumption was 20.62%, 25.85%, and 32.57%, respectively.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101613"},"PeriodicalIF":6.0,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization THE-TAFL:利用基于变压器的自适应联合学习和学习率优化转变医疗保健优势
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-17 DOI: 10.1016/j.iot.2025.101605
Farhan Ullah , Nazeeruddin Mohammad , Leonardo Mostarda , Diletta Cacciagrano , Shamsher Ullah , Yue Zhao
{"title":"THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization","authors":"Farhan Ullah ,&nbsp;Nazeeruddin Mohammad ,&nbsp;Leonardo Mostarda ,&nbsp;Diletta Cacciagrano ,&nbsp;Shamsher Ullah ,&nbsp;Yue Zhao","doi":"10.1016/j.iot.2025.101605","DOIUrl":"10.1016/j.iot.2025.101605","url":null,"abstract":"<div><div>The healthcare industry is becoming more vulnerable to privacy violations and cybercrime due to the pervasive dissemination and sensitivity of medical data. Advanced data security systems are needed to protect privacy, data integrity, and dependability as confidentiality breaches increase across industries. Decentralized healthcare networks face challenges in feature extraction during local training, hindering effective federated averaging and learning rate optimization, which affects data processing and model training efficiency. This paper introduces a novel approach of Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning (THE-TAFL) and Learning Rate Optimization. In this paper, we combine Transformer-based Adaptive Federated Learning (TAFL) with learning rate optimization to improve the privacy and security of healthcare information on edge devices. We used data augmentation approaches that generate robust and generalized input datasets for deep learning models. Next, we use the Vision Transformer (ViT) model for local training, generating Local Model Weights (LMUs) that enhance feature extraction and learning. We designed a training optimization method that improves model performance and stability by combining a loss function with weight decay for regularization, learning rate scheduling, and gradient clipping. This ensures effective training across decentralized clients in a Federated Learning (FL) framework. The FL server receives LMUs from many clients and aggregates them. The aggregation procedure utilizes adaptive federated averaging to aggregate the LMUs based on the performance of each client. This adaptive method ensures that high-performing clients contribute more to the Global Model Update (GMU). Following aggregation, clients receive the GMU to continue training with the updated parameters, ensuring collaborative and dynamic learning. The proposed method provides better performance on two standard datasets using various numbers of clients.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101605"},"PeriodicalIF":6.0,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invertible generative speech hiding with normalizing flow for secure IoT voice 具有归一化流的可逆生成语音隐藏用于安全物联网语音
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-17 DOI: 10.1016/j.iot.2025.101606
Xiaoyi Ge, Xiongwei Zhang, Meng Sun, Kunkun SongGong, Xia Zou
{"title":"Invertible generative speech hiding with normalizing flow for secure IoT voice","authors":"Xiaoyi Ge,&nbsp;Xiongwei Zhang,&nbsp;Meng Sun,&nbsp;Kunkun SongGong,&nbsp;Xia Zou","doi":"10.1016/j.iot.2025.101606","DOIUrl":"10.1016/j.iot.2025.101606","url":null,"abstract":"<div><div>Speech-based control is widely used for remotely operating the Internet of Things (IoT) devices, but it risks eavesdropping and cyberattacks. Speech hiding enhances security by embedding secret speech in a cover speech to conceal communication behavior. However, existing methods are limited by the extracted secret speech’s poor intelligibility and the stego speech’s insufficient security. To address these challenges, we propose a novel invertible generative speech hiding framework that integrates the embedding process into the speech synthesis pipeline. Our method establishes a bijective mapping between secret speech inputs and stego speech outputs, conditioned on text-derived Mel-spectrograms. The embedding process employs a normalizing flow-based SecFlow module to map secret speech into Gaussian-distributed latent codes, which are subsequently synthesized into stego speech through a flow-based vocoder. Crucially, the invertibility of both SecFlow and the vocoder enables precise secret speech extraction during extraction. Extensive evaluation demonstrated the generated stego speech achieves high quality with a Perceived Evaluation of Speech Quality (PESQ) score of 3.40 and a Short-Term Objective Intelligibility (STOI) score of 0.96. Extracted secret speech exhibits high quality and intelligibility with a character error rate (CER) of 0.021. In addition, the latent codes of secret speech mapped and randomly sampled Gaussian noise are very close to each other, effectively guaranteeing security. The framework achieves real-time performance with 1.28s generation latency for 2.22s speech segment embedding(achieving a real-time factor (RTF) of 0.577), which ensures efficient covert communication for latency-sensitive IoT applications.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101606"},"PeriodicalIF":6.0,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143847310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DI4IoT: A comprehensive framework for IoT device-type identification through network flow analysis DI4IoT:通过网络流分析进行物联网设备类型识别的综合框架
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-12 DOI: 10.1016/j.iot.2025.101599
Saurav Kumar, Manoj Das, Sukumar Nandi, Diganta Goswami
{"title":"DI4IoT: A comprehensive framework for IoT device-type identification through network flow analysis","authors":"Saurav Kumar,&nbsp;Manoj Das,&nbsp;Sukumar Nandi,&nbsp;Diganta Goswami","doi":"10.1016/j.iot.2025.101599","DOIUrl":"10.1016/j.iot.2025.101599","url":null,"abstract":"<div><div>The rapid growth of the Internet of Things (IoT) necessitates an effective Device-Type Identification System to monitor resource-constrained devices and mitigate potential security risks. Most Machine Learning (ML) based approaches for IoT Device-Type Identification utilize behavior-based, packet-based, flow-based characteristics, or a combination of these. Packet and behavior-based characteristics require analysis of individual packets. Furthermore, behavior-based characteristics need the analysis of application layer data (payloads), which may not be practical in case of encrypted traffic. Moreover, the existing approaches do not handle the mixed traffic (IoT and non-IoT) in an appropriate manner, suffer from frequent misclassification of closely related devices, and do not maintain performance when tested in different network environments. In contrast, flow-based characteristics neither require per-packet analysis nor the inspection of payloads. However, the existing flow-based approaches underperform as they consider a limited set of appropriate characteristics. To address these challenges, we propose DI4IoT, a two-stage flow-based Device-Type Identification framework using ML. The first stage categorizes the traffic into IoT and non-IoT, and the second stage identifies the device type from the categorized traffic. We create labeled flow-based characteristics and provide a methodology to select a minimal set of appropriate flow characteristics. We evaluate different ML algorithms to identify the suitable model for our proposed framework. The results demonstrate that our framework outperforms the state-of-the-art flow-based methods by over 10%. Furthermore, we evaluate and validate the performance gains in terms of Generalizability with complex network traffic compared to not only flow-based but also combined feature-type approaches.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"31 ","pages":"Article 101599"},"PeriodicalIF":6.0,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent plant watering decision support system for drought monitoring & analysis based on AIoT and an LSTM time-series framework 基于AIoT和LSTM时间序列框架的植物干旱监测分析智能浇水决策支持系统
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-12 DOI: 10.1016/j.iot.2025.101617
Yao-Cheng Lin , Tin-Yu Wu , Chu-Fu Wang , Jheng-Yang Ou , Te-Chang Hsu , Shiyang Lyu , Ling Cheng , Yu-Xiu Lin , David Taniar
{"title":"An intelligent plant watering decision support system for drought monitoring & analysis based on AIoT and an LSTM time-series framework","authors":"Yao-Cheng Lin ,&nbsp;Tin-Yu Wu ,&nbsp;Chu-Fu Wang ,&nbsp;Jheng-Yang Ou ,&nbsp;Te-Chang Hsu ,&nbsp;Shiyang Lyu ,&nbsp;Ling Cheng ,&nbsp;Yu-Xiu Lin ,&nbsp;David Taniar","doi":"10.1016/j.iot.2025.101617","DOIUrl":"10.1016/j.iot.2025.101617","url":null,"abstract":"<div><div>Climate change has increased the severity of droughts, threatening global agricultural productivity. The implementation of information technology for enhancing smart agriculture has proven its great potential for supporting precision agriculture that can provide crops with the ability to defend themselves against environmental threats. Rice, which is a staple food crop in tropical and subtropical regions, is particularly sensitive to water stress during its critical growth stages. This study therefore focused on Tainung No. 67 rice, known for its drought resistance, to develop an intelligent AIoT-based plant watering decision support system. The proposed system aims to optimise water use and enhance agricultural resilience by integrating real-time monitoring, AI-driven analysis, and automated irrigation. Data were collected using hyperspectral imaging, point cloud analysis, and physiological indicators (measured by the LI-600 device), providing a comprehensive time-series dataset for model training. Principal component analysis (PCA) was used to reduce data dimensionality, and an LSTM-based AI framework was used to predict water stress severity. Experimental results showed high accuracy for all datasets, with the AI model achieving 97 % accuracy for point cloud data and 98 % accuracy for hyperspectral imagery. Scenarios with mixed missing data further validated the practicality and robustness of the system. This research highlights the potential to address drought-related challenges in agriculture through the integration of IoT, AI and advanced sensing technologies. The system not only optimises irrigation strategies but also contributes to sustainable farming practices through the preservation of water resources.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101617"},"PeriodicalIF":6.0,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143868931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel hybrid metaheuristic method for efficient decentralized IoT network layouts 一种新的混合元启发式方法用于高效分散物联网网络布局
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-12 DOI: 10.1016/j.iot.2025.101612
Ferzat Anka
{"title":"A novel hybrid metaheuristic method for efficient decentralized IoT network layouts","authors":"Ferzat Anka","doi":"10.1016/j.iot.2025.101612","DOIUrl":"10.1016/j.iot.2025.101612","url":null,"abstract":"<div><div>This paper introduces a Hybrid Genetic Particle Swarm Optimization (HGPSO) method focusing on optimal and efficient sensor deployment in Wireless Sensor Networks (WSNs) and Decentralized IoT (DIoT) networks. Effective sensor placement in these networks necessitates the simultaneous optimization of numerous conflicting goals, such as maximizing coverage, ensuring connectivity, minimizing redundancy, and improving energy economy. Traditional optimization techniques and single metaheuristic algorithms frequently encounter these difficulties, demonstrating premature convergence or inadequately balancing exploration and exploitation phases. The suggested HGPSO effectively combines the advantageous features of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to overcome these limitations. The strong global exploration capabilities of GA, which successfully preserve variety and avert premature convergence, are integrated with the swift local exploitation and convergence attributes of PSO. A new multi-objective fitness function specifically designed for sensor deployment issues is created, facilitating the effective handling of trade-offs between conflicting objectives. The efficacy of the HGPSO approach is meticulously assessed in seven consistent situations and practical applications, encompassing environments with intricate impediments. A comparative examination is performed against six prominent metaheuristic algorithms acknowledged in literature. Results indicate that HGPSO regularly surpasses these competing methods across all assessment categories. Regarding average fitness values, HGPSO exceeds POHBA by 14 %, MAOA by 20 %, IDDT-GA by 21 %, EFSSA by 29 %, CFL-PSO by 35 %, and OBA by 45 %. These findings underscore HGPSO's exceptional theoretical framework and validate its practical relevance for extensive, real-world IoT implementations. By adeptly utilizing the exploration capabilities of GA and the exploitation strengths of PSO, HGPSO becomes a highly versatile and resilient optimization framework, making substantial contributions to addressing the deployment issues of next-generation IoT and WSN.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101612"},"PeriodicalIF":6.0,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143877107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invisible eyes: Real-time activity detection through encrypted Wi-Fi traffic without machine learning 隐形眼睛:通过加密的Wi-Fi流量进行实时活动检测,无需机器学习
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-11 DOI: 10.1016/j.iot.2025.101602
Muhammad Bilal Rasool , Uzair Muzamil Shah , Mohammad Imran , Daud Mustafa Minhas , Georg Frey
{"title":"Invisible eyes: Real-time activity detection through encrypted Wi-Fi traffic without machine learning","authors":"Muhammad Bilal Rasool ,&nbsp;Uzair Muzamil Shah ,&nbsp;Mohammad Imran ,&nbsp;Daud Mustafa Minhas ,&nbsp;Georg Frey","doi":"10.1016/j.iot.2025.101602","DOIUrl":"10.1016/j.iot.2025.101602","url":null,"abstract":"<div><div>Wi-Fi camera-based home monitoring systems are increasingly popular for improving security and real-time observation. However, reliance on Wi-Fi introduces privacy vulnerabilities, as sensitive activities within monitored areas can be inferred from encrypted traffic. This paper presents a lightweight, non-ML attack model that analyzes Wi-Fi traffic metadata—such as packet size variations, serial number sequences, and transmission timings—to detect live streaming, motion detection, and person detection. Unlike machine learning-based approaches, our method requires no training data or feature extraction, making it computationally efficient and easily scalable. Empirical testing at varying distances (10 m, 20 m, and 30 m) and under different environmental conditions shows accuracy rates of up to 90% at close range and 72% at greater distances, demonstrating its robustness. Compared to existing ML-based techniques, which require extensive retraining for different camera manufacturers, our approach provides a universal and adaptable attack model. This research underscores significant privacy risks in Wi-Fi surveillance systems and emphasizes the urgent need for stronger encryption mechanisms and obfuscation techniques to mitigate unauthorized activity inference.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"31 ","pages":"Article 101602"},"PeriodicalIF":6.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments FogScheduler:用于雾环境中节能计算的资源优化框架
IF 6 3区 计算机科学
Internet of Things Pub Date : 2025-04-10 DOI: 10.1016/j.iot.2025.101609
Eyhab Al-Masri, Sri Vibhu Paruchuri
{"title":"FogScheduler: A resource optimization framework for energy-efficient computing in fog environments","authors":"Eyhab Al-Masri,&nbsp;Sri Vibhu Paruchuri","doi":"10.1016/j.iot.2025.101609","DOIUrl":"10.1016/j.iot.2025.101609","url":null,"abstract":"<div><div>The rapid growth of Internet of Things (IoT) devices has created a pressing demand for fog computing, offering an effective alternative to the inherent constraints imposed by traditional cloud computing. Efficient resource management in fog environments remains challenging due to device heterogeneity, dynamic workloads, and conflicting performance objectives. This paper introduces FogScheduler, an innovative resource allocation algorithm that optimizes performance and energy efficiency in IoT-fog ecosystems using the TOPSIS method to rank resources based on attributes like MIPS, Thermal Design Power (TDP), memory bandwidth, and network latency. Experiments highlight FogScheduler's notable achievements, including a 46.1 % reduction in energy consumption in the best case compared to the Greedy Algorithm (GA) and a 45.6 % reduction in makespan compared to the First-Fit Algorithm (FFA). On average, FogScheduler achieves a 27 % reduction in energy consumption compared to FFA, demonstrating its consistent ability to optimize resource allocation. Even in worst-case scenarios, FogScheduler outperforms traditional algorithms, underscoring its robustness across varying resource contention levels. Results from our experiments demonstrate that FogScheduler is a highly effective solution for energy-aware and performance-optimized resource management, offering significant potential for IoT-fog-cloud ecosystems.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101609"},"PeriodicalIF":6.0,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143842804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信