{"title":"Automated image-based fire detection and alarm system using edge computing and cloud-based platform","authors":"Xueliang Yang, Yenchun Li, Qian Chen","doi":"10.1016/j.iot.2024.101402","DOIUrl":"10.1016/j.iot.2024.101402","url":null,"abstract":"<div><div>To tackle the increasing wildfire challenges, this paper presents an automated image-based fire detection and alarm system utilizing edge computing and a cloud-based platform, specifically designed for urban building fire detection. The system captures both RGB and infrared images from thermal cameras and employs existing computer vision techniques to detect fire characteristics such as flames and smoke. By integrating edge computing, the system minimizes latency to enhance the accuracy of fire detection and alarm activation. The cloud platform supports extensive data storage, analysis, and remote monitoring, which can ensure data accessibility and scalable data management. The proposed system descriptions include a detailed system architecture design, data collection, and the selection and application of detection algorithms that leverage both RGB and thermal image data for fire detection. Using the campus building and surrounding risk-prone areas as a testbed, the proposed system demonstrated desired fire detection capabilities and a robust solution to quickly identify and respond to fire incidents within the urban area. The proposed system functionalities can be scaled and adapted to other fire risk-prone areas.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva
{"title":"Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis","authors":"Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva","doi":"10.1016/j.iot.2024.101401","DOIUrl":"10.1016/j.iot.2024.101401","url":null,"abstract":"<div><div>With the availability of enormous amounts of data come the difficulties of big data, privacy, and ransomware assaults, which result in Marketing fraud and spam. Blockchain offers an extensive array of possible applications in the Marketing field. Nevertheless, both Marketing research and practice exhibit a degree of hesitance toward using Blockchain technology and have not yet come around to completely understand and adopt the technology. Here, the aim is to examine the Blockchain concepts and their applications in Marketing through bibliometrics, network, and thematic analyses, which can provide several novel insights and perspectives into current research trends in this field by evaluating the most significant and cited research publications, keywords, institutions, authors' collaboration network, and finally countries that promote Industry 5.0 (I5.0) businesses. This study performs a detailed bibliometric and thematic-based Systematic Literature Review (SLR) on 124 of over 15000 research papers. Major outcomes include the identification of emerging themes such as the role of Blockchain in advertising, and dynamic pricing, as well as the need for further exploration of underdeveloped areas (e.g., consumer behavior and brand equity). The results contribute to theoretical and practical management elements and provide the groundwork for future study in this area. The overarching target of this research is to give a complete overview of applications and emerging trends of Blockchain technology in Marketing, thereby serving as a resource for future research topics for Marketing scholars and experts aiming to implement solutions based on Blockchain technology and algorithms to develop an I5.0 business.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obadah Habash, Rabeb Mizouni, Shakti Singh, Hadi Otrok
{"title":"Gaussian process-based online sensor selection for source localization","authors":"Obadah Habash, Rabeb Mizouni, Shakti Singh, Hadi Otrok","doi":"10.1016/j.iot.2024.101388","DOIUrl":"10.1016/j.iot.2024.101388","url":null,"abstract":"<div><div>This paper addresses the sensor selection problem for source localization within cyber–physical systems (CPSs). While recent machine learning and reinforcement learning approaches aim to optimize sensor selection and placement within the Area of Interest (AoI), their need for intensive data collection and training precludes online operation. Furthermore, these methods often require prior knowledge of the unknown source’s characteristics and lack adaptability to the dynamic nature of CPSs, leading to inefficiencies in unseen environments. This paper addresses these shortcomings using Gaussian process Optimization coupled with an active sensor selection mechanism to locate the unknown source within the AoI. The proposed approach first builds a probabilistic model of the environment, which is discretized into a grid, without prior training using a Gaussian Process surrogate model. Next, the model iteratively and systematically learns the underlying spatial phenomenon using Gaussian Process optimization. Concurrently, the approach selects a subset of sensors by optimizing a fitness function that advocates selecting informative and energy-efficient sensors. Next, the probabilistic model, having accurately learned the environment, directs the algorithm to the unknown source by identifying the cell with the highest likelihood of containing it. Finally, a peak refinement step is performed, which computes the exact location of the source within the designated cell. The proposed method’s efficacy is validated through experiments in radioactive source localization, validation studies, and adaptability assessments across various environments. In terms of quality of localization (QoL), it outperforms recent localization benchmarks, such as a reinforcement learning-based approach and DANS, by around 18% and 100%, respectively.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data","authors":"Roberto Román, Rosario Arjona, Iluminada Baturone","doi":"10.1016/j.iot.2024.101389","DOIUrl":"10.1016/j.iot.2024.101389","url":null,"abstract":"<div><div>Physical Unclonable Functions (PUFs) are widely used to authenticate electronic devices because they take advantage of random variations in the manufacturing process that are unique to each device and cannot be cloned. Therefore, each device can be uniquely identified and counterfeit devices can be detected. Weak PUFs, which support a relatively small number of challenge-response pairs (CRPs), are simple and easy to construct. Device authentication with weak PUFs typically uses helper data to obfuscate and recover a cryptographic key that is then required by a cryptographic authentication scheme. However, these schemes are vulnerable to helper-data attacks and many of them do not protect conveniently the PUF responses, which are sensitive data, as well as are not resistant to attacks performed by quantum computers. This paper proposes an authentication scheme that avoids the aforementioned weaknesses by not using helper data, protecting the PUF response with a quantum-safe homomorphic encryption, and by using a two-server setup. Specifically, the CRYSTALS-Kyber public key cryptographic algorithm is used for its quantum resistance and suitability for resource-constrained Internet-of-Things (IoT) devices. The practicality of the proposal was tested on an ESP32 microcontroller using its internal SRAM as a SRAM PUF. For PUF responses of 512 bits, the encryption execution time ranges from 16.41 ms to 41.08 ms, depending on the desired level of security. In terms of memory, the device only needs to store between 800 and 1,568 bytes. This makes the solution post-quantum secure, lightweight and affordable for IoT devices with limited computing, memory, and power resources.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid vehicular access protocol and message prioritization for real-time safety messaging","authors":"Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed","doi":"10.1016/j.iot.2024.101390","DOIUrl":"10.1016/j.iot.2024.101390","url":null,"abstract":"<div><div>Real-time safety services rely on the exchange of messages to enhance the operations of connected and automated vehicles (CAVs). These safety messages convey vital information about traffic conditions, enabling drivers to take necessary measures to prevent accidents. The timely and reliable delivery of these messages is essential, necessitating efficient channel access. Vehicular Deterministic Access (VDA) is employed as a channel access scheme with distinct priorities and stringent timing guidelines, particularly for urgent safety warnings. In this paper, we propose a hybrid approach that combines VDA and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocols, along with a message prioritization algorithm, to ensure efficient and reliable communication of safety messages in vehicular networks. Our approach leverages the strengths of both VDA and CSMA/CA to avoid message collisions; VDA is more efficient under high traffic loads, while CSMA/CA is better suited for low traffic loads. Additionally, the incorporation of the message prioritization algorithm ensures strict deadline guarantees for high-priority messages, such as Decentralized Environmental Notification Messages (DENMs). We evaluate our proposed solution using the Artery simulation framework. Our results show over a 93% delivery rate for DENM exchanges while maintaining low collision probability across various traffic loads. This research provides practical guidance for the development of efficient and reliable communication systems for CAVs. It also offers a detailed analysis of the trade-offs among different access protocols and message prioritization strategies in vehicular networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen
{"title":"A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security","authors":"Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen","doi":"10.1016/j.iot.2024.101391","DOIUrl":"10.1016/j.iot.2024.101391","url":null,"abstract":"<div><div>The rapid advancement of quantum computing poses a significant threat to conventional cryptographic systems, particularly in the context of Internet of Things (IoT) security. This paper introduces PQ-IoTCrypt, a lightweight post-quantum cryptosystem for resource-constrained IoT devices. PQ-IoTCrypt builds upon the binary ring learning with errors problem, incorporating optimizations for efficient implementation on 8-bit microcontrollers commonly found in IoT environments. We introduce a symmetric discrete uniform distribution and streamlined polynomial arithmetic to reduce computational overhead while maintaining a high-security level. Additionally, we present a comprehensive power side-channel analysis framework for lattice-based post-quantum cryptography, demonstrating PQ-IoTCrypt's resilience against various side-channel attacks, including advanced ciphertext selection criteria, IoT-optimized template creation, and a hierarchical chosen-ciphertext attack methodology tailored for IoT deployments. Experimental results show that PQ-IoTCrypt achieves a 9.9% reduction in total encryption time compared to the next best baseline at the 256-bit security level while requiring significantly fewer ciphertexts for successful attacks. PQ-IoTCrypt demonstrates superior performance in key generation, encryption, and decryption processes, with times reduced by 12.7 %, 9.1 %, and 9.2 %, respectively, compared to the closest competitor. This work contributes to the standardization efforts of post-quantum IoT security and offers valuable insights for real-world deployment of quantum-resistant cryptography in resource-limited settings.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data","authors":"Mashud Rana , Ashfaqur Rahman , Daniel Smith","doi":"10.1016/j.iot.2024.101386","DOIUrl":"10.1016/j.iot.2024.101386","url":null,"abstract":"<div><div>Activity recognition refers to the process of automatically identifying or interpreting activities of objects based on the data captured from different sensing devices. While previous research on indoor activity recognition predominantly relies on visual data like images or video recordings, we present a novel approach based on <em>spatiotemporal trajectory</em> data recorded by IoT based sensors. The proposed approach is tailored for indoor manufacturing applications leveraging trajectory partitioning, hierarchical clustering, and convolutional neural networks. Moreover, a vast majority of activity recognition models that have been used in different industrial settings are supervised methods requiring large manually labelled datasets to be collected. This manual annotation process is unwieldly and labour-intensive, and hence, often infeasible to deploy for practical applications. In contrast, our proposed activity recognition approach is <em>semi-supervised</em> meaning it can be trained with far less labelled data; significantly reducing the effort and costs associated with the manual annotation process. The proposed approach is evaluated using two indoor trajectory datasets related to different manufacturing assembly processes. Experimental results demonstrate its effectiveness for activity recognition: the classification accuracy (measured using F-score) varies between 0.81 to 0.95 and 0.88 to 0.92 across indoor trajectory datasets. A comparison with a baseline model indicates that it achieves up to a 18% improvement in classification accuracy. Furthermore, the classification results enable insights into factory floor states, aiding in decision-making for operational efficiency and resource allocation.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity","authors":"Yasmina Maïzi, Antoine Arcand, Ygal Bendavid","doi":"10.1016/j.iot.2024.101379","DOIUrl":"10.1016/j.iot.2024.101379","url":null,"abstract":"<div><div>The digital twin (DT) is a powerful technological tool that has captured many industries’ attention in recent years, including healthcare where it offers great potential for service quality and operational efficiency. However, the literature in this field remains scattered among heterogeneous applications ranging from the digital twinning of a heart to that of a city’s population health. Although recent reviews may have provided better structure for literature understanding, a typology of healthcare DTs as well as evaluation and implementation guidelines are still missing. Therefore, this article provides a structured review of literature as well as a three-tiered taxonomy and evaluation system to better assess the current state of research on DTs in healthcare and facilitate comparisons among models sharing similar core characteristics. First, we provide a comprehensive review of case studies and use case frameworks in literature and industry based on their hierarchical level of reality, application purpose, and maturity or sophistication of models. Second, we provide an analysis of the maturity and sophistication of models by application type to highlight particular characteristics and facilitate discussion of future opportunities and improvement paths. The proposed classification of reviewed articles provides a better overview of the most studied types of models in research and facilitates the understanding of their potential use in healthcare settings, but is also extendable to other fields as well, as it aims to regroup models in a way that is coherent with existing models in industry.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic communication model for the task of high quality image transmission to edge-end devices","authors":"Zhaoxu Wen, Jiandong Fang, Xiuling Wang","doi":"10.1016/j.iot.2024.101384","DOIUrl":"10.1016/j.iot.2024.101384","url":null,"abstract":"<div><div>With the development of Industrial Internet of Things (IIOT) equipment to intelligentization and digitalization, a large number of intelligent mobile devices and Automated Guided Vehicles (AGV) are widely used in modern intelligent warehouse management, which generates a large number of machine vision tasks as well as massive demand for image and video data transmission. Guaranteeing the quality of image data transmission while saving the amount of transmitted data by edge-end devices has become one of the key issues in modern IIOT. As an efficient new communication method, semantic communication technology can significantly improve the transmission efficiency by focusing on the intrinsic meaning of the transmitted data. In this paper, a semantic communication model is proposed for the modern intelligent warehouse environment, using the ray tracing method to obtain its channel characteristic parameters, according to the obtained channel characteristic parameters to establish an end-to-end semantic communication scheme applicable to the warehouse environment, to achieve the optimization of the communication process transmission. Simulation analysis shows that compared with the traditional communication scheme, the proposed scheme can still achieve a structural similarity index higher than 0.8 when the transmission signal-to-noise ratio (SNR) is less than 6 dB, which effectively improves the image reconstruction quality compared with the traditional compression scheme.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions","authors":"Harsha Varun Marisetty, Nida Fatima, Manik Gupta, Paresh Saxena","doi":"10.1016/j.iot.2024.101375","DOIUrl":"10.1016/j.iot.2024.101375","url":null,"abstract":"<div><div>Resource Scheduling and Distributed learning play a key role in Internet of Things (IoT) edge computing systems. There has been extensive research in each area, however, there is limited work focusing on the relationship between the two. We present a systematic literature review (SLR) examining the relationship between the two by thoroughly reviewing the available articles in these two specific areas. Our main novel contribution is to discover a complementary relationship between resource scheduling and distributed learning. We find that the resource scheduling techniques are utilized for distributed machine learning (DML) in edge networks, while distributed reinforcement learning (RL) is used as an optimization technique for resource scheduling in edge networks. Other key contributions of the SLR include: (1) presenting a detailed taxonomy on resource scheduling and distributed learning in edge computing, (2) reviewing articles on resource scheduling for DML and distributed RL for resource scheduling, mapping them to the taxonomy, and classifying them into broad categories, and (3) discussing the future research directions as well as the challenges arising from the integration of new technologies with resource scheduling and distributed learning in edge networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}