Internet of Things最新文献

筛选
英文 中文
Automated image-based fire detection and alarm system using edge computing and cloud-based platform 使用边缘计算和云平台的基于图像的火灾自动探测和报警系统
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-10 DOI: 10.1016/j.iot.2024.101402
Xueliang Yang, Yenchun Li, Qian Chen
{"title":"Automated image-based fire detection and alarm system using edge computing and cloud-based platform","authors":"Xueliang Yang,&nbsp;Yenchun Li,&nbsp;Qian Chen","doi":"10.1016/j.iot.2024.101402","DOIUrl":"10.1016/j.iot.2024.101402","url":null,"abstract":"<div><div>To tackle the increasing wildfire challenges, this paper presents an automated image-based fire detection and alarm system utilizing edge computing and a cloud-based platform, specifically designed for urban building fire detection. The system captures both RGB and infrared images from thermal cameras and employs existing computer vision techniques to detect fire characteristics such as flames and smoke. By integrating edge computing, the system minimizes latency to enhance the accuracy of fire detection and alarm activation. The cloud platform supports extensive data storage, analysis, and remote monitoring, which can ensure data accessibility and scalable data management. The proposed system descriptions include a detailed system architecture design, data collection, and the selection and application of detection algorithms that leverage both RGB and thermal image data for fire detection. Using the campus building and surrounding risk-prone areas as a testbed, the proposed system demonstrated desired fire detection capabilities and a robust solution to quickly identify and respond to fire incidents within the urban area. The proposed system functionalities can be scaled and adapted to other fire risk-prone areas.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis 区块链技术在市场营销中的应用和新兴趋势,以发展工业 5.0 企业:全面调查与网络分析
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-10 DOI: 10.1016/j.iot.2024.101401
Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva
{"title":"Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis","authors":"Ali Nikseresht ,&nbsp;Sajjad Shokouhyar ,&nbsp;Erfan Babaee Tirkolaee ,&nbsp;Nima Pishva","doi":"10.1016/j.iot.2024.101401","DOIUrl":"10.1016/j.iot.2024.101401","url":null,"abstract":"<div><div>With the availability of enormous amounts of data come the difficulties of big data, privacy, and ransomware assaults, which result in Marketing fraud and spam. Blockchain offers an extensive array of possible applications in the Marketing field. Nevertheless, both Marketing research and practice exhibit a degree of hesitance toward using Blockchain technology and have not yet come around to completely understand and adopt the technology. Here, the aim is to examine the Blockchain concepts and their applications in Marketing through bibliometrics, network, and thematic analyses, which can provide several novel insights and perspectives into current research trends in this field by evaluating the most significant and cited research publications, keywords, institutions, authors' collaboration network, and finally countries that promote Industry 5.0 (I5.0) businesses. This study performs a detailed bibliometric and thematic-based Systematic Literature Review (SLR) on 124 of over 15000 research papers. Major outcomes include the identification of emerging themes such as the role of Blockchain in advertising, and dynamic pricing, as well as the need for further exploration of underdeveloped areas (e.g., consumer behavior and brand equity). The results contribute to theoretical and practical management elements and provide the groundwork for future study in this area. The overarching target of this research is to give a complete overview of applications and emerging trends of Blockchain technology in Marketing, thereby serving as a resource for future research topics for Marketing scholars and experts aiming to implement solutions based on Blockchain technology and algorithms to develop an I5.0 business.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaussian process-based online sensor selection for source localization 基于高斯过程的源定位在线传感器选择
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-09 DOI: 10.1016/j.iot.2024.101388
Obadah Habash, Rabeb Mizouni, Shakti Singh, Hadi Otrok
{"title":"Gaussian process-based online sensor selection for source localization","authors":"Obadah Habash,&nbsp;Rabeb Mizouni,&nbsp;Shakti Singh,&nbsp;Hadi Otrok","doi":"10.1016/j.iot.2024.101388","DOIUrl":"10.1016/j.iot.2024.101388","url":null,"abstract":"<div><div>This paper addresses the sensor selection problem for source localization within cyber–physical systems (CPSs). While recent machine learning and reinforcement learning approaches aim to optimize sensor selection and placement within the Area of Interest (AoI), their need for intensive data collection and training precludes online operation. Furthermore, these methods often require prior knowledge of the unknown source’s characteristics and lack adaptability to the dynamic nature of CPSs, leading to inefficiencies in unseen environments. This paper addresses these shortcomings using Gaussian process Optimization coupled with an active sensor selection mechanism to locate the unknown source within the AoI. The proposed approach first builds a probabilistic model of the environment, which is discretized into a grid, without prior training using a Gaussian Process surrogate model. Next, the model iteratively and systematically learns the underlying spatial phenomenon using Gaussian Process optimization. Concurrently, the approach selects a subset of sensors by optimizing a fitness function that advocates selecting informative and energy-efficient sensors. Next, the probabilistic model, having accurately learned the environment, directs the algorithm to the unknown source by identifying the cell with the highest likelihood of containing it. Finally, a peak refinement step is performed, which computes the exact location of the source within the designated cell. The proposed method’s efficacy is validated through experiments in radioactive source localization, validation studies, and adaptability assessments across various environments. In terms of quality of localization (QoL), it outperforms recent localization benchmarks, such as a reinforcement learning-based approach and DANS, by around 18% and 100%, respectively.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data 使用同态加密和无辅助数据的弱物理不可克隆函数的物联网设备量子安全认证方案
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-08 DOI: 10.1016/j.iot.2024.101389
Roberto Román, Rosario Arjona, Iluminada Baturone
{"title":"A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data","authors":"Roberto Román,&nbsp;Rosario Arjona,&nbsp;Iluminada Baturone","doi":"10.1016/j.iot.2024.101389","DOIUrl":"10.1016/j.iot.2024.101389","url":null,"abstract":"<div><div>Physical Unclonable Functions (PUFs) are widely used to authenticate electronic devices because they take advantage of random variations in the manufacturing process that are unique to each device and cannot be cloned. Therefore, each device can be uniquely identified and counterfeit devices can be detected. Weak PUFs, which support a relatively small number of challenge-response pairs (CRPs), are simple and easy to construct. Device authentication with weak PUFs typically uses helper data to obfuscate and recover a cryptographic key that is then required by a cryptographic authentication scheme. However, these schemes are vulnerable to helper-data attacks and many of them do not protect conveniently the PUF responses, which are sensitive data, as well as are not resistant to attacks performed by quantum computers. This paper proposes an authentication scheme that avoids the aforementioned weaknesses by not using helper data, protecting the PUF response with a quantum-safe homomorphic encryption, and by using a two-server setup. Specifically, the CRYSTALS-Kyber public key cryptographic algorithm is used for its quantum resistance and suitability for resource-constrained Internet-of-Things (IoT) devices. The practicality of the proposal was tested on an ESP32 microcontroller using its internal SRAM as a SRAM PUF. For PUF responses of 512 bits, the encryption execution time ranges from 16.41 ms to 41.08 ms, depending on the desired level of security. In terms of memory, the device only needs to store between 800 and 1,568 bytes. This makes the solution post-quantum secure, lightweight and affordable for IoT devices with limited computing, memory, and power resources.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid vehicular access protocol and message prioritization for real-time safety messaging 实时安全信息的混合车辆接入协议和信息优先级排序
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-05 DOI: 10.1016/j.iot.2024.101390
Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed
{"title":"Hybrid vehicular access protocol and message prioritization for real-time safety messaging","authors":"Mayssa Dardour,&nbsp;Mohamed Mosbah,&nbsp;Toufik Ahmed","doi":"10.1016/j.iot.2024.101390","DOIUrl":"10.1016/j.iot.2024.101390","url":null,"abstract":"<div><div>Real-time safety services rely on the exchange of messages to enhance the operations of connected and automated vehicles (CAVs). These safety messages convey vital information about traffic conditions, enabling drivers to take necessary measures to prevent accidents. The timely and reliable delivery of these messages is essential, necessitating efficient channel access. Vehicular Deterministic Access (VDA) is employed as a channel access scheme with distinct priorities and stringent timing guidelines, particularly for urgent safety warnings. In this paper, we propose a hybrid approach that combines VDA and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocols, along with a message prioritization algorithm, to ensure efficient and reliable communication of safety messages in vehicular networks. Our approach leverages the strengths of both VDA and CSMA/CA to avoid message collisions; VDA is more efficient under high traffic loads, while CSMA/CA is better suited for low traffic loads. Additionally, the incorporation of the message prioritization algorithm ensures strict deadline guarantees for high-priority messages, such as Decentralized Environmental Notification Messages (DENMs). We evaluate our proposed solution using the Artery simulation framework. Our results show over a 93% delivery rate for DENM exchanges while maintaining low collision probability across various traffic loads. This research provides practical guidance for the development of efficient and reliable communication systems for CAVs. It also offers a detailed analysis of the trade-offs among different access protocols and message prioritization strategies in vehicular networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security 基于 BRLWE 的轻量级后量子密码系统,具有物联网安全的侧信道恢复能力
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-10-03 DOI: 10.1016/j.iot.2024.101391
Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen
{"title":"A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security","authors":"Changsheng Ma ,&nbsp;Achyut Shankar ,&nbsp;Saru Kumari ,&nbsp;Chien-Ming Chen","doi":"10.1016/j.iot.2024.101391","DOIUrl":"10.1016/j.iot.2024.101391","url":null,"abstract":"<div><div>The rapid advancement of quantum computing poses a significant threat to conventional cryptographic systems, particularly in the context of Internet of Things (IoT) security. This paper introduces PQ-IoTCrypt, a lightweight post-quantum cryptosystem for resource-constrained IoT devices. PQ-IoTCrypt builds upon the binary ring learning with errors problem, incorporating optimizations for efficient implementation on 8-bit microcontrollers commonly found in IoT environments. We introduce a symmetric discrete uniform distribution and streamlined polynomial arithmetic to reduce computational overhead while maintaining a high-security level. Additionally, we present a comprehensive power side-channel analysis framework for lattice-based post-quantum cryptography, demonstrating PQ-IoTCrypt's resilience against various side-channel attacks, including advanced ciphertext selection criteria, IoT-optimized template creation, and a hierarchical chosen-ciphertext attack methodology tailored for IoT deployments. Experimental results show that PQ-IoTCrypt achieves a 9.9% reduction in total encryption time compared to the next best baseline at the 256-bit security level while requiring significantly fewer ciphertexts for successful attacks. PQ-IoTCrypt demonstrates superior performance in key generation, encryption, and decryption processes, with times reduced by 12.7 %, 9.1 %, and 9.2 %, respectively, compared to the closest competitor. This work contributes to the standardization efforts of post-quantum IoT security and offers valuable insights for real-world deployment of quantum-resistant cryptography in resource-limited settings.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data 利用室内轨迹数据对工人活动进行分类的分层半监督方法
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-30 DOI: 10.1016/j.iot.2024.101386
Mashud Rana , Ashfaqur Rahman , Daniel Smith
{"title":"Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data","authors":"Mashud Rana ,&nbsp;Ashfaqur Rahman ,&nbsp;Daniel Smith","doi":"10.1016/j.iot.2024.101386","DOIUrl":"10.1016/j.iot.2024.101386","url":null,"abstract":"<div><div>Activity recognition refers to the process of automatically identifying or interpreting activities of objects based on the data captured from different sensing devices. While previous research on indoor activity recognition predominantly relies on visual data like images or video recordings, we present a novel approach based on <em>spatiotemporal trajectory</em> data recorded by IoT based sensors. The proposed approach is tailored for indoor manufacturing applications leveraging trajectory partitioning, hierarchical clustering, and convolutional neural networks. Moreover, a vast majority of activity recognition models that have been used in different industrial settings are supervised methods requiring large manually labelled datasets to be collected. This manual annotation process is unwieldly and labour-intensive, and hence, often infeasible to deploy for practical applications. In contrast, our proposed activity recognition approach is <em>semi-supervised</em> meaning it can be trained with far less labelled data; significantly reducing the effort and costs associated with the manual annotation process. The proposed approach is evaluated using two indoor trajectory datasets related to different manufacturing assembly processes. Experimental results demonstrate its effectiveness for activity recognition: the classification accuracy (measured using F-score) varies between 0.81 to 0.95 and 0.88 to 0.92 across indoor trajectory datasets. A comparison with a baseline model indicates that it achieves up to a 18% improvement in classification accuracy. Furthermore, the classification results enable insights into factory floor states, aiding in decision-making for operational efficiency and resource allocation.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity 医疗保健领域的数字孪生:基于层次、应用和成熟度的模型分类和类型学
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-28 DOI: 10.1016/j.iot.2024.101379
Yasmina Maïzi, Antoine Arcand, Ygal Bendavid
{"title":"Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity","authors":"Yasmina Maïzi,&nbsp;Antoine Arcand,&nbsp;Ygal Bendavid","doi":"10.1016/j.iot.2024.101379","DOIUrl":"10.1016/j.iot.2024.101379","url":null,"abstract":"<div><div>The digital twin (DT) is a powerful technological tool that has captured many industries’ attention in recent years, including healthcare where it offers great potential for service quality and operational efficiency. However, the literature in this field remains scattered among heterogeneous applications ranging from the digital twinning of a heart to that of a city’s population health. Although recent reviews may have provided better structure for literature understanding, a typology of healthcare DTs as well as evaluation and implementation guidelines are still missing. Therefore, this article provides a structured review of literature as well as a three-tiered taxonomy and evaluation system to better assess the current state of research on DTs in healthcare and facilitate comparisons among models sharing similar core characteristics. First, we provide a comprehensive review of case studies and use case frameworks in literature and industry based on their hierarchical level of reality, application purpose, and maturity or sophistication of models. Second, we provide an analysis of the maturity and sophistication of models by application type to highlight particular characteristics and facilitate discussion of future opportunities and improvement paths. The proposed classification of reviewed articles provides a better overview of the most studied types of models in research and facilitates the understanding of their potential use in healthcare settings, but is also extendable to other fields as well, as it aims to regroup models in a way that is coherent with existing models in industry.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semantic communication model for the task of high quality image transmission to edge-end devices 用于向边缘设备传输高质量图像任务的语义通信模型
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-28 DOI: 10.1016/j.iot.2024.101384
Zhaoxu Wen, Jiandong Fang, Xiuling Wang
{"title":"A semantic communication model for the task of high quality image transmission to edge-end devices","authors":"Zhaoxu Wen,&nbsp;Jiandong Fang,&nbsp;Xiuling Wang","doi":"10.1016/j.iot.2024.101384","DOIUrl":"10.1016/j.iot.2024.101384","url":null,"abstract":"<div><div>With the development of Industrial Internet of Things (IIOT) equipment to intelligentization and digitalization, a large number of intelligent mobile devices and Automated Guided Vehicles (AGV) are widely used in modern intelligent warehouse management, which generates a large number of machine vision tasks as well as massive demand for image and video data transmission. Guaranteeing the quality of image data transmission while saving the amount of transmitted data by edge-end devices has become one of the key issues in modern IIOT. As an efficient new communication method, semantic communication technology can significantly improve the transmission efficiency by focusing on the intrinsic meaning of the transmitted data. In this paper, a semantic communication model is proposed for the modern intelligent warehouse environment, using the ray tracing method to obtain its channel characteristic parameters, according to the obtained channel characteristic parameters to establish an end-to-end semantic communication scheme applicable to the warehouse environment, to achieve the optimization of the communication process transmission. Simulation analysis shows that compared with the traditional communication scheme, the proposed scheme can still achieve a structural similarity index higher than 0.8 when the transmission signal-to-noise ratio (SNR) is less than 6 dB, which effectively improves the image reconstruction quality compared with the traditional compression scheme.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions 物联网边缘计算中的资源调度与分布式学习之间的关系--对互补方面、现有研究和未来方向的见解
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-26 DOI: 10.1016/j.iot.2024.101375
Harsha Varun Marisetty, Nida Fatima, Manik Gupta, Paresh Saxena
{"title":"Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions","authors":"Harsha Varun Marisetty,&nbsp;Nida Fatima,&nbsp;Manik Gupta,&nbsp;Paresh Saxena","doi":"10.1016/j.iot.2024.101375","DOIUrl":"10.1016/j.iot.2024.101375","url":null,"abstract":"<div><div>Resource Scheduling and Distributed learning play a key role in Internet of Things (IoT) edge computing systems. There has been extensive research in each area, however, there is limited work focusing on the relationship between the two. We present a systematic literature review (SLR) examining the relationship between the two by thoroughly reviewing the available articles in these two specific areas. Our main novel contribution is to discover a complementary relationship between resource scheduling and distributed learning. We find that the resource scheduling techniques are utilized for distributed machine learning (DML) in edge networks, while distributed reinforcement learning (RL) is used as an optimization technique for resource scheduling in edge networks. Other key contributions of the SLR include: (1) presenting a detailed taxonomy on resource scheduling and distributed learning in edge computing, (2) reviewing articles on resource scheduling for DML and distributed RL for resource scheduling, mapping them to the taxonomy, and classifying them into broad categories, and (3) discussing the future research directions as well as the challenges arising from the integration of new technologies with resource scheduling and distributed learning in edge networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信