Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen
{"title":"A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security","authors":"Changsheng Ma , Achyut Shankar , Saru Kumari , Chien-Ming Chen","doi":"10.1016/j.iot.2024.101391","DOIUrl":"10.1016/j.iot.2024.101391","url":null,"abstract":"<div><div>The rapid advancement of quantum computing poses a significant threat to conventional cryptographic systems, particularly in the context of Internet of Things (IoT) security. This paper introduces PQ-IoTCrypt, a lightweight post-quantum cryptosystem for resource-constrained IoT devices. PQ-IoTCrypt builds upon the binary ring learning with errors problem, incorporating optimizations for efficient implementation on 8-bit microcontrollers commonly found in IoT environments. We introduce a symmetric discrete uniform distribution and streamlined polynomial arithmetic to reduce computational overhead while maintaining a high-security level. Additionally, we present a comprehensive power side-channel analysis framework for lattice-based post-quantum cryptography, demonstrating PQ-IoTCrypt's resilience against various side-channel attacks, including advanced ciphertext selection criteria, IoT-optimized template creation, and a hierarchical chosen-ciphertext attack methodology tailored for IoT deployments. Experimental results show that PQ-IoTCrypt achieves a 9.9% reduction in total encryption time compared to the next best baseline at the 256-bit security level while requiring significantly fewer ciphertexts for successful attacks. PQ-IoTCrypt demonstrates superior performance in key generation, encryption, and decryption processes, with times reduced by 12.7 %, 9.1 %, and 9.2 %, respectively, compared to the closest competitor. This work contributes to the standardization efforts of post-quantum IoT security and offers valuable insights for real-world deployment of quantum-resistant cryptography in resource-limited settings.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101391"},"PeriodicalIF":6.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Semi-Supervised Approach for Classifying Activities of Workers Utilising Indoor Trajectory Data","authors":"Mashud Rana , Ashfaqur Rahman , Daniel Smith","doi":"10.1016/j.iot.2024.101386","DOIUrl":"10.1016/j.iot.2024.101386","url":null,"abstract":"<div><div>Activity recognition refers to the process of automatically identifying or interpreting activities of objects based on the data captured from different sensing devices. While previous research on indoor activity recognition predominantly relies on visual data like images or video recordings, we present a novel approach based on <em>spatiotemporal trajectory</em> data recorded by IoT based sensors. The proposed approach is tailored for indoor manufacturing applications leveraging trajectory partitioning, hierarchical clustering, and convolutional neural networks. Moreover, a vast majority of activity recognition models that have been used in different industrial settings are supervised methods requiring large manually labelled datasets to be collected. This manual annotation process is unwieldly and labour-intensive, and hence, often infeasible to deploy for practical applications. In contrast, our proposed activity recognition approach is <em>semi-supervised</em> meaning it can be trained with far less labelled data; significantly reducing the effort and costs associated with the manual annotation process. The proposed approach is evaluated using two indoor trajectory datasets related to different manufacturing assembly processes. Experimental results demonstrate its effectiveness for activity recognition: the classification accuracy (measured using F-score) varies between 0.81 to 0.95 and 0.88 to 0.92 across indoor trajectory datasets. A comparison with a baseline model indicates that it achieves up to a 18% improvement in classification accuracy. Furthermore, the classification results enable insights into factory floor states, aiding in decision-making for operational efficiency and resource allocation.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101386"},"PeriodicalIF":6.0,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital twin in healthcare: Classification and typology of models based on hierarchy, application, and maturity","authors":"Yasmina Maïzi, Antoine Arcand, Ygal Bendavid","doi":"10.1016/j.iot.2024.101379","DOIUrl":"10.1016/j.iot.2024.101379","url":null,"abstract":"<div><div>The digital twin (DT) is a powerful technological tool that has captured many industries’ attention in recent years, including healthcare where it offers great potential for service quality and operational efficiency. However, the literature in this field remains scattered among heterogeneous applications ranging from the digital twinning of a heart to that of a city’s population health. Although recent reviews may have provided better structure for literature understanding, a typology of healthcare DTs as well as evaluation and implementation guidelines are still missing. Therefore, this article provides a structured review of literature as well as a three-tiered taxonomy and evaluation system to better assess the current state of research on DTs in healthcare and facilitate comparisons among models sharing similar core characteristics. First, we provide a comprehensive review of case studies and use case frameworks in literature and industry based on their hierarchical level of reality, application purpose, and maturity or sophistication of models. Second, we provide an analysis of the maturity and sophistication of models by application type to highlight particular characteristics and facilitate discussion of future opportunities and improvement paths. The proposed classification of reviewed articles provides a better overview of the most studied types of models in research and facilitates the understanding of their potential use in healthcare settings, but is also extendable to other fields as well, as it aims to regroup models in a way that is coherent with existing models in industry.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101379"},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic communication model for the task of high quality image transmission to edge-end devices","authors":"Zhaoxu Wen, Jiandong Fang, Xiuling Wang","doi":"10.1016/j.iot.2024.101384","DOIUrl":"10.1016/j.iot.2024.101384","url":null,"abstract":"<div><div>With the development of Industrial Internet of Things (IIOT) equipment to intelligentization and digitalization, a large number of intelligent mobile devices and Automated Guided Vehicles (AGV) are widely used in modern intelligent warehouse management, which generates a large number of machine vision tasks as well as massive demand for image and video data transmission. Guaranteeing the quality of image data transmission while saving the amount of transmitted data by edge-end devices has become one of the key issues in modern IIOT. As an efficient new communication method, semantic communication technology can significantly improve the transmission efficiency by focusing on the intrinsic meaning of the transmitted data. In this paper, a semantic communication model is proposed for the modern intelligent warehouse environment, using the ray tracing method to obtain its channel characteristic parameters, according to the obtained channel characteristic parameters to establish an end-to-end semantic communication scheme applicable to the warehouse environment, to achieve the optimization of the communication process transmission. Simulation analysis shows that compared with the traditional communication scheme, the proposed scheme can still achieve a structural similarity index higher than 0.8 when the transmission signal-to-noise ratio (SNR) is less than 6 dB, which effectively improves the image reconstruction quality compared with the traditional compression scheme.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101384"},"PeriodicalIF":6.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions","authors":"Harsha Varun Marisetty, Nida Fatima, Manik Gupta, Paresh Saxena","doi":"10.1016/j.iot.2024.101375","DOIUrl":"10.1016/j.iot.2024.101375","url":null,"abstract":"<div><div>Resource Scheduling and Distributed learning play a key role in Internet of Things (IoT) edge computing systems. There has been extensive research in each area, however, there is limited work focusing on the relationship between the two. We present a systematic literature review (SLR) examining the relationship between the two by thoroughly reviewing the available articles in these two specific areas. Our main novel contribution is to discover a complementary relationship between resource scheduling and distributed learning. We find that the resource scheduling techniques are utilized for distributed machine learning (DML) in edge networks, while distributed reinforcement learning (RL) is used as an optimization technique for resource scheduling in edge networks. Other key contributions of the SLR include: (1) presenting a detailed taxonomy on resource scheduling and distributed learning in edge computing, (2) reviewing articles on resource scheduling for DML and distributed RL for resource scheduling, mapping them to the taxonomy, and classifying them into broad categories, and (3) discussing the future research directions as well as the challenges arising from the integration of new technologies with resource scheduling and distributed learning in edge networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101375"},"PeriodicalIF":6.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ferdous Sharifi , Shaahin Hessabi , Young Choon Lee
{"title":"Cluster-based cooperative fog caching for scalable coded videos of multiple content providers","authors":"Ferdous Sharifi , Shaahin Hessabi , Young Choon Lee","doi":"10.1016/j.iot.2024.101380","DOIUrl":"10.1016/j.iot.2024.101380","url":null,"abstract":"<div><div>Efficient content caching in video streaming services is important for improving user experience as well as reducing network bandwidth consumption. Fog caching combined with scalable video coding (SVC) has the potential to significantly improve caching efficiency. However, challenges such as the limited storage capacity of fog nodes and determining the optimal number of SVC layers must be overcome for their effective adoption. This becomes more complicated with multiple content providers requiring shared cache resources. To the best of our knowledge, no existing research has simultaneously tackled all these aspects. In this paper, we present Cluster-based Cooperative Fog Caching (CCo-Fog), a holistic caching strategy that enables multiple content providers to share the scarce storage of fog nodes in a multi-tier fog network to judiciously cache SVC videos in a cooperative manner. In particular, CCo-Fog consists of a cluster-based storage partitioning method and tier-wise cooperative content placement policies. The partitioning method distributes the storage of each fog node to multiple content providers for users clustered based on their population density and their proximity to fog nodes. The content placement policies determine the optimal number of SVC layers of each video for different tiers of the fog network by solving a latency-aware content placement optimization problem. Our evaluations on a real-world dataset and various configurations demonstrate the efficacy of CCo-Fog, showing a reduction in latency by about 60% and an increase in fog hit ratio by about 20% on average, compared to state-of-the-art caching strategies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101380"},"PeriodicalIF":6.0,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142419301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing SCADA systems in smart grids with IoT integration: A Self-Defensive Post-Quantum Blockchain Architecture","authors":"Mohammad Tazeem Naz, Wael Elmedany, Mazen Ali","doi":"10.1016/j.iot.2024.101381","DOIUrl":"10.1016/j.iot.2024.101381","url":null,"abstract":"<div><div>The rapid development of smart city infrastructures has brought increased attention to the security of critical systems such as Supervisory Control and Data Acquisition (SCADA) systems, which are central to smart grids. SCADA systems are highly susceptible to cyberattacks, particularly false data injection attacks that can lead to catastrophic failures. While blockchain technology has been explored as a means to secure SCADA systems, traditional blockchain models are vulnerable to the emerging threat of quantum computing, which can break classical cryptographic algorithms.</div><div>This paper proposes a Self-Defensive Post-Quantum Blockchain Architecture (SD-PQBA) specifically designed to protect SCADA systems within smart cities from both classical and quantum cyber threats. The SD-PQBA framework introduces a novel Proof of Derived Authority (PoDA) consensus mechanism and a post-quantum 3-key cryptography scheme that ensures the immutability and integrity of data in the SCADA system. By addressing the limitations of existing blockchain solutions in the context of quantum computing, this architecture provides a robust, future-proof layer of defense, enhancing the resilience of SCADA systems against advanced cyber attacks. This approach not only strengthens SCADA security but also highlights critical gaps in the literature at the intersection of quantum computing, SCADA, and blockchain technology.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101381"},"PeriodicalIF":6.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ye Zhang , Xingyun He , Jin Xing , Wuyungerile Li , Winston K.G. Seah
{"title":"Load-balanced offloading of multiple task types for mobile edge computing in IoT","authors":"Ye Zhang , Xingyun He , Jin Xing , Wuyungerile Li , Winston K.G. Seah","doi":"10.1016/j.iot.2024.101385","DOIUrl":"10.1016/j.iot.2024.101385","url":null,"abstract":"<div><div>The continuous development of mobile networks poses new challenges for end devices with limited computing power. Mobile or multi-access edge computing (MEC) has been proposed for providing the computing resources close to the end devices that need them. However, in real network environments, MEC servers also have limited computing resources that need to be shared among many devices and efficient resource allocation is critical to ensure that the limited resources are optimally used. In view of this, we propose the Balanced Offload for Multi-type Tasks (BOMT) algorithm. The tasks to be offloaded are first prioritized according to their type, size and maximum tolerable delay; then different offloading algorithms are executed for different priority tasks according to the level of the priority and the current load on the MEC server. Following which, the optimal offloading policy is determined iteratively. Simulation results show that BOMT can effectively reduce system delay, increase user coverage and offload task completion rates.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101385"},"PeriodicalIF":6.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computation and transmission adaptive semantic communication for reliability-guarantee image reconstruction in IoT","authors":"Chen Lin, Yijun Guo, Jianjun Hao, Zhilong Zhang","doi":"10.1016/j.iot.2024.101383","DOIUrl":"10.1016/j.iot.2024.101383","url":null,"abstract":"<div><div>Semantic communication can significantly compress source data, improving transmission efficiency. However, semantic communication systems under varying channel condition have not been well studied, especially for tasks that require reliability guarantee. This paper focus on the reliability-guarantee image reconstruction tasks, and study the computation and transmission adaptive semantic communication. First, a computation and transmission adaptive semantic communication (CTASC) system is proposed. It is able to adjust the computation load and transmission load of an image reconstruction task adaptively while guaranteeing the reconstruction reliability. Specifically, a semantic encoder with multiple convolutional neural network (CNN) slices with different network depths is designed to adjust the transmission load and computation load. Second, a joint computation and transmission resource allocation problem aimed at minimizing the maximum delay within system is formulated. To solve this problem, we decompose it into two nested sub-problems and propose a Simulated Annealing with Re-perturbation Mechanism (SA-RPM) algorithm and an Alternating Optimization (AO) algorithm to solve these sub-problems, respectively. Simulation results demonstrate that compared to variable code length enabled DeepJSCC (DeepJSCC-V), our system can achieve higher compression ratio(CR) with similar LPIPS performance. Simulation results also show that our resource allocation scheme can obtain an approaching value to the optimal maximum delay, with an average difference not exceeding 0.2%.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101383"},"PeriodicalIF":6.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration","authors":"Ming Yuan Hsieh","doi":"10.1016/j.iot.2024.101382","DOIUrl":"10.1016/j.iot.2024.101382","url":null,"abstract":"<div><div>This research investigates the impact of Internet of Things (IoT) applications on decision-making capacity (DMC) development in Corporate Sustainable Leadership (CSL). The research focuses on how IoT enhances Environmental, Social, and Governance (ESG) practices within organizations, addressing key sustainability challenges and supporting Sustainable Development Goals (SDGs). Through quantitative and qualitative analyses, the study identifies three primary findings: (1) IoT applications directly enhance power source management in the environmental domain, improving Business Strategy and Long-term Growth (BSLG) and Measurement and Reporting (M&R) capabilities. This is achieved through real-time monitoring, smart building management, and predictive maintenance. In the social sphere, IoT strengthens supply chain transparency, bolstering Stakeholder Management (SM) through real-time tracking and blockchain-integrated systems for product authenticity verification. IoT comprehensively empowers performing risk management in the governance realm, improving Organizational Culture (OC) through early warning systems and predictive analytics for risk mitigation. (2) IoT integration facilitates Data-Driven Decision Making (DDDM), Real-Time Responsiveness (RTR), and Business Risk Management (BRM), key components of IoT-DMC. Furthermore, it supports the development of Effective Stakeholder Management (ESM), Resource Efficiency (RE), and Sustainable Competitive Outcomes (SCO) within IoT-CSL. (3) While highlighting the potential of IoT in advancing CSL, the research also acknowledges challenges such as initial investment costs, data privacy concerns, technological complexity, energy consumption of IoT devices, and electronic waste management. The study concludes that successful IoT implementation in CSL requires careful planning, robust data management, and a holistic approach considering both benefits and potential drawbacks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101382"},"PeriodicalIF":6.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142327217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}