Internet of Things最新文献

筛选
英文 中文
Understanding the dynamics of social interaction in SIoT: Human-machine engagement 了解 SIoT 中社交互动的动态:人机互动
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101337
Kuo Cheng Chung , Paul Juinn Bing Tan
{"title":"Understanding the dynamics of social interaction in SIoT: Human-machine engagement","authors":"Kuo Cheng Chung ,&nbsp;Paul Juinn Bing Tan","doi":"10.1016/j.iot.2024.101337","DOIUrl":"10.1016/j.iot.2024.101337","url":null,"abstract":"<div><p>The Social Internet of Things (SIoT) amalgamates social networks with the Internet of Things (IoT) to enable intelligent devices to form social connections analogous to human networks. This research is grounded in psychological contract theory, which examines the reciprocal mechanisms arising from diverse customer interactions to encourage user engagement and provide recommendations on social media platforms. This study in particular identifies the factors that drive customer engagement on social media. It is unique in its exploration of customer interactions within the framework of psychological contracts across multiple levels of customer engagement (through customer empowerment). The findings reveal that psychological ownership among customers is influenced by empowering interactions on social media, which ultimately drive engagement behaviors.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101337"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset 电动汽车充电站的 DDoS 检测:通过 CICEV2023 数据集的深度学习视角
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101343
Yagiz Alp Anli , Zeki Ciplak , Murat Sakaliuzun , Seniz Zekiye Izgu , Kazim Yildiz
{"title":"DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset","authors":"Yagiz Alp Anli ,&nbsp;Zeki Ciplak ,&nbsp;Murat Sakaliuzun ,&nbsp;Seniz Zekiye Izgu ,&nbsp;Kazim Yildiz","doi":"10.1016/j.iot.2024.101343","DOIUrl":"10.1016/j.iot.2024.101343","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks have always been an important research topic in the field of information security. Regarding specialized infrastructures such as electric vehicle charging stations, detecting and preventing such attacks becomes even more critical. In the existing literature, most studies on DDoS attack detection focus on traditional methods that analyze network metrics such as network traffic, packet rates, and number of connections. These approaches attempt to detect attacks by identifying anomalies and irregularities in the network, but can have high error rates and fail to identify advanced attacks. Conversely though, detection methods based on system metrics use deeper and more insightful parameters such as processor utilization, memory usage, disk I/O operations, and system behavior. Such metrics provide a more detailed perspective than network-based approaches, allowing for more accurate detection of attacks. However, work in this area is not yet widespread enough further research and improvement are needed. The adoption of advanced system metrics-based methods can significantly improve the effectiveness of DDoS defense strategies, especially in next-generation and specialized infrastructures. This paper evaluates the applicability and effectiveness of Long Short-Term Memory (LSTM) and Feed-Forward Network (FFN) in detecting DDoS attacks against electric vehicle charging stations through system metrics using CICEV2023 dataset. Experimental results show that the LSTM based model offers advantages in terms of speed and processing capacity, while the FFN is superior in terms of the accuracy.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101343"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing SPM-SeCTIS:用于智能增材制造中可计算威胁信息安全共享的严重性模式匹配
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-24 DOI: 10.1016/j.iot.2024.101334
Mahender Kumar, Gregory Epiphaniou, Carsten Maple
{"title":"SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing","authors":"Mahender Kumar,&nbsp;Gregory Epiphaniou,&nbsp;Carsten Maple","doi":"10.1016/j.iot.2024.101334","DOIUrl":"10.1016/j.iot.2024.101334","url":null,"abstract":"<div><p>Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to defend against cyberattacks. However, current methods often fail to adequately protect sensitive information, leading to security risks, especially in Intelligent Additive Manufacturing (IAM) systems. In these systems, the security and privacy of incident data collected by IoT devices are essential, as revealing threat information, such as types, impacts, and organisational interests, could be harmful. To address these challenges, we propose the Severity Pattern Matching for a Secure Computable Threat Information Sharing System (SPM-SeCTIS). This system is designed to maintain privacy by allowing intermediaries to pass along threat information without accessing sensitive details, such as the type or severity of the threats. SPM-SeCTIS ensures that attackers cannot determine which incidents organisations are interested in or what specific threats they monitor. The system employs Homomorphic Encryption (HE) to conduct threat pattern matching on encrypted data, keeping sensitive information confidential even during analysis. Our performance tests indicate that SPM-SeCTIS operates efficiently, requiring minimal time for encryption and decryption processes. Additionally, the system scales effectively, handling a large number of subscribers and incidents with ease. Compared to existing methods, SPM-SeCTIS provides improved security measures and better overall performance, making it a robust solution for protecting sensitive threat information.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101334"},"PeriodicalIF":6.0,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002750/pdfft?md5=de14d9cf242bc80bc1d64e608fdfcd74&pid=1-s2.0-S2542660524002750-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems 确保医疗物联网系统安全的两阶段区块链框架
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-23 DOI: 10.1016/j.iot.2024.101335
Kainat Fiaz , Asim Zeb , Shahid Hussain , Kinza Khurshid , Reyazur Rashid Irshad , Maher Alharby , Taj Rahman , Ibrahim M. Alwayle , Fabiano Pallonetto
{"title":"A Two-Phase Blockchain-Enabled Framework for Securing Internet of Medical Things Systems","authors":"Kainat Fiaz ,&nbsp;Asim Zeb ,&nbsp;Shahid Hussain ,&nbsp;Kinza Khurshid ,&nbsp;Reyazur Rashid Irshad ,&nbsp;Maher Alharby ,&nbsp;Taj Rahman ,&nbsp;Ibrahim M. Alwayle ,&nbsp;Fabiano Pallonetto","doi":"10.1016/j.iot.2024.101335","DOIUrl":"10.1016/j.iot.2024.101335","url":null,"abstract":"<div><p>The healthcare industry has witnessed a transformative impact due to recent advancements in sensing technology, coupled with the Internet of Medical Things (IoMTs)-based healthcare systems. Remote monitoring and informed decision-making have become possible by leveraging an integrated platform for efficient data analysis and processing, thereby optimizing data management in healthcare. However, this data is collected, processed, and transmitted across an interconnected network of devices, which introduces notable security risks and escalates the potential for vulnerabilities throughout the entire data processing pipeline. Traditional security approaches rely on computational complexity and face challenges in adequately securing sensitive healthcare data against evolving threats, thus necessitating robust solutions that ensure trust, enhance security, and maintain data confidentiality and integrity. To address these challenges, this paper introduces a two-phase framework that integrates blockchain technology with IoMT to enhance trust computation, resulting in a secure cluster that supports the quality-of-service (QoS) for sensitive data. The first phase utilizes the decentralized interplanetary file system and hashing functions to create a smart contract for device registration, establishing a resilient storage platform that encrypts data, improves fault tolerance, and facilitates data access. In the second phase, communication overhead is optimized by considering power levels, communication ranges, and computing capabilities alongside the smart contract. The smart contract evaluates the trust index and QoS of each node to facilitate device clustering based on processing capabilities. We implemented the proposed framework using OMNeT++ simulator and C++ programming language and evaluated against the cutting-edge IoMT security approaches in terms of attack detection, energy consumption, packet delivery ratio, throughput, and latency. The qualitative results demonstrated that the proposed framework enhanced attack detection by 6.00%, 18.00%, 20.00%, and 27.00%, reduced energy consumption by 6.91%, 8.19%, 12.07%, and 17.94%, improved packet delivery ratio by 3.00%, 6.00%, 9.00%, and 10.00%, increased throughput by 7.00%, 8.00%, 11.00%, and 13.00%, and decreased latency by 4.90%, 8.81%, 11.54%, and 20.63%, against state-of-the-art methods and was supported by statistical analysis.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101335"},"PeriodicalIF":6.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002762/pdfft?md5=a09955f31a5ac83ee06a0cb5866b7585&pid=1-s2.0-S2542660524002762-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing 航空边缘计算中基于强化学习的任务卸载技术综述
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-22 DOI: 10.1016/j.iot.2024.101342
Ahmadun Nabi, Tanmay Baidya, Sangman Moh
{"title":"Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing","authors":"Ahmadun Nabi,&nbsp;Tanmay Baidya,&nbsp;Sangman Moh","doi":"10.1016/j.iot.2024.101342","DOIUrl":"10.1016/j.iot.2024.101342","url":null,"abstract":"<div><p>Aerial edge computing (AEC) has emerged as a pivotal platform offering low-latency computation services, seamless deployability, rapid operationality, and high maneuverability to the Internet of things (IoT) devices of end users. Different aerial computing platforms offer different computation support to process the tasks of IoT devices, which affects the offloading decision. However, effective task offloading (TO) decision-making in this context remains a critical challenge because it impacts the quality of service, energy consumption, resource allocation, and latency requirements. Most current research uses reinforcement learning (RL)-based offloading decisions in AEC owing to the uncertainty of the environment and the heterogeneity of computation platforms. Therefore, this survey explores the prevailing use of RL-based algorithms for TO in AEC, addressing the inherent uncertainty of the environment and the heterogeneity of computation platforms. This study systematically reviews and compares RL-based techniques employed for efficient offloading decisions in heterogeneous aerial computing platforms. It delves into recent research findings, highlighting the various approaches and methodologies applied. Additionally, the paper provides a comprehensive overview of the performance metrics widely used to evaluate the efficacy of RL-based offloading decision techniques. In conclusion, this survey identifies research gaps and outlines future directions, aiming to guide scholars and practitioners in advancing the field of RL-based TO in AEC.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101342"},"PeriodicalIF":6.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT 全面评估 IIoT 中 CRYSTALS-Kyber 的侧信道泄漏情况
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101331
Zitian Huang , Huanyu Wang , Bijia Cao , Dalin He , Junnian Wang
{"title":"A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT","authors":"Zitian Huang ,&nbsp;Huanyu Wang ,&nbsp;Bijia Cao ,&nbsp;Dalin He ,&nbsp;Junnian Wang","doi":"10.1016/j.iot.2024.101331","DOIUrl":"10.1016/j.iot.2024.101331","url":null,"abstract":"<div><p>Following the establishment of the draft standardization for Post-Quantum Cryptography (PQC), cryptographic systems across various sectors have undergone a paradigm shift. Although the theoretical strength of PQC has provided a robust foundation for securing communications against quantum threats, physical implementations of PQC algorithms remain vulnerable to Side-Channel Attacks (SCAs). Existing SCA studies predominantly focus on the attack process, lacking thorough side-channel leakage assessments and comparisons of inherent vulnerabilities at different attack points and with different countermeasures. In this paper, we first present a comprehensive assessment of side-channel leakage and resistance of four attack points within an ARM Cortex-M4 implementation of Kyber, including its masked version. This assessment employs a range of countermeasures such as noise addition, random delays, clock jitter, and their combinations. Besides, we also build deep-learning models for attacking, thereby verifying the results of the leakage assessments. By collaboratively utilizing three distinct leakage assessment approaches and deep learning-based attack results, we experimentally demonstrate that different algorithmic intermediate values of Kyber are suited to different countermeasures, which advances our understanding of the capacity and vulnerability of PQC implementations.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101331"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on metaverse-empowered 6G wireless systems: A security perspective 关于元宇宙赋能 6G 无线系统的调查:安全视角
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101325
Latif U. Khan , Mohsen Guizani , Ibrar Yaqoob , Dusit Niyato , Ala Al-Fuqaha , Choong Seon Hong
{"title":"A survey on metaverse-empowered 6G wireless systems: A security perspective","authors":"Latif U. Khan ,&nbsp;Mohsen Guizani ,&nbsp;Ibrar Yaqoob ,&nbsp;Dusit Niyato ,&nbsp;Ala Al-Fuqaha ,&nbsp;Choong Seon Hong","doi":"10.1016/j.iot.2024.101325","DOIUrl":"10.1016/j.iot.2024.101325","url":null,"abstract":"<div><p>Recent trends in emerging applications have motivated researchers to design advanced wireless systems to meet their evolving requirements. These emerging applications include digital healthcare, intelligent transportation systems, Industry 5.0, and more. To address the evolving requirements, leveraging a metaverse to empower 6G wireless systems is a viable solution. A metaverse-empowered 6G wireless system can offer numerous benefits, but it may also be vulnerable to a wide variety of security attacks. In this survey, we discuss potential security attacks in metaverse-empowered 6G wireless systems. We introduce an architecture designed to enhance security within metaverse-empowered 6G wireless systems. This architecture comprises two key spaces: the meta space and the physical space. We present physical space attacks and outline effective solutions to secure metaverse-empowered 6G wireless systems. We provide invaluable insights and discussions on meta space attacks, along with promising solutions. Finally, we discuss open challenges and provide future recommendations.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101325"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G enabled smart cities: A real-world evaluation and analysis of 5G using a pilot smart city application 支持 5G 的智慧城市:利用智慧城市试点应用对 5G 进行实际评估和分析
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-14 DOI: 10.1016/j.iot.2024.101326
Abhik Banerjee , Breno Costa , Abdur Rahim Mohammad Forkan , Yong-Bin Kang , Felip Marti , Chris McCarthy , Hadi Ghaderi , Dimitrios Georgakopoulos , Prem Prakash Jayaraman
{"title":"5G enabled smart cities: A real-world evaluation and analysis of 5G using a pilot smart city application","authors":"Abhik Banerjee ,&nbsp;Breno Costa ,&nbsp;Abdur Rahim Mohammad Forkan ,&nbsp;Yong-Bin Kang ,&nbsp;Felip Marti ,&nbsp;Chris McCarthy ,&nbsp;Hadi Ghaderi ,&nbsp;Dimitrios Georgakopoulos ,&nbsp;Prem Prakash Jayaraman","doi":"10.1016/j.iot.2024.101326","DOIUrl":"10.1016/j.iot.2024.101326","url":null,"abstract":"<div><p>Ubiquitous sensing in smart cities is expected to be one of the key beneficiaries of the high bandwidth and low latency capabilities of 5G. However, current 5G deployments still have low population coverage, and are unlikely to reach global coverage of above 80% before 2028. This means that new smart city applications are likely to experience a combination of 4G and 5G, limiting their data-intensive capabilities. Thus, it is necessary to assess the ability of current 5G deployments to support emerging smart city applications, and how they perform in 5G environments. Existing performance evaluations focus either on the 5G core or use instantaneous speed tests, which do not effectively assess the suitability of 5G deployments for smart city applications. In this paper, we present a comprehensive evaluation and analysis of real-world 5G network performance observed through the outcomes of a pilot smart city application, an innovative mobile 5G Internet of Things (IoT) solution to automatically identify and report road assets requiring maintenance. The pilot smart city application was deployed on 11 waste collection service trucks over a 6 month period (June 2022–Dec 2022). We undertook both application-specific and application independent network performance evaluation to assess the ability of the 5G deployment to support uninterrupted smart city services. Our analysis shows that while 5G is capable of supporting mobile video streaming applications, there are significant variations in network performance, which may make it unsuitable for applications that require higher data intensive or near real-time responsiveness.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101326"},"PeriodicalIF":6.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002671/pdfft?md5=bc439e7e87a4ac69e430b345ca8fa42a&pid=1-s2.0-S2542660524002671-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142058359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability-oriented risk identification framework for IoT risk assessment 面向脆弱性的物联网风险评估风险识别框架
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-13 DOI: 10.1016/j.iot.2024.101333
Mohammad Beyrouti , Ahmed Lounis , Benjamin Lussier , Abdelmadjid Bouabdallah , Abed Ellatif Samhat
{"title":"Vulnerability-oriented risk identification framework for IoT risk assessment","authors":"Mohammad Beyrouti ,&nbsp;Ahmed Lounis ,&nbsp;Benjamin Lussier ,&nbsp;Abdelmadjid Bouabdallah ,&nbsp;Abed Ellatif Samhat","doi":"10.1016/j.iot.2024.101333","DOIUrl":"10.1016/j.iot.2024.101333","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) systems across diverse applications has led to a notable increase in connected smart devices. Nevertheless, this surge in connectivity has induced a broad spectrum of vulnerabilities and threats, jeopardizing the security and safety of IoT applications. Security risk assessment methods are commonly employed to analyze risks. However, traditional IT and existing IoT-tailored security assessment methods often fail to fully address key IoT aspects: complex assets intercommunication, dynamic system changes, assets’ potential as attack platforms, safety impacts of security breaches, and assets resource constraints. Such oversights lead to significant risks being overlooked in the IoT ecosystem. In this paper, we propose a novel vulnerability-oriented risk identification framework comprising a four-step process as a core element of IoT security risk assessment, applicable to any IoT system. Our process enhances both traditional and IoT-specific security risk assessment methods by providing tailored approaches that address their crucial oversights for comprehensive IoT risk assessment. We validate our process with a case study of an IoT smart healthcare system using a proposed expert-driven approach. The results confirm that our process effectively identifies critical attack scenarios originating from the lack of proper security measures, mobility, and intercommunication processes of IoT devices in the healthcare system. Furthermore, our analysis reveals potential attacks that exploit the IoT devices as platforms to target the backend and user domains. We demonstrate the feasibility of our process for identifying realistic risks by conducting simulations of two derived attack scenarios using the Contiki Cooja network simulator.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101333"},"PeriodicalIF":6.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141998349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient data communication for WSN based resource constrained IoT devices 基于 WSN 的资源受限物联网设备的节能数据通信
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-13 DOI: 10.1016/j.iot.2024.101329
Shreeram Hudda, K. Haribabu, Rishabh Barnwal
{"title":"Energy efficient data communication for WSN based resource constrained IoT devices","authors":"Shreeram Hudda,&nbsp;K. Haribabu,&nbsp;Rishabh Barnwal","doi":"10.1016/j.iot.2024.101329","DOIUrl":"10.1016/j.iot.2024.101329","url":null,"abstract":"<div><p>In the Internet of Things (IoTs) and wireless sensor networks (WSNs), improving security and energy efficiency are key concerns. Clustering, which involves managing cluster heads, plays a pivotal role in extending network lifetime. The selection of a cluster head, responsible for data transfer between nodes, is a key aspect of network management. This paper proposes two variants of a novel algorithm designed for energy efficient communication in a resource constrained IoT environments. One variant considers remaining energy, distance, and node degree for cluster head selection, while the other focuses on remaining energy and distance only. Including node degree ensures cluster heads do not waste energy by remaining idle or performing unnecessary tasks such as the cluster head selection process in every round. The authors tested these variants against several well known algorithms using MATLAB simulation environment, evaluating factors such as operating nodes, number of clusters, transmission energy, and remaining energy. The proposed algorithm extends network lifetime by maintaining more operating nodes for longer, not changing clusters or cluster heads frequently, minimizing energy consumption for transmission, and conserving more remaining energy. Consequently, the proposed algorithm outperforms existing approaches by addressing issues like zero cluster head selection, compulsory cluster head selection in every round, avoiding cluster heads that connect to no nodes, and preventing network destabilization due to unnecessary re-elections.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"27 ","pages":"Article 101329"},"PeriodicalIF":6.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信