首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 984 毫秒
1.
李响 《计算机仿真》2020,(2):411-415
针对传统的物联网信息资源分层共享方法存在开销大等问题,提出云信任驱动的物联网信息资源分层共享方法。根据物联网中心资源模型,将物联网信息资源分为时间模型、Web负载模型以及信息资源中心传输模型。全面分析物联网信息中心资源对外提供的服务以及各个资源基本模型之间的交互关系,组建物联网信息中心资源分层共享模型,采用自适应粒子群算法优化分层模型的早熟收敛问题,实现云信任驱动的物联网信息资源分层共享。经仿真证明,所提方法具有开销小、检索快速以及资源利用率高的问题。  相似文献   

2.
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of applications and greatly attractive benefits, for example, self-governing, low expenditure on execution and data communication, long-term function, and unsupervised access to the network. The Internet of Things (IoT) is an attractive, exciting paradigm. By applying communication technologies in sensors and supervising features, WSNs have initiated communication between the IoT devices. Though IoT offers access to the highest amount of information collected through WSNs, it leads to privacy management problems. Hence, this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique (LRECC) to establish a secure IoT structure for preventing, detecting, and mitigating threats. This approach uses the Elliptical Curve Cryptography (ECC) algorithm to generate and distribute security keys. ECC algorithm is a light weight key; thus, it minimizes the routing overhead. Furthermore, the Logistic Regression machine learning technique selects the transmitter based on intelligent results. The main application of this approach is smart cities. This approach provides continuing reliable routing paths with small overheads. In addition, route nodes cooperate with IoT, and it handles the resources proficiently and minimizes the 29.95% delay.  相似文献   

3.
Abhik Chaudhuri 《EDPACS》2017,56(4):7-18
This article discusses the various dimensions of philosophy of information for the Internet of Things (IoT) technology. The aspects of attention, subjectivity, objectivity, happiness, key ethical concerns, and the need for algorithmic transparency and accountability in autonomous IoT applications that are necessary to build an IoT belief system have been highlighted here. The interplay of smart devices, smart services, and humans has been depicted to highlight trust permeability in human and IoT interfaces.  相似文献   

4.
云信任驱动的物联网信息资源寻址模型   总被引:1,自引:0,他引:1  
万年红  王雪蓉 《计算机应用》2011,31(5):1184-1188
为提高物联网底层信息资源寻址效果,基于对云环境下的物联网底层寻址服务的信任度评估准则等方面的研究,改进信任驱动算法,提出一个云信任驱动的物联网信息资源寻址模型。首先,分析寻址的关键特征;然后,设计并采用特定约束条件、信任陡度函数、云信任度评估准则及信任约束系数建立寻址模型;最后,设计了一个物联网系统实例来验证该模型的有效性。实验结果表明,相比传统模型或算法,该模型有良好的底层资源寻址效果。  相似文献   

5.
随着5G技术广泛应用和物联网技术飞速发展,可以预见的是物联网设备的数量和连接规模会进一步扩大。物联网可以有效地利用现有网络基础设施将物理世界和互联网世界联系在一起,从而实现设备之间的数据共享,然而,其网络结构的大规模性和复杂性给物联网系统带来了潜在的安全风险。访问控制技术可以用来保护设备以及设备上数据的安全,传统访问控制模型及实现比较复杂且中心化的,由此,本文期望构建一种新型的基于区块链的物联网访问控制系统——基于RBAC模型和ABAC模型构建DARBAC模型,同时结合区块链技术构建访问控制系统以克服集中式实体的单点故障问题,具备可伸缩性、轻量级和细粒度等特性。实验测试结果表明,该系统具有良好的并发性能,可在物联网系统中有效地部署实施并能达到预期效果。  相似文献   

6.
This study designed an interactive IoT (Internet of Things) service on mobile devices based upon the concept of Social Web of Things (SWoT), with which users can interact with IoT in the same way they use the social network services. In order to integrate IoT into Chinese daily use, this study also investigated how Chinese users interact with things and IoT technologies. A four-phase study among users living in Beijing was conducted with a lifecycle of user-centered design. Results revealed that SWoT could activate users׳ intuitive understanding of social network services, and make the interaction with SWoT natural in their own ways. Users living in Beijing tended to be utility-oriented and highly emphasized efficiency; they were distinctive in uncertainty avoidance and preference of hierarchical way of managing things. Our results suggested implications for the design of user-centered IoT systems in China, and shed light on improvements for the performance of IoT systems and balance of requirements between users and system design.  相似文献   

7.
The development of wireless sensor network with Internet of Things (IoT) predicts various applications in the field of healthcare and cloud computing. This can give promising results on mobile health care (M-health) and Telecare medicine information systems. M-health system on cloud Internet of Things (IoT) through wireless sensor network (WSN) becomes the rising research for the need of modern society. Sensor devices attached to the patients’ body which is connected to the mobile device can ease the medical services. Security is the key connect for optimal performance of the m-health system that share the data of patients in wireless networks in order to maintain the anonymity of the patients. This paper proposed a secure transmission of M-health data in wireless networks using proposed key agreement based Kerberos protocol. The patients processed data are stored in cloud server and accessed by doctors and caregivers. The data transfer between the patients, server and the doctors are accessed with proposed protocol in order to maintain the confidentiality and integrity of authentication. The efficiency of the proposed algorithm is compared with the existing protocols. For computing 100 devices it consumes only 91milllisecond for computation.  相似文献   

8.

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

  相似文献   

9.
ABSTRACT

With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.  相似文献   

10.
物联网设备已经被广泛应用于各个领域,为保证物联网的安全,排除内部隐患,基于时序特征数据高效索引技术设计物联网感知设备安全自动监测方法。结合时序特征数据高效索引技术提取物联网信息特征,在报文传输过程的基础上,区分不同流量数据之间的差异、恶意攻击软件与感知设备的系统特征,计算样本数据的表征值,得到物联网感知设备的原始信息特征。对数据特征进行分类,计算其数据内的缺失值和错误值,得到特征向量的筛选优化结果,计算训练损失函数,调整实际操作的阈值,保证数据特征分类的准确性。搭建物联网感知设备监测模型,训练判别器,进行物联网的自动监测。分别对数据包、字节以及数据流量进行识别,该监测技术可以准确地区分良性数据与攻击数据,从而保证物联网感知设备的安全。  相似文献   

11.
Internet of Things environments are comprised of heterogeneous devices that are continuously exchanging information and being accessed ubiquitously through lossy networks. This drives the need of a flexible, lightweight and adaptive access control mechanism to cope with the pervasive nature of such global ecosystem, ensuring, at the same time, reliable communications between trusted devices. To fill this gap, this paper proposes a flexible trust-aware access control system for IoT (TACIoT), which provides an end-to-end and reliable security mechanism for IoT devices, based on a lightweight authorization mechanism and a novel trust modelthat has been specially devised for IoT environments. TACIoT extends traditional access control systems by taking into account trust values which are based on reputation, quality of service, security considerations and devices’ social relationships. TACIoT has been implemented and evaluated successfully in a real testbed for constrained and non-constrained IoT devices.  相似文献   

12.
In recent years, with many devices continuously joining the Internet of Things (IoT), data sharing as the main driver of the IoT market has become a research hotspot. However, the users are reluctant to participate in data sharing due to security concerns and lacking incentive mechanisms in the current IoT. In this context, blockchain is introduced into the data sharing of IoT to solve the trust problem of users and provide secure data storage. However, in the exploration of building a secure distributed data sharing system based on the blockchain, how to break the inherent performance bottleneck of blockchain is still a major challenge. For this reason, the efficient blockchain-based data sharing incentive scheme is studied for IoT. In the scheme, an efficient data sharing incentive framework based on blockchain is proposed, named ShareBC. Firstly, ShareBC uses sharding technology to build asynchronous consensus zones that can process data sharing transactions in parallel and deploy efficient consensus mechanisms on the cloud/edge servers and asynchronous consensus zones in sharding, thus improving the processing efficiency of data sharing transactions. Then, a sharing incentive mechanism based on a hierarchical data auction model implemented by a smart contract is presentedto encourage IoT users to participate in data sharing. The proposed mechanism can solve the problem of multi-layer data allocation involved in IoT data sharing and maximize the overall social welfare. Finally, the experimental results show that the proposed scheme is economically efficient, incentive-compatible, and real-time, with scalability, low cost, and good practicability.  相似文献   

13.
随着物联网的迅速发展,巨量的嵌入式设备广泛应用于现代生活,安全和隐私成为了物联网发展的重要挑战.物联网设备互联构成集群网络,设备集群证明是验证集群环境内所有设备的可信状态的一种安全技术,也是物联网安全研究需要解决的一个重要问题.传统证明技术主要针对单一证明者的场景,无法满足大规模集群的全局证明需求;而简单扩展的集群证明机制通常难以抵抗合谋攻击,且效率低下.为了解决这些问题,本文提出了一种基于设备分组的高效集群证明方案.该方案将同构设备分组,并于每组设立一个管理节点负责该组的组内节点验证.当进行远程证明时,由于每个管理节点已经预先获悉该组节点可信性状态,所以只需要对全局集群环境内所有管理节点进行验证,从而提高了效率.该方案不仅高效,还具有较高的安全性,能够抵抗合谋攻击等.我们实现的原型系统实验测试结果表明,当同构设备越多,管理节点越少的时候,本文方案的证明效率更高.  相似文献   

14.
在物物通信和物联网技术的基础上综述了国内外物联网的发展现状,提出了物联网中无线传感器网络(WSN)与lnternet的互联融合模型.结合此模型,研究了其可信控制关键技术,包括可信路由技术、信任控制技术,以促进物联网在中国的安全发展.  相似文献   

15.
Interaction and communication between humans with smart mobile devices are a new trend of development in Internet of Things (IoT). With the powerful sensing capability of smart device and human mobility, various services could be provided by building a trusted chain between service requesters and suppliers. The cognition of social relations between mobile nodes is the basis of final mobile-aware services. It involves many decision factors, such as time, space and activity patterns. Using social network theory, a new cognitive model for social relations of mobile nodes in IoT is proposed. Firstly, nodes' social relations are reasoned and quantified from multiple perspectives based on the summary of social characteristics of mobile nodes and the definition of different decision factors. Then the location factor, interconnection factor, service evaluation factor and feedback aggregation factor are defined to solve the shortcomings in existing quantitative models. Finally, the weight distribution is set up by information entropy and rough set theory for these decision factors; it can overcome the shortage of traditional methods, in which the weight is set up by subjective ways and hence their dynamic adaptability is poor. We compare our cognitive model to existing models using MIT dataset by defining a variety of test indicators, such as network overall density (NOD), the degree center potential (DCP), the network distribution index (EI), etc. Simulation results show that, the cognitive model has better internal structure and significant validity in network analysis, and thus can provide mobile-aware service effectively in dynamic environment.  相似文献   

16.
信息技术的不断发展和智能终端设备的普及导致全球数据存储总量持续增长,数据面临的威胁挑战也随着其重要性的凸显而日益增加,但目前部分计算设备和存储设备仍存在缺乏数据保护模块或数据保护能力较弱的问题.现有数据安全存储技术一般通过加密的方式实现对数据的保护,但是数据的加解密操作即数据保护过程通常都在应用设备上执行,导致应用设备遭受各类攻击时会对存储数据的安全造成威胁.针对以上问题,本文提出了一种基于DICE的物联网设备证明存储方案,利用基于轻量级信任根DICE构建的可信物联网设备为通用计算设备(统称为主机)提供安全存储服务,将数据的加解密操作移至可信物联网设备上执行,消除因主机遭受内存攻击等风险对存储数据造成的威胁.本文工作主要包括以下3方面:(1)利用信任根DICE构建可信物联网设备,为提供可信服务提供安全前提.(2)建立基于信任根DICE的远程证明机制和访问控制机制实现安全认证和安全通信信道的建立.(3)最终利用可信物联网设备为合法主机用户提供可信的安全存储服务,在实现数据安全存储的同时,兼顾隔离性和使用过程的灵活性.实验结果表明,本方案提供的安全存储服务具有较高的文件传输速率,并具备较高...  相似文献   

17.
Many advances have been introduced recently for service-oriented computing and applications (SOCA). The Internet of Things (IoT) has been pervasive in various application domains. Fog/Edge computing models have shown techniques that move computational and analytics capabilities from centralized data centers where most enterprise business services have been located to the edge where most customer’s Things and their data and actions reside. Network functions between the edge and the cloud can be dynamically provisioned and managed through service APIs. Microservice architectures are increasingly used to simplify engineering, deployment and management of distributed services in not only cloud-based powerful machines but also in light-weighted devices. Therefore, a key question for the research in SOCA is how do we leverage existing techniques and develop new ones for coping with and supporting the changes of data and computation resources as well as customer interactions arising in the era of IoT and Fog/Edge computing. In this editorial paper, we attempt to address this question by focusing on the concept of ensembles for IoT, network functions and clouds.  相似文献   

18.
The Internet of Things (IoT), including wireless sensors, is one of the highly anticipated contributors to big data; therefore, avoiding misleading or forged data gathering in cases of sensitive and critical data through secure communication is vital. However, due to the relatively long distance between remote cloud and end nodes, cloud computing cannot provide effective and direct management for end nodes, which leads to security vulnerabilities. In this paper, we propose a novel trust evaluation model based on the trust transitivity on a chain assisted by mobile edge nodes, which is used to ensure the reliability of nodes in the Internet of Things and prevent malicious attacks. The mobile edge nodes offer a new solution to solve the above problems with relatively strong computing and storage abilities. Firstly, we design calculation approaches to different trust chains to measure their trust degrees. Secondly, we propose an improved Dijkstra’s algorithm for collecting trust information of sensor nodes by mobile edge nodes. Finally, the experimental results show that our trust model based on mobile edge nodes can evaluate sensor nodes more precisely and enhance the security on the Internet of Things.  相似文献   

19.
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It provides the ability to remotely monitor, manage and control devices, and to create new insights and actionable information from massive streams of real-time data. The main features of a smart city include a high degree of information technology integration and a comprehensive application of information resources. The essential components of urban development for a smart city should include smart technology, smart industry, smart services, smart management and smart life. The Internet of Things is about installing sensors (RFID, IR, GPS, laser scanners, etc.) for everything, and connecting them to the internet through specific protocols for information exchange and communications, in order to achieve intelligent recognition, location, tracking, monitoring and management. With the technical support from IoT, smart city need to have three features of being instrumented, interconnected and intelligent. Only then a Smart City can be formed by integrating all these intelligent features at its advanced stage of IOT development. The explosive growth of Smart City and Internet of Things applications creates many scientific and engineering challenges that call for ingenious research efforts from both academia and industry, especially for the development of efficient, scalable, and reliable Smart City based on IoT. New protocols, architectures, and services are in dire needs to respond for these challenges. The goal of the special issue is to bring together scholars, professors, researchers, engineers and administrators resorting to the state-of-the-art technologies and ideas to significantly improve the field of Smart City based on IoT.  相似文献   

20.
Today, the Internet of Things (IOT) generally refers to a network with intelligent everyday objects ubiquitous. Things will be connected not only by humans but also by all items embedded systems highly distributed network of other devices. The integration of interactive communication devices has increased the popularity of the Internet. In recent years, the development and application of things have been a complicated task that requires extensive expertise. This is an essential issue for developers' experience, in particular, non-programmable skills, build rapid prototypes of things. To solve this problem, improved virtualization methods for IoT objects have been proposed. The proposed method uses the concept of virtual object existence, which allows end-users to create virtual items on top of them with simple operations such as dragging, then drop and click. Use various sensors and actuators and Intel Edison boards to implement virtual prototypes of IoT objects based on the Internet Engineering Task Force (IETF) CoAP protocol. Proposed items by connecting and visualizing components that support IoT virtualization methods and virtual objects of physical IoT devices. Therefore, virtual objects to access physical IoT devices.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号