期刊文献+
共找到7,019篇文章
< 1 2 250 >
每页显示 20 50 100
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning 被引量:1
1
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network internet of Medical things(IoMT) multi-access edge computing(MEC)
在线阅读 下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
2
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite internet of things
在线阅读 下载PDF
Ultra reliability and massive connectivity provision in integrated internet of military things(IoMT)based on tactical datalink
3
作者 Li Bing Yating Gu +4 位作者 Lanke Hu Li Bowen Yang Lihua Jue Wang Yue Yin 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期386-398,共13页
One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this pa... One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern. 展开更多
关键词 Satellite network Deep space communications internet of military things Non-orthogonal multiple access MIMO LINK-16 JITDS
在线阅读 下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
4
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
在线阅读 下载PDF
A Double-Timescale Reinforcement Learning Based Cloud-Edge Collaborative Framework for Decomposable Intelligent Services in Industrial Internet of Things
5
作者 Zhang Qiuyang Wang Ying Wang Xue 《China Communications》 SCIE CSCD 2024年第10期181-199,共19页
With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we p... With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%. 展开更多
关键词 computing service edge intelligence industrial internet of things(IIoT) reinforcement learning(RL)
在线阅读 下载PDF
A Few-Shot Learning-Based Automatic Modulation Classification Method for Internet of Things
6
作者 Aer Sileng Qi Chenhao 《China Communications》 SCIE CSCD 2024年第8期18-29,共12页
Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve it... Due to the limited computational capability and the diversity of the Internet of Things devices working in different environment,we consider fewshot learning-based automatic modulation classification(AMC)to improve its reliability.A data enhancement module(DEM)is designed by a convolutional layer to supplement frequency-domain information as well as providing nonlinear mapping that is beneficial for AMC.Multimodal network is designed to have multiple residual blocks,where each residual block has multiple convolutional kernels of different sizes for diverse feature extraction.Moreover,a deep supervised loss function is designed to supervise all parts of the network including the hidden layers and the DEM.Since different model may output different results,cooperative classifier is designed to avoid the randomness of single model and improve the reliability.Simulation results show that this few-shot learning-based AMC method can significantly improve the AMC accuracy compared to the existing methods. 展开更多
关键词 automatic modulation classification(AMC) deep learning(DL) few-shot learning internet of things(IoT)
在线阅读 下载PDF
Age-Driven Joint Sampling and Non-Slot Based Scheduling for Industrial Internet of Things
7
作者 Cao Yali Teng Yinglei +1 位作者 Song Mei Wang Nan 《China Communications》 SCIE CSCD 2024年第11期190-204,共15页
Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly... Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly design sampling and non-slot based scheduling policies to minimize the maximum time-average age of information(MAoI)among sensors with the constraints of average energy cost and finite queue stability.To overcome the intractability involving high couplings of such a complex stochastic process,we first focus on the single-sensor time-average AoI optimization problem and convert the constrained Markov decision process(CMDP)into an unconstrained Markov decision process(MDP)by the Lagrangian method.With the infinite-time average energy and AoI expression expended as the Bellman equation,the singlesensor time-average AoI optimization problem can be approached through the steady-state distribution probability.Further,we propose a low-complexity sub-optimal sampling and semi-distributed scheduling scheme for the multi-sensor scenario.The simulation results show that the proposed scheme reduces the MAoI significantly while achieving a balance between the sampling rate and service rate for multiple sensors. 展开更多
关键词 Age of Information(AoI) Industrial internet of things(IIoT) Markov decision process(MDP) time sensitive systems URLLC
在线阅读 下载PDF
Energy Minimization for Heterogenous Traffic Coexistence with Puncturing in Mobile Edge Computing-Based Industrial Internet of Things
8
作者 Wang Xue Wang Ying +1 位作者 Fei Zixuan Zhao Junwei 《China Communications》 SCIE CSCD 2024年第10期167-180,共14页
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform... Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks. 展开更多
关键词 energy minimization enhanced mobile broadband(eMBB)and ultra-reliable low latency communications(URLLC)coexistence industrial internet of things(IIoT) mobile edge computing(MEC) PUNCTURING
在线阅读 下载PDF
英文“Internet of Things”研究热点与趋势分析 被引量:1
9
作者 曾利 李自力 《国防科技》 2015年第5期100-109,共10页
物联网实现物与物、人与物的互联,具有十分广阔的市场和应用前景。运用信息计量学、自研软件和以Citespace为代表的知识图谱工具相结合的方法对1987至2014年英文"Internet of Things"SCI文献的基本情况和研究热点与趋势进行... 物联网实现物与物、人与物的互联,具有十分广阔的市场和应用前景。运用信息计量学、自研软件和以Citespace为代表的知识图谱工具相结合的方法对1987至2014年英文"Internet of Things"SCI文献的基本情况和研究热点与趋势进行了初步分析与可视化展现。通过对数据的处理和分析得出了英文"Internet of Things"SCI文献的期刊、国家、机构、学科、作者、高被引用文献等基本情况,并利用关键词共现、突现词检测等方法对英文"Internet of Things"研究的热点和未来的研究趋势进行了初步预测。研究表明,运用知识图谱工具分析物联网研究点与趋势,是一种有意义的手段。 展开更多
关键词 物联网 信息计量学 知识图谱 热点与趋势
在线阅读 下载PDF
Deployment Strategy of Wireless Sensor Networks for Internet of Things 被引量:29
10
作者 刘强 黄小红 +2 位作者 冷延鹏 李龙江 毛玉明 《China Communications》 SCIE CSCD 2011年第8期111-120,共10页
This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed a... This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed architecture, our research focuses on the optimal deployment strategy of the nodes on the convergence level. We aim at the maximization of the sub-network's lifetime while minimizing the deployment cost. Meanwhile, a novel metric named as the Ratio of Lifetime to Cost (RLC) is proposed to estimate the efficiency of convergence nodes deployment. Simulation results indicate that the proposed deployment algorithm can achieve the optimal number of convergence nodes. The proposed deployment strategy is able to achieve a balanced tradeoff between the network lifetime and the deployment cost. 展开更多
关键词 internet of things Wireless Sensor Networks networking architecture LIFETIME COST
在线阅读 下载PDF
A Novel Secure Data Transmission Scheme in Industrial Internet of Things 被引量:27
11
作者 Hongwen Hui Chengcheng Zhou +1 位作者 Shenggang Xu Fuhong Lin 《China Communications》 SCIE CSCD 2020年第1期73-88,共16页
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch... The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed. 展开更多
关键词 industrial internet of things data transmission secure communication fractional-order chaotic systems
在线阅读 下载PDF
A Green Paradigm for Internet of Things: Ambient Backscatter Communications 被引量:9
12
作者 Wei Zhang Yao Qin +4 位作者 Wenjing Zhao Minzheng Jia Qiang Liu Ruisi He Bo Ai 《China Communications》 SCIE CSCD 2019年第7期109-119,共11页
Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT gen... Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT generally faces the challenges from energy constraint and implementation cost. In this paper, we will introduce a new green communication paradigm, the ambient backscatter (AmBC), that could utilize the environmental wireless signals for both powering a tiny-cost device and backscattering the information symbols. Specifically, we will present the basic principles of AmBC, analyze its features and advantages, suggest its open problems, and predict its potential applications for our future IoT. 展开更多
关键词 AMBIENT backscatter (AmBC) RF-powered device internet of things (IoT) battery-free TAG wire-less sensor
在线阅读 下载PDF
Multidiscipline Applications of Triboelectric Nanogenerators for the Intelligent Era of Internet of Things 被引量:8
13
作者 Xiaole Cao Yao Xiong +3 位作者 Jia Sun Xiaoyin Xie Qijun Sun Zhong Lin Wang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第1期252-292,共41页
In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustai... In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustainable and self-powered functional systems.The rapid development of intelligent applications of IoTs based on TENGs mainly relies on supplying the harvested mechanical energy from surroundings and implementing active sensing,which have greatly changed the way of human production and daily life.This review mainly introduced the TENG applications in multidisci-pline scenarios of IoTs,including smart agriculture,smart industry,smart city,emergency monitoring,and machine learning-assisted artificial intelligence applications.The challenges and future research directions of TENG toward IoTs have also been proposed.The exten-sive developments and applications of TENG will push forward the IoTs into an energy autonomy fashion. 展开更多
关键词 Triboelectric nanogenerator Self-powered sensor internet of things Artificial intelligence Machine learning
在线阅读 下载PDF
A Novel Orthogonal LoRa Multiple Access Algorithm for Satellite Internet of Things 被引量:6
14
作者 Chengwen Zhang Liankai Wang +3 位作者 Libin Jiao Shipeng Wang Jun Shi Jia Yue 《China Communications》 SCIE CSCD 2022年第3期279-289,共11页
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite IoT.To improve the multiple acc... In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite IoT.To improve the multiple access performance of LoRa satellite IoT,based on the orthogonality of LoRa symbols in the fractional domain,this paper proposes a low complexity Orthogonal LoRa Multiple Access(OLMA)algorithm for multiple LoRa users occupying the same frequency bandwidth.The algorithm introduces the address code to divide the fractional bandwidth into multiple parts,and the OLMA users with different address codes occupy different parts to transmit the information code,thus avoiding mutual interference caused by collisions in the same frequency bandwidth.The multiple access capability of OLMA can be flexibly configured only by simply adjusting the length of the address code according to the actual application requirements of data transmission.Theoretical analysis and simulation results show that the OLMA algorithm can greatly improve the multiple access capability and the total transmission bit rate of LoRa IoT without changing the existing LoRa modulation parameters and process. 展开更多
关键词 LoRa satellite internet of things multiple access fractional domain linear frequency modulation
在线阅读 下载PDF
Joint Optimization on Energy and Delay for Target Tracking in Internet of Things 被引量:4
15
作者 黎羴 范春晓 《China Communications》 SCIE CSCD 2011年第1期20-27,共8页
Network and communications models are built for target tracking and pursuing in the Internet of Things (IoT).According to these models,two tracking schemes which jointly optimize the pursuing energy and delay are prop... Network and communications models are built for target tracking and pursuing in the Internet of Things (IoT).According to these models,two tracking schemes which jointly optimize the pursuing energy and delay are proposed.The merits of these schemes are that they can enhance energy efficiency of both the pursuing route and communication in the network.Moreover,experimental results are provided to demonstrate the benefits of the proposed schemes which will be used as optimization schemes for the IoT tracking service. 展开更多
关键词 internet of things sensor network target tracking ROUTING DELAY
在线阅读 下载PDF
Trust Management Mechanism for Internet of Things 被引量:4
16
作者 GU Lize WANG Jingpei SUN Bin 《China Communications》 SCIE CSCD 2014年第2期148-156,共9页
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches ab... Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT. 展开更多
关键词 internet of things trustmanagement formal semantics trust decision-making
在线阅读 下载PDF
Intelligent Reflecting Surfaces Enabled Cognitive Internet of Things Based on Practical Pathloss Model 被引量:6
17
作者 Zheng Chu Pei Xiao +2 位作者 De Mi Hongzhi Chen Wanming Hao 《China Communications》 SCIE CSCD 2020年第12期1-16,共16页
In this paper,we aim to unlock the potential of intelligent reflecting surfaces(IRSs)in cognitive internet of things(loT).Considering that the secondary IoT devices send messages to the secondary access point(SAP)by s... In this paper,we aim to unlock the potential of intelligent reflecting surfaces(IRSs)in cognitive internet of things(loT).Considering that the secondary IoT devices send messages to the secondary access point(SAP)by sharing the spectrum with the primary network,the interference is introduced by the IoT devices to the primary access point(PAP)which profits from the IoT devices by pricing the interference power charged by them.A practical path loss model is adopted such that the IRSs deployed between the IoT devices and SAP serve as diffuse scatterers,but each reflected signal can be aligned with its own desired direction.Moreover,two transmission policies of the secondary network are investigated without/with a successive interference cancellation(SIC)technique.The signal-to-interference plus noise ratio(SINR)balancing is considered to overcome the nearfar effect of the IoT devices so as to allocate the resource fairly among them.We propose a Stackelberg game strategy to characterize the interaction between primary and secondary networks.For the proposed game,the Stackelberg equilibrium is analytically derived to optimally obtain the closed-form solution of the power allocation and interference pricing.Numerical results are demonstrated to validate the performance of the theoretical derivations. 展开更多
关键词 dedicated intelligent reflecting surfaces internet of things practical path loss cognitive network Stackelberg game
在线阅读 下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
18
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography internet of things radio frequency identification security system trusting system.
在线阅读 下载PDF
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
19
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources... As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources. This paper studies the service-ori- ented network virtualization architecture for loT services. Firstly the semantic description method for loT services is proposed, then the resource representation model and resource management model in the environment of network virtualization are presented. Based on the above models, the service-oriented virtual network architecture for loT is established. Finally, a smart campus system is designed and deployed based on the service-oriented virtual network architecture. Moreover, the proposed architecture and models are verified in experiments. 展开更多
关键词 internet of things network virtualization virtual network resource management virtual network embedding
在线阅读 下载PDF
Quantum Cryptography for Internet of Things Security 被引量:1
20
作者 Alekha Parimal Bhatt Anand Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期213-220,共8页
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr... Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security. 展开更多
关键词 internet of things QUANTUM COMPUTING QUANTUM CRYPTOGRAPHY SECURITY
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部