首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 583 毫秒
1.
As an important application of the fifth generation (5G) mobile communication systems, Internet of Things (IoT) has attracted worldwide research interests. Since most of the communication devices in IoT are powered by batteries, these devices always have limited operation time. Wireless power transfer (WPT) technology, which can transfer power over a wireless medium (without any wires), can avoid the need to manually replace or recharge the batteries of the wireless devices in IoT. For electromagnetic (EM) radiation-based WPT, since radio-frequency (RF) signals that transport energy can at the same time be used for wireless communications, integrated wireless communications and WPT becomes a new research area which has attracted great research interests. In this paper, we first introduce two main research paradigms for integrated wireless communications and WPT, i.e., simultaneous wireless information and power transfer (SWIPT) and wireless-powered communication network (WPCN). Then we provide an overview of the state-of-the-art of both SWIPT and WPCN, respectively. Finally, we point out the new and challenging future research direction.  相似文献   

2.
The Internet of Things (IoT) is a revolutionary technique of sharing data for smart devices that generates huge amounts of data from smart healthcare systems. Therefore, healthcare systems utilize the convergence power and traffic analysis of sensors that cannot be satisfactorily handled by the IoT. In this article, a novel mutation operator is devised and incorporated with the differential evolution (DE) algorithm. Two tests have been conducted in the validation process. Firstly, the newly dual adaption-based operators incorporated with the differential evolution algorithm are being proposed. The proposed approach provides sufficient diversity and enhances the search speed of nature’s local and global search environments in the problem. The proposed method incorporates the application of IoT-based smart healthcare. Second, an application-based test has been conducted, in which the proposed approach is applied to the application in the smart healthcare system. Therefore, IoT sensor deployment is an optimization problem to minimize service time, delay, and energy loss by considering the communication constraint between sensors(objects). The proposed algorithm is applied in this article to solve this optimization problem. Further, in the experimentation and comparative study, the proposed method is superior to the standard evolutionary algorithms in IoT applications concerning the minimum number of function evaluations and minimization of traffic services. The proposed approach also achieves efficiency in the minimum loss of energy in each service and reduces load and delay.  相似文献   

3.
The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices due to their unique features, such as scalability, maintainability, fault tolerance, reliability, accuracy, and much more. With the growing number of hybrid devices in large organizations, security and privacy concerns are becoming more challenging. Security is essential for protecting the hardware, network aspects of devices, and information access from unauthorized entities. Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. The future challenge is to address the incompatibility of the authentication feature with IoT devices based on appropriate technologies. AI and machine learning are also implementable in order to detect the vulnerability of IoT devices and inform the concerned operator or administration for protection. This research highlights the authentication feature of IoT devices from literature studies and evaluates the significant feature using COPRAS approach to assist organization in enhancing security of IoT devices.  相似文献   

4.
In the Internet of Things (IoT) ecosystem, devices will predominate, using it in a manner similar to how people used it. Devices will cooperating in a multicast network to collect, share, and forward information way while interacting with one another autonomously and without centralised supervision. The building of an intelligent environment the capability of real-time collection of data, which is crucial for maximising the value of the IoT, will make this possible. A typical electric grid is made up of many power plants that use various power generating units, such as coal-based units, gas-based units, hydro units, etc. The majority of the infrastructure and wires that make up the conventional electricity grid have been in existence for a long time, it should be mentioned. They require significant investments, so providing them could take years. As a result, many grid components are outmoded and must be maintained and monitored on a regular basis to keep power flowing. A sophisticated technology is the smart grid (SG) system that makes it easier to integrate green technology and environmental considerations. The SG cyber–physical system was implemented thanks to the advancement and use of communication technologies in the conventional power system. The Internet of Things (IoT) and essential devices are both present in the complicated architecture of the SG systems. The traditional electric grids are been transformed into smart and efficient grid known as “Smart grid”. The Internet of Things’ smart grid allows for two-way communications among connected devices and technology that can recognise and respond to human needs. The cost and reliability of a smart grid are superior to that of conventional power infrastructure. Through use and data maintenance, smart grid technology will assist in reducing energy use and costs. One of the primary contributions made to grids is the integration of IoT with producing facilities using sustainable energy at various levels. To enhance the smart grid for bidirectional information exchange, improve power quality, and increase reliability Internet of Things (IOT) devices are becoming an important part of smart electric grid. IOT Infrastructure (IOTI) provide a flexible, efficient and secure platform providing strategic management for monitoring and controlling of different operations under different working conditions. This paper discusses cyber security on IOT based infrastructure for electric power systems. A comprehensive study is highlighted which includes type of IOTs, architecture used for smart grid, and future challenges.  相似文献   

5.
Massive MIMO is an essential technology in developing 5G networks and a concept that may be applied to other wireless systems. However, the advantages of adopting massive MIMO for broadband communication are well-established. Recently researcher has been devoted to building communication systems sustaining high communication rates with security. While massive MIMO for Internet-of-Things (IoT) connectivity is still a developing issue, IoT connectivity has requirements and limitations that differ significantly from broadband connections. Although IoT makes people’s lives easier by allowing physical devices to flow through, the interaction of open wireless channels such as Bluetooth, ZigBee, LoRa, Narrowband-Internet of Things (NBIoT), and WiFi, has produced various security and privacy difficulties. Identity authentication is one of the effective solutions for addressing the Internet of Things security and privacy concerns. The typical point-to-point authentication technique ignores the internet of things’ massive number of nodes and limited node resources. Group authentication is an authentication method that simultaneously confirms the identity of a group of members, offering a novel approach to identity identification for the internet of things nodes. However, existing group authentication systems appropriate for the internet of things scenarios pose security issues. They cannot withstand malicious attacks such as forging and replay and cannot prevent group managers from fooling group members. Most existing group authentication schemes are computationally expensive and cannot be applied to resource-constrained IoT scenarios. At the same time, existing systems based on secret-sharing technology cannot resist forgery attacks and replay attacks. The attacker can forge a legal token by modifying the Lagrangian coefficient in the authentication token to pass the group authentication. This work employs verifiable secret sharing technology to create a lightweight verifiable group authentication method (L-IoT-GS) suitable for Internet of Things situations to resist group managers’ deceptive group behavior. Nodes in the Internet of Things scenario can frequently join and leave the network. Because of this, this article proposes a critical update link based on a verified group authentication system for updating group Member rights. According to security analysis, the suggested L-IoT-GS scheme meets accuracy and confidentiality requirements and can withstand malicious attacks such as replay, forgery, and impersonation. Furthermore, performance study and experimental simulation reveal that the L-IoT-GS technique minimizes group members’ computing costs compared to existing standard IoT group authentication schemes.  相似文献   

6.
The emergence of more and more computation-intensive applications has imposed higher requirements in spectrum and energy efficiency (EE) for internet of things (IoT) wireless networks. Massive multiple-input multiple-output (MIMO) is utilized to gain spectral efficiency as an important part of wireless systems. However, the power expansion from hardware lowers the massive MIMO performance remarkably. Reconfigurable intelligent surface (RIS) technology can solve this problem well since it can not only provide higher array gain but also reduce energy depletion and hardware expense. In this article, we study joint optimization about beam-forming, RIS phase shift, and energy harvesting of IoT devices for maximizing EE of the multiple-input single-input downlink system with multiple IoT devices and an energy harvesting device. Different from existing works focusing on ergodic capacity with known statistic channel information of BS-RIS-device, we suppose that statistics information of RIS-device is known. Mathematically, the joint optimization problem is cast into a challenging non-convex one. To this end, based on successive convex approximation, we convert the original problem into two parts and then provide two heuristic schemes to tackle them, respectively. Next, an iterative scheme integrated by two heuristic algorithms is proposed to earn feasible solution in polynomial time. Finally, the proposed scheme is verified to be effective by simulations.  相似文献   

7.
C.J. Rhodes  M. Nekovee 《Physica A》2008,387(27):6837-6844
The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones.An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. The model uses straight-line motion to achieve population, though it is recognised that this is a highly simplified representation of human mobility patterns. We show that the contact rate can be derived from the underlying mobility model and, through extensive simulation, that mass-action epidemic models remain applicable to worm spreading in the low density regime studied here. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.  相似文献   

8.
Resting-state functional magnetic resonance imaging (fMRI) aims to measure baseline neuronal connectivity independent of specific functional tasks and to capture changes in the connectivity due to neurological diseases. Most existing network detection methods rely on a fixed threshold to identify functionally connected voxels under the resting state. Due to fMRI non-stationarity, the threshold cannot adapt to variation of data characteristics across sessions and subjects, and generates unreliable mapping results. In this study, a new method is presented for resting-state fMRI data analysis. Specifically, the resting-state network mapping is formulated as an outlier detection process that is implemented using one-class support vector machine (SVM). The results are refined by using a spatial-feature domain prototype selection method and two-class SVM reclassification. The final decision on each voxel is made by comparing its probabilities of functionally connected and unconnected instead of a threshold. Multiple features for resting-state analysis were extracted and examined using an SVM-based feature selection method, and the most representative features were identified. The proposed method was evaluated using synthetic and experimental fMRI data. A comparison study was also performed with independent component analysis (ICA) and correlation analysis. The experimental results show that the proposed method can provide comparable or better network detection performance than ICA and correlation analysis. The method is potentially applicable to various resting-state quantitative fMRI studies.  相似文献   

9.
为了能够实现对室内环境的监测和舒适度的调节,首先需要获取准确、及时的室内环境参数。针对目前室内环境监测系统存在自动化程度低、检测点部署欠灵活,安装维护困难,监控难度大等问题,设计开发了一种基于无线传感网络的室内环境监测系统。以ZigBee技术为核心,构建无线传感器网络,自动采集和传输室内相关环境参数;通过结合物联网云平台,实现远程监控和报警;运用模糊综合评价的方法,通过统计、分析、计算,得到符合实际的室内环境舒适度水平。本系统通过硬件设计降低了室内环境监测成本,通过软件设计提高了系统的监测水平和灵活性,通过结合模糊综合评价方法和物联网云平台降低了监控难度。经实验,验证了本系统在实际环境下的使用性能,适合推广应用。  相似文献   

10.
白昊  屈军锁  孙阳  占伟 《应用声学》2017,25(1):149-151
随着物联网技术的高速发展,对同一无线局域网内的设备进行控制时,存在传输距离短、可移动性差等缺点。针对此问题,提出了一种物联网终端远程控制的实现方法,采用串口转WiFi模块,通过Socket模式下的透传机制,传统的串口设备能够无线接入到互网络中基于MQTT消息传输协议的服务器上,完成数据的接收和发送,从而使终端设备突破无线通信距离的限制,达到数据交互和远程控制的目的。实验结果表明该方法正确、可靠,可广泛应用于智能家居、工业控制等领域。  相似文献   

11.
An enterprise’s private cloud may be attacked by attackers when communicating with the public cloud. Although traffic detection methods based on deep learning have been widely used, these methods rely on a large amount of sample data and cannot quickly detect new attacks such as Zero-day Attacks. Moreover, deep learning has a black-box nature and cannot interpret the detection results, which has certain security risks. This paper proposes an interpretable abnormal traffic detection method, which can complete the detection task with only a few malicious traffic samples. Specifically, it uses the covariance matrix to characterize each traffic category and then calculates the similarity between the query traffic and each category according to the covariance metric function to realize the traffic detection based on few-shot learning. After that, the traffic images processed by the random masks are input into the model to obtain the predicted probability of the corresponding traffic category. Finally, the predicted probability is linearly summed with each mask to generate the final saliency map to interpret and analyze the model decision. In this paper, experiments are carried out by simulating only 15 and 25 malicious traffic samples. The results show that the proposed method can obtain good accuracy and recall, and the interpretation analysis shows that the model is reliable and interpretable.  相似文献   

12.
This article considers a backscatter-aided wireless powered mobile edge computing (BC-aided WPMEC) network, in which the tasks data of each Internet of Things (IoT) device can be computed locally or offloaded to the MEC server via backscatter communications, and design a resource allocation scheme regarding the weighted sum computation bits (WSCB) maximization of all the IoT devices. Towards this end, by optimizing the mobile edge computing (MEC) server’s transmit power, IoT devices’ power reflection coefficients, local computing frequencies and time, the time allocation between the energy harvesting and task offloading, as well as the binary offloading decision at each IoT device, we built a WSCB maximization problem, which belongs to a non-convex mixed integer programming problem. For solving this, the proof by contradiction and the objective function’s monotonicity are considered to determine the optimal local computing time of each IoT device and the optimal transmit power of the MEC server, and the time-sharing relaxation (TSR) is adopted to tackle the integer variables, which are used to simplify the original problem. Then, we decouple the simplified problem into two sub-problems by means of the block coordinate decent (BCD) technology, and each of the sub-problems is transformed to a convex one by introducing auxiliary variables. Based on this, we design a two-stage alternative (TSA) optimization algorithm to solve the formulated WSCB problem. Computer simulations validate that the TSA algorithm has a fast convergent rate and also demonstrate that the proposed scheme achieves a higher WSCB than the existing schemes.  相似文献   

13.
麻锐  唐政  赵露露  齐涛涛 《应用声学》2017,25(10):247-250, 262
Dempster-Shafer证据理论在水下多源目标识别领域有着广泛而重要的应用, 但经典的证据理论在融合高度冲突的证据时往往会导致一些反常理的结果, 如Zadeh冲突悖论。针对这一问题,综合考虑证据体之间的冲突程度和支持程度,提出一种证据异常度的概念并对原始证据集进行异常检测,基于检测结果对原始证据体进行权重分配,引入全集项,修正证据源。在保持Dempster组合规则不变的前提下,进行有效的证据预处理,实验仿真结果验证了算法的有效性。证明对证据体进行有效的修正,可以改进经典证据理论的缺点,达到更好的融合结果。  相似文献   

14.
入侵检测是保障网络安全的重要措施,网络攻击手段的多样性和隐蔽性不断增强导致入侵检测愈加困难,迫切需要研究新的入侵检测方法。结合可视化技术和k近邻分类算法,提出一种基于图形特征的入侵检测方法。采用信息增益方法对原始特征进行排序选择,并进行雷达图可视化表示,提取雷达图的图形特征构成新的数据集并送入k近邻分类器进行训练和测试。通过KDDCUP99数据集仿真实验表明,该方法不仅能直观显示攻击行为,而且获得较好的攻击检测性能,对DOS攻击的检测率可达97.9%,误报率为1.5%。  相似文献   

15.
A robust watermarking algorithm based on salient image features   总被引:3,自引:0,他引:3  
A feature-based robust watermarking algorithm against geometric attacks is proposed in this paper. It is well-known that geometric attacks such as rotation, scaling, and translation on a watermarked image will destroy the synchronization between the processes of watermark embedding and detection. In other words, the locations for embedding the watermark are lost due to geometric attacks, which results in the failure of watermark detection. Since salient features in an image are relatively stable under geometric attacks, they may serve as reference points to synchronize the embedding and detection processes and the detection rate of the watermark could be increased significantly. Another problem for feature-based watermarking is that the repeatability of feature detection tends to be low; that is, the features detected during the embedding process may not be detected again during the detection process. To overcome such a problem, a novel feature enhancement technique is developed to increase the repeatability rate of feature detection, in which image moments are used to achieve geometric invariance between the embedding and detection processes. Experimental results demonstrate that the proposed watermarking algorithm is able to survive various geometric attacks and common image processing operations. And the visual quality of the watermarked image is well preserved as well.  相似文献   

16.
We address the problem of unsupervised anomaly detection for multivariate data. Traditional machine learning based anomaly detection algorithms rely on specific assumptions of normal patterns and fail to model complex feature interactions and relations. Recently, existing deep learning based methods are promising for extracting representations from complex features. These methods train an auxiliary task, e.g., reconstruction and prediction, on normal samples. They further assume that anomalies fail to perform well on the auxiliary task since they are never trained during the model optimization. However, the assumption does not always hold in practice. Deep models may also perform the auxiliary task well on anomalous samples, leading to the failure detection of anomalies. To effectively detect anomalies for multivariate data, this paper introduces a teacher-student distillation based framework Distillated Teacher-Student Network Ensemble (DTSNE). The paradigm of the teacher-student distillation is able to deal with high-dimensional complex features. In addition, an ensemble of student networks provides a better capability to avoid generalizing the auxiliary task performance on anomalous samples. To validate the effectiveness of our model, we conduct extensive experiments on real-world datasets. Experimental results show superior performance of DTSNE over competing methods. Analysis and discussion towards the behavior of our model are also provided in the experiment section.  相似文献   

17.
Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SKG) from shared randomness (in the form of wireless fading coefficients). However, although practical, SKG schemes have been shown to be vulnerable to active attacks over the initial “advantage distillation” phase, throughout which estimates of the fading coefficients are obtained at the legitimate users. In fact, by injecting carefully designed signals during this phase, a man-in-the-middle (MiM) attack could manipulate and control part of the reconciled bits and thus render SKG vulnerable to brute force attacks. Alternatively, a denial of service attack can be mounted by a reactive jammer. In this paper, we investigate the impact of injection and jamming attacks during the advantage distillation in a multiple-input–multiple-output (MIMO) system. First, we show that a MiM attack can be mounted as long as the attacker has one extra antenna with respect to the legitimate users, and we propose a pilot randomization scheme that allows the legitimate users to successfully reduce the injection attack to a less harmful jamming attack. Secondly, by taking a game-theoretic approach we evaluate the optimal strategies available to the legitimate users in the presence of reactive jammers.  相似文献   

18.
Desynchronization attacks are among the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence cause incorrect watermark detection. The design of an image watermarking scheme that is robust against desynchronization attacks is challenging. Based on a multi-scale SIFT (scale invariant feature transform) detector and Bandelet transform theory, we propose a new content based image watermarking algorithm with good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the stable image feature points are extracted from the original host by using the multi-scale SIFT detector, and the local feature regions (LFRs) are constructed adaptively according to the feature scale theory. The Bandelet transform is then performed on the LFRs. Finally, the digital watermark is embedded into the LFRs by modifying the significant Bandelet coefficients. By binding the watermark with the geometrically invariant image features, the watermark detection can be done without synchronization error. Experimental results show that the proposed image watermarking is not only invisible and robust against common signal processing such as sharpening, noise adding, JPEG compression, etc., but also robust against the desynchronization attacks such as rotation, translation, scaling, row or column removal, cropping, etc.  相似文献   

19.
The identification of the type of wireless propagation channel (e.g., Line of Sight (LOS) or Non Line of Sight (NLOS)) is an important function in the wireless communication design and deployment especially in rich propagation environments. The wireless channel characteristics can be quite specific not only between Line of Sight (LOS) and Non Line of Sight (NLOS) wireless propagation conditions but also in different NLOS environments.In recent times, machine learning approaches have been increasingly used to differentiate and classify channel characteristics and this paper is part of this trend. In particular, this paper proposes the combination of machine learning with a recently proposed signal processing tool called Variational Mode Decomposition (VMD), which is a decomposition algorithm that decomposes a time series into several modes which have specific sparsity properties. VMD itself is a refinement of the Empirical Mode Decomposition (EMD) and demonstrated a superior performance to EMD for classification problems. One issue for the practical deployment of VMD in channel identification problems is the presence of hyper-parameters, which must be tuned for the applied context. The main contribution of this paper is to propose a novel approach for channel identification based on an improvement of VMD called Improved Variational Mode Decomposition (IVMD), where the optimal values of the hyper-parameters of VMD are automatically identified on the basis of the Shannon entropy of the signal output from the channel. Then, various features are extracted from the modes generated by IVMD and a sequential feature selection algorithm is applied to select the optimal features. This paper applies the proposed approach with IVMD to a data set generated by the authors with a wireless channel emulator, where 6 different propagation scenarios (including no fading conditions) are created for WiFi 802.11g signals, where only the preamble is used for channel identification. Even if channel identification based on the normalized preamble is a challenging classification problem, the proposed IVMD is able to outperform significantly the application of basic VMD, EMD and the time and frequency domain representations (as commonly done in literature) of the WiFi signals.  相似文献   

20.
李文 《应用声学》2017,25(8):214-217
为了有效从收集的恶意数据中选择特征去分析,保障网络系统的安全与稳定,需要进行网络入侵检测模型研究。但目前方法是采用遗传算法找出网络入侵的特征子集,再利用粒子群算法进行进一步选择,找出最优的特征子集,最后利用极限学习机对网络入侵进行分类,但该方法准确性较低。为此,提出一种基于特征选择的网络入侵检测模型研究方法。该方法首先以增强寻优性能为目标对网络入侵检测进行特征选择,结合分析出的特征选择利用特征属性的Fisher比构造出特征子集的评价函数,然后结合计算出的特征子集评价函数进行支持向量机完成对基于特征选择的网络入侵检测模型研究方法。仿真实验表明,利用支持向量机对网络入侵进行检测能有效地提高入侵检测的速度以及入侵检测的准确性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号