首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 402 毫秒
1.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

2.
Increasing numbers of devices that output large amounts of geographically referenced data are being deployed as the Internet of Things (IoT) continues to expand. Partly as a result of the IoT's dynamic, decentralized, and heterogeneous architecture. These are all examples of the Internet of items (IoT), despite the fact that we might be thinking that one of these items is different from the others. The physical and digital worlds are connected by the Internet of Things (IoT). Nowadays, one of the key goals of the Internet is its own development. This paper provides an in-depth analysis of IoT-based data quality and data preparation strategies developed with multinational corporations in mind. The goal is to make IoT data more trustworthy and practical so that MNCs may use it to their advantage in making educated business decisions. The proposed structure consists of three distinct actions: gathering data, evaluating data quality, and cleaning up raw data. Data preprocessing research is essential since it decides and significantly affects the accuracy of predictions made in later stages. Thus, the recommendation for a special and useful combination in the framework of different data preprocessing task types, which includes the following four technical elements and is briefly justified, is made. The Internet of Things (IoT) is a design pattern in which commonplace items can be equipped with classification, sensing, networking, and processing capabilities that will enable them to communicate with one another over the Internet to fulfill a specific function. The Internet of Things will eventually change physical objects into virtual objects with intelligence. In addition to a detailed analysis of the IoT layer, this article gives an overview of the existing Internet of Things (IoT), technical specifics, and applications in this recently growing field. However, this publication will provide future scholars who desire to conduct study in this area of Internet of Things with a better knowledge.  相似文献   

3.
As time went on, technological progress inevitably altered our daily routines. Many new technologies, such as the Internet of Things (IoT) and cryptocurrency, offer revolutionary possibilities. To put it simply, the blockchain is a distributed, public, and auditable database that can be used to record financial transactions. The IoT, or “Internet of Things,” is a system of interconnected electronic devices that can communicate with one another and be remotely monitored and handled. This paper reviews the most recent findings in the field of blockchain and Internet of Things with the goal of examining blockchain as a possible answer to secure IoT data management within supply networks. There is a dearth of literature in the early stages of both blockchain and IoT study because they are such novel topics. The study's findings suggest that in order to improve their leadership quality to intentionally impact employee performance, industry managers should pay attention to human resource management indicators like collaboration, involvement, actualization, perception, and teamwork. This is primarily because of the inherent limitations of IoT devices and the distributed ledger architecture of the blockchain technology. There is potential for IoT to provide many advantages if blockchain capabilities can be optimized for it.  相似文献   

4.
The Internet of Things (IoT) has sparked a revolution in the manufacturing sector, providing numerous advantages to companies that adopt it. Using IoT, factories can boost productivity, cut expenses, and develop a more sustainable business model. The rise of digital networking and real-time communication are compelling manufacturers to adopt cutting-edge technologies in order to compete in today's fast-paced, international marketplace. The Internet of Things (IoT) to facilitate the virtualization of manufacturing processes and the gathering of real-time data to guarantee seamless supply chain operations. There has been abductive qualitative research done. Case studies of the heavy-duty vehicle sector provided empirical data, while a review of the relevant literature provided the theoretical underpinnings. Information system issues and people and structure issues were cited as barriers to analytics adoption. In this study works on challenges and security of manufacturing. Finally, suitable themes for analysis have been derived using a thematic analysis. The results show that manufacturing firms can benefit from analytics solutions for production activities even if they are not highly automated or complicated. The Internet of Things (IoT) offers numerous opportunities for growth in the business models of manufacturing companies. Businesses can boost efficiency, cut expenses, and develop a more robust business model by implementing IoT. Successfully integrating IoT, however, calls for meticulous preparation and execution.  相似文献   

5.
无线Mesh网(wireless mesh networks,WMNs)是一种新兴的无线网络技术,支持节点多跳路由和转发功能。节点合作与否是实现通信的关键。在缺少预先约定的信任关系时,判断节点合作性的安全机制是解决恶意节点破坏网络通信的有效手段。在对WMNs中AODV协议安全分析的基础上,提出了一种基于局部声誉值的安全路由解决方案。  相似文献   

6.
国外农业物联网技术发展及对我国的启示   总被引:5,自引:0,他引:5  
随着现代信息技术的发展,物联网已广泛应用于农业生产的各个领域。国际上,一些国家在农业物联网感知技术、数据传输技术、智能处理技术等方面取得了重要的进展,出现了物联网在农业领域的典型应用。这些技术进展和相关应用对我国农业物联网的快速发展具有重要的借鉴意义。文章通过对国外农业物联网技术最新进展的调研和分析,描述了农业物联网在感知技术、数据传输技术、智能处理技术等方面的国际先进经验,例举了国外农业物联网在农业资源监测和利用、农业生态环境监测、农业生产精细管理、农产品安全溯源、农业物联网云服务等领域的典型应用,并针对我国农业物联网技术的发展,在发展微型化传感器、寻求系统节能策略、努力降低传感器成本、传感器网络安全性和抗干扰问题、节点自动配置问题等方面提出了建设性意见。  相似文献   

7.
Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.  相似文献   

8.
基于我国物联网产业发展具有代表性的9个省(市)的相关统计数据,构建物联网产业技术研发评价指标体系,运用曼奎斯特(Malmquist)指数方法对2007—2013年间我国物联网产业的技术研发效率进行动态评价。通过研究发现:我国物联网产业技术研发效率较为低下,且各地区研发效率差异较大;技术衰退是导致物联网产业研发效率下降的主要原因。  相似文献   

9.
The Internet of Things (IoT) might yield many benefits for organizations, but like other technology adoptions may also introduce unforeseen risks and requiring substantial organizational transformations. This paper analyzes IoT adoption by organizations, and identifies IoT benefits and risks. A Big, Open, Linked Data (BOLD) categorization of the expected benefits and risks of IoT is made by conducting a comprehensive literature study. In-depth case studies in the field of asset management were then executed to examine the actual experienced, real world benefits and risks. The duality of technology is used as our theoretical lens to understand the interactions between organization and technology. The results confirm the duality that gaining the benefits of IoT in asset management produces unexpected social changes that lead to structural transformation of the organization. IoT can provide organizations with many benefits, after having dealt with unexpected risks and making the necessary organizational changes. There is a need to introduce changes to the organization, processes and systems, to develop capabilities and ensure that IoT fits the organization’s purposes.  相似文献   

10.
随着云计算、物联网、大数据、移动互联、人工智能、增强现实等新技术的不断涌现,数据量呈指数级增长,催生了新的业务——数据分析。从数据的分类、标准化、质量管理等方面入手,提出基于结合生命周期(lifecycle)、需求层次(need hierarchy)和大数据(big data)技术3种方法的数据(资源)管理三维度的LNB管理方法,探讨数据分析的维度、步骤、工具,及其在现代科技管理中所起关键作用。  相似文献   

11.
对"互联网+"物流信息安全管理的用户行为路径进行优化研究,希望通过显性化的特征值来揭示物流信息安全管理的风险程度。通过构建供应链模型,采用TSP算法求解供应链上的物流业务最短路径,认为无论节点的用户行为如何表现,其物流业务运作必然依托原有的供应链最短路径结构开展。以物流信息安全管理背后的用户行为为载体对象,构建变异的用户行为熵TSP模型。将网络的信息安全问题抽象为求不重复连接所有节点用户熵值的最短路径,在此基础上,对用户行为路径进行仿真优化,并得出相关的结论。  相似文献   

12.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。  相似文献   

13.
This paper proposes a novel trust-based false data detection method for power systems under false data injection attacks (FDIAs). In order to eliminate the interference posed by false data to the power system in the state estimation process, a trust model is first established to estimate the reliability of the system bus. Then an algorithm is proposed to update the bus trust value, when all the trust value of neighbor buses at one bus node are quite low, then this bus is diagnosed as a malicious node and the false data are detected. This method guarantees that the power systems can estimate the state accurately against FDIAs based on the trust of bus. The simulations on the benchmark IEEE 14-bus, IEEE 30-bus and IEEE 57-bus test systems are used to demonstrate the feasibility and effectiveness of proposed algorithm.  相似文献   

14.
《Journal of The Franklin Institute》2021,358(18):10232-10249
In this paper, we investigate the physical-layer security for an Internet of Things (IoT) relaying network employing non-orthogonal multiple access (NOMA) in the context of non-linear energy harvesting. In particular, a power-constrained source transmits its confidential information to a destination via an IoT device, which first decodes the received signal and then forwards the decoded data together with its own information using the NOMA technique to their respective destinations, while an eavesdropper is overhearing this transmission. Considering the scenario that both the power-constrained source and the IoT device are assumed to work under non-linear energy harvesting modes, and are capable of harvesting energy from a power beacon with a time switching protocol, both analytical and asymptotic expressions for secrecy outage probability as well as the analytical expression for the probability of strictly positive secrecy capacity are derived. In addition, those expressions are also verified with Monte-Carlo simulations.  相似文献   

15.
农产品供应链中物联网技术采纳的影响因素分析   总被引:2,自引:1,他引:1  
总结并分析国内外物联网及其主流技术无线射频识别(RFID)技术采纳影响因素方面的研究文献,初步构建了农产品供应链中物联网技术采纳影响因素的技术组织环境(TOE)框架。根据实际调研数据,运用结构方程模型(SEM)对提出的物联网技术采纳影响因素的TOE模型进行实证分析。结果表明:员工阻力和不确定性不被模型支持;在被支持的众多因素中,兼容性、感知效益、企业规模、高层支持、供应链企业间相互信任、技术知识、外部压力、政府支持对物联网技术的采纳有正向的显著影响,影响最大的是企业规模,影响最小的是外部压力;复杂性和成本对物联网技术的采纳有负向的显著影响,成本对物联网技术的采纳负向影响最大。  相似文献   

16.
17.
自然资源要素综合观测数据具有来源多、类型复杂和数据量庞大等特点,需要建立自然资源要素综合观测一体化平台对数据进行统一管理和利用。本文基于物联网与数据中台技术,构建了自然资源要素综合观测一体化平台,主要包括自然资源要素数据中心、物联网中心和模型云中心三大模块,实现了从传感器终端到数据中台、模型云的自动数据传输和互联共享,以及数值分析、加工和综合应用,达到了可视化效果。为自然资源统一管理、全国重要生态系统保护和修复重大工程规划提供技术支撑。  相似文献   

18.
Due the advent of new wireless communication, Internet of Things (IoT) and cloud computing, outsourcing the data processing and management to the cloud servers has become a typical transformative computing paradigm. In this context, a cloud auditing protocol is an effective way to check the data integrity for cloud data management. We present a cryptanalysis of two recently proposed certificateless public verifiable auditing protocols, the Zhang et al.’s protocol and the Kang et al.’s protocol. We argue that the tags in the Zhang et al.’s protocol and the semi-tags in the Kang et al.’s protocol can be forged, leading to insecure protocols. We propose improved versions of both protocols and analyze their security and efficiency. Our new protocols can be used as a very effective way for checking the integrity of outsourced cloud storage in the context of transformative computation.  相似文献   

19.
对于物联网,本文分析了几个客观物质的特性要求,同时对解决问题的关键性技术进行了调研,并且阐述了通过使用智能对象提升客体服务的问题。  相似文献   

20.
当前,理论界与实践界都认为企业需要构建恰当的物联网商业模式,从而有效地释放和获取物联网技术的商业价值。为此,运用模块化理论深入解析物联网商业模式的复杂结构、可能形态与构建路径。研究发现:用户企业物联网商业模式是由能够独立设计而又功能集成的技术模块和业务模块构成;按照用户企业处理看得见的设计规则可将物联网商业模式划分为封闭型、开放型与自适应型3种类型;用户企业通过模块整合构建物联网商业模式,包括技术模块整合、技术模块与业务模块整合、跨企业的模块整合3个层次。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号