首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.  相似文献   

2.
Increasing numbers of devices that output large amounts of geographically referenced data are being deployed as the Internet of Things (IoT) continues to expand. Partly as a result of the IoT's dynamic, decentralized, and heterogeneous architecture. These are all examples of the Internet of items (IoT), despite the fact that we might be thinking that one of these items is different from the others. The physical and digital worlds are connected by the Internet of Things (IoT). Nowadays, one of the key goals of the Internet is its own development. This paper provides an in-depth analysis of IoT-based data quality and data preparation strategies developed with multinational corporations in mind. The goal is to make IoT data more trustworthy and practical so that MNCs may use it to their advantage in making educated business decisions. The proposed structure consists of three distinct actions: gathering data, evaluating data quality, and cleaning up raw data. Data preprocessing research is essential since it decides and significantly affects the accuracy of predictions made in later stages. Thus, the recommendation for a special and useful combination in the framework of different data preprocessing task types, which includes the following four technical elements and is briefly justified, is made. The Internet of Things (IoT) is a design pattern in which commonplace items can be equipped with classification, sensing, networking, and processing capabilities that will enable them to communicate with one another over the Internet to fulfill a specific function. The Internet of Things will eventually change physical objects into virtual objects with intelligence. In addition to a detailed analysis of the IoT layer, this article gives an overview of the existing Internet of Things (IoT), technical specifics, and applications in this recently growing field. However, this publication will provide future scholars who desire to conduct study in this area of Internet of Things with a better knowledge.  相似文献   

3.
The Internet of Things (IoT) might yield many benefits for organizations, but like other technology adoptions may also introduce unforeseen risks and requiring substantial organizational transformations. This paper analyzes IoT adoption by organizations, and identifies IoT benefits and risks. A Big, Open, Linked Data (BOLD) categorization of the expected benefits and risks of IoT is made by conducting a comprehensive literature study. In-depth case studies in the field of asset management were then executed to examine the actual experienced, real world benefits and risks. The duality of technology is used as our theoretical lens to understand the interactions between organization and technology. The results confirm the duality that gaining the benefits of IoT in asset management produces unexpected social changes that lead to structural transformation of the organization. IoT can provide organizations with many benefits, after having dealt with unexpected risks and making the necessary organizational changes. There is a need to introduce changes to the organization, processes and systems, to develop capabilities and ensure that IoT fits the organization’s purposes.  相似文献   

4.
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores.This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes’ trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.  相似文献   

5.
The Internet of Things (IoT) has sparked a revolution in the manufacturing sector, providing numerous advantages to companies that adopt it. Using IoT, factories can boost productivity, cut expenses, and develop a more sustainable business model. The rise of digital networking and real-time communication are compelling manufacturers to adopt cutting-edge technologies in order to compete in today's fast-paced, international marketplace. The Internet of Things (IoT) to facilitate the virtualization of manufacturing processes and the gathering of real-time data to guarantee seamless supply chain operations. There has been abductive qualitative research done. Case studies of the heavy-duty vehicle sector provided empirical data, while a review of the relevant literature provided the theoretical underpinnings. Information system issues and people and structure issues were cited as barriers to analytics adoption. In this study works on challenges and security of manufacturing. Finally, suitable themes for analysis have been derived using a thematic analysis. The results show that manufacturing firms can benefit from analytics solutions for production activities even if they are not highly automated or complicated. The Internet of Things (IoT) offers numerous opportunities for growth in the business models of manufacturing companies. Businesses can boost efficiency, cut expenses, and develop a more robust business model by implementing IoT. Successfully integrating IoT, however, calls for meticulous preparation and execution.  相似文献   

6.
The massive number of Internet of Things (IoT) devices connected to the Internet is continuously increasing. The operations of these devices rely on consuming huge amounts of energy. Power limitation is a major issue hindering the operation of IoT applications and services. To improve operational visibility, Low-power devices which constitute IoT networks, drive the need for sustainable sources of energy to carry out their tasks for a prolonged period of time. Moreover, the means to ensure energy sustainability and QoS must consider the stochastic nature of the energy supplies and dynamic IoT environments. Artificial Intelligence (AI) enhanced protocols and algorithms are capable of predicting and forecasting demand as well as providing leverage at different stages of energy use to supply. AI will improve the efficiency of energy infrastructure and decrease waste in distributed energy systems, ensuring their long-term viability. In this paper, we conduct a survey to explore enhanced AI-based solutions to achieve energy sustainability in IoT applications. AI is relevant through the integration of various Machine Learning (ML) and Swarm Intelligence (SI) techniques in the design of existing protocols. ML mechanisms used in the literature include variously supervised and unsupervised learning methods as well as reinforcement learning (RL) solutions. The survey constitutes a complete guideline for readers who wish to get acquainted with recent development and research advances in AI-based energy sustainability in IoT Networks. The survey also explores the different open issues and challenges.  相似文献   

7.
In this paper, we provide a methodology to evaluate the capacity of a Massive multiple-input multiple-output (MIMO) supported Internet of Things (IoT) system in which a large number of low cost low power IoT devices transmit and receive sporadic data. Numerous IoT devices are supported by a single cell Massive MIMO base station (BS) with maximum-ratio (MR) processing. Orthogonal reference signals (RSs) or pilots are assigned randomly to all the IoT devices for channel estimation purpose. The number of simultaneously active IoT devices follows Poisson distribution. Due to the tremendous number of IoT devices, orthogonal RSs are heavily reused, which severely degrades the receiver signal quality. One of the most important performance criteria for this kind of system is the blocking probability which shows the percentage of the outage IoT devices, and how we maintain the low blocking probability while supporting all the IoT devices simultaneously is particularly important. Due to RS reuse, we can divide IoT devices into two groups based on their interference levels. We provide detailed theoretical analyses, and show that the blocking primarily happens to the group with higher interference level. Increasing the number of service antennas and/or reducing the number of IoT devices can help to improve the performance of the blocking probability, however there is a regime in which the parameter adjustment helps little to improve the performance. Based on these factors, we provide a useful algorithm to improve the performance of blocking probability. A number of simulation results are also provided to validate the theoretical analysis.  相似文献   

8.
随着云计算、物联网、大数据、移动互联、人工智能、增强现实等新技术的不断涌现,数据量呈指数级增长,催生了新的业务——数据分析。从数据的分类、标准化、质量管理等方面入手,提出基于结合生命周期(lifecycle)、需求层次(need hierarchy)和大数据(big data)技术3种方法的数据(资源)管理三维度的LNB管理方法,探讨数据分析的维度、步骤、工具,及其在现代科技管理中所起关键作用。  相似文献   

9.
自然资源要素综合观测数据具有来源多、类型复杂和数据量庞大等特点,需要建立自然资源要素综合观测一体化平台对数据进行统一管理和利用。本文基于物联网与数据中台技术,构建了自然资源要素综合观测一体化平台,主要包括自然资源要素数据中心、物联网中心和模型云中心三大模块,实现了从传感器终端到数据中台、模型云的自动数据传输和互联共享,以及数值分析、加工和综合应用,达到了可视化效果。为自然资源统一管理、全国重要生态系统保护和修复重大工程规划提供技术支撑。  相似文献   

10.
Blockchain plays a vital task in cybersecurity. With the exerted efforts for realising large-scale quantum computers, most current cryptographic mechanisms may be hacked. Accordingly, we need a quantum tool utilised for designing blockchain frameworks to have the ability to be executed in the level of digital computers and resist the probable attacks from both digital and quantum computers. Quantum walks may be utilised as a quantum-inspired model for designing new cryptographic algorithms. In this paper, we present a new authentication and encryption protocol based on quantum-inspired quantum walks (QIQW). The proposed protocol is utilized to build a blockchain framework for secure data transmission among IoT devices. Instead of using classical cryptographic hash functions, quantum hash functions based on QIQW are employed for linking blocks of the chain. The main advantages of the presented framework are helping IoT nodes to effectively share their data with other nodes and full control of their records. Security analysis demonstrates that our proposed protocol can defend against message attack and impersonation attacks, thus ensuring secure transmission of data among IoT devices.  相似文献   

11.
物联网是什么?物联网不是互联网、传感网、产品电子代码,也不单纯是一种技术应用。物联网将“互联网”和“物”连接在一起,就意味着把破坏性创新引进到当今的信息和通信技术世界。与互联网不同,物联网是物、网络、语义等视角的综合而形成的集网络、应用服务于一体的技术融合系统。在物联网语境中,物联网技术像人一样形成了人为的自主特征。物联网意味着一种潜在的技术异化的环境:个人隐私以多种方式受到威胁。而现有对隐私的制度规约存在诸多的不完备性。  相似文献   

12.
当前,理论界与实践界都认为企业需要构建恰当的物联网商业模式,从而有效地释放和获取物联网技术的商业价值。为此,运用模块化理论深入解析物联网商业模式的复杂结构、可能形态与构建路径。研究发现:用户企业物联网商业模式是由能够独立设计而又功能集成的技术模块和业务模块构成;按照用户企业处理看得见的设计规则可将物联网商业模式划分为封闭型、开放型与自适应型3种类型;用户企业通过模块整合构建物联网商业模式,包括技术模块整合、技术模块与业务模块整合、跨企业的模块整合3个层次。  相似文献   

13.
“区块链+”商业模式创新整合路径   总被引:1,自引:0,他引:1       下载免费PDF全文
区块链应用领域的研究主要集中在区块链技术与传统行业的结合,也就是“区块链+”商业模式创新,这些研究成果存在大量相互矛盾之处。这是因为现有研究由区块链出发推演商业模式创新的过程中,混淆了区块链技术、区块链特征和区块链理念三个范畴。在梳理三者边界以及相互之间关系的基础上,本文通过对三种“区块链+”共享经济商业模式创新路径的对比分析,发现由区块链集成技术和发展阶段所形成的组态决定了其与具体领域结合时表现出的商业模式新特征。这些特征一般表现为数据权、隐私和数据成本等方面,即“区块链+”商业模式创新点。进一步研究发现,“区块链+”商业模式创新的方向,例如打破垄断、独立自主和合作共赢等,与区块链创生的理念相契合。由此得出“区块链+”商业模式创新的整合路径为,区块链技术组态到具体商业模式的优化创新,再到区块链理念与商业模式理念的双向影响。形成三者循环的动态变化。本研究为不同领域“区块链+”商业模式的研究提供了理论框架,也为区块链企业的发展指明了方向。  相似文献   

14.
《Research Policy》2022,51(10):104600
Innovative industries need efficient markets for technology (MFTs). One determinant of MFT efficiency neglected until now is licensing level—that is, the level in the value chain where patents are licensed. Patents may be licensed upstream, to firms that put the patented knowledge into practice. I refer to this as integrated licensing. Alternatively, patents may be licensed further downstream in the value chain, in particular to makers of final devices. I call this bifurcated licensing since it separates intellectual property rights from the technical knowledge they cover. I study the licensing level of essential patents on communication standards such as LTE and Wi-Fi in relation to the Internet of Things (IoT). The choice of licensing level in this context is currently a hotly debated topic. To show how bifurcated licensing affects MFT efficiency, I present empirical evidence from a qualitative study comprising interviews with 30 individuals from 22 diverse firms, focusing on startups. IoT device makers clearly find the uncertainty regarding infringement, patent validity, and the licensing process hinders efficient licensing, which is compounded by the large number of IoT device makers and, for SMEs and startups, by resource constraints. As a theory contribution, I show that a patent's licensing level need not correspond with the implementation level of the patented knowledge—in other words, licensing may be bifurcated rather than integrated. I develop a model of how licensing level affects MFT efficiency. Implications for practice are that device-level licensing of standard-essential patents (SEPs), if broadly implemented, would have a negative effect on innovation and entrepreneurship in the IoT. Policymakers should ensure that SEP licensing is simplified.  相似文献   

15.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

16.
基于我国物联网产业发展具有代表性的9个省(市)的相关统计数据,构建物联网产业技术研发评价指标体系,运用曼奎斯特(Malmquist)指数方法对2007—2013年间我国物联网产业的技术研发效率进行动态评价。通过研究发现:我国物联网产业技术研发效率较为低下,且各地区研发效率差异较大;技术衰退是导致物联网产业研发效率下降的主要原因。  相似文献   

17.
Conventional grant-based random access scheme is inappropriate to massive Internet of Things (IoT) connectivity since massive devices results in large number of collisions. This is unacceptable for the low latency requirement in 5 G and future networks. It is also not possible to assign orthogonal pilot sequences to all users to perform user activity detection (UAD) due to the massive number of devices and limited channel coherence time. In this paper, a novel grant-free (GF) UAD scheme is proposed with extremely low complexity and latency in an IoT network with a massive number of users. We exploit multiple antennas at the base station (BS) to produce spatial filtering by a fixed beamforming network (FBN), there then the inter-beam interference can be mitigated. Moreover, intra-beam interference is removed in temporal domain by orthogonal multiple access (OMA) technology. Joint UAD and multiuser detection (MUD) is realized by a bank of spatial-temporal matched filters at BS. The proposed method is efficient and the complexity is much less than the existing compressed sensing (CS)-based GF non-orthogonal multiple access (GFNOMA) algorithms. Performances of the proposed method is extensively analyzed in terms of the successful activity detection rate (SADR) as well as the Receiver operating characteristic (ROC) based on Neyman-Pearson (NP) decision rule. Numerical results demonstrate that it is comparable to the recently proposed iterative Maximum Likelihood (ML) algorithm, yet the computation load of the proposed scheme is extensively reduced.  相似文献   

18.
我国农业物联网发展现状及对策   总被引:9,自引:0,他引:9  
文章分析了现阶段农用传感器、农业数据采集与传输、GIS和GPS以及农业智能数据处理等核心农业物联网技术在我国的发展现状及其应用情况;重点阐述了农业物联网在农业生产、农产品市场、农业管理及电子政务领域的应用进展,论述了农业物联网对改造与提升我国传统农业发展模式的重要意义,同时对我国农业物联网未来的发展趋势做出了科学预测。  相似文献   

19.
The blockchain is considered to be the potential driver of the digital economy. The Blockchain technology outweighs the challenges associated with the traditional transaction business governed and regulated by the third trusted party. There is a growth in the interest among the researchers, the industry, and the academia to study and leverage the potential of Blockchain. Blockchain provides a decentralized and distributed public ledger for all the participating parties. Though it seems that blockchain is a viable choice and solution for all the centralized governed and regulated transactions (in digital online space), it has potential challenges that need to be resolved; opportunities to be explored, and applications to be studied. This paper utilizes a systematic literature review to study several research endeavors made in the domain of blockchain. To further research on blockchain adoption, the paper theoretically constructs an integrated framework of the blockchain innovation adoption process in an organization considering organizational and user acceptance perspectives. This would facilitate its widespread adoption, thereby achieving sustained leadership solutions. The paper offers 23 propositions to information systems (IS)/information management (IM) scholars with respect to innovation characteristics, organizational characteristics, environmental characteristics, and user acceptance characteristics. Further, the paper explores several areas of future research and directions that can provide deep insights for overcoming challenges and for the adoption of blockchain technology.  相似文献   

20.
In the era of the Internet of Things (IoT), emerging artificial intelligence (AI) technologies provide various artificial autonomy features that allow intelligent personal assistants (IPAs) to assist users in managing the dynamically expanding applications, devices, and services in their daily lives. However, limited academic research has been done to validate empirically artificial autonomy and its downstream consequences on human behavior. This study investigates the role of artificial autonomy by dividing it into three types of autonomy in terms of task primitives, namely, sensing, thought, and action autonomy. Drawing on mind perception theory, the authors hypothesize that the two fundamental dimensions of humanlike perceptions—competence and warmth—of non-human entities could explain the mechanism between artificial autonomy and IPA usage. Our results reveal that the comparative effects of competence and warmth perception exist when artificial autonomy contributes to users' continuance usage intention. Theoretically, this study increases our understanding of AI-enabled artificial autonomy in information systems research. These findings also provide insightful suggestions for practitioners regarding AI artifacts design.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号