با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
31 |
Smart mask – Wearable IoT solution for improved protection and personal health
ماسک هوشمند – راه حل پوشیدنی اینترنت اشیا برای بهبود حفاظت و سلامت شخصی-2022 The use of face masks is an important way to fight the COVID-19 pandemic. In this paper, we
envision the Smart Mask, an IoT supported platform and ecosystem aiming to prevent and control
the spreading of COVID-19 and other respiratory viruses. The integration of sensing, materials,
AI, wireless, IoT, and software will help the gathering of health data and health-related event
detection in real time from the user as well as from their environment. In the larger scale, with the
help of AI-based analysis for health data it is possible to predict and decrease medical costs with
accurate diagnoses and treatment plans, where the comparison of personal data to large-scale
public data enables drawing up a personal health trajectory, for example. Key research prob-
lems for smart respiratory protective equipment are identified in addition to future research di-
rections. A Smart Mask prototype was developed with accompanying user application, backend
and heath AI to study the concept. keywords: کووید-۱۹ | محاسبات لبه | اینترنت اشیا | سلامت شخصی | پوشیدنی | COVID-19 | Edge computing | IoT | Personal health | Wearable |
مقاله انگلیسی |
32 |
A new DTN routing strategies ensuring high message delivery ratio while keeping low power consumption
یک استراتژی جدید مسیریابی DTN با تضمین نسبت تحویل پیام بالا و مصرف کم انرژی-2022 This study proposes Delay/Disruption Tolerant Networking (DTN) routing strategies for disaster
information delivery under the existence of obstacles that are based on the message relay
decision (MRD) method. The proposed methods include a new added obstacle detection
procedure to deliver messages to destinations while bypassing the obstacles. Efficient and
precise relief activities are required immediately after disasters, and it is well known that
obstacles appearing after a disaster will degrade message forwarding performance. Hence, the
proposed schemes maintain communication performance by using a node to detect the existence
of obstacles around itself. If there are obstacles, the message strategy is altered to bypass
the obstacle. In this study, human-beings are the main mobile nodes and mobile phones are
the creators and forwarders of messages. A multiple obstacle model is used to evaluate the
schemes in terms of obstacle-resistance. Three routing schemes are proposed: MRD with area
increase (MRDAI), Sub-Relay Station (SRS), and Adapted Predict Obstacle (APO). This model
tests MRDAI and SRS at the macro level and APO under the existence of concave obstacles. The
MRDAI scheme could autonomously perceive the existence of a huge obstacle and intelligently
enlarge the original message relay area. The SRS scheme could re-establish sub-relay areas
based on MRDAI. The APO scheme demonstrated resistance to concave obstacles, stability
(less affected by environmental changes), and a high delivery ratio while ensuring low energy
consumption. These proposed strategies for information delivery in a disaster area can be used
to launch rescue activities more quickly.
Keywords: DTN | Routing strategy | Disaster information | Avoiding obstacles |
مقاله انگلیسی |
33 |
A new road state information platform based on crowed sensing on challenged network environments
یک پلت فرم جدید اطلاعات وضعیت جاده مبتنی بر حسگر در محیط های شبکه چالش برانگیز-2022 In this paper, a new generation road state information platform based on IoT crowed sens-
ing technology is proposed. Various sensors are attached on vehicle to sample sensor data
and to determine the road state in reatime. Those sensor data and road state information
are transmitted to the neighbor vehicles and road side server using V2X communication
network. Driver can receive the sensor data and road surface state information from the
vehicle in opposite direction or road side server and eventually pay attentions to his/her
driving before encountering the dangerous location. A prototype system of this proposed
system is constructed and evaluated the functions and performance as a preliminary sys-
tem. keywords: اینترنت اشیا | سنسور | شبکه بی سیم | سنجش سطح جاده | رانندگی خودمختار | IoT | Sensor | V2V: V2R | Wireless network | Road surface sensing | Autonomous driving |
مقاله انگلیسی |
34 |
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022 Internet of Things (IoT) is a developing technology in our time that is prone to security problems
as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to-
Device (D2D) communication where an authentication server, as a trusted third-party, does not
participate in the Authentication and Key Agreement (AKA) process and only cooperates in the
process of allocating and updating long-term secret keys. Various authentication protocols have
been suggested for such situations but have not been able to meet security and efficiency re-
quirements. This paper examined three related protocols and demonstrated that they failed to
remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at-
tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable,
and highly secure was designed that needed no secure channel to generate paired private and
public keys in the registration phase. Formal security proof and security analysis using BAN logic,
Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied
security requirements. The communication and computation costs and energy consumption
comparisons denoted that our design had a better performance than existing protocols. keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack |
مقاله انگلیسی |
35 |
A throughput drop estimation model and its application to joint optimization of transmission power, frequency channel, and channel bonding in IEEE 802:11n WLAN for large-scale IoT environments
یک مدل تخمین افت توان و کاربرد آن برای بهینهسازی مشترک توان انتقال، کانال فرکانس و پیوند کانال در IEEE 802:11n WLAN برای محیطهای اینترنت اشیا در مقیاس بزرگ-2022 The concept of Internet of Things (IoT) has been widely studied in smart home networks, smart
city networks, smart grid systems, autonomous driving systems, and smart healthcare systems.
In IoT, the IEEE 802.11n wireless local-area network (WLAN) is used as a common communication
technology due to its flexibility and low cost. Then, the high performance WLAN is required to
enhance quality of service (QoS) of large-scale IoT applications connecting a number of devices
or sensors allocated in wide areas. WLAN can use the limited number of partially overlapping
channels (POCs) at 2.4 GHz band. The WLAN performance can be degraded by interfered signals
from other WLANs. Then, to optimize the POC assignment by reducing interferences, we have
proposed the throughput drop estimation model for concurrently communicating multiple links
under interferences. Unfortunately, the 40 MHz channel bonding (CB) and the 20 MHz non-CB
are considered separately, while the transmission power is always fixed to the maximum. In this
paper, we study the throughput drop estimation model under coexistence of CB and non-CB while
the transmission power is changed. Then, we present its application to the joint optimization of
assigning the transmission power, the frequency channel, and the channel bonding to enhance
the throughput performance of IEEE 802.11n WLAN. For evaluations, we compare estimated
throughputs by the model with measured ones in various network topologies to verify the model
accuracy. Then, we apply the model to the joint assignment optimization in them, and confirm
the effectiveness through simulations and experiments using the testbed system.
Keywords: Internet of Things | WLAN | Partially overlapping channel | Access point | Transmission power | Channel bonding | Non-channel bonding | Throughput drop |
مقاله انگلیسی |
36 |
A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
مدل تشخیص نفوذ مه-ابر دو لایه برای شبکه های اینترنت اشیا-2022 The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However,
the open deployment environment and the limited resources of IoT devices make them vulnerable
to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks
that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks
while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes
the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog
layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus
enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed
extensive experiments using two publicly available datasets to test the proposed approach. Test
results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also
justified the proposed model in terms of improved service time, lower delay, and optimal energy
utilization.
keywords: Fog computing | Intrusion detection | IoT network | Machine learning | Security |
مقاله انگلیسی |
37 |
AI for next generation computing: Emerging trends and future directions
هوش مصنوعی برای محاسبات نسل بعدی: روندهای نوظهور و مسیرهای آینده-2022 Autonomic computing investigates how systems can achieve (user) specified ‘‘control’’ outcomes on their own, without the intervention of a human operator. Autonomic computing
fundamentals have been substantially influenced by those of control theory for closed and
open-loop systems. In practice, complex systems may exhibit a number of concurrent and
inter-dependent control loops. Despite research into autonomic models for managing computer resources, ranging from individual resources (e.g., web servers) to a resource ensemble (e.g.,
multiple resources within a data centre), research into integrating Artificial Intelligence (AI)
and Machine Learning (ML) to improve resource autonomy and performance at scale continues
to be a fundamental challenge. The integration of AI/ML to achieve such autonomic and
self-management of systems can be achieved at different levels of granularity, from full to
human-in-the-loop automation. In this article, leading academics, researchers, practitioners,
engineers, and scientists in the fields of cloud computing, AI/ML, and quantum computing
join to discuss current research and potential future directions for these fields. Further, we
discuss challenges and opportunities for leveraging AI and ML in next generation computing for
emerging computing paradigms, including cloud, fog, edge, serverless and quantum computing
environments.
Keywords: Next generation computing | Artificial intelligence | Cloud computing | Fog computing | Edge computing | Serverless computing | Quantum computing | Machine learning |
مقاله انگلیسی |
38 |
An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022 With the expansion of the Internet of Things (IoT), several monitoring solutions are available
in the market. However, most solutions use proprietary software, which is costly and do not
provide online monitoring, hampering data access and hindering preventive actions. This article
presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT
concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic
data from surface and submerged sensors, which can be accessed online and has low-power
consumption. Long-distance transmission tests were performed analyzing battery consumption
and readings taken by the LimnoStation sensors. The results show that the average error of
sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100
times less compared to commercial sensors. The evaluation of the LimnoStation showed that it
is viable not only for academic use, but also as a replacement for presenting lower cost, high
reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring |
مقاله انگلیسی |
39 |
Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022 The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led
to a rise in the use of their civilian and commercial applications. The access of these drones to controlled
airspace can be efficiently coordinated through particular layered network architecture, often referred to
as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment,
brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography,
Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the
IoD. However, with the rapid development of quantum computing, it will be easy to break public-key
cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe
solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide
unconditional security solutions to protect data and communications in the IoD environment. This paper
proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone
and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum
channel to encode the private information based on a pre-shared key and a random key generated in a session.
The involved entities also perform mutual authentication and share a secret key. We also provide the security
proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography. |
مقاله انگلیسی |
40 |
Confidential computing in cloud/fog-based Internet of Things scenarios
محاسبات محرمانه در سناریوهای اینترنت اشیا مبتنی بر ابر/مه-2022 Internet of Things (IoT) devices are increasingly present in people’s daily lives, collecting
different types of data about the environment, user behavior, medical data, and others. Due to
limited processing power, such devices share the collected data with cloud/fog environments,
which raises concerns about users’ privacy. To ensure privacy and confidentiality guarantees, many cloud/fog-enhanced IoT applications use Trusted Execution Environments, such as
ARM TrustZone and Intel SGX, which are the basis for Confidential Computing. Confidential
Computing aims at protecting data during processing, besides transit and rest. This paper
presents a review regarding TEEs’ adoption to protect data in cloud/fog-based IoT applications,
focusing on the two aforementioned technologies. We highlight the challenges in adopting these
technologies and discuss the vulnerabilities present in both Intel SGX and ARM TrustZone.
keywords: Confidential computing | Trusted execution environments | Intel SGX | ARM trustZone |
مقاله انگلیسی |