دانلود و نمایش مقالات مرتبط با Internet of Things (IOT)::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Internet of Things (IOT)

تعداد مقالات یافته شده: 391
ردیف عنوان نوع
1 IoT anomaly detection methods and applications: A survey
روش ها و کاربردهای تشخیص ناهنجاری اینترنت اشیا: یک مرور-2022
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field. This growth necessitates an examination of application trends and current gaps. The vast majority of those publications are in areas such as network and infrastructure security, sensor monitoring, smart home, and smart city applications and are extending into even more sectors. Recent advancements in the field have increased the necessity to study the many IoT anomaly detection applications. This paper begins with a summary of the detection methods and applications, accompanied by a discussion of the categorization of IoT anomaly detection algorithms. We then discuss the current publications to identify distinct application domains, examining papers chosen based on our search criteria. The survey considers 64 papers among recent publications published between January 2019 and July 2021. In recent publications, we observed a shortage of IoT anomaly detection methodologies, for example, when dealing with the integration of systems with various sensors, data and concept drifts, and data augmentation where there is a shortage of Ground Truth data. Finally, we discuss the present such challenges and offer new perspectives where further research is required.
keywords: Anomaly detection | Internet of Things | IoT | Review | Survey | Applications
مقاله انگلیسی
2 IoT-based Prediction Models in the Environmental Context: A Systematic Literature Review
مدل‌های پیش‌بینی مبتنی بر اینترنت اشیا در زمینه محیطی: مروری بر ادبیات سیستماتیک-2022
Undoubtedly, during the last years climate change has alerted the research community of the natural environment sector. Furthermore, the advent of Internet of Things (IoT) paradigm has enhanced the research activity in the environmental field offering low-cost sensors. Moreover, artificial intelligence and more specifically, statistical and machine learning methodologies have proved their predictive power in many disciplines and various real-world problems. As a result of the aforementioned, many scientists of the environmental research field have performed prediction models exploiting the strength of IoT data. Hence, insightful information could be extracted from the review of these research works and for this reason, a Systematic Literature Review (SLR) is introduced in the present manuscript in order to summarize the recent studies of the field under specific rules and constraints. From the SLR, 54 primary studies have been extracted during 2017-2021. The analysis showed that many IoT-based prediction models have been applied the previous years in 10 different environmental issues, presenting in the majority of the primary studies promising results.
keywords: Natural Environment | Internet of Things | Prediction Models | Systematic Literature Review
مقاله انگلیسی
3 IoTracker: A probabilistic event tracking approach for data-intensive IoT Smart Applications
IoTracker: یک رویکرد ردیابی رویداد احتمالی برای برنامه‌های هوشمند اینترنت اشیا با داده های فشرده-2022
Smart Applications for cities, industry, farming and healthcare use Internet of Things (IoT) approaches to improve the general quality. A dependency on smart applications implies that any misbehavior may impact our society with varying criticality levels, from simple inconveniences to life-threatening dangers. One critical challenge in this area is to overcome the side effects caused by data loss due to failures in software, hardware, and communication systems, which may also affect data logging systems. Event traceability and auditing may be impaired when an application makes automated decisions and the operating log is incomplete. In an environment where many events happen automatically, an audit system must understand, validate, and find the root causes of eventual failures. This paper presents a probabilistic approach to track sequences of events even in the face of logging data loss using Bayesian networks. The results of the performance analysis with three smart application scenarios show that this approach is valid to track events in the face of incomplete data. Also, scenarios modeled with Bayesian subnets highlight a decreasing complexity due to this divide and conquer strategy that reduces the number of elements involved. Consequently, the results improve and also reveal the potential for further advancement.
Keywords: Smart applications | Event tracker | Probabilistic tracker | Bayesian networks
مقاله انگلیسی
4 Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
اجرای کارآمد توابع هش سبک در GPU و کامپیوترهای کوانتومی برای کاربردهای اینترنت اشیا-2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cybersecurity attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions. Recently, US National Institute of Standards and Technology (NIST) announced a competition to standardize lightweight hash functions, which can be used in IoT applications. IoT communication involves various hardware platforms, from low-end microcontrollers to high-end cloud servers with GPU accelerators. Since many sensor nodes are connected to the gateway devices and cloud servers, performing high throughput integrity check is important to secure IoT applications. However, this is a time consuming task even for high-end servers, which may affect the response time in IoT systems. Moreover, no prior work had evaluated the performance of NIST candidates on contemporary processors like GPU and quantum computers. In this study, we showed that with carefully crafted implementation techniques, all the finalist hash function candidates in the NIST standardization competition can achieve high throughput (up-to 1,000 Gbps) on a RTX 3080 GPU. This research output can be used by IoT gateway devices and cloud servers to perform data integrity checks at high speed, thus ensuring a timely response. In addition, this is also the first study that showcase the implementation of NIST lightweight hash functions on a quantum computer (ProjectQ). Besides securing the communication in IoT, these efficient implementations on a GPU and quantum computer can be used to evaluate the strength of respective hash functions against brute-force attack.
INDEX TERMS: Graphics processing units (GPU) | hash function | lightweight cryptography | quantum computer.
مقاله انگلیسی
5 Post-Quantum Blockchain-Based Data Sharing for IoT Service Providers
به اشتراک گذاری داده های مبتنی بر بلاک چین پسا کوانتومی برای ارائه دهندگان خدمات اینترنت اشیا-2022
Quantum technologies have made significant advances and are likely to lead to important security challenges and threats to networks in the near future. On the other hand, sharing the huge amount of data from the Internet of Things (IoT) in the context of data as a service could provide new revenue streams for infrastructure providers and service providers. However, post-quantum computing exposes the entire data sharing ecosystem to a new set of security risks. In this article, we propose a novel blockchain-based system for data sharing in the post-quantum era. The proposed system facilitates data sharing among multiple organizations while meeting compliance and regulatory requirements via private blockchain. We implemented the proposed architecture and information flow using three blockchain networks (namely Hyperledger Fabric, Ethereum, and Quorum) and selected NTRU as our quantum resistant security algorithm (QRSA) to compare the parallelization performance of Toom-Cook’s and Karatsuba’s computation methods. Experimental results show that parallel computation has a positive impact when the security level of QRSAs is lowered, and the transaction time savings is almost 50 percent in favor of Quorum. Finally, we outline the main challenges and potential solutions.
مقاله انگلیسی
6 The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees. A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches) is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks (SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA) with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits: 1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture; 6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys; and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things.
مقاله انگلیسی
7 LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring
پیاده سازی سیستم اینترنت اشیاء مبتنی بر LoRaWAN برای نظارت بر کیفیت هوای خارج از منزل در محدوده بلند-2022
This study proposes a smart long-range (LoRa) sensing node to timely collect the air quality in- formation and update it on the cloud. The developed long-range wide area network (LoRaWAN)- based Internet of Things (IoT) air quality monitoring system (AQMS), hereafter called LoRaWAN- IoT-AQMS, was deployed in an outdoor environment to validate its reliability and effectiveness. The system is composed of multiple sensors (NO2, SO2, CO2, CO, PM2.5, temperature, and hu- midity), Arduino microcontroller, LoRa shield, LoRaWAN gateway, and The Thing Network (TTN) IoT platform. The LoRaWAN-IoT-AQMS is a standalone system powered continuously by a rechargeable battery with a photovoltaic solar panel via a solar charger shield for sustainable operation. Our system simultaneously gathers the considered air quality information by using the smart sensing unit. Then, the system transmits the information through the gateway to the TTN platform, which is integrated with the ThingSpeak IoT server. This action updates the collected data and displays these data on a developed Web-based dashboard and a Graphical User Interface (GUI) that uses the Virtuino mobile application. Thus, the displayed information can be easily accessed by users via their smartphones. The results obtained by the developed LoRaWAN-IoT- AQMS are validated by comparing them with experimental results based on the high- technology Aeroqual air quality monitoring devices. Our system can reliably monitor various air quality indicators and efficiently transmit the information in real time over the Internet.
keywords: پایش کیفیت هوا | Air quality monitoring | Iot lora lorawan | TTN ThingSpeak Virtuino
مقاله انگلیسی
8 Lossy Data Compression for IoT Sensors: A Review
فشرده سازی داده های از دست رفته برای حسگرهای اینترنت اشیا: مرور-2022
Internet of Things (IoT) can be considered a suitable platform for industrial applications, enabling large systems that connect a huge number of intelligent sensors and subsequent data collection for analytical applications. This factor is responsible for the substantial increase in the current volume of data generated by IoT devices. The large volume of data generated by IoT sensors can lead to unusual demands on cloud storage and data transmission bandwidths. A suitable approach to address these issues is through data compression approaches. This article presents a systematic review of the literature on lossy data compression algorithms that allows the systems to reduce the data detected by IoT devices. Lossy algorithms have a good compression ratio, preserving data quality and minimizing compression errors. A taxonomy was proposed from the review results, and the main works were classified, analyzed, and discussed.
keywords: فشرده سازی داده ها | اینترنت اشیا IOT | از بین رفتن در فشرده سازی | حسگرها | Data compression | IoT Internet of things | Lossy compression | Sensors
مقاله انگلیسی
9 Non-functional requirements elicitation for edge computing
استخراج الزامات غیر عملکردی برای محاسبات لبه-2022
The proliferation of the Internet of Things (IoT) devices and advances in their computing capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate localize computing and data storage. As a result, limitations like network connectivity issues, data mobility constraints, and real-time processing delays, in Cloud computing can be addressed more efficiently. EC can create a lot of opportunities across the breadth of the IT domains and cyber–physical systems. Several studies have been conducted describing EC general requirements, challenges, and issues. However, considering the complexity involved in the EC paradigm, non-functional requirements (NFRs) are equally important as functional requirements, to be thoroughly investigated. This paper discusses NFRs, namely, performance, reliability, scalability, and security that can assist in maturing the EC paradigm. To accomplish the objective, available case studies and the state-of-the-art related to non-functional requirements, real-world issues, and challenges concerning EC are reviewed. Ultimately, the paper anatomizes the aforementioned NFRs leveraging the six-part scenario form of sourcestimulus-artifact-environment-response-response measure to assert Quality of Service (QoS) in EC.
Keywords: Edge Computing | Non functional requirements (quality attributes) | Quality of service
مقاله انگلیسی
10 Over-the-air firmware update for IoT devices on the wild
به‌روزرسانی میان‌افزار فرا-هوا برای دستگاه‌های اینترنت اشیا در طبیعت-2022
Internet of Things (IoT) has been gaining a lot of attention in the last few years and despite the large amount of investments, there is still much to be developed and refined. Software and firmware updates over-the-air (OTA) are a crucial part for IoT solutions longevity. This paper presents the design and implementation of an OTA firmware update method based on the standard architecture recently proposed by the Internet Engineering Task Force (IETF). The proposed solution is evaluated through a testbed using 20 constrained IoT devices and an open source IoT cloud platform, as well as on a set of devices deployed in a real world application. Results show that the proposed solution is suitable for constrained devices and has little impact on the network traffic.
Keywords: Internet of Things | IoT | Update over the air | OTA | RFC 9019
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1877 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1877 :::::::: افراد آنلاین: 52