Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Mais filtros

Base de dados
Assunto principal
Tipo de documento
País de afiliação
Intervalo de ano de publicação
1.
Sensors (Basel) ; 23(13)2023 Jun 28.
Artigo em Inglês | MEDLINE | ID: mdl-37447837

RESUMO

There are multiple types of services in the Internet of Things, and existing access control methods do not consider situations wherein the same types of services have multiple access options. In order to ensure the QoS quality of user access and realize the reasonable utilization of Internet of Things network resources, it is necessary to consider the characteristics of different services to design applicable access control strategies. In this paper, a preference-aware user access control strategy in slices is proposed, which can increase the number of users in the system while balancing slice resource utilization. First, we establish the user QoS model and slice QoS index range according to the delay, rate and reliability requirements, and we select users with multiple access options. Secondly, a user preference matrix is established according to the user QoS requirements and the slice QoS index range. Finally, a preference matrix of the slice is built according to the optimization objective, and access control decisions are made for users through the resource utilization state of the slice and the preference matrix. The verification results show that the proposed strategy not only balances slice resource utilization but also increases the number of users who can access the system.


Assuntos
Internet das Coisas , Reprodutibilidade dos Testes , Conscientização , Internet
2.
Sensors (Basel) ; 21(1)2020 Dec 31.
Artigo em Inglês | MEDLINE | ID: mdl-33396380

RESUMO

With the widespread application of wireless sensor networks (WSNs), WSN virtualization technology has received extensive attention. A key challenge in WSN virtualization is the survivable virtual network embedding (SVNE) problem which efficiently maps a virtual network on a WSN accounting for possible substrate failures. Aiming at the lack of survivability research towards physical sensor node failure in the virtualized sensor network, the SVNE problem is mathematically modeled as a mixed integer programming problem considering resource constraints. A heuristic algorithm-node reliability-aware backup survivable embedding algorithm (NCS)-is further put forward to solve this problem. Firstly, a node reliability-aware embedding method is presented for initial embedding. The resource reliability of underlying physical sensor nodes is evaluated and the nodes with higher reliability are selected as mapping nodes. Secondly, a fault recovery mechanism based on resource reservation is proposed. The critical virtual sensor nodes are recognized and their embedded physical sensor nodes are further backed up. When the virtual sensor network (VSN) fails caused by the failure physical node, the operation of the VSN is restored by backup switching. Finally, the experimental results show that the strategy put forward in this paper can effectively guarantee the survivability of the VSN, reduce the failure penalty caused by the physical sensor nodes failure, and improve the long-term operating income of infrastructure provider.

3.
Sensors (Basel) ; 20(7)2020 Mar 30.
Artigo em Inglês | MEDLINE | ID: mdl-32235548

RESUMO

There are massive entities with strong denaturation of state in the physical world, and users have urgent needs for real-time and intelligent acquisition of entity information, thus recommendation technologies that can actively provide instant and precise entity state information come into being. Existing IoT data recommendation methods ignore the characteristics of IoT data and user search behavior; thus the recommendation performances are relatively limited. Considering the time-varying characteristics of the IoT entity state and the characteristics of user search behavior, an edge-cloud collaborative entity recommendation method is proposed via combining the advantages of edge computing and cloud computing. First, an entity recommendation system architecture based on the collaboration between edge and cloud is designed. Then, an entity identification method suitable for edge is presented, which takes into account the feature information of entities and carries out effective entity identification based on the deep clustering model, so as to improve the real-time and accuracy of entity state information search. Furthermore, an interest group division method applied in cloud is devised, which fully considers user's potential search needs and divides user interest groups based on clustering model for enhancing the quality of recommendation system. Simulation results demonstrate that the proposed recommendation method can effectively improve the real-time and accuracy performance of entity recommendation in comparison with traditional methods.

4.
Sensors (Basel) ; 18(8)2018 Jul 24.
Artigo em Inglês | MEDLINE | ID: mdl-30042302

RESUMO

Advances of information and communication technologies in medical areas have led to the emergence of wireless body area network (WBAN). The high accessibility of media in WBAN can easily lead to the malicious tapping or tampering attacks, which may steal privacy data or inject wrong data. However, existing privacy protection mechanisms in WBAN depend on the third-party key management system and have a complex key exchange process. To enhance user privacy at a low cost and with high flexibility, a channel characteristic aware privacy protection mechanism is proposed for WBAN. In the proposed mechanism, the similarity of RSS is measured to authenticate nodes. The key extraction technique can reduce the cost of the key distribution process. Due to the half duplex communication mode of sensors, the biased random sequences are extracted from the RSS of sensor nodes and coordinator. To reduce the inconsistency, we propose the n-dimension quantification and fuzzy extraction, which can quickly encrypt the transmission information and effectively identify malicious nodes. Simulation results show that the proposed mechanism can effectively protect user privacy against tampering and eavesdropping attacks.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA