Withthe rapid advancements in 5G and internet of things (IoT) technologies, smart applications have proliferated, imposing heightened demands on data processing speeds. the enhanced performance of GPUs has facilitate...
详细信息
the utilization of cell phones and desktop computers on a global scale has experienced a significant growth in recent years. this tendency has heightened global competition and demanded firms' regional development...
详细信息
Decentralized Attribute-based Encryption (DABE) is an extension of public key cryptography that allows the ciphertext to be decrypted by any node that has a predefined set of attributes. DABE can be used to control ac...
详细信息
ISBN:
(纸本)9798350336672
Decentralized Attribute-based Encryption (DABE) is an extension of public key cryptography that allows the ciphertext to be decrypted by any node that has a predefined set of attributes. DABE can be used to control access to internet of things (IoT) devices and data based on attributes such as the type of device, the location, and the role of the user. Due to its heavy computation requirements, the DABE either can not be implemented on the weak devices or will be implemented with significant delay. In this paper, we study two distributed solutions of lightweight encryption in DABE using secret sharing and outsourcing. the analysis of our results showed that both approaches provided a lightweight encryption property of DABE. the secret sharing outperformed the outsourcing in small number of attributes, and both provided close efficient results in case of high number of attributes.
MQTT is currently one of the most widely used protocols at the application layer for the internet of things (IoT). To manage an increasing number of IoT devices and optimize the transmission of information, the distri...
详细信息
ISBN:
(纸本)9798350336672
MQTT is currently one of the most widely used protocols at the application layer for the internet of things (IoT). To manage an increasing number of IoT devices and optimize the transmission of information, the distribution of the MQTT broker (MQTT cluster) and the integration of the SDN technology in the MQTT architecture are nowadays strongly promoted ideas. Unfortunately, existing proposals have several limitations: 1) they are incompatible with currently deployed solutions, 2) they induce significant delays for information exchange between MQTT brokers within the same cluster, and 3) they do not take into account the distribution of data to the end users (subscribers). that is why, in this paper, we propose a new SDN-based Real-Time distributed MQTT Broker: SoD-MQTT. the architecture and protocols described aim to minimize communication delays between brokers and to support very low latency applications (e-health, transportation). By leveraging the advantages of SDN, subscription, and publishing can also be efficiently managed. the conducted evaluations demonstrate the relevance of the solution in terms of latency and network utilization optimization compared to existing SDN-based MQTT brokers.
internet of things (IoT) is encroaching in every aspect of our lives. the exponential increase in connected devices has massively increased the attack surface in IoT. the unprotected IoT devices are not only the targe...
详细信息
We consider the case of a set of energy harvesting edge nodes, equipped with photovoltaic panels that implement some kind of monitoring service. To ensure that the service operates in an optimal way, nodes have someti...
详细信息
ISBN:
(纸本)9798350339826
We consider the case of a set of energy harvesting edge nodes, equipped with photovoltaic panels that implement some kind of monitoring service. To ensure that the service operates in an optimal way, nodes have sometimes offload some of their data to other nodes. We show that this kind of task offloading (migration) can improve service performance by avoiding temporary interruptions and prolonging the overall service lifetime. We present a centralized algorithm based on Linear Programming optimization problem solution and a distributed implementation.
Smart intelligent computing has emerged as a key technology in the field of computer science and engineering. It has revolutionized the way we interact with machines and has paved the way for the development of advanc...
详细信息
On the basis of expounding the related theory of fractional calculus, this article summarizes the engineering application of fractional calculus, analyzes the realization theory of relevant fractional calculus in stat...
详细信息
In recent years, withthe acceleration of the domestic financial industry towards the internet, electronic payment channels have become increasingly rich, and there are great differences in message format, communicati...
详细信息
Withthe rapid development of industrial internet services, the era of the internet of everything has arrived, which puts forward higher requirements for the network security of the industrial internet. In order to gu...
详细信息
ISBN:
(纸本)9798350319293
Withthe rapid development of industrial internet services, the era of the internet of everything has arrived, which puts forward higher requirements for the network security of the industrial internet. In order to guarantee the safe and trustworthy flow of industrial internet data, this paper proposes a chain network connector architecture that integrates blockchain technology and industrial internettechnology, which utilizes the characteristics of blockchain traceability, tampering, collective maintenance, and openness and transparency to guarantee that the identification data in the industrial internet is more secure and trustworthy. In addition, the architecture adopts quantum identity authentication technology in the identity authentication part to reduce the problem of illegal user access due to identity forgery. Meanwhile, for the problem of low efficiency of largecapacity and high-concurrency data processing generated by actual enterprises in the production process, this paper proposes to use analytical hierarchy process and Hungarian algorithm to co-optimize the chain network connector in order to make the resource allocation more reasonable and the transmission efficiency higher. the experimental results show that different algorithms are used for task allocation in different scenarios to maximize the data transmission efficiency, and also greatly improve the security of industrial internet identification data.
暂无评论