Software-defined networking is a mature technology that has been included into several networks and new designs including 5 G and 6 G. It is a paradigm change that adopts dynamic software-driven models instead of old ...
详细信息
The reconfigurable intelligent surface (RIS) stands as an emergent technique poised to revolutionize future vehicular communication. In order to facilitate the application of RIS in vehicular communication, ...
详细信息
Autonomous Smart Home (ASH) systems incorporate various sensors and internet of Things (IoT) modules to automate and enhance residential functionality. ASH represents an IoT communication paradigm for decision-making,...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
Autonomous Smart Home (ASH) systems incorporate various sensors and internet of Things (IoT) modules to automate and enhance residential functionality. ASH represents an IoT communication paradigm for decision-making, data analysis, task automation during triggered events, and remote accessibility. However, the connectivity of modules via wired and wireless channels can introduce cybersecurity challenges, including data privacy concerns, device tampering, network weaknesses, lack of standardization, and risks associated with firmware and software vulnerabilities. Cyber breaches in ASH can have catastrophic effects, such as unauthorized control of critical home, medical systems, emergency response interference, automated lock system failures, and critical home-appliance sabotage. To address this concern, we propose Smart-Sec, which leverages a deep learning-based Convolutional Neural network (CNN) architecture. The performance of Smart-Sec was evaluated using various optimization algorithms, accuracy comparison, loss depiction, confusion matrix, precision, recall, and F1-score. Among all algorithms, our one-dimensional CNN architecture performed well with the RMSProp optimizer.
Yet the internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak...
详细信息
With the advancement of Software-Defined networking (SDN) technology, network programmability and flexibility have been significantly enhanced. However, effectively integrating traditional networksystems with emergin...
详细信息
The evolution in the generations of smart applications has led to great challenges in terms of providing low latency and high computing efficiency. One of the most important of these applications is for smart homes, t...
详细信息
ISBN:
(纸本)9798350361261;9798350361278
The evolution in the generations of smart applications has led to great challenges in terms of providing low latency and high computing efficiency. One of the most important of these applications is for smart homes, through which various connected devices can be controlled by smart and efficient systems to achieve high service quality. In this paper, we propose a smart home controller based on fog computing, where home services are migrated from the cloud to the fog servers at the edge of the network. We propose an exact algorithm called Optimal Migration Algorithm (OMA) that allocates unified fog computing servers to different services. Moreover, to deal with large-scale networks, we propose an efficient algorithm called Efficient Migration Algorithm (EMA). The performance evaluation shows that the proposed optimization solutions are efficient in terms of migration cost, time, and end-to-end latency.
The internet of Things (IoT) is viewed as the umbrella under which heterogeneous devices are connected to form what is called the network of the future (NoF). In the IoT era, all objects and devices are instrumented, ...
详细信息
Electrical lighting systems contribute to approximately 20% of global electricity consumption and 6% of carbon dioxide (CO2) emissions, underlining the urgent need for more efficient and adaptable lighting solutions. ...
详细信息
Mobility-on-Demand (MoD) services have been an active research topic in recent years. Many studies focused on developing control algorithms to supply efficient services. To cope with a large search space to solve the ...
详细信息
ISBN:
(纸本)9798350399462
Mobility-on-Demand (MoD) services have been an active research topic in recent years. Many studies focused on developing control algorithms to supply efficient services. To cope with a large search space to solve the underlying vehicle routing problem, studies usually apply hard time-constraints on pick-up and drop-off while considering static network travel times to reduce computational time. As travel times in real street networks are dynamic and stochastic, assigned routes considered feasible by the control algorithm in one time step might become infeasible in the next. Nevertheless, once the service is confirmed, it is imperative that those customers remain part of the assignment. Hence, damage control measures have to counteract this effect. This research integrates an elaborate simulation framework for MoD services with a microscopic traffic simulation to consider dynamic and stochastic network travel times. Results from a case study for Munich, Germany show, that the combination of inaccurate travel time estimation and damage control strategies for infeasible routes deteriorates the performance of MoD services - hailing and pooling - significantly. Moreover, customers suffer from unreliable pickup time and travel time estimations. Allowing re-assignments of initial vehicle schedules according to updated system states helps to restore system efficiency and reliability, but only to a minor extent.
This paper investigates the challenges posed by delays in Closed-Loop Sense-Act systems in the context of Adversarial internet of Things (IoT) applications. Prior work focused on studying the impact of delays on a sin...
详细信息
ISBN:
(纸本)9798350321814
This paper investigates the challenges posed by delays in Closed-Loop Sense-Act systems in the context of Adversarial internet of Things (IoT) applications. Prior work focused on studying the impact of delays on a single resource-constrained platform. To capitalize on the capabilities of different computing platforms, this work investigates the adaptation of control placement to optimize application performance in distributed settings. An Adaptive control Placement (ACP) strategy is introduced, which dynamically switches between a local controller with lower accuracy and a cloud controller with higher accuracy based on network dynamics, optimizing overall application performance. The effectiveness of the ACP strategy is evaluated using a simulated Vehicle Following application in the PyBullet simulator. The results demonstrate that in terms of a time-to-complete (TTC) metric, the ACP strategy consistently outperforms strategies that use a fixed combination of controller type and location (e.g., PID at Local and MPC at Cloud) across various deadline scenarios.
暂无评论