3,630 research outputs found

    A Novel Enhanced Quantum PSO for Optimal Network Configuration in Heterogeneous Industrial IoT

    Get PDF
    A novel enhanced quantum particle swarm optimization algorithm for IIoT deployments is proposed. It provides enhanced connectivity, reduced energy consumption, and optimized delay. We consider heterogeneous scenarios of network topologies for optimal path configuration by exploring and exploiting the hunts. It uses multiple inputs from heterogeneous IIoT into quantum and bio-inspired optimization techniques. The differential evolution operator and crossover operations are used for information interchange among the nodes to avoid trapping into local minima. The different topology scenarios are simulated to study the impact of pp -degrees of connectivity concerning objective functions’ evaluation and compared with existing techniques. The results demonstrate that our algorithm consumes a minimum of 30.3% lesser energy. Furthermore, it offers improved searching precision and convergence swiftness in the possible search space for pp -disjoint paths and reduces the delay by a minimum of 26.7%. Our algorithm also improves the throughput by a minimum of 29.87% since the quantum swarm inclines to generate additional diverse paths from multiple source nodes to the gateway

    Improved Coverage and Connectivity via Weighted Node Deployment in Solar Insecticidal Lamp Internet of Things

    Get PDF
    As an important physical control technology, Solar Insecticidal Lamp (SIL) can effectively prevent and control the occurrence of pests. The combination of SILs andWireless Sensor Networks (WSNs) initiates a novel agricultural Internet of Things (IoT), i.e., SIL-IoTs, to simultaneously kill pests and transmit pest information. In this paper, we study the weighted SIL Deployment Problem (wSILDP) in SIL-IoTs, where weighted locations on ridges are prespecified and some of them are selected to deploy SILs. Different from the existing studies whose optimization objective is to minimise the deployment cost, we consider the deployment cost and the total weight of selected locations jointly. We formulate the wSILDP as the Weighted Set Cover (WSC) problem and propose a Layered Deployment Method based on Greedy Algorithm (LDMGA) to solve the defined optimization problem. The LDMGA is composed of two phases. Firstly, SILs are deployed layer by layer from the boundary to the centre until the entire farmland is completely covered. Secondly, on the basis of three design operations, i.e., substitution, deletion and fusion, the suboptimal locations obtained in the first phase are fine-tuned to achieve the minimum deployment cost together with the maximum total weight for meeting the coverage and connectivity requirements. Simulation results clearly demonstrate that the proposed method outperforms three peer algorithms in terms of deployment cost and total weight

    Optimal Deployment of Solar Insecticidal Lamps over Constrained Locations in Mixed-Crop Farmlands

    Get PDF
    Solar Insecticidal Lamps (SILs) play a vital role in green prevention and control of pests. By embedding SILs in Wireless Sensor Networks (WSNs), we establish a novel agricultural Internet of Things (IoT), referred to as the SILIoTs. In practice, the deployment of SIL nodes is determined by the geographical characteristics of an actual farmland, the constraints on the locations of SIL nodes, and the radio-wave propagation in complex agricultural environment. In this paper, we mainly focus on the constrained SIL Deployment Problem (cSILDP) in a mixed-crop farmland, where the locations used to deploy SIL nodes are a limited set of candidates located on the ridges. We formulate the cSILDP in this scenario as a Connected Set Cover (CSC) problem, and propose a Hole Aware Node Deployment Method (HANDM) based on the greedy algorithm to solve the constrained optimization problem. The HANDM is a two-phase method. In the first phase, a novel deployment strategy is utilised to guarantee only a single coverage hole in each iteration, based on which a set of suboptimal locations is found for the deployment of SIL nodes. In the second phase, according to the operations of deletion and fusion, the optimal locations are obtained to meet the requirements on complete coverage and connectivity. Experimental results show that our proposed method achieves better performance than the peer algorithms, specifically in terms of deployment cost

    Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges

    Get PDF
    The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential privacy in IIoT. We firstly review related papers on IIoT and privacy protection, respectively. Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection. Several valuable problems are summarized and new research ideas are put forward. In conclusion, this survey is dedicated to complete comprehensive summary and lay foundation for the follow-up researches on industrial differential privacy

    A survey of network lifetime maximization techniques in wireless sensor networks

    No full text
    Emerging technologies, such as the Internet of things, smart applications, smart grids and machine-to-machine networks stimulate the deployment of autonomous, selfconfiguring, large-scale wireless sensor networks (WSNs). Efficient energy utilization is crucially important in order to maintain a fully operational network for the longest period of time possible. Therefore, network lifetime (NL) maximization techniques have attracted a lot of research attention owing to their importance in terms of extending the flawless operation of battery-constrained WSNs. In this paper, we review the recent developments in WSNs, including their applications, design constraints and lifetime estimation models. Commencing with the portrayal of rich variety definitions of NL design objective used for WSNs, the family of NL maximization techniques is introduced and some design guidelines with examples are provided to show the potential improvements of the different design criteri

    Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures

    Get PDF
    Industry 4.0 can be defined as the digitization of all components within the industry, by combining productive processes with leading information and communication technologies. Whereas this integration has several benefits, it has also facilitated the emergence of several attack vectors. These can be leveraged to perpetrate sophisticated attacks such as an Advanced Persistent Threat (APT), that ultimately disrupts and damages critical infrastructural operations with a severe impact. This doctoral thesis aims to study and design security mechanisms capable of detecting and tracing APTs to ensure the continuity of the production line. Although the basic tools to detect individual attack vectors of an APT have already been developed, it is important to integrate holistic defense solutions in existing critical infrastructures that are capable of addressing all potential threats. Additionally, it is necessary to prospectively analyze the requirements that these systems have to satisfy after the integration of novel services in the upcoming years. To fulfill these goals, we define a framework for the detection and traceability of APTs in Industry 4.0, which is aimed to fill the gap between classic security mechanisms and APTs. The premise is to retrieve data about the production chain at all levels to correlate events in a distributed way, enabling the traceability of an APT throughout its entire life cycle. Ultimately, these mechanisms make it possible to holistically detect and anticipate attacks in a timely and autonomous way, to deter the propagation and minimize their impact. As a means to validate this framework, we propose some correlation algorithms that implement it (such as the Opinion Dynamics solution) and carry out different experiments that compare the accuracy of response techniques that take advantage of these traceability features. Similarly, we conduct a study on the feasibility of these detection systems in various Industry 4.0 scenarios

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate
    • …
    corecore