Results 11 to 20 of about 5,284,746 (348)

Energy-Efficient and Physical-Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things [PDF]

open access: yesIEEE Internet of Things Journal, 2022
This article investigates computation offloading in blockchain-empowered Internet of Things (IoT), where the task data uploading link from sensors to a base station (BS) is protected by intelligent reflecting surface (IRS)-assisted physical-layer ...
Yiliang Liu, Z. Su, Yuntao Wang
semanticscholar   +1 more source

A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things

open access: yesIEEE Transactions on Industrial Informatics, 2023
As part of Big Data trends, the ubiquitous use of the Internet of Things (IoT) in the industrial environment has generated a significant amount of network traffic.
Jing Long   +4 more
semanticscholar   +1 more source

Research on Key Technologies and Applications of Energy Internet Blockchain [PDF]

open access: yesE3S Web of Conferences, 2019
In view of the challenges facing the current development of energy Internet, the basic theory, architecture implementation and application mode of energy blockchain technology are proposed from the communication layer, data layer and contract layer.
Zhu Xingxiong
doaj   +1 more source

Two-Layer Federated Learning With Heterogeneous Model Aggregation for 6G Supported Internet of Vehicles

open access: yesIEEE Transactions on Vehicular Technology, 2021
The vision of the upcoming 6G technologies that have fast data rate, low latency, and ultra-dense network, draws great attentions to the Internet of Vehicles (IoV) and Vehicle-to-Everything (V2X) communication for intelligent transportation systems ...
Xiaokang Zhou   +4 more
semanticscholar   +1 more source

Research on blockchain mechanism of mine Internet of things

open access: yesGong-kuang zidonghua, 2022
The mine Internet of things has the characteristics of large-scale and massive data transmission. These characteristics make the traditional network security and privacy protection methods unable to guarantee the traceability and reliability of key data.
ZHANG Liya   +3 more
doaj   +1 more source

A Referenced Cyber Physical System for Compressor Manufacturing [PDF]

open access: yesMATEC Web of Conferences, 2020
Compressor is a typical high-end discrete product,with the shortening of product life cycle and the enhancement of the degree of product customization, the traditional compressor manufacturing system architecture cannot meet the requirements of ...
Cao Jin, Wang Junliang, Lu Junqing
doaj   +1 more source

Cross‐layer innovations in Internet of Things

open access: yesTransactions on Emerging Telecommunications Technologies, 2020
IoT concept took a part in everyday lives. Environments became smart, suggestive, recognizing, and adopting to its user needs. However, energy efficiency, interoperability, security, and other issues are restricting the number of use-cases and ways the technology can be used.
Solic P.   +4 more
openaire   +5 more sources

Survey on IETF 6TiSCH Industrial Internet of Things: Standards, Key Technologies and Platforms

open access: yesJisuanji kexue yu tansuo, 2020
The Internet engineering task force (IETF) is developing an IPv6-based low-power industrial Internet of things (IIoT) protocol stack called 6TiSCH, which is mainly used in complex industrial process control and automation.
YANG Wei, WANG Hao, WAN Yadong, CAO Yuanlong, LIU Qinghua
doaj   +1 more source

Home - About - Disclaimer - Privacy