Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things

Author(s):  
Yan-ling JIN ◽  
Yong-sheng DING ◽  
Kuang-rong HAO ◽  
Yan-jun LIU
Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Jianpeng Zhang

Short information sharing time is one of the problems to be solved in the traditional Internet. Therefore, this paper proposes a hierarchical simulation of the Internet of Things sharing structure framework that trusts the cloud to drive Internet information resource sharing. By setting thresholds and iterative adjustment parameters, a complementary judgment matrix is constructed to obtain the minimum nonnegative deviation value and the optimal weight vector. This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. We use radio frequency identification (RFID) equipment in the preprocessing of massive heterogeneous data in the Internet of Things. In a network environment where resources are limited and heterogeneous are fully considered, the trust-based adaptive detection algorithm is used to evaluate the credibility of the trust-driven algorithm for hierarchical information resource sharing services in the cloud environment of the Internet of Things. We propose a cloud trust-driven hierarchical information resource sharing Internet information resource model. Firstly, the key characteristics of hierarchical information resource sharing are analyzed. Then, a hierarchical information resource sharing model was established by using specific constraints, trust steepness function, cloud trust evaluation criteria, and trust constraint coefficient. Finally, an example of IoT system is designed to verify the effectiveness of the model. Experimental results show that, compared with the traditional model or algorithm, this model has a good hierarchical sharing effect of the underlying resource information.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiaona Xie ◽  
Wenliang Zhang

At present, it is urgent to solve the problem of scenic area tourism environmental capacity. This paper analyzes the causes of congestion and overload in scenic spots and then points out that the methods to solve the problem are capacity restriction and flow control. This paper first calculates the spatial capacity of various tourism resources in a scenic spot by using mathematical model and then studies the intelligent spatial management model of tourist flow in the scenic spot based on the Internet of Things technology. Based on the Internet of Things technology, the spatial capacity control platform of tourist resources in scenic spots built in this paper can realize the structure analysis of peak forest of tourist flow in scenic spots and the fractal and fractal dimension analysis of tourist flow and determine the spatial and temporal threshold of tourist flow control in tourist destinations. Through capacity restriction and flow regulation, tourists can be scientifically channelled and distributed, which can greatly reduce congestion and overload, enhance tourist experience, and improve tourist satisfaction, so as to promote the sustainable development of the scenic spot.


Author(s):  
Jianxing Zhu ◽  
Lina Huo ◽  
Mohd Dilshad Ansari ◽  
Mohammad Asif Ikbal

Background: The development of the Internet of Things has prominently expanded the perception of human beings, but ensuing security issues have attracted people's attention. From the perspective of the relatively weak sensor network in the Internet of Things. Method: Proposed method Aiming at the characteristics of diversification and heterogeneity of collected data in sensor networks, the data set is clustered and analyzed from the aspects of network delay and data flow to extract data characteristics. Then, according to the characteristics of different types of network attacks, a hybrid detection method for network attacks is established. An efficient data intrusion detection algorithm based on K-means clustering is proposed Results: This paper proposes a network node control method based on traffic constraints to improve the security level of the network. Simulation experiments show that compared with traditional password-based intrusion detection methods; the proposed method has a higher detection level and is suitable for data security protection in the Internet of Things. Conclusions: This paper proposes an efficient intrusion detection method for applications with Internet of Things


2021 ◽  
Vol 22 (2) ◽  
Author(s):  
Jianxing Zhu ◽  
Lina Huo ◽  
Mohd Dilshad Ansari ◽  
Mohammad Asif Ikbal

The development of the Internet of Things has prominently expanded the perception of human beings, but ensuing security issues have attracted people's attention. From the perspective of the relatively weak sensor network in the Internet of Things. Proposed method is aiming at the characteristics of diversification and heterogeneity of collected data in sensor networks; the data set is clustered and analyzed from the aspects of network delay and data flow to extract data characteristics. Then, according to the characteristics of different types of network attacks, a hybrid detection method for network attacks is established. An efficient data intrusion detection algorithm based on K-means clustering is proposed. This paper proposes a network node control method based on traffic constraints to improve the security level of the network. Simulation experiments show that compared with traditional password-based intrusion detection methods; the proposed method has a higher detection level and is suitable for data security protection in the Internet of Things. This paper proposes an efficient intrusion detection method for applications with Internet of Things.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


2019 ◽  
Vol 14 (5) ◽  
pp. 375
Author(s):  
Vladimir P. Zhalnin ◽  
Anna S. Zakharova ◽  
Demid A. Uzenkov ◽  
Andrey I. Vlasov ◽  
Alexey I. Krivoshein ◽  
...  

2017 ◽  
Vol 10 ◽  
pp. 120-124
Author(s):  
R.S. Khisamov ◽  
◽  
R.A. Gabdrahmanov ◽  
A.P. Bespalov ◽  
V.V. Zubarev ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document