scholarly journals An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology

Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1213 ◽  
Author(s):  
Qiao Tian ◽  
Yun Lin ◽  
Xinghao Guo ◽  
Jin Wang ◽  
Osama AlFarraj ◽  
...  

With the continuous development of science and engineering technology, our society has entered the era of the mobile Internet of Things (MIoT). MIoT refers to the combination of advanced manufacturing technologies with the Internet of Things (IoT) to create a flexible digital manufacturing ecosystem. The wireless communication technology in the Internet of Things is a bridge between mobile devices. Therefore, the introduction of machine learning (ML) algorithms into MIoT wireless communication has become a research direction of concern. However, the traditional key-based wireless communication method demonstrates security problems and cannot meet the security requirements of the MIoT. Based on the research on the communication of the physical layer and the support vector data description (SVDD) algorithm, this paper establishes a radio frequency fingerprint (RFF or RF fingerprint) authentication model for a communication device. The communication device in the MIoT is accurately and efficiently identified by extracting the radio frequency fingerprint of the communication signal. In the simulation experiment, this paper introduces the neighborhood component analysis (NCA) method and the SVDD method to establish a communication device authentication model. At a signal-to-noise ratio (SNR) of 15 dB, the authentic devices authentication success rate (ASR) and the rogue devices detection success rate (RSR) are both 90%.

2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2012 ◽  
Vol 516-517 ◽  
pp. 1414-1418 ◽  
Author(s):  
Hua Yin ◽  
Bin Fa Long ◽  
Nai Zhou Wang

This article discussed the basic principles of the power line carrier application technology and an example scheme, The unique advantage of the power line carrier networking technology is applied in the Internet of things. The advantage of the application of the power line carrier in the difficult environment of radio frequency application and layout is pointed out.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 987
Author(s):  
Luciano Tarricone ◽  
Jasmin Grosinger

Radio frequency identification (RFID) is one of the crucial enabling technologies for the Internet of Things (IoT). This is leading to a continuous augmentation of RFID technologies, in terms of sensing capabilities, energetic autonomy, usability, and cost affordability, and this special issue proposes an overview on such a challenging scenario. The proposed results, in terms of cost reduction, miniaturization, and compatibility with complex systems and technologies, as well as the identification of the relevant criticalities, also pave the way to future steps being taken that go beyond the current IoT.


2017 ◽  
Vol 13 (10) ◽  
pp. 132
Author(s):  
Bing Zhou

<p><span style="font-size: small;"><span style="font-family: Times New Roman;">In order to develop a valid wireless Internet of things system, a wireless Internet of things framework based on mobile Internet is designed. The architecture of the Internet of things determines the architecture of the Internet of things business platform. There is no uniform standard for the architecture of the Internet of things service platform. The Internet of things business platform is mostly in an isolated state. The platform uses the common information management platform of Internet websites to manage mobile internet. Combined with the technologies of perception, identification and network transmission in the Internet of things technology, it is a content management Web management information system with both B/S (Browser/Server) and C/S structure (Client/Server). The platform can operate anywhere, and can give full play to the processing capacity of the client PC, and greatly reduce the application server running data load. The experimental results show that compared with the centralized database system, in the same piece of redundant condition, when the test table data is greater than the 1 million and the concurrent number is 100, the distributed database system has shorter concurrent query time and faster system response rate. Based on the above finding, it is concluded that wireless Internet of things technology based on mobile Internet will promote the development of the whole logistics industry and other related industries.</span></span></p>


2013 ◽  
Vol 756-759 ◽  
pp. 4529-4532 ◽  
Author(s):  
Hao Zeng ◽  
Yan Hui Fu ◽  
Xu Chen

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.


Author(s):  
Matthew N. O. Sadiku ◽  
Mahamadou Tembely ◽  
Sarhan M. Musa

As more and more people drive cars and vehicles, there is a corresponding increase in the number of fatalities that occur due to accidents. As these vehicles are increasingly being connected to the Internet of things (IoT), they form the Internet of vehicles (IoV).  Thus, IoV is the convergence of the mobile Internet and IoT. It is an emerging field for the automotive industry and an important part of the smart cities. This paper provides a brief introduction to Internet of Vehicles (IoV).


2020 ◽  
Vol 39 (6) ◽  
pp. 8633-8642
Author(s):  
Zhu, Hongwei ◽  
Wang, Xuesong

With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19.


2020 ◽  
Vol 39 (6) ◽  
pp. 8623-8632
Author(s):  
Tang Lin

Although much less fatal than the Ebola and previous SARS virus epidemics, the current coronavirus outbreak (COVID-19) has spread to more people in more countries in a much shorter time frame. With the rapid development of the Internet of things, it has played an important role to track/monitor transmission movements throughout the population. The technology infrastructure between mobile devices, wearable devices and sensors, smart home device makes it possible to readily deploy solutions to monitor and collect data and perform analysis to ensure policy make intelligent, rapid decisions. This research combines AOL and Support Vector Machine to form the Internet of things cycle through smart home. The parameters of Support Vector Machine model are optimized by ALO algorithm, which shortens the learning time and improves the performance of classifier. Then, the algorithm of ALO is used to optimize the Support Vector Machine intrusion detection method and agent technology, and the intrusion detection model is established. Experimental results show that the combination of these two can effectively reduce the false alarm rate of network intrusion.


2016 ◽  
Vol 23 (5) ◽  
pp. 8-9 ◽  
Author(s):  
Alexey Vinel ◽  
Wen-Shyen Eric Chen ◽  
Neal N. Xiong ◽  
Seungmin Rho ◽  
Naveen Chilamkurti ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document