The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems

Author(s):  
Dmitry S. Zaichenko ◽  
Irina S. Sineva

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.

Author(s):  
Dmitry S. Zaichenko ◽  
Irina S. Sineva

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.


Biotechnology ◽  
2019 ◽  
pp. 1967-1984
Author(s):  
Dharmendra Trikamlal Patel

Voluminous data are being generated by various means. The Internet of Things (IoT) has emerged recently to group all manmade artificial things around us. Due to intelligent devices, the annual growth of data generation has increased rapidly, and it is expected that by 2020, it will reach more than 40 trillion GB. Data generated through devices are in unstructured form. Traditional techniques of descriptive and predictive analysis are not enough for that. Big Data Analytics have emerged to perform descriptive and predictive analysis on such voluminous data. This chapter first deals with the introduction to Big Data Analytics. Big Data Analytics is very essential in Bioinformatics field as the size of human genome sometimes reaches 200 GB. The chapter next deals with different types of big data in Bioinformatics. The chapter describes several problems and challenges based on big data in Bioinformatics. Finally, the chapter deals with techniques of Big Data Analytics in the Bioinformatics field.


2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Sun-Young Ihm ◽  
Aziz Nasridinov ◽  
Young-Ho Park

A rapid development in wireless communication and radio frequency technology has enabled the Internet of Things (IoT) to enter every aspect of our life. However, as more and more sensors get connected to the Internet, they generate huge amounts of data. Thus, widespread deployment of IoT requires development of solutions for analyzing the potentially huge amounts of data they generate. A top-kquery processing can be applied to facilitate this task. The top-kqueries retrievektuples with the lowest or the highest scores among all of the tuples in the database. There are many methods to answer top-kqueries, where skyline methods are efficient when considering all attribute values of tuples. The representative skyline methods are soft-filter-skyline (SFS) algorithm, angle-based space partitioning (ABSP), and plane-project-parallel-skyline (PPPS). Among them, PPPS improves ABSP by partitioning data space into a number of spaces using hyperplane projection. However, PPPS has a high index building time in high-dimensional databases. In this paper, we propose a new skyline method (called Grid-PPPS) for efficiently handling top-kqueries in IoT applications. The proposed method first performs grid-based partitioning on data space and then partitions it once again using hyperplane projection. Experimental results show that our method improves the index building time compared to the existing state-of-the-art methods.


2021 ◽  
Vol 12 (36) ◽  
pp. 11936-11954
Author(s):  
Kai-Li Wang ◽  
Yu-Hang Zhou ◽  
Yan-Hui Lou ◽  
Zhao-Kui Wang

With the rapid development of the Internet of Things (IoTs), photovoltaics (PVs) has a vast market supply gap of billion dollars.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jie Du

As the economy grows rapidly and IoT technology advances rapidly, the logistics industry as a service industry is growing rapidly around the world. The logistics industry, meanwhile, is the one that can best play the role of IoT. The rapid development of the logistics industry has brought great competition challenges to the logistics industry. To solve the competitive problems of the logistics industry cluster, this article introduces the research on the upgrade path and strategy of the logistics industry cluster based on the Internet of Things and uses the analytic hierarchy process, investigation method, and expert evaluation method to build the IoT technology information model and logistics cost. According to the established optimization model, the following are proposed: analyzing the problems existing in the logistics industry cluster, giving an upgrade path from the four aspects of manufacturing, technology, structure, and service, and giving specific strategic suggestions from the aspects of talents and enterprises. The accuracy rate of current analysis is as high as 90%, and the implementation rate of upgrade paths and strategy recommendations is as high as 95%.


2021 ◽  
Vol 6 (3) ◽  
pp. 33-39
Author(s):  
Oleg O. Viushchenko ◽  
◽  
Maria A. Maslova ◽  

The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3155
Author(s):  
Erfeng Li ◽  
Xue Jun Li ◽  
Boon-Chong Seet

With the rapid development of wireless communication technology and the Internet of Things (IoT), wireless body area networks (WBAN) have been thriving. This paper presents a triband patch antenna with multiple slots for conformal and wearable applications. The proposed antenna operates at 5.8, 6.2, and 8.4 GHz. The antenna was designed with a flexible polyethylene terephthalate (PET) substrate, and the corresponding conformal tests and on-body performance were conducted via simulation. The antenna demonstrated promising gain and acceptable fluctuations when applied on curvature surfaces. The specific absorption rate (SAR) for on-body simulation also suggests that this antenna is suitable for wearable applications.


2018 ◽  
Vol 7 (3.13) ◽  
pp. 99 ◽  
Author(s):  
Janusz Wielki

The rapid development of the Internet of Things and its growing influence on functioning of business organizations and utilized by them business models was the main motivation of undertaking the research presented in the paper. In this context the most important areas of opportunities created with the development of this concept were determined. The main internal and external challenges of a technical and non-technical nature were also identified. The major finding of the paper is suggested in its final part a strategic framework connected with the implementation of the concept of the Internet of Thing in business organizations.  


Sign in / Sign up

Export Citation Format

Share Document