ABSTRACT
Blockchain-enabled cyber-physical systems (CPSs) are developed to provide the mass of Intelligent Object Terminal Equipment (IOTE). However, they cannot deal with the real-time control problem of perception. Hence, this paper studies the multi-type access methods and multi-path selective access algorithm of intelligent end devices in the local area network. The algorithm is proposed based on the multi-terminal collaboration technology. This network model provides a basis for realizing real-time awareness and optimal resource scheduling of IOTE. The model effectively alleviates the problem of state loss of IOTEs in the current local area. The experimental results show that the network model can effectively control the location and state of the IOTE in real time.
- FELDMANN A. 2007. Internet clean-slate design: what and why. ACM SIGCOMM Computer Communication Review 37, 3 (2007), 59--64.Google ScholarDigital Library
- Yang J I, Ping Z, Zheng H, and et al. 2006. Towards Mobile Ubiquitous Service Environment. Wireless Personal Communications 38, 1 (2006), 67--78.Google ScholarDigital Library
- Kaye J and Dourish P. 2014. Special issue on science fiction and ubiquitous computing. Personal and Ubiquitous Computing 18, 4 (2014), 765--766.Google ScholarDigital Library
- Yu J, Wang M, Liu J, and et al. 2021. Service management mechanisms in the internet of things: an organized and thorough study. Journal of Ambient Intelligence and Humanized Computing 6 (2021).Google Scholar
- Ding K, Chan F T S, Zhang X, and et al. 2019. Defining a Digital Twin-based Cyber-Physical Production System for autonomous manufacturing in smart shop floors. International Journal of Production Research (2019), 1--23.Google Scholar
- G Kortuem. 2010. Smart Objects as Building Blocks for the Internet of Things. IEEE internet computing (2010).Google ScholarDigital Library
- Chen H M and Cui L. 2016. Design and Model Checking of Service Oriented Software Architecture for Internet of Things:A Survey. Chinese Journal of Computers (2016).Google Scholar
- Li C M, Wang R, and Huang L. 2014. The Key Technology and Application of the Internet of Things. Applied Mechanics Materials (2014), 644--650.Google Scholar
- Zong Ping, Zhu Hongbo, Huang Gang, and Xu Jianzhen. 2010. Research and design of smart campus based on Internet of Things. Journal of Nanjing University of Posts and Telecommunications (NATURAL SCIENCE EDITION) 30, 04 (2010), 15--19 + 51.Google Scholar
- Sahrish Khan Tayyaba, Munam Ali Shah, Naila Sher Afzal Khan, Yousra Asim, Wajeeha Naeem, and Muhammad Kamran. 2016. Software-Defined Networks (SDNs) and Internet of Things (IoTs): A Qualitative Prediction for 2020. International Journal of Advanced Computer Science and Applications (IJACSA) 7, 11 (2016).Google Scholar
- Wei W, De S, Cassar G, and et al. 2015. An experimental study on geospatial indexing for sensor service discovery. Expert Systems with Applications An International Journal 42, 7 (2015), 3528--3538.Google ScholarDigital Library
- ZOU Xiang-yang, ZOU He-hui, and LIU Rong. 2015. Research of Ammunition Depot Real-time Monitoring System Based on IoT and 3D Visualization Technology. Fire Control Command Control 40, 1 (2015), 30--33.Google Scholar
- Hu Y, Li D, Sun P, and et al. 2020. Polymorphic smart network: An open, flexible and universal architecture for future heterogeneous networks. IEEE Transactions on Network Science and Engineering 99 (2020), 1.Google Scholar
Index Terms
- Multi-path selection access algorithm and design of intelligent perception network model for blockchain-enabled CPSs
Recommendations
ABSA: A Blockchain-based SDN Device Access Control Scheme
ICICSE 2021: 2021 10th International Conference on Internet Computing for Science and EngineeringAiming at the problem of the lack of effective access control for the source of access devices in the software-defined network (SDN), based on this, based on the ABAC model, a blockchain-based access control scheme for terminal access in the SDN network ...
A blockchain-based Access Control Mechanism for IOT
EITCE '22: Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer EngineeringBecause of lightweight, large-scale and dynamic access characteristics in IoT devices, the current centralized access control mechanism leads to many security problems such as failure of single point, privacy leakage and user authentication. With the ...
Blockchain based permission delegation and access control in Internet of Things (BACI)
AbstractAccess control with permission delegation mechanism allows fine granular access to secure resources. In the literature, existing architectures for permission delegation and access control are either event-based or query-based. These ...
Comments