Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 4, Pages 2538-2544Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3084636
Keywords
Channel security; convolutional neural network (CNN); Industrial Internet of Things (IIoT); resource allocation; signal-to-interference ratio (SIR); wireless sensor network (WSN)
Categories
Funding
- National Science Foundation of China [62071003, 41874174]
- Fund for Key Laboratory of Electromagnetic Scattering [61424090107]
- Natural Science Foundation of Anhui Province [2008085MF186]
- University Synergy Innovation Program of Anhui Province [GXXT-2020-50]
Ask authors/readers for more resources
This article discusses the issues of data security and resource allocation in the context of the Internet of Things, particularly in industrial applications. It incorporates the use of convolutional neural networks and channel security calculations to address the problem of fixed resources, improving the flexibility and security of the network.
Data security and resource allocation are two important terms associated with the Internet of Things (IoT). This recent technical evolution has made its mark in industrial applications making the network more flexible and computation friendly through connecting all the devices. As a subset of IoT, the framework of Industrial IoT (IIoT) is based on the huge number of nodes with the continuous process of multiple works at a time. Due to this, multiobjective network, interference in the path always becomes the reason for the loss of network resources as well as the security of data becomes vulnerable. In most of the previous works, dedicated channel states are considered for fixed resources which remains a major issue of IIoT network flexibility along with security. In this article, both the problems are incorporated by calculating the channel security and using convolutional neural network (CNN) optimal channel state extracted for different applications. This results as a fast system with proper utilization of resources and validated with mathematical analysis and simulations.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available