Special Issue "Intelligent Perception, Application and Security Mechanism in the Internet of Things"

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 28 May 2020.

Special Issue Editors

Dr. Xiaochun Cheng
E-Mail Website
Guest Editor
Department of Computer Science, Middlesex University, London, UK
Interests: AI computing (decision support, reasoning, pattern recognition, machine learning, deep learning, optimization) and security (intrusion detection, malware detection, spam detection, fraud detection, security protocol verification, biometrics, crime intelligence analysis, cryptography, water marking, data origin provenance and tracing)
Special Issues and Collections in MDPI journals
Dr. Zheli Liu
E-Mail Website
Guest Editor
Nankai University, China
Interests: data privacy protection, ciphertext database, ciphertext set operation, and differential privacy
Dr. Bing Jia
E-Mail Website
Guest Editor
Inner Mongolia University, China
Interests: mobile computing, Internet of Things, and intelligent applications

Special Issue Information

Dear Colleagues,

In recent years, artificial intelligence (AI) has attracted extensive attention from both academics and industry. There are many relevant important research results. The Internet of Things systems (IoT) have extended the information system to the physical world, greatly expanding the ability of human beings to perceive, to understand and to control the physical world, and profoundly affecting the industry production and lifestyle of human beings. The methods by which to apply AI technologies to the IoT systems and to enhance the intelligence of system perception, understanding, computing, application and security are important to the implementation of intelligent IoT applications.

With the rapid development of IoT technologies, the current IoT environments have many distinctive characteristics, such as: the universality of perception, the ubiquity of connection and information transmission, and the massive volume of communicated data. Considering these characteristics, in order to apply IoT designs in the intelligent, efficient, safe and stable manner, safe and low-cost network management technologies and management methods with learning ability, understanding capability, reasoning ability, and collaborating ability are essential. Hence, the combination of AI technologies with the IoT systems provides prominent advantages. The integration of AI technologies and IoT systems enables the ability to gain valuable insight from the massive volume of data generated. The IoT era is coming. AI will help to stimulate the great potential of the IoT systems.

This special issue aims to attract contributions with new developments of intelligent perception, application and security mechanisms in the Internet of Things, to enhance the intelligence of the IoT systems. The ultimate goal is to promote research and development of AI technologies for IoT systems by publishing high-quality research articles in this rapidly developing field.

Scopes include (but are not limited to) the following:

  • Theoretical understanding of AI in the IoT
  • Hidden data awareness
  • Passive data transmission
  • Intelligent data processing
  • Multi-sources heterogeneous data fusion
  • Security and credibility verification
  • Dynamic intelligent perception in complex scenarios
  • Intelligent network
  • Intelligent application
  • Intelligent Indoor and Outdoor Seamless Positioning
  • Data privacy in IOT
  • Intrusion Detection in IoT systems
  • Crowd-sensing and Crowdsourcing

Dr. Xiaochun Cheng
Dr. Zheli Liu
Dr. Bing Jia
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT
  • Security
  • Intelligent application

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

Open AccessArticle
Attention Neural Network for Water Image Classification under IoT Environment
Appl. Sci. 2020, 10(3), 909; https://doi.org/10.3390/app10030909 - 30 Jan 2020
Abstract
With significant development of sensors and Internet of things (IoT), researchers nowadays can easily know what happens in water ecosystem by acquiring water images. Essentially, growing data category and size greatly contribute to solving water pollution problems. In this paper, we focus on [...] Read more.
With significant development of sensors and Internet of things (IoT), researchers nowadays can easily know what happens in water ecosystem by acquiring water images. Essentially, growing data category and size greatly contribute to solving water pollution problems. In this paper, we focus on classifying water images to sub-categories of clean and polluted water, thus promoting instant feedback of a water pollution monitoring system that utilizes IoT technology to capture water image. Due to low inter-class and high intra-class differences of captured water images, water image classification is challenging. Inspired by the ability to extract highly distinguish features of Convolutional Neural Network (CNN), we aim to construct an attention neural network for IoT captured water images classification that appropriately encodes channel-wise and multi-layer properties to accomplish feature representation enhancement. During construction, we firstly propose channel-wise attention gate structure and then utilize it to construct a hierarchical attention neural network in local and global sense. We carried out comparative experiments on an image dataset about water surface with several studies, which showed the effectiveness of the proposed attention neural network for water image classification. We applied the proposed neural network as a key part of a water image based pollution monitoring system, which helps users to monitor water pollution breaks in real-time and take instant actions to deal with pollution. Full article
Show Figures

Figure 1

Open AccessArticle
Table Recognition for Sensitive Data Perception in an IoT Vision Environment
Appl. Sci. 2019, 9(19), 4162; https://doi.org/10.3390/app9194162 - 04 Oct 2019
Cited by 1
Abstract
Internet of Things (IoT) technology allows us to measure, compute, and decide about the physical world around us in a quantitative and intelligent way. It makes all kinds of intelligent IoT devices popular. We are continually perceived and recorded by intelligent IoT devices, [...] Read more.
Internet of Things (IoT) technology allows us to measure, compute, and decide about the physical world around us in a quantitative and intelligent way. It makes all kinds of intelligent IoT devices popular. We are continually perceived and recorded by intelligent IoT devices, especially vision devices such as cameras and mobile phones. However, a series of security issues have arisen in recent years. Sensitive data leakage is the most typical and harmful one. Whether we are just browsing files unintentionally in sight of high-definition (HD) security cameras, or internal ghosts are using mobile phones to photograph secret files, it causes sensitive data to be captured by intelligent IoT vision devices, resulting in irreparable damage. Although the risk of sensitive data diffusion can be reduced by optical character recognition (OCR)-based packet filtering, it is difficult to use it with sensitive data presented in table form. This is because table images captured by the intelligent IoT vision device face issues of perspective transformation, and interferences of circular stamps and irregular handwritten signatures. Therefore, a table-recognition algorithm based on a directional connected chain is proposed in this paper to solve the problem of identifying sensitive table data captured by intelligent IoT vision devices. First, a Directional Connected Chain (DCC) search algorithm is proposed for line detection. Then, valid line mergence and invalid line removal is performed for the searched DCCs to detect the table frame, to filter the irregular interferences. Finally, an inverse perspective transformation algorithm is used to restore the table after perspective transformation. Experiments show that our proposed algorithm can achieve accuracy of at least 92%, and filter stamp interference completely. Full article
Show Figures

Figure 1

Open AccessArticle
Performance Evaluation of Region-Based Convolutional Neural Networks Toward Improved Vehicle Taillight Detection
Appl. Sci. 2019, 9(18), 3753; https://doi.org/10.3390/app9183753 - 08 Sep 2019
Cited by 1
Abstract
Increasingly serious traffic jams and traffic accidents pose threats to the social economy and human life. The lamp semantics of driving is a major way to transmit the driving behavior information between vehicles. The detection and recognition of the vehicle taillights can acquire [...] Read more.
Increasingly serious traffic jams and traffic accidents pose threats to the social economy and human life. The lamp semantics of driving is a major way to transmit the driving behavior information between vehicles. The detection and recognition of the vehicle taillights can acquire and understand the taillight semantics, which is of great significance for realizing multi-vehicle behavior interaction and assists driving. It is a challenge to detect taillights and identify the taillight semantics on real traffic road during the day. The main research content of this paper is mainly to establish a neural network to detect vehicles and to complete recognition of the taillights of the preceding vehicle based on image processing. First, the outlines of the preceding vehicles are detected and extracted by using convolutional neural networks. Then, the taillight area in the Hue-Saturation-Value (HSV) color space are extracted and the taillight pairs are detected by correlations of histograms, color and positions. Then the taillight states are identified based on the histogram feature parameters of the taillight image. The detected taillight state of the preceding vehicle is prompted to the driver to reduce traffic accidents caused by the untimely judgement of the driving intention of the preceding vehicle. The experimental results show that this method can accurately identify taillight status during the daytime and can effectively reduce the occurrence of confused judgement caused by light interference. Full article
Show Figures

Figure 1

Open AccessArticle
A Lightweight Hash-Based Blockchain Architecture for Industrial IoT
Appl. Sci. 2019, 9(18), 3740; https://doi.org/10.3390/app9183740 - 07 Sep 2019
Cited by 2
Abstract
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial field. Moreover, many researchers [...] Read more.
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial field. Moreover, many researchers have proposed the Industrial IoT (IIoT) architecture with blockchain for data integrity and efficient management. The IIoT network consists of many heterogeneous devices (e.g., sensors, actuators, and programmable logic controllers (PLC)) with resources-constrained, and the availability of the network must be preferentially considered. Therefore, applying the existed blockchain technology is still challenging. There are some results about the technique of constructing blockchain lightly to solve this challenge. However, in these results, the analysis in perspective of cryptographic performance (area, throughput, and power consumption) has not been considered sufficiently, or only focused on the architecture of the blockchain network. The blockchain technology is based on cryptographic techniques, and the main part is a cryptographic hash function. Therefore, if we construct the blockchain-based IIoT architecture, we have to consider the performance of the hash function. Many lightweight hash functions have been proposed recently for the resource-constrained environment, and it can also be used to the blockchain. Therefore, in this paper, we analyze the considerations of lightweight blockchain for IIoT. Also, we conduct an analysis of lightweight hash for blockchain, and propose a new lightweight hash-based blockchain architecture that can change the hash algorithm used for mining adjust to network traffic. Full article
Show Figures

Figure 1

Open AccessArticle
PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing
Appl. Sci. 2019, 9(18), 3695; https://doi.org/10.3390/app9183695 - 05 Sep 2019
Abstract
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a data stream with repeated elements, is extremely important for avoiding waste of resources. [...] Read more.
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a data stream with repeated elements, is extremely important for avoiding waste of resources. Besides, the privacy protection of users is also a critical issue for aggregation security. However, it is a challenge to meet these two requirements simultaneously since normal privacy-preserving methods would have negative influence on the accuracy and efficiency of distinct counting. In this paper, we propose a Privacy-Preserving Distinct Counting scheme (PPDC) for mobile sensing. Through integrating the basic idea of homomorphic encryption into Flajolet-Martin (FM) sketch, PPDC allows an aggregator to conduct distinct counting over large-scale datasets without disrupting privacy of users. Moreover, PPDC supports various forms of sensing data, including camera images, location data, etc. PPDC expands each bit of the hashing values of users’ original data, FM sketch is thus enhanced for encryption to protect users’ privacy. We prove the security of PPDC under known-plaintext model. The theoretic and experimental results show that PPDC achieves high counting accuracy and practical efficiency with scalability over large-scale data sets. Full article
Show Figures

Figure 1

Open AccessArticle
Semantic-Based Representation Binary Clone Detection for Cross-Architectures in the Internet of Things
Appl. Sci. 2019, 9(16), 3283; https://doi.org/10.3390/app9163283 - 10 Aug 2019
Cited by 1
Abstract
Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities. Solving these problems requires extensive manual reverse analysis. Fortunately, binary clone detection can help analysts mitigate [...] Read more.
Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities. Solving these problems requires extensive manual reverse analysis. Fortunately, binary clone detection can help analysts mitigate manual work by matching reusable code and known parts. However, many binary clone detection methods are not robust to various compiler optimization options and different architectures. While some clone detection methods can be applied across different architectures, they rely on manual features based on human prior knowledge to generate feature vectors for assembly functions and fail to consider the internal associations between features from a semantic perspective. To address this problem, we propose and implement a prototype GeneDiff, a semantic-based representation binary clone detection approach for cross-architectures. GeneDiff utilizes a representation model based on natural language processing (NLP) to generate high-dimensional numeric vectors for each function based on the Valgrind intermediate representation (VEX) representation. This is the first work that translates assembly instructions into an intermediate representation and uses a semantic representation model to implement clone detection for cross-architectures. GeneDiff is robust to various compiler optimization options and different architectures. Compared to approaches using symbolic execution, GeneDiff is significantly more efficient and accurate. The area under the curve (AUC) of the receiver operating characteristic (ROC) of GeneDiff reaches 92.35%, which is considerably higher than the approaches that use symbolic execution. Extensive experiments indicate that GeneDiff can detect similarity with high accuracy even when the code has been compiled with different optimization options and targeted to different architectures. We also use real-world IoT firmware across different architectures as targets, therein proving the practicality of GeneDiff in being able to detect known vulnerabilities. Full article
Show Figures

Figure 1

Open AccessArticle
Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
Appl. Sci. 2019, 9(10), 2058; https://doi.org/10.3390/app9102058 - 18 May 2019
Abstract
Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features [...] Read more.
Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality. Full article
Show Figures

Figure 1

Review

Jump to: Research

Open AccessReview
VPNFilter Malware Analysis on Cyber Threat in Smart Home Network
Appl. Sci. 2019, 9(13), 2763; https://doi.org/10.3390/app9132763 - 09 Jul 2019
Cited by 1
Abstract
Recently, the development of smart home technologies has played a crucial role in enhancing several real-life smart applications. They help improve the quality of life through systems designed to enhance convenience, comfort, entertainment, health of the householders, and security. Note, however, that malware [...] Read more.
Recently, the development of smart home technologies has played a crucial role in enhancing several real-life smart applications. They help improve the quality of life through systems designed to enhance convenience, comfort, entertainment, health of the householders, and security. Note, however, that malware attacks on smart home devices are increasing in frequency and volume. As people seek to improve and optimize comfort in their home and minimize their daily home responsibilities at the same time, this makes them attractive targets for a malware attack. Thus, attacks on smart home-based devices have emerged. The goals of this paper are to analyze the different aspects of cyber-physical threats on the smart home from a security perspective, discuss the types of attacks including advanced cyber-attacks and cyber-physical system attacks, and evaluate the impact on a smart home system in daily life. We have come up with a taxonomy focusing on cyber threat attacks that can also have potential impact on a smart home system and identify some key issues about VPNFilter malware that constitutes large-scale Internet of Things (IoT)-based botnet malware infection. We also discuss the defense mechanism against this threat and mention the most infected routers. The specific objective of this paper is to provide efficient task management and knowledge related to VPNFilter malware attack. Full article
Show Figures

Figure 1

Back to TopTop