Journal on Communications ›› 2015, Vol. 36 ›› Issue (12): 57-76.doi: 10.11959/j.issn.1000-436x.2015315
• Search • Previous Articles Next Articles
Yun-quan GAO1,2,Xiao-yong LI1,Bin-xing FANG1
Online:
2015-12-25
Published:
2017-07-17
Supported by:
Yun-quan GAO,Xiao-yong LI,Bin-xing FANG. Survey on the search of Internet of Things[J]. Journal on Communications, 2015, 36(12): 57-76.
"
系统维度 | Snoogle/Microsearch | MAX | OCH | GSN | SenseWeb | DIS | RTS | Dyser |
体系结构 | 两层分布式 | 三层集中式 | 两层分布式 | 基于容器的集中式 | 两层集中式 | 两层分布式 | 文件系统 | 两层集中式 |
聚合类型 | 混合 | 信标 | 定时器 | 信标 | 混合 | 混合 | 无 | 混合 |
索引类型 | 倒排索引 | 无 | 无 | MySQL-style | 倒排索引 | 倒排索引 | 倒排索引 | 倒排索引 |
查询类型 | 即席查询 | 即席查询 | 连续查询 | 即席查询 | 即席查询 | 连续查询和即席查询 | 即席查询 | 即席查询 |
查询方式 | 关键字 | 关键字 | 关键字 | 关键字 | 关键字和地理位置 | 图像 | 关键字 | 关键字 |
查询范围 | 本地 | 本地 | 本地 | 全局 | 全局 | 本地 | 全局 | 全局 |
查询时效 | 实时 | 实时 | 实时 | 实时 | 实时 | 实时和历史 | 实时(近似) | 实时 |
查询精度 | 启发式 | 启发式 | 启发式 | 精确 | 精确 | 启发式 | 精确 | 精确 |
查询内容 | 静态 | 静态 | 动态 | 静态 | 静态 | 动态 | 动态 | 动态 |
查询结果 | 全部 | 全部 | 全部 | 全部 | 全部 | Top-k | 全部 | Top-k |
移动性 | 是 | 否 | 是 | 是 | 是 | 是 | 是 | 是 |
目标用户 | 终端用户 | 终端用户 | 终端用户 | 专家 | 专家 | 终端用户 | 终端用户 | 终端用户 |
安全支持 | 是 | 否 | 否 | 否 | 否 | 是 | 否 | 是 |
[1] | ATZORI L , IERA A , MORABITO G . The Internet of Things:a survey[J]. Computer Networks, 2010,54(15): 2787-2805 |
[2] | LIU H , BOLIC M , NAYAKAND A ,et al. Taxonomy and challenges of the integration of RFID and wireless sensor networks[J]. IEEE Network, 2008,22(6): 26-35. |
[3] | ENGLUND C , WALLIN H . RFID in wireless sensor network,EX034/2004[R]. Sweden:Communication Systems Group,Department of Signals and Systems,Chalmers University of Technology, 2004. |
[4] | 毛伟 . 互联网资源标识和寻址技术研究[D]. 中国科学院计算技术研究所计算机系统结构, 2006. MAO W . Research on Internet Resource Identification and Addressing Technology[D]. Institute of Computing Technology Chinese Academy of Sciences, 2006. |
[5] | BRIN S , PAGE L . The anatomy of a large-scale hypertextual Web search engine[J]. Computer Networks & ISDN Systems, 1998,30(98): 107-117. |
[6] | DING C H , BUYYA R . Guided Google:a meta search engine and its implementation using the Google distributed Web services[J]. International Journal of Computers & Application, 2004,10(3). |
[7] | 宋春阳, 金可音 . Web搜索引擎技术综述[J]. 现代计算机(专业版), 2008,(05): 82-85. SONG C Y , JIN K Y . Review of Web search engine technology[J]. Modern Computer (Professional Edition), 2008(05): 82-85. |
[8] | INMON B . Structured and unstructured data[EB/OL]. . 2010. |
[9] | TAN C C , SHENG B , WANG H D ,et al. Microsearch-when search engines meet small devices[A]. Proc of the 6th International Conference on Pervasive Computing[C]. Springer, 2008: 93-110. |
[10] | DAS R , HARROP P . RFID forecasts,players and opportunities 201-2021[R]. IDTechEx.com, 2010. |
[11] | ROMER K , OSTERMAIER B , MATTERN F ,et al. Real-time search for real-world entities:a survey[J]. Proceedings of the IEEE, 2010,98(11): 1887-1902. |
[12] | 王智, 潘强, 邢涛 . 面向物联网的实体实时搜索服务综述[J]. 计算机应用研究, 2011,28(6): 2001-2010. WANG Z , PAN Q , XING T . Survey on real-time search service for entities of Internet of Things[J]. Application Research of Computers, 2011,28(6): 2001-2010. |
[13] | 胡永利, 孙艳丰, 尹宝才 . 物联网信息感知与交互技术[J]. 计算机学报, 2012,35(6): 1147-1163. HU Y L , SUN Y F , YIN B C . Information sensing and interaction technology in Internet of Things[J]. Chinese Journal of Computers, 2012,35(6): 1147-1163 |
[14] | SCHILIT B N , ADAMS N , WANT R . Context aware computing applications[A]. WMCSA[C]. Santa Cruz,CA,USA, 1994. 85-90. |
[15] | DEY A K . Providing Architectural Support for Building Context Aware Applications[D]. Atlanta,GA,USA,Georgia Institute of Technology, 2000. |
[16] | PERERA C , ZASLAVSKY A , CHRISTEN P ,et al. Context aware computing for the Internet of Things:a survey[J]. IEEE Communications Surverys & Tutorials, 2014,16(1): 414-454. |
[17] | LANE N , MILUZZO E , LU H ,et al. A survey of mobile phone sensing[J]. Communications Magazine,IEEE, 2010 48(9): 140-150. |
[18] | RIBONI D , BETTINI C . Context-aware activity recognition through a combination of ontological and statistical reasoning[A]. Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing,ser UIC ’09[C]. Berlin,Heidelberg: Springer-Verlag, 2009. 39-53. |
[19] | w3.org. Swrl:a semantic web rule language combining owl and ruleml[EB/OL]. . |
[20] | ZHOU X , TANG X , YUAN X ,et al. Spbca:semantic patternbased context-aware middleware[J]. IEEE International Conference on Parallel and Distributed Systems, 2009(12): 891-895. |
[21] | KESSLER C , RAUBAL M , WOSNIOK C . Semantic rules for context-aware geographical information retrieval[A]. Proceedings of the 4th European Conference on Smart Sensing and Context,ser EuroSSC’09[C]. Berlin,Heidelberg: Springer-Verlag, 2009. 77-92. |
[22] | CHOI C , PARK I , HYUN S ,et al. Mire:a minimal rule engine for context-aware mobile devices[A]. Digital Information Management,Third International Conference on[C]. 2008,(10): 172-177. |
[23] | KONSTANTINOU N , SOLIDAKIS E , ZOI S A ,et al. Priamos:a middleware architecture for real-time semantic annotation of context features[A]. Intelligent Environments,IET International Conference on[C]. 2007(9): 96-103. |
[24] | MANTYJARVI J , SEPPANEN T . Adapting applications in mobile terminals using fuzzy context information[A]. Proceedings of the 4th International Symposium on Mobile Human-Computer Interaction,ser Mobile HCI ’02[C]. London,UK,UK: Springer-Verlag, 2002. 95-107. |
[25] | PADOVITZ A , LOKE S W , ZASLAVSKY A . The ecora framework:a hybrid architecture for context-oriented pervasive computing[J]. Pervasive Mob Comput, 2008,4(2): 182-215. |
[26] | W3.org,Resource description framework (rdf)[S]. 2004. |
[27] | W3.org,Web ontology language (owl)[S]. 2007. |
[28] | RIBONI D , BETTINI C . Context-aware activity recognition through a combination of ontological and statistical reasoning[A]. Proceedings of the 6th International Conference on Ubiquitous Intelligence andComputing[C]. Berlin,Heidelberg: Springer-Verlag, 2009. 39-53. |
[29] | TEYMOURIAN K , STREIBEL O , PASCHKE A ,et al. Towards semantic event-driven systems[A]. Proceedings of the 3rd international Conference on New Technologies,Mobility and Security,Ser NTMS’09[C]. Piscataway,NJ,USA: IEEE Press, 2009. 347-352. |
[30] | NIST's dictionary of algorithms and data structures:inverted index[EB/OL]. . 2008. |
[31] | ILYAS I , BESKAILES G , SOLIMAN M . A survey of top-k query processing techniques in relational database systems[J]. ACM Computing Surveys, 2008 40(4): 1131-1158. |
[32] | SMYTH B , BALFE E , BRIGGS P ,et al. Collaborative Web search[A]. Proceedings of the 18th International Joint Conference on Artficial Intelligence(IJCAI--03)[C]. Acapulco,Mexico, 2003. 1417-1419. |
[33] | SMYTH B , BALFE E , BOYDELI O ,et al. A live-user evaluation of collaborative Web search[A]. Proceedings of the 19th International Joint Conference on Artificial Intelligence(IJCAI-05)[C]. 2005. 1419-1424. |
[34] | BALFE E , SMYTH B . An analysis of query similarity in collaborative web search[J]. Lecture Notes in Computer Science, 2005 34(8): 330-344. |
[35] | MORRIS M R , HORVITZ E . Searchtogether:an interface for collaborative Web search[A]. Proceedings of the 20th ACM UIST Conference[C]. New York: ACM Press, 2007. 3-12 |
[36] | 周水庚, 李丰, 陶宇飞 . 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009 32(5): 847-861. ZHOU S G , LI F , TAO Y F . Privacy preservation in database applications:a survey[J]. Chinese Journal of Computers, 2009,32(5): 847-861. |
[37] | YAO A C . How to generate and exchange secrets[A]. Proc of the 27th IEEE Sym on Foundations of Computer Science (FOCS)[C]. Toronto,Canada, 1986. 162-167. |
[38] | CLIFTON C , KANTARCIOGLOU M , LIN X ,et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Explorations, 2002,4(2): 28-34. |
[39] | SWEENEY L . K-anonymity,a model for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge-based Systems, 2002,10(5): 557-570. |
[40] | SWEENEY L . Achieving K-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty,Fuzziness and Knowledge-based Systems, 2002,10(5): 571-588. |
[41] | CHOR B , GOLDREICH O , KUSHILEVITZ E ,et al. Private Information Retrieval[J]. Journal of the ACM, 1998,45(6): 965-982. |
[42] | KUSHILEVITZ E , OSTROVSKY R . Replication is not needed:single database,computationally-private information retrieval[A]. Proceedings of the 38th Annual Symposium on Foundations of Computer Science[C]. Florida,USA, 1997. 364-373. |
[43] | AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing Across Private Databases[A]. Proc of SIGMOD[C]. 2003, 86-97. |
[44] | JARECKI S , LIU X . Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection[A]. TCC 2009[C]. LNCS, 2009. 577-594. |
[45] | FREEDMAN M J , NISSIM K , PINKAS B . Efficient private matching and set intersection[A]. EUROCRYPT 2004[C]. Springer-Verlag (LNCS 3027), 2004. 1-19. |
[46] | STEFANOV E , SHI E , SONG D . Policy-enhanced private set intersection:sharing information while enforcing privacy policies[A]. PKC[C]. 2012. 203-245. |
[47] | ROY S , CONTI M , SETIA S ,et al. Secure data aggregation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 1040-1052. |
[48] | RIVEST R , ADLEMAN L , DERTOUZOS M.On Data Banks and Privacy Homomorphism . Foundations of Secure Computation[M]. New York: Academic PressPress, 1978. 169-179. |
[49] | FERRER J D . A provably secure additive and multiplicative privacy homomorphism[A]. Proc of the 5th International Conference on Information Security[C]. London: Springer-Verlag Press, 2002. 471-483. |
[50] | CASTELLUCCIA C , MYKLETUN E , TSUDIK G . Efficient aggregation of encrypted data in wireless sensor networks[A]. Proc of the 2nd Conference on Mobile and Ubiquitous Systems[C]. Washington: IEEE Computer Society Press, 2005. 109-117. |
[51] | MYKLETUN E , GIRAO J , WESTHOFF D . Public key based crypto schemes for data concealment in wireless sensor networks[A]. Proc of IEEE International Conference on Communications[C]. New York: IEEE Communications Society Press, 2006. 2288-2295. |
[52] | WESTHOFF D , GIRAO J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:encryption key distribution and routing adaptation[J]. IEEE Transaction on Mobile Computing, 2006,5(10): 1417-1431. |
[53] | MLAIH E , ALY S A . Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[A]. Proc of conference on Compute Communications.Washington,IEEE Computer Society Press[C]. 2008. 1-6. |
[54] | RODHE I , ROHNER C . n-LDA:n-layers data aggregation in sensor networks[A]. Proc of the 28th International Conference on Distributed Computing Systems Workshops[C]. Beijing: IEEE Computer Society Press, 2008. 400-405. |
[55] | BAHI J , GUYEUX C , MAKHOUL A . Secure data aggregation in wireless sensor networks:homomorphism versus watermarking approach[A]. Proc of Conference on Ad Hoc Networks[C]. Canada: ADHOCNETS Press, 2010. 344-358. |
[56] | FENG TAIMING , WANG CHUANG , ZHANG WENSHENG . Confidentiality protection schemes for data aggregation in sensor networks[A]. Proc of IEEE International Conference on Communications[C]. 2008. 1-9. |
[57] | OZDEMIR S , CAM H . ESPDA:Energy efficient and secure pattern based data aggregation for wireless sensor networks[A]. Proc of the 2nd IEEE Conference on Sensors[C]. New York:IEEE Society Press, 2003. |
[58] | SANLI H , OZDEMIR S , CAM H . SRDA:Secure reference-based data aggregation protocol for wireless sensor networks[A]. Proc of the IEEE VTC fall conference[C]. Los Angeles, 2004. 4650-4654. |
[59] | HE W B , NAHRSTEDT K , NGUYEN H . PDA:Privacy-preserving data aggregation in wireless sensor networks[A]. Proc of 26th IEEE International Conference on Computer Communications[C]. Washington,IEEE Computer Society Press, 2007. 2045-2053. |
[60] | ZHANG WEN SHENG , WANG CHUANG , FENG TAIMING . GP2S:generic privacy-preserving solutions for approximate aggregation of sensor data[A]. Proc of the 6th Annual IEEE International Conference on Pervasive Computing and Communications[C]. Hong Kong,China, 2008. 179-184 |
[61] | 黎为 . 无线传感器网络数据融合安全方案的研究[D]. 长沙:湖南大学, 2009. LI W . The research on secure data aggregation schemes in wireless sensor networks[D]. Changsha:Hunan University, 2009. |
[62] | GROAT M M , HE W B , FORREST S . KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[A]. Proc of the 30th IEEE International Conference on Computer Communications[C]. Shanghai,China, 2011. 2024-2032. |
[63] | LI H J , LIN K , LI K Q . Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communication, 2011,34: 591-597. |
[64] | 杨庚, 王安琪 ,等. 一种低能耗的数据融合隐私保护算法[J]. 计算机学报, 2011,34(5): 792-800. YANG G , WANG A Q ,et al. An energy-saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Computers, 2011 34(5): 792-800. |
[65] | BISTA R , JO K J , CHANG J W . A new approach to secure aggregation of private data in wireless sensor networks[A]. Proc of the 8th IEEE International Conference on Dependable Autonomic and Secure Computing[C]. Chengdu,China, 2009. 394-399. |
[66] | BISTA R , KIM H D , CHANG J W . A new private data aggregation scheme for wireless sensor networks[A]. Proc of the 10th IEEE International Conference on Computer and Information Technology[C]. Bradford,UK, 2010. 273-280. |
[67] | BISTA R , YOO H K , CHANG J W . A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[A]. Proc of the 10th IEEE International Conference on Computer and Information Technology[C]. Bradford,UK, 2010. 2463-2470. |
[68] | DU W , DENG J , HAN Y S . A witness-based approach for data fusion assurance wireless sensor networks[A]. Proc of IEEE Global Telecommunication Conference[C]. Washington,IEEE Computer Society Press, 2003. 1435-1439. |
[69] | GAO F , ZHU W T . A dual-head cluster based secure aggregation scheme for sensor networks[A]. Proc of the conference on Network and Parallel Computing[C]. Washington,IEEE Computer Society Press, 2008. 103-110. |
[70] | OZDEMIR S . Secure and reliable data aggregation for wireless sensor networks[A]. Proc of the 4th international Conference on Ubiquitous Computing Systems[C]. 2007. 102-109. |
[71] | OZDEMIR S . Functional reputation based reliable data aggregation and transmission for wireless sensor networks[J]. Computer Communications, 2008. 3941-3953. |
[72] | VU H , MITTAL N , VENKATESAN S . THIS:threshold security for information aggregation in sensor networks[A]. Proc of the 4th International Conference on Information Technology[C]. Washington,IEEE Computer Society Press, 2007. 89-95. |
[73] | BOHLI J.-M , VERARDI D , PAPADIMITRATORS P . Resilient data aggregation for unattended WSNS[A]. Proc of the 36th IEEE Conference on Local Computer Networks[C]. 2011. 994-1002. |
[74] | MAHIMKAR A , RAPPAPORT T S . SecureDAV:a secure data aggregation and verification protocol for wireless sensor networks[A]. Proc of the 47th IEEE Global Telecommunications Conference[C]. Dallas,TX, 2004. |
[75] | YANG Y , WANG X , ZHU S ,et al. SDAP:a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Secure, 2008,11(18): 1-43. |
[76] | LI DEPENG , ZEYAR A , WILLIAMS JR . Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis[A]. Proc of IEEE Global Telecommunication Conference[C]. 2012. 1-8. |
[77] | WANG H D , TAN C C , LI Q . Snoogle:a search engine for pervasive environments[J]. IEEE Trans on Parallel and Distributed Systems, 2010,21(8): 1188-1202. |
[78] | TAN C C , SHENG B , WANG H ,et al. BMicrosearch:when search engines meet small devices[A]. Proc 6th Int Conf Pervasive Comput[C]. 2008. 93-110. |
[79] | YAP K K , SRINIVASAN V , MOTANI M . BMAX:Human-centric search of the physical world[A]. Proc 3rd Conf Embedded Netw Sensor Syst[C]. 2005. 166-179. |
[80] | FRANK C , BOLLIGER P , MATTERN F ,et al. The sensor internet at work:locating everyday items using mobile phones[J]. Pervasive Mobile Comput, 2008 4(3): 421-447. |
[81] | ABERER K , HAUSWIRTH M , SALEHI A . Infrastructure for data processing in large-scale interconnected sensor networks[A]. Proc Int Conf Mobile Data Manage,Mannheim[C]. Germany, 2007. 198-205. |
[82] | KANSAL A , NATH S , LIU J ,et al. BSenseWeb:an infrastructure for shared sensing[J]. IEEE Multimedia, 2007 14(4): 8-13. |
[83] | YAN T , GANESAN D , MANMATHA R . Distributed image search in camera sensor networks[A]. SenSys[C]. 2008. 155-168. |
[84] | CORLEY A M . Real-time search stumbles out of the gate[J]. IEEE Spectrum, 2010,(12). |
[85] | PERERA C , ZASLAVSKY A , LIU C H . Sensor search techniques for sensing as a service architecture for the internet of things[J]. IEEE Sensors Journal, 2014,14(2). |
[86] | PERERA C , ZASLAVSKY A , CHRISTEN P ,et al. Context-aware sensor search,selection and ranking model for Internet of Things middleware[A]. 2013 IEEE 14th International Conference on Mobile Data Management[C]. 2013. 314-322. |
[87] | DING Z , GAO X , GUO L M . A hybrid search engine framework for the Internet of Things based on spatial-temporal,value-based,and keyword-based conditions[A]. IEEE International Conference on Green Computing and Communications,Conference on Internet of Things,and Conference on Cyber,Physical and Social Computing[C]. 2012. 17-25. |
[88] | TRUONG C , R¨OMER K . Content-based sensor search for the Web of things[A]. Global Communications Conference[C]. 2013. 2654-2660. |
[89] | TRUONG C , Romer K , CHEN K . Fuzzy-based sensor search in the Web of things[A]. Internet of Things (IOT),2012 3rd International Conference on[C]. 2012. 127-134 |
[90] | QIAN X J , CHE X P . Security-enhanced search engine design in Internet of Things[J]. Journal of Universal Computer Science, 2012,18(9): 1218-1235. |
[91] | MAYER S , GUINARD D , TRIFA V . Searching in a Web-based infrastructure for smart things[A]. 2012 3rd International Conference on the Internet of Things (IOT)[C]. 2012. 119-126. |
[92] | ZHANG D Q , YANG L T , HUANG H Y ,et al. Searching in Internet of Things:vision and challenges[A]. Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications[C]. 2011. 201-206. |
[1] | Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG. GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents [J]. Journal on Communications, 2023, 44(6): 183-197. |
[2] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[3] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[4] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[5] | Haili SUN, Xiang LONG, Lansheng HAN, Yan HUANG, Qingbo LI. Overview of anomaly detection techniques for industrial Internet of things [J]. Journal on Communications, 2022, 43(3): 196-210. |
[6] | Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. |
[7] | Hui TIAN, Hao WU, Yang TIAN, Jianyang REN, Yajuan CUI, Wenbao AI, Jianhua YUAN. Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things [J]. Journal on Communications, 2021, 42(4): 89-99. |
[8] | Zhengyu ZHU, Jinlei XU, Gangcan SUN, Ning WANG, Wanming HAO. Secure beamforming design for IRS-assisted SWIPT Internet of things system [J]. Journal on Communications, 2021, 42(4): 185-193. |
[9] | Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG. Random access for massive Internet of things:current status, challenges and opportunities [J]. Journal on Communications, 2021, 42(4): 1-21. |
[10] | Wanming HAO, Jinkun XIE, Gangcan SUN, Zhengyu ZHU, Yiqing ZHOU. Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system [J]. Journal on Communications, 2021, 42(3): 100-110. |
[11] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[12] | Chuanhong LIU, Caili GUO, Yang YANG, Chunyan FENG, Qizheng SUN, Jiujiu CHEN. Intelligent task-oriented semantic communication method in artificial intelligence of things [J]. Journal on Communications, 2021, 42(11): 97-108. |
[13] | Liang YUAN, Xiao YU, Enjie DING, Xiaohu ZHAO, Shimin FENG, Da ZHANG, Tongyu LIU, Weidong WANG, Yanqiu HUANG. Research on key technologies of human-machine-environment states perception in mine Internet of things [J]. Journal on Communications, 2020, 41(2): 1-12. |
[14] | Weidong WANG,Cheng WANG,Huiwen WANG,Pin XU. Dynamic cache allocation routing strategy of Internet of things satellite node based on traffic prediction [J]. Journal on Communications, 2020, 41(2): 25-35. |
[15] | Da ZHANG,Jinong WANG,Hu JI,Hao JI,Yunfeng ZHAO. Research and application of micropower safety monitoring IoT system for mine [J]. Journal on Communications, 2020, 41(2): 44-57. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|