Please wait a minute...

Current Issue

    30 June 2018, Volume 2 Issue 2
    Frontier and Comprehensive Review
    Security of the industrial Internet of things and localization of the core technology
    Guangnan NI
    2018, 2(2):  1-7.  doi:10.11959/j.issn.2096-3750.2018.00046
    Asbtract ( 1937 )   HTML ( 73)   PDF (1165KB) ( 3023 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the industrial control system as the breakthrough point,the security problems and national network security strategy of the industrial Internet of things were analyzed in detail,and the importance of the localization of the core technology was expounded.Taking the desktop computer technology,which was one of the core technologies of the industrial Internet of things,as an example,the necessity and favorable conditions for breaking the Wintel system monopoly was expounded,two ways and key technologies to replace the Wintel system were given,and the present status and application results of the security controlled desktop computer technology system in China was analyzed.Finally,suggestions for the future development of China’s network security and information technology were put forward.

    Theory and Technology
    Development and trend of IoT identifier technology
    Ye TIAN,Jia LIU,Jie SHEN
    2018, 2(2):  8-17.  doi:10.11959/j.issn.2096-3750.2018.00047
    Asbtract ( 3711 )   HTML ( 64)   PDF (8646KB) ( 1239 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The Internet of things has broken through the traditional human-to-human communication model and introduced the perception of the real world,thereby establishing the communication between things,human being and things,as well as achieving the dynamic acquisition of information,intelligent processing,and seamless interaction and collaborative sharing.The IoT identifier that identifies and distinguishes different target objects is the basis and prerequisite for achieving the above mentioned information communications and various IoT applications.The IoT identifier is used to uniquely identify the physical and logical entities within a certain range,so that the network and application can manage the target objects based on it,and the acquisition,processing,transmission,and exchange of related information is the most important and fundamental resource in IoT Internet of things.Moreover,it is the “identity card” of IoT object.In order to uniquely identify various heterogeneous resources within a certain range,and to obtain and transmit related information based on the control and management of target objects,it is necessary to provide a identification resolution service based on the IoT identifier,and realize different levels of mapping between identifiers.

    Research on IoT device identification based on blockchain
    Meijuan CHEN,Xiaorong ZHU
    2018, 2(2):  18-26.  doi:10.11959/j.issn.2096-3750.2018.00048
    Asbtract ( 2663 )   HTML ( 77)   PDF (2516KB) ( 2269 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Combined blockchain technology with IoT applications,a blockchain-based IoT architecture was proposed,and a blockchain-based IoT identification method was designed.The equipment registration service process and the query service process based on the proposed IoT architecture were illustrated,and the security of the system was analyzed.Finally,based on the proposed network architecture and the identification method,the application in the smart home scenario was given.It can be seen from the two typical cases that the proposed solution can guarantee the security of various applications in the Internet of things.

    IoT things description method and things identification
    Bowen PAN,Chao MA
    2018, 2(2):  27-32.  doi:10.11959/j.issn.2096-3750.2018.00049
    Asbtract ( 2463 )   HTML ( 18)   PDF (1368KB) ( 1387 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Starting from the current situation of IoT identification systems,the new development thoughts of IoT was discussed,and the concept of IoT things description from a different perspective was raised.IoT open system architecture was introduced,and the things description layer of the architecture was mainly explained.The things description metadata two-layer structure and the contents and meanings of every segment in the metadata structure were illustrated.Things description file was introduced and the relationship between files and identifications was explained.The role of IoT things description in the development of artificial intelligence was discussed.Then,the progress and problems of standardization of IoT things description technology were talked about.

    Fog computing-enabled robot simultaneous localization and mapping
    Yang YANG,Kai LI,Haidong XU,Huajun WANG,Kunlun WANG,Jian LI,Mingtuo ZHOU
    2018, 2(2):  33-40.  doi:10.11959/j.issn.2096-3750.2018.00050
    Asbtract ( 2077 )   HTML ( 21)   PDF (5384KB) ( 1322 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Robot simultaneous localization and mapping (SLAM) is often required when robots are used to explore prior-unknown environment,e.g.,in rescue scenarios.Fog computing,an emerging computing mode could be used to enable faster,more accurate,speedier,and energy-saved robot SLAM.The framework of fog-enabled robot SLAM addressing was proposed,and challenges it faced were analyzed.Finally,technologies by real implementation of testbed were demonstrated.

    Off-body channel modelling and diversity reception approach using wearable circularly polarized antenna
    Wenjun LYU,Pengfei CUI,Hongbo ZHU
    2018, 2(2):  41-48.  doi:10.11959/j.issn.2096-3750.2018.00051
    Asbtract ( 828 )   HTML ( 5)   PDF (5167KB) ( 1029 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An anti-fading diversity receiving approach to body-area communications was proposed.A pair of opposite-sense called planar endfire circularly polarized antennas (PECPA) was employed to implement the receiving approach.The wide beamwidth CP characteristic of the PECPA was used to mitigate the height-dependent fadings.Antenna designs and body-area propagation measurements were performed at 5.8 GHz-band.An off-body channel model was established,and a channel simulator was accordingly developed.All results were compared to the cases using linearly polarized (LP) antennas diversity on equal conditions.The results show that the equal-gain-combination (EGC) signal levels for CP diversity reception are 2.1 dB greater than the LP one (with polarization mismatching loss removed).The rootmean-square delay spread (RDS) and number of multi-path component (MPC) can be significantly reduced.In addition,the simulated bit error rate (BER) of the body-area communication system using CP diversity can be improved by one order of magnitude compared the LP diversity one.The correctness and effectiveness of the proposed approach has been evidently validated by the experimental and simulated results.

    IoT sensing technology based on acoustic phase
    Yang LIU,Wuxiong ZHANG,Weidong FANG
    2018, 2(2):  49-53.  doi:10.11959/j.issn.2096-3750.2018.00052
    Asbtract ( 1055 )   HTML ( 20)   PDF (883KB) ( 1315 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The perception and interaction technology between IoT devices is one of the necessary foundations for the development of the Internet of things.With the growing popularity of multimedia devices,such as smart phones,tablet,and home audio,the speakers and microphones are ubiquitous on these devices which make it possible to the low cost interaction between devices using acoustic signal.The low speed and low frequency physical properties of sound waves make the acoustic-based sensing technology have higher accuracy and lower computation.A phase based measurement method using acoustic signals was proposed,which could be used to measure high precision distance between different mobile devices and sound sources.In a certain range,firstly,the mobile device receives the single frequency acoustic signal transmitted by a sound source.The mobile device uses the sound signal to synchronize the phase between the mobile devices the sound source,and then calculates the distance between the mobile device and the sound source by calculating the phase difference during movement.

    Countermeasures to promote the systematic construction of the military IoT
    Shibin LAN,Wenxiang XIA
    2018, 2(2):  54-57.  doi:10.11959/j.issn.2096-3750.2018.00053
    Asbtract ( 1269 )   HTML ( 35)   PDF (603KB) ( 1491 )   Knowledge map   
    References | Related Articles | Metrics

    The military Internet of things (MIoT) is an important part of the military network information system.Based on this,the significance of MIoT systematic construction were described firstly.Then the main contents of construction of MIoT was provided,such as sensing network system,public architecture service system,standard specification system,security system and demonstration project.Finally,the countermeasures of promoting the systematic construction of MIoT were discussed.

    Smartphone-based indoor localization by fusion of acoustic ranging and PDR
    Mao PANG,Mei WANG,Xiyu SONG,Liyan LUO,Kun RUAN
    2018, 2(2):  58-64.  doi:10.11959/j.issn.2096-3750.2018.00054
    Asbtract ( 1753 )   HTML ( 35)   PDF (4005KB) ( 1561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel indoor localization algorithm that integrates acoustic ranging and pedestrian dead reckoning (PDR) algorithm was presented,to reduce the accumulated error of the inertial sensors in the process of indoor positioning using PDR.Firstly,the PDR was used for position estimation.Then,the distance between the mobile phone and the wall was measured by using sound waves,and the cumulative error in the PDR was corrected by combining the above position and the distance with the known indoor map information.Hence,long-term stable indoor positioning can be achieved without laying out any nodes.In order to solve the problem that the echo signals reflected by the wall under long-distance conditions were difficult to detect,signal enhancement on the echoes reflected from the target wall was performed by using beamforming,taking advantage of the characteristics of the built-in dual microphones in the smartphone,then the effective measurement distance was increased and the application range of the proposed method was expanded.Experimental results show that the average positioning error of the proposed fusion localization method is 0.427 m.Compared with the results of using PDR alone,the average positioning error is reduced by 2.748 m.

    Multilayer neural network model for unbalanced data
    Xue ZHANG,Zhiguo SHI,Xuan LIU
    2018, 2(2):  65-72.  doi:10.11959/j.issn.2096-3750.2018.00055
    Asbtract ( 1045 )   HTML ( 4)   PDF (1284KB) ( 883 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Classification of unbalanced data often has low performance of the classifier because of the unbalance of data between classes.Using AUC (the area under the ROC curve) as evaluation index,combined with one class F-score feature selection and genetic algorithm,a multilayer neural network model was established,and a more favorable feature set for unbalanced data classification was selected,so as to establish a deeper model suitable for classification of unbalanced data.Based on Tensor Flow,a multilayer neural network model was established.Using four different UCI datasets for testing,and comparing with the traditional machine learning algorithms such as Naive Bayesian,KNN,neural networks,etc,the performance of the proposed model built on the unbalanced data classification is more excellent.

    Service and Application
    Research on wireless access technologies for Internet of things
    Jianchi ZHU,Bei YANG,Peng CHEN,Xiaoming SHE,Qi BI
    2018, 2(2):  73-84.  doi:10.11959/j.issn.2096-3750.2018.00056
    Asbtract ( 1821 )   HTML ( 101)   PDF (2128KB) ( 2739 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile Internet and Internet of things (IoT) are two major driving forces for the future development of mobile communications and will provide broad prospects for 5G.IoT expands the range of mobile communications services,evolving from “Internet of people” to “Internet of everything”.5G IoT scenarios include low-power massive-connections and low-latency high-reliability.Low-power massive-connections scenario has the characteristics of small data packets,low power consumption,mass connections.It not only requires the network to have the ability to support over a hundred billion connections,but also ensures the terminal’s ultra-low power consumption and ultra-low cost.Low-latency high-reliability scenario is primarily for applications,such as Internet of vehicle,autonomous driving,industrial control and remote medical.Such applications requires extremely high requirements on latency and reliability.They require to provide millisecond-level end-to-end latency and be close to 100% service reliability.Firstly,the technologies for low-power massive-connections scenario were introduced,including LoRa (long range wide area network) and SigFox operating on unlicensed spectrum and EC-GSM (extended coverage-GSM),LTE-M and NB-IoT (narrow band Internet of things) operating on licensed spectrum.Then,an overview of service requirements and performance metrics for ultra-reliable low latency communications was presented.Finally,the development of ITS (intelligent transport system) technologies for both 3GPP V2X (vehicle-to-everything) and IEEE DSRC (dedicated short range communication) standards was described.

    Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data
    Xuli YE,Qiang ZENG,Liyu LIU,Yu SU,Meng KANG
    2018, 2(2):  85-93.  doi:10.11959/j.issn.2096-3750.2018.00057
    Asbtract ( 1157 )   HTML ( 14)   PDF (2763KB) ( 1239 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.


Copyright Information
Quarterly,started in 2017
Cpmpetent Unit:Ministry of Industry and Information Technology of the People's Republic of China
Sponsor:Posts & Telecom Press Co.,Ltd.
Publisher: China InfoCom Media Group
Editor:Editor Board of Chinese Journal on Internet of Things
Editor-in-Chief:YIN Hao
Executive Editor-in-Chief:ZHU Hongbo
Deputy Editor-in-Chief:LIU Hualu
Director:LI Caishan
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53878076、53879096、53879098
E-mail:wlwxb@bjxintong.com.cn
ISSN 2096-3750
CN 10-1491/TP
Visit
Total visitors:
Visitors of today:
Now online: