Search scope:
排序: Display mode:
Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi,yangkangle@sgepri.sgcc.com.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 3, Pages 287-436 doi: 10.1631/FITEE.1900636
Keywords: 物联网;泛在电力物联网;边缘计算;可信计算;网络安全
Edge Computing Technology: Development and Countermeasures
Hong Xuehai and Wang Yang
Strategic Study of CAE 2018, Volume 20, Issue 2, Pages 20-26 doi: 10.15302/J-SSCAE-2018.02.004
Edge computing is an emerging technology that reduces transmission delays and bandwidth consumption by placing computing, storage, bandwidth, applications, and other resources on the edge of the network. Moreover, application developers and content providers can provide perceptible services based on real-time network information. Mobile terminals, Internet of things, and other devices provide the necessary front-end support for computing sensitive applications, such as image recognition and network games, to share the cloud work load with the processing capability of edge computing. This paper discusses the concept of edge computing, key problems that require solutions, main advances in edge computing, influence of edge computing developments, and opportunities and development countermeasures of edge calculation.
Keywords: cloud computing edge computing fog computing mobile edge computing internet of things front-end intelligence
MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things Article
Chengxiao Liu, Wei Feng, Xiaoming Tao, Ning Ge
Engineering 2022, Volume 8, Issue 1, Pages 96-107 doi: 10.1016/j.eng.2021.11.002
In the upcoming sixth-generation (6G) era, the demand for constructing a wide-area time-sensitive Internet of Things (IoT) continues to increase. As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT, it is beneficial to use non-terrestrial infrastructures, including satellites and unmanned aerial vehicles (UAVs). Thus, we can build a non-terrestrial network (NTN) using a cell-free architecture. Driven by the time-sensitive requirements and uneven distribution of IoT devices, the NTN must be empowered using mobile edge computing (MEC) while providing oasisoriented on-demand coverage for devices. Nevertheless, communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN, which makes it difficult to coordinate the resources. In this study, we propose a process-oriented framework to design communication and MEC systems in a time-division manner. In this framework, large-scale channel state information (CSI) is used to characterize the complex propagation environment at an affordable cost, where a nonconvex latency minimization problem is formulated. Subsequently, the approximated problem is provided, and it can be decomposed into sub-problems. These sub-problems are then solved iteratively. The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms, implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources, and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT.
Keywords: Cell-free Mobile edge computing Non-terrestrial networks Sixth-generation Wide-area time-sensitive IoT
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords: active defense active immunity trusted computing trusted technology insurance system cybersecurity infrastructure
Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace
Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 114-119 doi: 10.15302/J-SSCAE-2019.10.001
The cyberspace has expanded from traditional internet to ubiquitous cyberspace which interconnects human, machines,things, services, and applications. The computing paradigm is also shifting from centralized computing in the cloud to combined computing in the front end, middle layer, and cloud. Therefore, traditional computing paradigms such as cloud computing and edge computing can no longer satisfy the evolving computing needs of big data in ubiquitous cyberspace. This paper presents a computing architecture named Fogcloud Computing for big data in ubiquitous cyberspace. Collaborative computing by multiple knowledge actors in the fog, middle layer, and cloud is realized based on the collaborative computing language and models, thereby providing a solution for big data computing in ubiquitous cyberspace.
Keywords: fogcloud computing ubiquitous cyberspace big data Internet of Things cloud computing
Flexible Resource Scheduling for Software-Defined Cloud Manufacturing with Edge Computing Article
Chen Yang,Fangyin Liao,Shulin Lan,Lihui Wang,Weiming Shen,George Q. Huang
Engineering 2023, Volume 22, Issue 3, Pages 60-70 doi: 10.1016/j.eng.2021.08.022
This research focuses on the realization of rapid reconfiguration in a cloud manufacturing environment to enable flexible resource scheduling, fulfill the resource potential and respond to various changes. Therefore, this paper first proposes a new cloud and software-defined networking (SDN)-based manufacturing model named software-defined cloud manufacturing (SDCM), which transfers the control logic from automation hard resources to the software. This shift is of significance because the software can function as the “brain” of the manufacturing system and can be easily changed or updated to support fast system reconfiguration, operation, and evolution. Subsequently, edge computing is introduced to complement the cloud with computation and storage capabilities near the end things. Another key issue is to manage the critical network congestion caused by the transmission of a large amount of Internet of Things (IoT) data with different quality of service (QoS) values such as latency. Based on the virtualization and flexible networking ability of the SDCM, we formalize the time-sensitive data traffic control problem of a set of complex manufacturing tasks, considering subtask allocation and data routing path selection. To solve this optimization problem, an approach integrating the genetic algorithm (GA), Dijkstra’s shortest path algorithm, and a queuing algorithm is proposed. Results of experiments show that the proposed method can efficiently prevent network congestion and reduce the total communication latency in the SDCM.
Keywords: Cloud manufacturing Edge computing Software-defined networks Industrial internet of things Industry 4.0
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
Development and Prospect of Edge Intelligence for Industrial Internet
Ren Yaodanjun, Qi Zhengwei, Guan Haibing, Chen Lei
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 104-111 doi: 10.15302/J-SSCAE-2021.02.014
As the industrial Internet deeply integrated with manufacturing, the drive capability of industrial intelligence becomes prominent regarding the digitization and informatization of the manufacturing industry. Meanwhile, new applications propose higher requirements for service quality. Edge intelligence, a product of edge computing and artificial intelligence, completes intelligent tasks using computing resources near the data origin. It can alleviate bandwidth transmission pressure, shorten service response delay, and protect the security of private data. Hence, edge intelligence provides a possible approach to satisfy the performance requirements in industrial intelligence applications. This study reviews the research status of cooperative computing, resource isolation, privacy protection, and other key technologies in edge intelligence. Then the typical applications of edge intelligence in equipment management services, production process automation, and manufacturing assistance in the industrial Internet are analyzed in detail. Moreover, the development trend of edge intelligence for the industrial Internet is analyzed in terms of business driving mode, industrial ecology composition, alliance role, and business model. Furthermore, relevant policy suggestions are proposed. We suggest that superior resources should be integrated to establish industry standards; investment increased in basic common resources to deepen the application of the industrial Internet; a good industrial ecology created in the subdivided fields; and university–enterprise cooperation promoted to cultivate interdisciplinary personnel.
Keywords: industrial Internet,edge computing,edge intelligence,cooperative computing,resource isolation
Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT Article
Qian Wang, Siguang Chen, Meng Wu
Engineering 2023, Volume 31, Issue 12, Pages 127-138 doi: 10.1016/j.eng.2022.10.014
The rapid development of artificial intelligence has pushed the Internet of Things (IoT) into a new stage. Facing with the explosive growth of data and the higher quality of service required by users, edge computing and caching are regarded as promising solutions. However, the resources in edge nodes (ENs) are not inexhaustible. In this paper, we propose an incentive-aware blockchain-assisted intelligent edge caching and computation offloading scheme for IoT, which is dedicated to providing a secure and intelligent solution for collaborative ENs in resource optimization and controls. Specifically, we jointly optimize offloading and caching decisions as well as computing and communication resources allocation to minimize the total cost for tasks completion in the EN. Furthermore, a blockchain incentive and contribution co-aware federated deep reinforcement learning algorithm is designed to solve this optimization problem. In this algorithm, we construct an incentive-aware blockchain-assisted collaboration mechanism which operates during local training, with the aim to strengthen the willingness of ENs to participate in collaboration with security guarantee. Meanwhile, a contribution-based federated aggregation method is developed, in which the aggregation weights of EN gradients are based on their contributions, thereby improving the training effect. Finally, compared with other baseline schemes, the numerical results prove that our scheme has an efficient optimization utility of resources with significant advantages in total cost reduction and caching performance.
Keywords: Computation offloading Caching Incentive Blockchain Federated deep reinforcement learning
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011
The new generation of information and communications technology is deeply integrated with the industrial system. The industrial Internet promotes the ubiquitous and deep interconnection and comprehensive perception of human, machines, and things. The industrial Internet equipment becomes increasingly networked, digital, and intelligent; therefore, the network security design, application management, and protection of these equipment become increasingly important. In this study, we clarify the connotation, protection scope, and requirements of the industrial Internet equipment, and summarize the development status of industrial Internet in China and abroad from the aspects of security control and security certification. Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection for the industrial internet equipment in China are discussed. Furthermore, several development suggestions are proposed. Specifically, the network security access mechanism of the industrial Internet equipment should be improved at the national level, a network security testing and certification system for the equipment should be established, research on the network security architecture and engineering application of the equipment should be promoted, and the network security risk monitoring and perception of the equipment should be strengthened.
Keywords: industrial Internet equipment network security management protection certification
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006
Although cybersecurity legislation has made some progress since the 18th National Congress of the Communist Party of China, there is still a large gap between the law and development of cybersecurity and informatization and the requirements of the public. In addition, many problems exist in the fields of legislation, enforcement, administration, and legality. Some people, both at home and abroad, question China's efforts in the legislation of cybersecurity. Based on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurity legislation and improve the legal system, particularly in order to enact cybersecurity law, e-commercial law, administrative law for cyber information service, personal information protection law, e-government law, information and telecommunication network law, and administrative law for cyber society, supported by matched regulations and by laws. In this way, a perfected legal system for cybersecurity will be achieved.
Keywords: networks Internet cybersecurity cybersecurity law legal system
A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article
Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1354-1368 doi: 10.1631/FITEE.2100518
Keywords: Power Internet of Things Cloud-fog cooperation Elliptic curve Random oracle model Certificateless aggregate signcryption
Summarization of Network Security
Li Ying,Shan Xiuming,Ren Yong
Strategic Study of CAE 2004, Volume 6, Issue 1, Pages 10-15
The content of computer network security is discussed in this article Firstly, the concept, system and structure and model of computer network security are given. Then the main content and correlative researching aspect are included. In the end, the main product is introduced.
Development Strategy for Application of the Internet of Things in China’s Aquaculture Industry
Yang Ningsheng,Yuan Yongming and Sun Yingze
Strategic Study of CAE 2016, Volume 18, Issue 3, Pages 57-61 doi: 10.15302/J-SSCAE-2016.03.009
Based on the analysis of the present situation and problems in application of Internet of Things(IoT) technology in Chinese aquaculture, this paper puts forward some key technical issues and policy suggestions for the development of the IoT. At the moment, IoT technology has been used in the aquaculture industry for water quality monitoring, breeding area monitoring and management, livestock germination monitoring, aquaculture product storage and transport, and supervision of processing procedures. During this early development stage, China is faced with a number of challenges in the application of this technology, including: Backward extensive aquaculture practice and poor infrastructures; lack of advanced equipment and unified standards; and the need of large sum investment and high costs. A number of key technological issues should be solved in order to improve IoT application in this industry, including: precise aquaculture sensor technology for precise breeding simulation technology, precise intelligent control technology for aquaculture equipment, precise aquaculture management technology, and precise integrated production technology for large-scale aquaculture. Finally, this paper makes suggestions to relevant government agencies on the formulation of an comprehensive development plan for China aquaculture IoT technology to enhance industrial informatization and optimize the application facilities for IoT, initiate a research and development program for precise aquaculture environmental sensor technology, advance the implementation of aquaculture IoT demonstration projects, and upgrade the government’s capacity for promoting the commercialization of aquaculture IoT.
Keywords: aquaculture Internet of Things development strategy
Title Author Date Type Operation
Generation of noise-like pulses and soliton rains in a graphene mode-locked erbium-doped fiber ring laser
Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi,yangkangle@sgepri.sgcc.com.cn
Journal Article
Edge Computing Technology: Development and Countermeasures
Hong Xuehai and Wang Yang
Journal Article
MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things
Chengxiao Liu, Wei Feng, Xiaoming Tao, Ning Ge
Journal Article
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Journal Article
Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace
Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin
Journal Article
Flexible Resource Scheduling for Software-Defined Cloud Manufacturing with Edge Computing
Chen Yang,Fangyin Liao,Shulin Lan,Lihui Wang,Weiming Shen,George Q. Huang
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article
Development and Prospect of Edge Intelligence for Industrial Internet
Ren Yaodanjun, Qi Zhengwei, Guan Haibing, Chen Lei
Journal Article
Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT
Qian Wang, Siguang Chen, Meng Wu
Journal Article
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Journal Article
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Journal Article
中国物联网大会
30 Oct 2019
Conference Information
A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU
Journal Article