Yang Sun Yang

Intelligent IoT for the Digital World


Скачать книгу

fog/edge nodes with different computing and energy resources. The optimal trade‐off is achieved through a distributed optimization framework, without disclosing any node's private information, nor lengthy back‐and‐forth negotiations among collaborative nodes. The proposed mechanism and framework are evaluated via an extensive simulation of a fog‐enabled self‐driving bus system in Dublin, Ireland, and demonstrate very good performance in balancing energy consumption among multiple nodes and reducing service delay in urban mobile scenarios.

      Chapter 5 addresses the privacy concerns in public IoT applications and services, where IoT devices are usually embedded in a user's private time and space, and the corresponding data is in general privacy sensitive. Unlike resourceful clouds that can apply powerful security and privacy mechanisms in processing massive user data for training and executing deep neural network models to solve complex problems, IoT devices and their nearby edge/fog nodes are resource‐limited, and therefore, have to adopt light‐weight algorithms for privacy protection and data analysis locally. With low computing overhead, three approaches with different privacy‐preserving features are proposed to tackle this challenge. Specifically, random and independent multiplicative projections are applied to IoT data, and the projected data is used in a stochastic gradient descent method for training a deep neural network, thus to protect the confidentiality of the original IoT data. In addition, random additive perturbations are applied to the IoT data, which can realize differential privacy for all the IoT devices while training the deep neural network. A secret shallow neural network is also applied to the IoT data, which can protect the confidentiality of the original IoT data while executing the deep neural network for inference. Extensive performance evaluations based on various standard datasets and real testbed experiments show these proposed approaches can effectively achieve high learning and inference accuracy while preserving the privacy of IoT data.

      Finally, Chapter 7 concludes this book and identifies some additional challenging problems for further investigation.

      We believe all the challenges and technical solutions discussed in this book will not only encourage and enable many novel intelligent IoT applications in our daily lives but, more importantly, will deliver a series of long‐term benefits to businesses, consumers, governments, and human societies in the digital world.

       Yang Yang

      ShanghaiTech University and

      Peng Cheng Laboratory, China

      August 19, 2020

      1 1 Bernard Marr, What is Digital Twin Technology and Why is it so Important?, Forbes, March 6, 2017.

      2 2 Cisco, Cisco Annual Internet Report (2018–2023), February 2020.

      3 3 Scott Buchholz and Bill Briggs, Tech Trends 2020, Deloitte, January 7, 2020.

      4 4 Keynote by Alexandra Rehak and Steve Bell, IoT World, May 14, 2019.

      5 5 Yigang Cai, 3GPP Release 16, IEEE Communications Society Technology Blog, 10 July 2020.

      6 6 10 Breakthrough Technologies 2020, MIT Technology Review, February 26, 2020.

      7 7 David Reinsel, John Gantz, and John Rydning, Data Age 2025, The Digitization of the World: from Edge to Core, IDC and SEAGATE, November 2018.

      8 8 Worldwide Big Data and Analytics Spending Guide, IDC, April 2019.

      9 9 David Reinsel, John Gantz, and John Rydning, Data Age 2025, The Digitization of the World: from Edge to Core, IDC and SEAGATE, November 2018.

      10 10 N. Chen, Y. Yang, T. Zhang, M. T. Zhou, X. L. Luo, and J. Zao, “Fog as a Service Technology,” IEEE