Results 1 to 10 of about 528,739 (288)
The Internet of Things (IoT) has been growing over the past few years due to its flexibility and ease of use in real-time applications. The IoT's foremost task is ensuring that there is proper communication among different types of applications and ...
Praveen Kumar Donta +3 more
doaj +3 more sources
Security of IoT Application Layer Protocols: Challenges and Findings
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly
Giuseppe Nebbione +1 more
doaj +3 more sources
Proving Properties of Rich Internet Applications [PDF]
We introduce application layer specifications, which allow us to reason about the state and transactions of rich Internet applications. We define variants of the state/event based logic UCTL* along with two example applications to demonstrate this ...
James Smith
doaj +4 more sources
A Systematic Review on the Data Interoperability of Application Layer Protocols in Industrial IoT
Due to the rising popularity of the Internet of Things (IoT), interconnected infrastructures with better flexibility and efficiency are being developed for industry 4.0.
Anam Amjad +3 more
doaj +3 more sources
Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications
Context: The growing number of linked devices, the limitations of some IoT devices, worries about data privacy, risks to physical safety, and the ever-changing threats all highlight why it’s crucial to have strong security measures in the IoT ...
N. Sharmila Kumari +3 more
doaj +3 more sources
Application Layer Protocol Identification Method Based on ResNet
Most network attacks occur at the application layer, where many application layer protocols exist. These protocols have different structures and functionalities, posing feature extraction challenges and resulting in low identification accuracy.
Zhijian Fang +4 more
doaj +2 more sources
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices [PDF]
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and ...
Bartosz Kościug, Piotr Bilski
doaj +1 more source
A survey on communication protocols and performance evaluations for Internet of Things
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols.
Cüneyt Bayılmış +4 more
doaj +1 more source
The Internet of Things (IoT) is a global network of interconnected computing, sensing, and networking devices that can exchange data and information via various network protocols.
Mohammad Mansour +6 more
doaj +1 more source
A survey on IoT application layer protocols
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols.
Hamid, Harth Ghassan, Alisa, Zainab T.
openaire +2 more sources

