Results 11 to 20 of about 528,739 (288)

Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems

open access: yesРадіоелектронні і комп'ютерні системи, 2021
The subject of study in the paper is the analysis of technologies, architectures, vulnerabilities and cyberattacks, communication patterns of smart objects, messaging models, and Internet of Things (IoT) / Web of Things (WoT) protocols for solving ...
Maryna Kolisnyk
doaj   +1 more source

The design and implementation of a framework based on collection device access

open access: yesDianzi Jishu Yingyong, 2023
With the rapid development of embedded technology and network communication technology, IoT has also developed greatly in recent years, and a large number of different types of end devices need to be connected to the network.
Ma Mingyang   +3 more
doaj   +1 more source

Robust video broadcasting over 802.11a/g in time-correlated fading channels [PDF]

open access: yes, 2009
In order to deliver video streams efficiently over WiFi to many thousands of consumer handheld devices, broadcast protocols must be employed. In this mode of operation the received video quality can deteriorate rapidly as a result of high application ...
Bull, David   +4 more
core   +2 more sources

An approach to application-layer DoS detection

open access: yesJournal of Big Data, 2023
With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS.
Cliff Kemp   +3 more
doaj   +1 more source

PluralisMAC: a generic multi-MAC framework for heterogeneous, multiservice wireless networks, applied to smart containers [PDF]

open access: yes, 2012
Developing energy-efficient MAC protocols for lightweight wireless systems has been a challenging task for decades because of the specific requirements of various applications and the varying environments in which wireless systems are deployed.
De Mil, Pieter   +4 more
core   +2 more sources

Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat

open access: yesSensors, 2022
The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols.
Nikola Gavrić, Živko Bojović
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]

open access: yes, 2019
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco   +3 more
core   +4 more sources

Power Evaluation of IOT Application Layer Protocols

open access: yes2023 7th International Conference on Internet of Things and Applications (IoT), 2023
The Internet of Things has affected all aspects of daily life, and the number of IoT devices is increasing day by day. According to forecasts, the number of Internet of Things devices will reach one trillion devices by 2035. The increase in the number of devices connected to the Internet will cause various concerns.
Amirhossein Shahrokhi, Mahmood Ahmadi
openaire   +2 more sources

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

open access: yesSensors, 2020
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily ...
Hichem Mrabet   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy