Results 11 to 20 of about 528,739 (288)
The subject of study in the paper is the analysis of technologies, architectures, vulnerabilities and cyberattacks, communication patterns of smart objects, messaging models, and Internet of Things (IoT) / Web of Things (WoT) protocols for solving ...
Maryna Kolisnyk
doaj +1 more source
The design and implementation of a framework based on collection device access
With the rapid development of embedded technology and network communication technology, IoT has also developed greatly in recent years, and a large number of different types of end devices need to be connected to the network.
Ma Mingyang +3 more
doaj +1 more source
Robust video broadcasting over 802.11a/g in time-correlated fading channels [PDF]
In order to deliver video streams efficiently over WiFi to many thousands of consumer handheld devices, broadcast protocols must be employed. In this mode of operation the received video quality can deteriorate rapidly as a result of high application ...
Bull, David +4 more
core +2 more sources
An approach to application-layer DoS detection
With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS.
Cliff Kemp +3 more
doaj +1 more source
PluralisMAC: a generic multi-MAC framework for heterogeneous, multiservice wireless networks, applied to smart containers [PDF]
Developing energy-efficient MAC protocols for lightweight wireless systems has been a challenging task for decades because of the specific requirements of various applications and the varying environments in which wireless systems are deployed.
De Mil, Pieter +4 more
core +2 more sources
Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat
The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols.
Nikola Gavrić, Živko Bojović
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco +3 more
core +4 more sources
Power Evaluation of IOT Application Layer Protocols
The Internet of Things has affected all aspects of daily life, and the number of IoT devices is increasing day by day. According to forecasts, the number of Internet of Things devices will reach one trillion devices by 2035. The increase in the number of devices connected to the Internet will cause various concerns.
Amirhossein Shahrokhi, Mahmood Ahmadi
openaire +2 more sources
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily ...
Hichem Mrabet +3 more
doaj +1 more source

