Results 41 to 50 of about 765 (197)
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
With the rise in smart devices, the Internet of Things (IoT) has been established as one of the preferred emerging platforms to fulfil their need for simple interconnections.
Laura Vigoya +3 more
doaj +1 more source
The industrial Internet of Things (IIoT) has become an innovative technology that has brought many benefits to industries and organizations. This review presents a comprehensive analysis of IIoT’s applications, highlighting its ability to optimize industrial operations through advanced connectivity, real‐time data exchange, automation, and its ...
Fujun Qiu +7 more
wiley +1 more source
Variance‐driven security optimisation in industrial IoT sensors
The methodology employed in this study adopts a systematic approach to deploying machine learning algorithms for the detection of anomalies in industrial sensor data. Data preprocessing, the first step in the process, ensures that the industrial sensor data is cleaned and prepared for subsequent model training.
Hardik Gupta +7 more
wiley +1 more source
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life.
Hyo Jin Ban, Jaeduck Choi, Namhi Kang
doaj +1 more source
Design and Implementation of a CoAP-Compliant Solution for RFID Inclusion in the Internet of Things
Recent technological advancements allowed widening the applicability scope of the RFID (Radio Frequency Identification) technology from item identification to sensor-enabled computation platforms. This feature, added to the native radio energy-harvesting
Ivan Farris +3 more
doaj +1 more source
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy ...
Balkis Bettoumi, Ridha Bouallegue
doaj +1 more source
Effective resource allocation is a fundamental challenge for software systems in Internet of Things (IoT) networks, influencing their performance, energy consumption, and scalability in dynamic environments. This study introduces a new framework, DRANet–graph convolutional network (GCN)+, which integrates GCNs, transformer architectures, and ...
Kiran Rao P. +7 more
wiley +1 more source
COAP BASED ACUTE PARKING LOT MONITORING SYSTEM USING SENSOR NETWORKS [PDF]
Vehicle parking is the act of temporarily maneuvering a vehicle in to a certain location. To deal with parking monitoring system issue such as traffic, this paper proposes a vision of improvements in monitoring the vehicles in parking lots based on ...
R. Aarthi, A. Pravin Renold
doaj
Performance Evaluation of Video Streaming Application Over CoAP in IoT
The Internet of Things (IoT) is considered a milestone for the realization of intelligent services through the interaction of smart things. Constrained application protocol (CoAP) was proposed by the Internet engineering task force as a web transfer ...
Waqas Ur Rahman +2 more
doaj +1 more source

