Results 61 to 70 of about 4,597 (215)

Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

open access: yesSensors, 2022
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns.
Wen-Chung Tsai   +3 more
doaj   +1 more source

Publish/subscribe protocol in wireless sensor networks: improved reliability and timeliness [PDF]

open access: yes, 2018
The rapidly-evolving demand of applications using wireless sensor networks in several areas such as building and industrial automation or smart cities, among other, makes it necessary to determine and provide QoS support mechanisms which can satisfy the ...
Calveras Augé, Anna M.   +1 more
core   +2 more sources

Constrained Application Protocol (CoAP) no Arduino UNO R3: Uma Análise Prática

open access: yesAnais do Workshop Pré-IETF (WPIETF), 2018
O protocolo CoAP (Constrained Application Protocol) é uma iniciativa de padronização para troca de informações em dispositivos restritos, sendo o seu uso apropriado para o ambiente de Internet das Coisas (IoT). Atualmente, um conjunto de iniciativas está em desenvolvimento para a criação de uma biblioteca, utilizando várias linguagens (incluindo C, C++,
Jéferson Campos Nobre   +3 more
openaire   +2 more sources

Advanced IoT Network Topologies to Optimize Medical Monitoring Platforms based on a Constrained and Secured IOT Application Protocol CoAP

open access: yesE3S Web of Conferences, 2022
The Internet of Things (IoT) became, and still an important and critical element during the covid-19 pandemic, and this paper was written within that framework, as it proposes a synchronized medical IoT platform that is used to monitor citizens’ access to public areas, and where the access is only authorized if one of the three following conditions is ...
Fatima Zahra Hamza   +5 more
openaire   +2 more sources

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

A Review on Integrating IoT, IIoT, and Industry 4.0: A Pathway to Smart Manufacturing and Digital Transformation

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The industrial Internet of Things (IIoT) has become an innovative technology that has brought many benefits to industries and organizations. This review presents a comprehensive analysis of IIoT’s applications, highlighting its ability to optimize industrial operations through advanced connectivity, real‐time data exchange, automation, and its ...
Fujun Qiu   +7 more
wiley   +1 more source

CoAP/DTLS Protocols in IoT Based on Blockchain Light Certificate

open access: yesIoT
The Internet of Things (IoT) is expanding rapidly, but the security of IoT devices remains a noteworthy concern due to resource limitations and existing security conventions. This research investigates and proposes the use of a Light certificate with the
David Khoury   +7 more
doaj   +1 more source

Lightweight CoAP-Based Bootstrapping Service for the Internet of Things

open access: yesSensors, 2016
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc.
Dan Garcia-Carrillo, Rafael Marin-Lopez
doaj   +1 more source

Securing SDN-Based IoT Group Communication

open access: yesFuture Internet, 2021
IoT group communication allows users to control multiple IoT devices simultaneously. A convenient method for implementing this communication paradigm is by leveraging software-defined networking (SDN) and allowing IoT endpoints to “advertise” the ...
Bander Alzahrani, Nikos Fotiou
doaj   +1 more source

Variance‐driven security optimisation in industrial IoT sensors

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
The methodology employed in this study adopts a systematic approach to deploying machine learning algorithms for the detection of anomalies in industrial sensor data. Data preprocessing, the first step in the process, ensures that the industrial sensor data is cleaned and prepared for subsequent model training.
Hardik Gupta   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy