Results 71 to 80 of about 4,569 (223)

Authorization Framework for the Internet-of-Things [PDF]

open access: yes, 2013
This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory.
Gehrmann, Christian   +2 more
core   +2 more sources

Requirements Evaluation Framework for a Phase‐Driven AIoT Architecture for Remote Patient Monitoring

open access: yesThe Journal of Engineering, Volume 2025, Issue 1, January/December 2025.
This research is significant because it addresses a critical gap in the management of chronic diseases, particularly for elderly populations. Chronic conditions often require frequent medical visits, which can be challenging. The study introduces an innovative architecture using Artificial Intelligence (AI) and Internet of Things (IoT) technologies to ...
Sajid Shah   +6 more
wiley   +1 more source

An information interaction method for smart mine

open access: yesGong-kuang zidonghua, 2020
In view of 'information island' problem which is common in coal mines, a smart mine information interaction method based on resource model and constrained application protocol (CoAP) was proposed from practical point of view.
HU Wentao   +3 more
doaj   +1 more source

Semantic Gateway as a Service architecture for IoT Interoperability [PDF]

open access: yes, 2014
The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and
Anantharam, Pramod   +2 more
core   +3 more sources

Minimizing IoT Energy Consumption Using BLE and Metaprotocol Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The Internet of Things is a very fast‐growing industry thanks to the increasing availability of cheap microcontrollers, which are its main component. However, the commonly used cloud technologies are not best suited for resource‐constrained devices, so energy optimization is needed to extend their battery life.
L. Milić   +3 more
wiley   +1 more source

An Edge-Fog Secure Self-Authenticable Data Transfer Protocol

open access: yesSensors, 2019
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise.
Algimantas Venčkauskas   +5 more
doaj   +1 more source

Recent advances in industrial wireless sensor networks towards efficient management in IoT [PDF]

open access: yes, 2015
With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast ...
Leung, Victor C M   +3 more
core   +1 more source

Challenges in Implementing IoT for Enhanced Reliability and Effectiveness in Smart Grids: Literature Review

open access: yesInternational Transactions on Electrical Energy Systems, Volume 2025, Issue 1, 2025.
Challenges in power quality and reliability present significant difficulties in conventional power grids for both service providers and customers. Smart grids (SGs) provide the opportunity to integrate renewable energy resources, and integrating Internet of Things (IoT) in the grid can enhance the capabilities of the SG.
Ahmed S. Alsafran   +3 more
wiley   +1 more source

Win CoAP: A Window-Based Congestion Control Approach for Burst Traffic in IoT Networks

open access: yesIEEE Access
Constrained Application Protocol (CoAP) is a widely used communication protocol in Internet of Things (IoT) networks. Congestion is a major concern in IoT networks because it affects the performance of applications and network reliability.
Archana K. Rajan, Masaki Bandai
doaj   +1 more source

IoT Networks: Using Machine Learning Algorithm for Service Denial Detection in Constrained Application Protocol

open access: yesCovenant Journal of Engineering Technology, 2023
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi   +4 more
doaj  

Home - About - Disclaimer - Privacy