Results 301 to 310 of about 548,723 (329)
Some of the next articles are maybe not open access.

RMDD: Cross Layer Attack in Internet of Things

2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018
The existing research on the Internet of Things(IoT) security mainly focuses on attack and defense on a single protocol layer. Increasing and ubiquitous use of loT also makes it vulnerable to many attacks. An attacker try to performs the intelligent, brutal and stealthy attack that can reduce the risk of being detected.
Shailesh Garg   +5 more
openaire   +2 more sources

Wireless Physical-Layer Authentication for the Internet of Things

2017
Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer ...
CAPARRA, GIANLUCA   +4 more
openaire   +3 more sources

Application layer protocols for the Internet of Things: A survey

2016 International Conference on Engineering & MIS (ICEMIS), 2016
The “Internet of things” (IoT) concept nowadays is one of the hottest trends for research in any given field; since IoT is about interactions between multiple devices, things, and objects. This interaction opens different directions of enhancement and development in many fields, such as architecture, dependencies, communications, protocols, security ...
Mohammed Q. Shatnawi   +2 more
openaire   +2 more sources

Internet Layers: Connecting the World

The internet has become an indispensable part of our lives. Powering everything from social media and online shopping to video calls and cloud computing. We use it daily, often without a second thought about the intricate processes that allow us to connect with information and people worldwide. This article aims to pull back the curtain and explore the
openaire   +1 more source

A Multi-layer Security Model for Internet of Things

2012
Since the open architecture at the perception layer, the IoT not only faces the traditional security risks in TCP/IP network, but also faces the new emerging risks. In this paper, through analysising the infrastructure of IoT and the security risks in IoT, a new multi-layer security model is proposed, which aims to improve the security technique in IoT.
Geng Zhenmin   +3 more
openaire   +2 more sources

The Internet Application Layer and the Cloud

2012
The applications in the Internet application layer are the face of the cloud. When an enterprise user records a sales contact in a SaaS customer relations management application, they use a browser. The browser interacts through the Web with a back-end application in a cloud.
openaire   +2 more sources

Innovations in research and clinical care using patient‐generated health data

Ca-A Cancer Journal for Clinicians, 2020
Aasha I Hoogland   +2 more
exaly  

Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges

IEEE Communications Surveys and Tutorials, 2020
Tie Qiu, Jiancheng Chi, Xiaobo Zhou
exaly  

Internet layer protocols

2003
Deon Reynders, Edwin Wright
openaire   +1 more source

Federated Learning for Internet of Things: A Comprehensive Survey

IEEE Communications Surveys and Tutorials, 2021
Ming Ding   +2 more
exaly  

Home - About - Disclaimer - Privacy