Results 301 to 310 of about 517,878 (310)
Some of the next articles are maybe not open access.
RMDD: Cross Layer Attack in Internet of Things
2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018The existing research on the Internet of Things(IoT) security mainly focuses on attack and defense on a single protocol layer. Increasing and ubiquitous use of loT also makes it vulnerable to many attacks. An attacker try to performs the intelligent, brutal and stealthy attack that can reduce the risk of being detected.
Shailesh Garg+5 more
openaire +2 more sources
Internet-Based Design Visualization for Layered Manufacturing
Concurrent Engineering, 2003When considering the use of layered manufacturing (LM), there are many issues a designer has to address for handling a stereolithography tessellation language (STL) model, the de facto standard for LM. In this paper, we propose an Internet-based design visualization tool for decision support when optimizing the LM process in support of a highly ...
R. Ian Campbell, Haeseong Jee
openaire +2 more sources
Internet transport layer system identification
Proceedings of the 11th IEEE Signal Processing Workshop on Statistical Signal Processing (Cat. No.01TH8563), 2002This paper addresses the problem of building appropriate statistical models of the way the Internet appears from the point of view of congestion, to a transmission control protocol (TCP) sender. TCP is a mechanism for implementing full duplex, acknowledged, end-to-end transmission over an Internet protocol (IP) network.
openaire +2 more sources
Wireless Physical-Layer Authentication for the Internet of Things
2017Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer ...
CAPARRA, GIANLUCA+4 more
openaire +3 more sources
Redesigning Transport Layer Architecture for Future Internet
2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011Current transport layer is facing challenges from both the original design drawbacks and new evolutionary technologies demands. The strict hierarchical layer architecture is restricted and inflexible, which makes the addition and deployment of new features difficult.
Feng Qiu+5 more
openaire +2 more sources
A Multi-layer Security Model for Internet of Things
2012Since the open architecture at the perception layer, the IoT not only faces the traditional security risks in TCP/IP network, but also faces the new emerging risks. In this paper, through analysising the infrastructure of IoT and the security risks in IoT, a new multi-layer security model is proposed, which aims to improve the security technique in IoT.
Geng Zhenmin+3 more
openaire +2 more sources
The Internet Application Layer and the Cloud
2012The applications in the Internet application layer are the face of the cloud. When an enterprise user records a sales contact in a SaaS customer relations management application, they use a browser. The browser interacts through the Web with a back-end application in a cloud.
openaire +2 more sources
A Survey on Layered Approach for Internet of Things Security
Advanced Science and Technology Letters, 2017Bonomali Khuntia, Santosh Kumar Sharma
openaire +1 more source