Results 301 to 310 of about 548,723 (329)
Some of the next articles are maybe not open access.
RMDD: Cross Layer Attack in Internet of Things
2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018The existing research on the Internet of Things(IoT) security mainly focuses on attack and defense on a single protocol layer. Increasing and ubiquitous use of loT also makes it vulnerable to many attacks. An attacker try to performs the intelligent, brutal and stealthy attack that can reduce the risk of being detected.
Shailesh Garg +5 more
openaire +2 more sources
Wireless Physical-Layer Authentication for the Internet of Things
2017Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer ...
CAPARRA, GIANLUCA +4 more
openaire +3 more sources
Application layer protocols for the Internet of Things: A survey
2016 International Conference on Engineering & MIS (ICEMIS), 2016The “Internet of things” (IoT) concept nowadays is one of the hottest trends for research in any given field; since IoT is about interactions between multiple devices, things, and objects. This interaction opens different directions of enhancement and development in many fields, such as architecture, dependencies, communications, protocols, security ...
Mohammed Q. Shatnawi +2 more
openaire +2 more sources
Internet Layers: Connecting the World
The internet has become an indispensable part of our lives. Powering everything from social media and online shopping to video calls and cloud computing. We use it daily, often without a second thought about the intricate processes that allow us to connect with information and people worldwide. This article aims to pull back the curtain and explore theopenaire +1 more source
A Multi-layer Security Model for Internet of Things
2012Since the open architecture at the perception layer, the IoT not only faces the traditional security risks in TCP/IP network, but also faces the new emerging risks. In this paper, through analysising the infrastructure of IoT and the security risks in IoT, a new multi-layer security model is proposed, which aims to improve the security technique in IoT.
Geng Zhenmin +3 more
openaire +2 more sources
The Internet Application Layer and the Cloud
2012The applications in the Internet application layer are the face of the cloud. When an enterprise user records a sales contact in a SaaS customer relations management application, they use a browser. The browser interacts through the Web with a back-end application in a cloud.
openaire +2 more sources
Innovations in research and clinical care using patient‐generated health data
Ca-A Cancer Journal for Clinicians, 2020Aasha I Hoogland +2 more
exaly
Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges
IEEE Communications Surveys and Tutorials, 2020Tie Qiu, Jiancheng Chi, Xiaobo Zhou
exaly
Federated Learning for Internet of Things: A Comprehensive Survey
IEEE Communications Surveys and Tutorials, 2021Ming Ding +2 more
exaly

