Design and analysis of secure communication protocol in the internet of things environment
With the popularization and development of the Internet of Things, the issue of secure communication of Internet of Things devices receives increasing attention. However, Internet of Things devices often have characteristics such as limited resources and
Xiaoyan Huo
doaj +1 more source
Methodology to Asses Internet Protocol Connection Availability: A Prerequisite For Feasible Video Stream Through Content Delivery Networks [PDF]
Vitor Chaves de Oliveira +2 more
openalex +1 more source
CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things [PDF]
Sennan Sankar +4 more
openalex +1 more source
In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet.
Qin Qin, Yong-qiang He, Li-ming Nie
doaj +1 more source
A Q-Learning-Based Adaptive MAC Protocol for Internet of Things Networks [PDF]
Chien-Min Wu +4 more
openalex +1 more source
A provably secure two-way authenticated key agreement protocol for IIoT environments
In the ever-evolving Internet landscape and the broad adoption of the Internet of Things (IoT) in various industries, secure communication is imperative, especially in the Industrial Internet of Things (IIoT).
Ahmed Manasrah +3 more
doaj +1 more source
Security scheme for time-critical TRDP message
As train communication technology advanced, the environment of train control networks became increasingly complex, with more network bandwidth being demanded by on-board devices and greater complexity emerging in network topology.
CUI Yulong +3 more
doaj
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
Protocol for the REVISIT-BPD Trial, a Randomized Controlled Trial Testing the Effectiveness of an Internet-Based Self-Management Intervention in the Treatment of Borderline Personality Disorder (BPD) [PDF]
Jan Philipp Klein +5 more
openalex +1 more source
Pre-Shared Key Authentication With EDHOC: The Security–Performance Tradeoff
The rapid growth of the Internet of Things ecosystem has intensified the need for secure, resource-efficient communication protocols. The EDHOC protocol is a lightweight authenticated key-exchange protocol, recently developed by the Internet Engineering ...
Elsa Lopez Perez +5 more
doaj +1 more source

