Results 81 to 90 of about 852,517 (241)

Design and analysis of secure communication protocol in the internet of things environment

open access: yesDiscover Internet of Things
With the popularization and development of the Internet of Things, the issue of secure communication of Internet of Things devices receives increasing attention. However, Internet of Things devices often have characteristics such as limited resources and
Xiaoyan Huo
doaj   +1 more source

CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things [PDF]

open access: gold, 2020
Sennan Sankar   +4 more
openalex   +1 more source

Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

open access: yesJournal of Electrical and Computer Engineering, 2015
In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet.
Qin Qin, Yong-qiang He, Li-ming Nie
doaj   +1 more source

A Q-Learning-Based Adaptive MAC Protocol for Internet of Things Networks [PDF]

open access: gold, 2021
Chien-Min Wu   +4 more
openalex   +1 more source

A provably secure two-way authenticated key agreement protocol for IIoT environments

open access: yesEgyptian Informatics Journal
In the ever-evolving Internet landscape and the broad adoption of the Internet of Things (IoT) in various industries, secure communication is imperative, especially in the Industrial Internet of Things (IIoT).
Ahmed Manasrah   +3 more
doaj   +1 more source

Security scheme for time-critical TRDP message

open access: yes网络与信息安全学报
As train communication technology advanced, the environment of train control networks became increasingly complex, with more network bandwidth being demanded by on-board devices and greater complexity emerging in network topology.
CUI Yulong   +3 more
doaj  

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Pre-Shared Key Authentication With EDHOC: The Security–Performance Tradeoff

open access: yesIEEE Access
The rapid growth of the Internet of Things ecosystem has intensified the need for secure, resource-efficient communication protocols. The EDHOC protocol is a lightweight authenticated key-exchange protocol, recently developed by the Internet Engineering ...
Elsa Lopez Perez   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy