Results 11 to 20 of about 104,367 (277)

Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications

open access: yesInformation, 2021
In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for ...
Stefan A. Aebersold   +3 more
doaj   +1 more source

Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach

open access: yesFuture Internet, 2022
Massive scale data centers (MSDC) have become a key component of current content-centric Internet architecture. With scales of up to hundreds of thousands servers, conveying traffic inside these infrastructures requires much greater connectivity ...
Leonardo Alberro   +4 more
doaj   +1 more source

A Green Routing Protocol with Wireless Power Transfer for Internet of Things

open access: yesJournal of Sensor and Actuator Networks, 2021
The usually constrained resources and lossy links scenarios of Internet of Things (IoT) applications require specific protocol suite, as the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). Due to its flexibility, RPL can support efficiently
Francesco Chiti   +2 more
doaj   +1 more source

Security Model for TCP/IP Protocol Suite

open access: yesJournal of Advances in Information Technology, 2011
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet.  Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj   +1 more source

Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices

open access: yesIEEE Access, 2023
Implantable medical devices, such as pacemakers, cardiac defibrillators, and insulin pumps, play a crucial role in monitoring patients’ vital signs within healthcare systems. However, these networked devices are susceptible to external attacks and
Nima Karimian   +3 more
doaj   +1 more source

IoT Device Integration and Payment via an Autonomic Blockchain-Based Service for IoT Device Sharing

open access: yesSensors, 2022
The Internet of Things (IoT) incorporates billions of IoT devices (e.g., sensors, cameras, wearables, smart phones, as well as other internet-connected machines in homes, vehicles, and industrial plants), and the number of such connected IoT devices is ...
Anas Dawod   +4 more
doaj   +1 more source

A novel pseudo-random number generator based on discrete chaotic iterations [PDF]

open access: yes, 2009
Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full ...
Bahi, Jacques M.   +2 more
core   +1 more source

Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat

open access: yesSensors, 2022
The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols.
Nikola Gavrić, Živko Bojović
doaj   +1 more source

Home - About - Disclaimer - Privacy