Results 251 to 260 of about 84,714 (295)
Some of the next articles are maybe not open access.

IoT Gateway Integrity Checking Protocol

2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC), 2019
Internet of Things (IoT) gateways connected to the Internet and to IoT devices and running conventional operating systems and communication protocols, are valuable targets for malicious attackers. Once taken over, a compromised gateway can alter, drop or insert data while it bridges information from the IoT devices to the applications running on the ...
Mateus Martínez De Lucena   +2 more
openaire   +1 more source

Comparative Analysis of IoT Communication Protocols

2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
With the proliferation of machine-to-machine communication, there are many communication protocols standardized for IoT applications. Performances of these protocols may significantly deviate from each other even under the same operating conditions.
Burak H. Çorak   +4 more
openaire   +2 more sources

Performance Comparison of IoT Communication Protocols

2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2019
The amount of systems based on Internet of Things (IoT) has grown at an unprecedented rate over the last years and such an expansion tends to continue. As a consequence, billions of devices are expected to be deployed on diverse industries (e.g., healthcare, automotive) during the next decade.
Thays Moraes   +3 more
openaire   +1 more source

IoT Protocols

Today the Internet has enabled the Internet of Things (loT) to become ubiquitous and has affected human life with sophisticated applications. The interaction among smart devices such as sensors, gateways, servers, and user applications in IoT will be through IoT protocols.
Kasarapu Ramani   +4 more
openaire   +1 more source

Security Protocols for IoT

2018
The Internet of Things (IoT), is a network of devices that are uniquely identified and has embedded software required to communicate the transient states and data that are usually used to trigger an actuator. The edge networking devices and protocols are used to communicate with a cloud server that processes and aggregates the big data arriving from ...
J. Cynthia   +3 more
openaire   +1 more source

Protocol stack virtualization support in IoT

Transactions on Emerging Telecommunications Technologies, 2021
AbstractMassive IoT scenarios involve a huge number of devices where deployment, provisioning, and configuration are carried out without any human intervention. Well‐known mechanisms of resource discovery and management attempt to enable some of this functionality typically associated with zero‐configuration schemes.
openaire   +1 more source

An Improved User Authentication Protocol for IoT

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2018
Rapid development in the field of internet of things (IoT) has increased numbers of applications. Meanwhile, security and privacy threats are also introduced. Various authentication protocols are devised to resist the malicious attacks. Li et al. proposed a remote user authentication protocol using smart cards and they claimed their protocol was secure.
Jianming Cui   +3 more
openaire   +1 more source

A Survey on Architecture, Protocols and Challenges in IoT

Wireless Personal Communications, 2020
Internet of Things (IoT) is an emerging paradigm which aims to inter-connect all smart physical devices, so that the devices together can provide smart services to the users. Some of the IoT applications include smart homes, smart cities, smart grids, smart retail, etc.
openaire   +1 more source

Secure Authentication Protocol for IoT Architecture

2017 International Conference on Information Technology (ICIT), 2017
In recent years, Internet of Things(IoT) gained popularity due to its enormous applications in many fields. IoT network comprises heterogeneous devices to a great scale, which creates numerous security threats. In this paper, a smart home based on IoT architecture is considered, where the IoT smart Hub(ISH) communicate with the cloud in one hand, and ...
Amiya Kumar Sahu   +4 more
openaire   +1 more source

Security Protocols for IoT Access Networks

2016
Nowadays, we are immersed in a digital world with a huge number of sensors, and devices, connected following a great variety of typologies. Internet Protocol (IP) v6 and the standardization of the novel Internet of Things (IoT) protocols enable new services and applications.
Giuliano, Romeo   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy