Results 261 to 270 of about 84,714 (295)
Some of the next articles are maybe not open access.
OneM2M-based IoT protocol integration
2017 IEEE Conference on Standards for Communications and Networking (CSCN), 2017In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple.
Chia-Wei Wu +3 more
openaire +1 more source
Security of Low Level IoT Protocols
2019Application of formal methods in security is demonstrated. Formalism for description of security properties of low level IoT protocols is proposed. It is based on security property called infinite step opacity. We prove some of its basic properties as well as we show its relation to other security notions. Finally, complexity issues of verification and
Damas P. Gruska, M. Carmen Ruiz
openaire +1 more source
IoT Protocols for Low-power Massive IoT: A Communication Perspective
2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2019The constantly growing number of resource-limited MTC (Machine-Type Communication) devices is challenging both the telecommunication operators as well as industrial companies to efficiently design communication technologies, protocols, and end-devices for data transmissions in the upcoming 5G and beyond wireless communication networks.
Martin Stusek +4 more
openaire +1 more source
IoT network protocols comparison for the purpose of IoT constrained networks
2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017In this paper, a comparison of Internet of Things protocols used for data transfer in Internet of Things constrained networks is presented. Setting up such a network with a large number of physical interconnected IoT devices can be a challenge. In the IoT world, one of the key challenges is to efficiently support M2M communication in constrained ...
Ivan Hedi, I. Speh, Antonio Sarabok
openaire +2 more sources
STAC-protocol: Secure and Trust Anonymous Communication protocol for IoT
2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017Security and privacy are prominent tasks in resource constrained devises in Internet of Things (IoT) and Wireless Sensor Networks (WSN). Therefore, to ensure anonymity and trust, concealing nodes' real identity trust management are mandatory. The majority of exiting IoT security solutions didn't achieve complete security needs and/or have large ...
Sarra Jebri +2 more
openaire +1 more source
Configurable Protocol for IoT Systems
2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2022openaire +1 more source
Protocol enhancements for moving from connected IoT to efficient IoT
2015 18th International Conference on Intelligence in Next Generation Networks, 2015Standardization activities that are or can become crucial for the Internet of Things (IoT) have mainly focused on reference architectures, device interoperability, and Machine-to-Machine communication protocols, leading to a connected IoT. However, the related specifications have already started taking a step further, namely towards enabling the ...
openaire +1 more source
A Lightweight Mutual Authentication Protocol for IoT
Journal of Communications and Information Networks, 2022Brou Bernard Ehui +3 more
openaire +1 more source
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
Internet of Things (Netherlands), 2021Frédéric Le Mouël
exaly
Multi-Protocol IoT Network Reconnaissance
2022 IEEE Conference on Communications and Network Security (CNS), 2022Stefan Gvozdenovic +3 more
openaire +1 more source

