Results 21 to 30 of about 84,714 (295)

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]

open access: yes, 2019
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco   +3 more
core   +4 more sources

Iotverif: Automatic Verification of SSL/TLS Certificate for IoT Applications

open access: yesIEEE Access, 2021
Although extensive research has been conducted on securing the Internet of Things (IoT) communication protocols, various vulnerabilities and exploits are continuously discovered and reported.
Anyi Liu   +3 more
doaj   +1 more source

Сryptocurrency and Internet of Things: Problems of Implementation and Realization [PDF]

open access: yes, 2018
IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments.
Kopytko, Vasyl   +4 more
core   +2 more sources

Device models and technologies of data transmission and processing in the internet of things networks

open access: yesСистемный анализ и прикладная информатика, 2022
The subject of research is the analysis and definition of the information model of devices, the choice of technologies and protocols for data collection and analysis, routing protocols for the Internet of Things (IoT) networks. The purpose of the article
V. A. Vishnyakov
doaj   +1 more source

RADIS: Remote Attestation of Distributed IoT Services [PDF]

open access: yes, 2019
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) checks the trustworthiness of a potentially untrusted device (i.e., Prover).
Conti, Mauro   +2 more
core   +2 more sources

Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications

open access: yesSensors, 2023
Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications.
Haiyan Sun   +4 more
doaj   +1 more source

Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things [PDF]

open access: yes, 2015
As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers
Demeester, Piet   +3 more
core   +3 more sources

Evaluation of HTTP/3 Protocol for Internet of Things and Fog Computing Scenarios [PDF]

open access: yesRevista Română de Informatică și Automatică, 2021
The paper investigates the performance properties of the new HTTP/3 protocol in IoT scenarios, with the focus on fog computing. A specific experimental environment is created, providing realistic IoT conditions.
Marjan MILOŠEVIĆ   +2 more
doaj   +1 more source

Survey on wireless technology trade-offs for the industrial internet of things [PDF]

open access: yes, 2020
Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity.
De Poorter, Eli   +3 more
core   +1 more source

AAA protocol in IoT

open access: yesProceedings of the 11th International Conference on “Electronics, Communications and Computing (IC|ECCO-2021)”, 2022
This document is representing not only the description of AAA protocol. It is representing real production problems which I encountered in many years of work with it. Each from this problem was taken separately. It was analyzed and the best solution was applied to it. Article is containing not only analyzing of the problem.
openaire   +3 more sources

Home - About - Disclaimer - Privacy