Results 1 to 10 of about 5,976,285 (331)

RADIS: Remote Attestation of Distributed IoT Services [PDF]

open access: yes2019 Sixth International Conference on Software Defined Systems (SDS), 2019
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) checks the trustworthiness of a potentially untrusted device (i.e., Prover).
Conti, Mauro   +2 more
core   +7 more sources

QoE-Driven IoT Architecture: A Comprehensive Review on System and Resource Management

open access: yesIEEE Access, 2022
Internet of Things (IoT) services have grown substantially in recent years. Consequently, IoT service providers (SPs) are emerging in the market and competing to offer their services.
Boonyarith Saovapakhiran   +4 more
doaj   +1 more source

Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things [PDF]

open access: yes, 2015
As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers
Demeester, Piet   +3 more
core   +3 more sources

ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability [PDF]

open access: yes, 2017
Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors.
Jin, Jiong, Keoh, Sye Loong, Ko, Hajoon
core   +1 more source

Middleware Technologies for Cloud of Things - a survey [PDF]

open access: yes, 2017
The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future.
Farahbakhsh, Reza   +3 more
core   +5 more sources

An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology

open access: yesIEEE Access, 2019
This paper mainly studies the vulnerability intelligent early warning technology in the IoT environment, and studies the network security assessment method based on the attack graph association analysis of the IoT environment, and analyzes the attack ...
Mao Yi, Xiaohui Xu, Lei Xu
doaj   +1 more source

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]

open access: yes, 2018
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G.   +6 more
core   +1 more source

Building microclouds at the network edge with the Cloudy platform [PDF]

open access: yes, 2017
Edge computing enables new types of services which operate at the network edge. There are important use cases in pervasive computing, ambient intelligence and the Internet of Things (IoT) for edge computing.
Freitag, Fèlix   +2 more
core   +1 more source

Trends and patterns of broadband Internet access speed in a Nigerian university campus: A robust data exploration

open access: yesData in Brief, 2019
Efficient broadband Internet access is required for optimal productivity in smart campuses. Besides access to broadband Internet, delivery of high speed and good Quality of Service (QoS) are pivotal to achieving a sustainable development in the area of ...
Aderemi A. Atayero   +6 more
doaj   +1 more source

Discrepancies in Demand of Internet of Things Services Among Older People and People With Disabilities, Their Caregivers, and Health Care Providers: Face-to-Face Survey Study

open access: yesJournal of Medical Internet Research, 2020
BackgroundHome Internet of Things (IoT) services and devices have the potential to aid older adults and people with disabilities in their living environments.
Lee, Heayon   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy