Results 11 to 20 of about 5,924 (195)
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol.
Muhammad Husnain +7 more
doaj +3 more sources
Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements
Presently, Internet of Things (IoT) protocols are at the heart of Machine-to-Machine (M2M) communication. Irrespective of the radio technologies used for deploying an IoT/M2M network, all independent data generated by IoT devices (sensors and actuators ...
Biswajeeban Mishra +2 more
doaj +3 more sources
DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices ...
Jun-Hong Park +2 more
doaj +3 more sources
QoS is an arguable feature of Message Queuing Telemetry Transport Protocol (MQTT) that is employed under constrained environment for communication over an unreliable network in smart cities.
Jawad Ali, Mohammad Haseeb Zafar
doaj +1 more source
In this article, an open source monitoring system based on Internet of Thing (IoT) is designed to monitor electrical energy consumption. This system provides real-time information about energy consumption over time.
Nabaa Ali Jasim, Haider ALRkabi
doaj +1 more source
Platforms and Protocols for the Internet of Things [PDF]
Building a general architecture for the Internet of Things (IoT) is a very complex task, exacerbated by the extremely large variety of devices, link layer technologies, and services that may be involved in such a system.
Pielli, Chiara +4 more
core +1 more source
MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible.
Kristina Sahlmann +3 more
doaj +1 more source
TCP in the Internet of Things: from ostracism to prominence [PDF]
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Arcia Moret, Andrés +2 more
core +1 more source
As one of the typical cyber physical systems (CPS), the user energy management system (UEMS) plays an increasingly significant role in the smart grid, such as participating in automated demand response (ADR).
Kunqi Jia +3 more
doaj +1 more source
Augmented Reality dalam Penggunaan Alat Rumah Tangga Berbasis Internet Of Things
Pengembangan aplikasi ini didasari oleh tingkat efisiensi penggunaan teknologi augmented reality yang masih minimum, khususnya dibidang rumah tangga. Hal ini disebabkan kurangnya pengetahuan dibidang tersebut dan menjadi dasar dalam membangun aplikasi ...
Raja Chairul Jannah Wydmann +1 more
doaj +1 more source

