Results 161 to 170 of about 21,562 (212)
Development of a 5G-Connected Ultra-Wideband Radar Platform for Traffic Monitoring in a Campus Environment. [PDF]
Martín-Sacristán D +4 more
europepmc +1 more source
Intelligent cloud-based RAS management: integration of DDPG reinforcement learning with AWS IoT for optimized aquaculture production. [PDF]
Elmessery WM +8 more
europepmc +1 more source
Smart city traffic optimization using IoD and IoT integration. [PDF]
Yusuf A, Sheltami TR, Mahmoud A, Imam M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT
IEEE Internet of Things Journal, 2023The demand for privacy in the current digital era is continuously growing. This is particularly true in the context of IoT, in which huge amounts of data are handled. Communication anonymity is a fundamental requirement when high privacy levels should be guaranteed.
Francesco Buccafurri +2 more
exaly +3 more sources
MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT
IEEE Transactions on Dependable and Secure ComputingMQTT has become the de facto standard in the IoT. Although standard MQTT lacks built-in security features, several proposals have been made to address this gap. Unfortunately, no existing proposal aims to offer end-to-end data flow integrity in the threat model of untrusted broker.
Vincenzo De Angelis +2 more
exaly +3 more sources
Lightweight Security Scheme for MQTT/MQTT-SN Protocol
2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019In the coming years, sensors will likely have a permeated every aspect of our life. Several works explain how the Internet of things (IoT) will have an impact on almost all aspects of our life and why security is at the top of the list of IoT challenges. Constrained nodes constitute a significant portion of devices in IoT. These nodes are characterized
Ousmane Sadio +2 more
openaire +1 more source

