Results 171 to 180 of about 14,625 (213)
Some of the next articles are maybe not open access.

IoT Applications based on MQTT Protocol

2020 International Symposium on Electronics and Telecommunications (ISETC), 2020
This paper presents two different approaches for implementing IoT applications, using the MQTT protocol. The paradigm is discussed from a security point of view. The components of the first system are two Raspberry PI boards (model 4 and model 3B+), a breadboard with LEDs and an IFTTT application.
Maria Salagean, Daniel Zinca
openaire   +1 more source

Lightweight Security Scheme for MQTT/MQTT-SN Protocol

2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019
In the coming years, sensors will likely have a permeated every aspect of our life. Several works explain how the Internet of things (IoT) will have an impact on almost all aspects of our life and why security is at the top of the list of IoT challenges. Constrained nodes constitute a significant portion of devices in IoT. These nodes are characterized
Ousmane Sadio   +2 more
openaire   +1 more source

Routing in IoT using MQTT Protocol

2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), 2020
Internet of Things (IoT) is the tool by which we can transform the existing devices to smart and intelligent as they can themselves take decision through communication. IoT is a heterogeneous technique that consists of not only hardware but also software.
Rahul Johari   +2 more
openaire   +1 more source

SemSub: Semantic Subscriptions for the MQTT Protocol

2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
The Internet of Things is constantly reaching new industrial and social domains, subsequently, encompassing virtually all domains. The number of connected devices continues to rise exponentially. Deployments with particularly high and extremely heterogeneous data volumes are particularly characteristic of several IoT domains such as the Smart City ...
Tobias Christian Piller   +1 more
openaire   +1 more source

Comparison Functionalities of HTTP and MQTT Protocols

2022
The mission and goal of this paper was to compare functionalities for both MQTT and HTTP protocol on the same example to see the advantages and disadvantages of sending and receiving data from server/device. Used tools are Android Studio, Kotlin, NestJS, TypeScript, PostgreSQL and in implementation two protocols were used: HTTP and MQTT protocols to ...
Tomislav Kušević   +2 more
openaire   +1 more source

Robotic arm control using MQTT protocol

2022
The aim of this work is to create a simple system that will serve mainly as a teaching tool for demonstrating communication in a simple IoT system. The proposed system should allow easily add different devices to the system and establish communication between them and create individual communication commands between devices The proposed system uses the
Mautner, V., Olenišák, D., Jurák, M.
openaire   +1 more source

Distributed UCON in CoAP and MQTT Protocols

2020
The Internet of Things (IoT) is playing a key role in consumer and business environments. Due to the sensitivity of the information IoT devices collect and share, and the potential impact a data breach can have in people’s lives, securing communication and access to data in IoT has become a critical feature.
Athanasios Rizos   +3 more
openaire   +1 more source

Research on Node Authentication of MQTT Protocol

2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), 2020
The technological development of artificial intelligence, Internet of Vehicles, big data, edge computing, intelligent manufacturing, 5G and other technologies will bring great prospects to the popularization of the Internet of Things. In the future, we will see more and more IoT systems of different sizes.
Huo Yujia, Huang Yongfeng, Chen Fu
openaire   +1 more source

MQTT Protocol for Efficient AI Communication

In recent years, advancements in Internet of Things (IoT) and artificial intelligence have revolutionized various fields, including biometric authentication systems. This project focuses on integrating IoT with face recognition technology to create a robust and efficient authentication system.
Khot, Suraj, Mali, Abhijeet
openaire   +2 more sources

Protocol Recommendation for Message Encryption in MQTT

2019 International Conference on Data Science and Communication (IconDSC), 2019
As per Gartner's forecast, around 25 billion things will be connected to Internet by 2020. Devices connected in open Internet poses the most security risks, and this can impact smart homes, connected cars and other cloud connected devices. A majority of such devices use Message Queuing Telemetry Transport (MQTT), but it has very limited authentication ...
Suja P Mathews, Raju R Gondkar
openaire   +1 more source

Home - About - Disclaimer - Privacy