Results 21 to 30 of about 14,625 (213)

Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [PDF]

open access: yesJisuanji kexue
Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission,an MQTT security protection scheme is designed based on domestic cryptography algorithms SM2,SM3 and SM4.Two-way identity ...
LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun
doaj   +1 more source

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities

open access: yesIEEE Access, 2021
Internet of Things is a widely adopted and pervasive technology, but also one of the most relevant in cyber-security, given the volume and sensitivity of shared data and the availability of affordable but insecure products.
Ivan Vaccari   +4 more
doaj   +1 more source

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]

open access: yes, 2019
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco   +3 more
core   +4 more sources

Implementasi dan Analisis Performa Protokol Message Queuing Telemetry Protocol Jaringan Smart Farming Pada Budidaya Jamur Tiram Dengan Memanfaatkan Internet Of Things

open access: yesJournal of Internet and Software Engineering, 2021
– The development of technology, gives many effects for human life. Many things can be controlled automatically and remotely. Internet of Things is as one of technology development which can be a solution to make human life easier. Internet of Things can
Sidiq Rilo Pambudi, Alif Subardono
doaj   +1 more source

SlowTT: A Slow Denial of Service against IoT Networks

open access: yesInformation, 2020
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information.
Ivan Vaccari   +2 more
doaj   +1 more source

Flexible and Efficient Security Framework for Many-to-Many Communication in a Publish/Subscribe Architecture

open access: yesSensors, 2022
Message Queuing Telemetry Transport (MQTT) is a lightweight publish/subscribe protocol, which is currently one of the most popular application protocols in Internet of Things (IoT) thanks to its simplicity in use and its scalability. The secured version,
Roald Van Glabbeek   +4 more
doaj   +1 more source

Smart vest for respiratory rate monitoring of COPD patients based on non-contact capacitive sensing [PDF]

open access: yes, 2018
In this paper, a first approach to the design of a portable device for non-contact monitoring of respiratory rate by capacitive sensing is presented.
Barbarov-Rostán, Gerardo   +7 more
core   +1 more source

An Assessment of the Performance of the Secure Remote Update Protocol in Simulated Real-World Conditions

open access: yesIoT, 2021
This paper assesses the relative performance of the MQTT protocol in comparison to the Secure Remote Update Protocol (SRUP) in a number of simulated real-world conditions, and describes an experiment that has been conducted to measure the processing ...
Andrew John Poulter, Simon J. Cox
doaj   +1 more source

Dashboard IoT Remote Lab with MQTT Protocol

open access: yesAnais Estendidos do XXVII Simpósio Brasileiro de Sistemas Multimídia e Web (WebMedia 2021), 2021
The Internet of Things enables the data collection of the physical world in real time, raising opportunities for cost reduction and optimization at large scale. However, creating an IoT solution that transforms these data into information by enabling new visualizations and interactions is not trivial.
Victor Takashi Hayashi   +4 more
openaire   +2 more sources

Real Performance Evaluation On MQTT and COAP Protocol in Ubiquitous Network Robot Platform (UNRPF) for Disaster Multi-robot Communication

open access: yesEmitter: International Journal of Engineering Technology, 2018
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to ...
Muhammad Ikrar Yamin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy