Academic literature on the topic 'IoT device provisioning'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IoT device provisioning.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IoT device provisioning"

1

Kwon, Sungmoon, Jaehan Jeong, and Taeshik Shon. "Toward Security Enhanced Provisioning in Industrial IoT Systems." Sensors 18, no. 12 (December 10, 2018): 4372. http://dx.doi.org/10.3390/s18124372.

Full text
Abstract:
Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang, and Jun-liang Chen. "Internet of Things Service Provisioning Platform for Cross-Application Cooperation." International Journal of Web Services Research 13, no. 1 (January 2016): 1–22. http://dx.doi.org/10.4018/ijwsr.2016010101.

Full text
Abstract:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
APA, Harvard, Vancouver, ISO, and other styles
3

Papp, Istvan, Roman Pavlovic, and Marija Antic. "WISE: MQTT-based Protocol for IP Device Provisioning and Abstraction in IoT Solutions." Elektronika ir Elektrotechnika 27, no. 2 (April 29, 2021): 86–95. http://dx.doi.org/10.5755/j02.eie.28826.

Full text
Abstract:
Although numerous consumer devices use Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack to connect and communicate over the Internet, their integration into a single Internet of Things (IoT) solution represents a challenge, primarily due to the lack of the standardized interoperability framework on the application layer. Devices produced by different manufacturers cannot operate together out of the box, thus raising the cost of system setup and maintenance. In this paper, a novel protocol is proposed that aims to bridge this gap. It is based on Message Queuing Telemetry Transport (MQTT) protocol and allows the seamless integration of different kinds of IP devices into the connected system. The proposed protocol is complete as it covers the aspects of device discovery and association in the IoT network. It provides mechanisms for IoT network maintenance and defines the abstract device model and communication patterns to enable system-wide device interoperability. The other goal of the protocol is to be portable to resource-constrained platforms. To validate the proposed protocol, it was integrated into the existing smart home hub, and for testing and validation purposes, prototype devices were developed.
APA, Harvard, Vancouver, ISO, and other styles
4

Sousa, Patrícia, Luís Magalhães, João Resende, Rolando Martins, and Luís Antunes. "Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE." Sensors 21, no. 17 (September 2, 2021): 5898. http://dx.doi.org/10.3390/s21175898.

Full text
Abstract:
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms ±65.11+δ. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
5

Ganesan, Elaiyasuriyan, I.-Shyan Hwang, Andrew Tanny Liem, and Mohammad Syuhaimi Ab-Rahman. "SDN-Enabled FiWi-IoT Smart Environment Network Traffic Classification Using Supervised ML Models." Photonics 8, no. 6 (June 4, 2021): 201. http://dx.doi.org/10.3390/photonics8060201.

Full text
Abstract:
Due to the rapid growth of the Internet of Things (IoT), applications such as the Augmented Reality (AR)/Virtual Reality (VR), higher resolution media stream, automatic vehicle driving, the smart environment and intelligent e-health applications, increasing demands for high data rates, high bandwidth, low latency, and the quality of services are increasing every day (QoS). The management of network resources for IoT service provisioning is a major issue in modern communication. A possible solution to this issue is the use of the integrated fiber-wireless (FiWi) access network. In addition, dynamic and efficient network configurations can be achieved through software-defined networking (SDN), an innovative and programmable networking architecture enabling machine learning (ML) to automate networks. This paper, we propose a machine learning supervised network traffic classification scheduling model in SDN enhanced-FiWi-IoT that can intelligently learn and guarantee traffic based on its QoS requirements (QoS-Mapping). We capture the different IoT and non-IoT device network traffic trace files based on the traffic flow and analyze the traffic traces to extract statistical attributes (port source and destination, IP address, etc.). We develop a robust IoT device classification process module framework, using these network-level attributes to classify IoT and non-IoT devices. We tested the proposed classification process module in 21 IoT/Non-IoT devices with different ML algorithms and the results showed that classification can achieve a Random Forest classifier with 99% accuracy as compared to other techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Yao, Jingjing, and Nirwan Ansari. "QoS-Aware Fog Resource Provisioning and Mobile Device Power Control in IoT Networks." IEEE Transactions on Network and Service Management 16, no. 1 (March 2019): 167–75. http://dx.doi.org/10.1109/tnsm.2018.2888481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.

Full text
Abstract:
Whether you consider “IoT” as a real thing or a buzzword, there’s no doubt that connected devices, data analysis and automation are transforming industry. CERN is no exception: a network of LoRa-based radiation monitors has recently been deployed and there is a growing interest in the advantages connected devices could bring—to accelerator operations just as much as to building management. Connected devices bring risks as well as advantages, however, and the last thing any business needs is an unsafe, uncoordinated and unmanaged sensor environment. To support the deployment of the LoRa-based radiation sensors, CERN has established both a Low Power Wireless Area Network (LPWAN) to complement the existing wired and wireless networks and a service infrastructure to manage the provisioning, orchestration, data transfer, security and operation for connected devices.
APA, Harvard, Vancouver, ISO, and other styles
8

Al Ridhawi, Ismaeel, Moayad Aloqaily, and Yaser Jararweh. "An Incentive-based Mechanism for Volunteer Computing Using Blockchain." ACM Transactions on Internet Technology 21, no. 4 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3419104.

Full text
Abstract:
The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.
APA, Harvard, Vancouver, ISO, and other styles
9

Tran, Minh-Quang, Duy Tai Nguyen, Van An Le, Duc Hai Nguyen, and Tran Vu Pham. "Task Placement on Fog Computing Made Efficient for IoT Application Provision." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6215454.

Full text
Abstract:
Fog computing is one of the promising technologies for realizing global-scale Internet of Things (IoT) applications as it allows moving compute and storage resources closer to IoT devices, where data is generated, in order to solve the limitations in cloud-based technologies such as communication delay, network load, energy consumption, and operational cost. However, this technology is still in its infancy stage containing essential research challenges. For instance, what is a suitable fog computing scheme where effective service provision models can be deployed is still an open question. This paper proposes a novel multitier fog computing architecture that supports IoT service provisioning. Concretely, a solid service placement mechanism that optimizes service decentralization on fog landscape leveraging context-aware information such as location, response time, and resource consumption of services has been devised. The proposed approach optimally utilizes virtual resources available on the network edges to improve the performance of IoT services in terms of response time, energy, and cost reduction. The experimental results from both simulated data and use cases from service deployments in real-world applications, namely, the intelligent transportation system (ITS) in Ho Chi Minh City, show the effectiveness of the proposed solution in terms of maximizing fog device utilization while reducing latency, energy consumption, network load, and operational cost. The results confirm the robustness of the proposed scheme revealing its capability to maximize the IoT potential.
APA, Harvard, Vancouver, ISO, and other styles
10

Labrado, Carson, Himanshu Thapliyal, Stacy Prowell, and Teja Kuruganti. "Use of Thermistor Temperature Sensors for Cyber-Physical System Security." Sensors 19, no. 18 (September 10, 2019): 3905. http://dx.doi.org/10.3390/s19183905.

Full text
Abstract:
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. This has been especially highlighted by the explosive growth in the number of Internet of Things (IoT) devices. Unfortunately, the increasing prevalence of these devices has begun to draw the attention of malicious entities which exploit them for their own gain. What makes these devices especially attractive is the various resource constraints present in these devices that make it difficult to add standard security features. Therefore, one intriguing research direction is creating security solutions out of already present components such as sensors. Physically Unclonable Functions (PUFs) are one potential solution that use intrinsic variations of the device manufacturing process for provisioning security. In this work, we propose a novel weak PUF design using thermistor temperature sensors. Our design uses the differences in resistance variation between thermistors in response to temperature change. To generate a PUF that is reliable across a range of temperatures, we use a response-generation algorithm that helps mitigate the effects of temperature variation on the thermistors. We tested the performance of our proposed design across a range of environmental operating conditions. From this we were able to evaluate the reliability of the proposed PUF with respect to variations in temperature and humidity. We also evaluated the PUF’s uniqueness using Monte Carlo simulations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IoT device provisioning"

1

Rusiňák, Petr. "Bezpečné zprovoznění IoT zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445532.

Full text
Abstract:
S ohledem na stále rostoucí počty prodaných IoT zařízeních se postupně začínají objevovat projekty, ve kterých jsou IoT zařízení použity ve stovkách až tisících. Tyto projekty však z časových důvodů neumožňují ruční konfiguraci každého zařízení zvlášť, čímž vzniká poptávka po protokolech, které dokáží rychle, ale přitom i bezpečně, nastavit nové IoT zařízení. Cílem této práce je vytvořit protokol, který umožní automatický přenos přihlašovacích údajů k Wi-Fi síti do nově zakoupeného IoT zařízení. Navržený protokol používá speciální konfigurační zařízení, ve kterém budou uloženy přihlašovací údaje všech zařízeních kompatibilních s tímto protokolem v rámci dané administrativní domény, a které bude poskytovat tyto přihlašovací údaje nenakonfigurovaným IoT zařízením za předpokladu, že je možné ověřit jejich identitu. K ověření identity nenakonfigurovaných zařízení je použita asymetrické kryptografie. Protokol byl implementován pomocí IoT zařízeních ESP32, přičemž ke komunikaci mezi nenakonfigurovanými je využit nespojovaný komunikační protokol ESP-NOW.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IoT device provisioning"

1

Jensen, David. "Device Provisioning Service." In Beginning Azure IoT Edge Computing, 189–203. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4536-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Drew. "Mass Provisioning of iOS Devices." In Apple macOS and iOS System Administration, 505–31. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5820-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kesavan, Selvaraj, Senthilkumar J., Suresh Y., and Mohanraj V. "IoT Device Onboarding, Monitoring, and Management." In Advances in Web Technologies and Engineering, 227–55. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3111-2.ch013.

Full text
Abstract:
In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Tanque, Marcus. "Examining of Data Security, Privacy, and Reliability for Cloud and Internet of Things Integration." In Advances in Wireless Technologies and Telecommunication, 57–90. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3445-7.ch004.

Full text
Abstract:
Converging Cloud computing with Internet of Things transformed organizations' traditional technologies. This chapter examines the intersection of cloud computing and internet of things in consort with how these solutions often interact on the internet. Vendors develop CloudIoT capabilities to support organizations' day-to-day operations. IoT is a combined platform encompassing physical and virtual nodes. IoT objects comprise device-to-device data sharing, machine-to-machine provisioning, sensors, actuators, and processors. These systems may be deployed as hardware components and applications software. This chapter also emphasizes data security, reliability, resource provisioning, service-level agreement, quality of service, IoT, privacy, and device integration. This chapter also highlights operational benefits and/or security issues affecting CC and IoT technologies.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang, and Jun-liang Chen. "Internet of Things Service Provisioning Platform for Cross-Application Cooperation." In Securing the Internet of Things, 655–78. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch033.

Full text
Abstract:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
APA, Harvard, Vancouver, ISO, and other styles
6

Mala, D. Jeya. "IoT Functional Testing Using UML Use Case Diagrams." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 125–45. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7790-4.ch006.

Full text
Abstract:
In the IoT applications development process, the consumers expectations are always high. Thus, the development environment should be focusing on virtual provisioning, manipulation, and testing and debugging. This has also raised more challenges in terms of proper testing to be done in both user interface level as well as the functionality level. It will be really challenging to test a connected device within a full IoT environment, which will have more devices with varied functionalities and data processing. These challenges have made a new way of testing to be done so that the test cases will be more efficient in revealing the errors in the software. In this chapter, UML use case diagram-based test cases generation for an IoT environment is explained in detail. Also, a real-time case study IoT application is taken to showcase how this approach helps in generating the test cases to test the embedded software in these IoT devices in terms of data flow, control flow, and functionalities with improved performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Babu, R., K. Jayashree, and R. Abirami. "Fog Computing Qos Review and Open Challenges." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 1147–57. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch054.

Full text
Abstract:
Internet of Things (IoT) enables inters connectivity among devices and platforms. IoT devices such as sensors, or embedded systems offer computational, storage, and networking resources and the existence of these resources permits to move the execution of IoT applications to the edge of the network and it is known as fog computing. It is able to handle billions of Internet-connected devices and is well situated for real-time big data analytics and provides advantages in advertising and personal computing. The main issues in fog computing includes fog networking, QoS, interfacing and programming model, computation offloading, accounting, billing and monitoring, provisioning and resource management, security and privacy. A particular research challenge is the Quality of Service metric for fog services. Thus, this paper gives a survey of cloud computing, discusses the QoS metrics, and the future research directions in fog computing.
APA, Harvard, Vancouver, ISO, and other styles
8

Condoluci, Massimo, Maria A. Lema, Toktam Mahmoodi, and Mischa Dohler. "5G IoT Industry Verticals and Network Requirements." In Powering the Internet of Things With 5G Networks, 148–75. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2799-2.ch006.

Full text
Abstract:
The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requirements such IoT verticals pose in terms of design features to be considered in the standardization of 5G systems. This chapter presents the state of the art on the contribution from the research community and standardization bodies to address the 5G design characteristics with particular attention to the features enabling a proper management of IoT-oriented business cases.
APA, Harvard, Vancouver, ISO, and other styles
9

Condoluci, Massimo, Maria A. Lema, Toktam Mahmoodi, and Mischa Dohler. "5G IoT Industry Verticals and Network Requirements." In Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, 928–49. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7708-0.ch039.

Full text
Abstract:
The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requirements such IoT verticals pose in terms of design features to be considered in the standardization of 5G systems. This chapter presents the state of the art on the contribution from the research community and standardization bodies to address the 5G design characteristics with particular attention to the features enabling a proper management of IoT-oriented business cases.
APA, Harvard, Vancouver, ISO, and other styles
10

Manukumar, Shanthi Thangam, and Vijayalakshmi Muthuswamy. "A Novel Resource Management Framework for Fog Computing by Using Machine Learning Algorithm." In Advances in Computer and Electrical Engineering, 42–52. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0194-8.ch002.

Full text
Abstract:
With the development of edge devices and mobile devices, the authenticated fast access for the networks is necessary and important. To make the edge and mobile devices smart, fast, and for the better quality of service (QoS), fog computing is an efficient way. Fog computing is providing the way for resource provisioning, service providers, high response time, and the best solution for mobile network traffic. In this chapter, the proposed method is for handling the fog resource management using efficient offloading mechanism. Offloading is done based on machine learning prediction technology and also by using the KNN algorithm to identify the nearest fog nodes to offload. The proposed method minimizes the energy consumption, latency and improves the QoS for edge devices, IoT devices, and mobile devices.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IoT device provisioning"

1

Wang, Dong, Sooyong Lee, Yongsheng Zhu, and Yuguang Li. "A zero human-intervention provisioning for industrial IoT devices." In 2017 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icit.2017.7915546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hassebo, A., S. Chaudhary, M. A. Saleh, and M. A. Ali. "Dynamic Provisioning of Emerging Multifunction/Multi-Bearer Smart IoT Devices." In 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE). IEEE, 2020. http://dx.doi.org/10.1109/itce48509.2020.9047814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Jun, Zhizhong Zhang, Peiliang Dong, and Rong Fan. "Flexible secret protection method for the provisioning of IoT devices." In 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN). IEEE, 2017. http://dx.doi.org/10.1109/iccsn.2017.8230089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Omer, Mohamad Khairi Ishak, Lunchakorn Wuttisittikulkij, and Tay Zar Bhone Maung. "IoT Devices and Edge gateway provisioning, realtime analytics for simulated and virtually emulated devices." In 2020 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2020. http://dx.doi.org/10.1109/iceic49074.2020.9051037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Wei-Han, and Fuchun Joseph Lin. "Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2M." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boskov, Ivan, Halil Yetgin, Matevz Vucnik, Carolina Fortuna, and Mihael Mohorcic. "Time-to-Provision Evaluation of IoT Devices Using Automated Zero-Touch Provisioning." In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, 2020. http://dx.doi.org/10.1109/globecom42002.2020.9348119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Awodele, Oludele, Victor Dibia, Oghenerukevwe Onoruvie, and Sharon Okoruwa. "Services Provisioning on Mobile Devices via Bluetooth in a Localized Setting Using a Proposed System - BTServ." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3272.

Full text
Abstract:
Conventionally, enterprise services that can be utilized by mobile devices such as E - mail, instant messaging, data transfer, news and event notification have been typically achieved using GPRS (General Packet Radio Service) connections to access internet servers that provide these services. Thus, even in a local area, disadvantages such as full dependence on GPRS service providers, incurred GPRS costs and slow data/communication rates constitute formidable drawbacks. This paper describes a system /Architecture (BTServ) in which these same services can be supplied via Bluetooth, with notable benefits such as high data rates, minimal dependence on external (GPRS) networks, higher security (internet attacks are totally avoided) and reduced cost, in a localized setting such as a corporate house.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography