Academic literature on the topic 'IoT Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IoT Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IoT Protocol"

1

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
APA, Harvard, Vancouver, ISO, and other styles
3

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP Machine to Machine authentication protocol and centralied IoT network Authentication Protocol RADIUS is formally verified using the well-known verification technique known as model checking technique and we have used the Scyther model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.
APA, Harvard, Vancouver, ISO, and other styles
4

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
APA, Harvard, Vancouver, ISO, and other styles
5

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
APA, Harvard, Vancouver, ISO, and other styles
7

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Wytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (October 18, 2021): 6904. http://dx.doi.org/10.3390/s21206904.

Full text
Abstract:
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an assessment of the suitability of the protocols for the defined types of IoT devices and the identified communication purposes. We conclude the comparison with some recommendations of the protocol selection and usage.
APA, Harvard, Vancouver, ISO, and other styles
9

Son, Heesuk, and Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–25. http://dx.doi.org/10.1145/3430501.

Full text
Abstract:
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.
APA, Harvard, Vancouver, ISO, and other styles
10

Oniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (February 6, 2020): 861. http://dx.doi.org/10.3390/s20030861.

Full text
Abstract:
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IoT Protocol"

1

Karim, Hawkar. "IoT Networking Using MPTCP Protocol." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.

Full text
Abstract:
The progress of technology is moving in a rapid pace forward, with new solutions and improvements being developed each year. Internet of Things (IoT) is one area of computer science that seen a growing interest from the population leading to more deployments of the technology. IoT devices often operate in low-power lossy networks making them depend upon low energy consumption but also high reliability. As the devices become more mobile this also exposes several challenges, one being connectivity in regard to mobility. Our proposed solution to this problem use Multipath Transmission Control Protocol (MPTCP) as a way of delivering high level of performance and connectivity and thereby high reliability. There has been research and implementations of MPTCP in different networks, however in low power radio networks, such as the ones IoT devices resides in, it is still a novel idea.  We reproduced and tested an implementation of MPTCP, against a similar network that is using regular TCP and compared the results. The MPTCP network showed a higher throughput and data transfer, proving to be more efficient while also providing a higher level of reliability in regard to connectivity. However, MPTCP showed a higher rate of packet retransmission compared to regular TCP. To be able to fully deploy MPTCP in low energy IoT devices there needs to be more improvements to accommodate the needs that such networks depend upon. There are use cases, such as for mobile cellular devices where MPTCP would make an impactful difference.
APA, Harvard, Vancouver, ISO, and other styles
2

Pettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.

Full text
Abstract:
Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. Området växer så pass fort att det förväntas vara 24 miljarder anslutna enheter vid år 2050, denna utökning leder i sin tur till ett ökat behov av förståelse för IoT protokollen som hanterar kommunikationen emellan enheterna. Detta för att kunna välja det mest optimala protokollet för ett givet scenario. Detta arbete kommer att välja ett lovande protokoll för undersökning samt evaluering gällande dess prestation berörande fördröjning, dataöverföringshastighet och skalbarhet.  Protokollet som valdes var MQTT (Message Queuing Telemetry Transport). Baserat på dessa evaluerade värden föra en diskussion gällande protokollets lämplighet inom scenariona. Värdena kommer att tas fram via tidmätningar start till slut för kommunikationen samt tid för att skicka en mängd meddelanden, båda i respekt till antalet samtidigt kommunicerande program. Testen körs med en lokal PC som agerar Broker och en Raspberry Pi som kör samtliga programmen i individuella terminaler. Resultaten var att fördröjningen verkar ha en näst intill linjär relation och dataöverföringshastighet ett exponentiellt avtagande beteende i respekt till samtidigt kommunicerande enheter. Dem mätta resultaten analyseras och diskuteras, och kommer till slutsatsen att protokollet är en lämplig kandidat för de flesta scenarion, så som smarta bilar, smarta hem och till viss del industriell användning. Den största nackdelen med protokollet var dess höga standardavvikelse gällande individuella meddelandens fördröjning.
Internet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described  as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
APA, Harvard, Vancouver, ISO, and other styles
3

Bassi, Lorenzo. "Orchestration of a MEC-based multi-protocol IoT environment." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.

Full text
Abstract:
Nowadays we are witnessing to a continuous increasing of the number of IoT devices that must be configured and supported by modern networks. Considering an industrial environment, there is a huge number of these devices that need to coexist at the same time. Each one of them is using its own communication/transport protocol, and a huge effort needs to be done during the setup of the system. In addition, there are also different kind of architectures that can be used. That’s why the network setup is not so easy in this kind of heterogeneous environment. The answer to all these problems can be found in the emerging cloud and edge computing architectures, allowing new opportunities and challenges. They are capable of enable on-demand deployment of all the IoT services. In this thesis is proposed a Multi-access Edge Computing (MEC) approach to face all the possible multi-protocol scenarios. All the services are transformed into MEC-based services, even if they are running over multiple technological domains. As result, was proved that this kind of solution is effective and can simplify the deployment of IoT services by using some APIs defined by the MEC standard. As above mentioned, one of the most important tasks of these new generation’s networks is to be self-configurable in very low amount of time and this will be the scope of my research. The aim of this thesis is to try to reduce as much as possible the time that a certain network requires to be self-configured in an automatic way considering an Industrial IoT as a Service (IIoTaaS) scenario.
APA, Harvard, Vancouver, ISO, and other styles
4

Fakhraddin, Haider. "Toward IoT : Implementation of WSN based MQTT Data Protocol." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.

Full text
Abstract:
Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used as the data exchange protocol to aggregate the data from WSN that incorporated local and remote sensor. ATmega 328 microcontroller unit, NodeMCU development board, SIM800L GSM module and DHT11 sensor modules where used to implement the nodes while Raspberry Pi 3B was used to implement a gateway that acts as the MQTT broker in order to aggregate the data. The proposed system has been implemented and tested successfully. The power consumption for the remote sensor nodes consumed only 20 mWh and the response time for the data transferred within the system’s network from the remote sensor node to the server is about 7 milliseconds with a total error of 0.11%. The system shows an excellent performance and provide a simple solution to link remote sensors which are out of the gateway’s local network coverage.
APA, Harvard, Vancouver, ISO, and other styles
5

Shahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Full text
Abstract:
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Douglas Simões. "Formal verification and access control approach of an IoT protocol." reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2017.
Made available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
APA, Harvard, Vancouver, ISO, and other styles
7

van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Full text
Abstract:
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
APA, Harvard, Vancouver, ISO, and other styles
8

Ferrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.

Full text
Abstract:
The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. The integration of Wireless Sensor Networks in the Internet of Things creates new obstacles due to the necessity of finding a balance between the resources utilization and the applied security solutions. In multicast group communications, the energy consumption, bandwidth and processing overhead at the nodes are minimized in comparison to a point-to-point communication system. To securely transmit a message in order to maintain confidentiality of the data and the user’s privacy, usually involves human interaction or the pre-agreement upon some key, the latter unknown to an external attacker. In this thesis, the author proposed an authentication protocol based on the similar context between the correct devices and lightweight computationally secure group-key establishment, avoiding any kind of human involvement. The goal is achieved by having the devices calculate a fingerprint from their ambient context and through a fuzzy commitment scheme generating a commitment respectively opening value which is used to generate a common secret key between them. The tests are effected on real world data accumulated from different environments. The proposed scheme is based on elliptic curve cryptography and cryptographic one-way accumulators. Its feasibility is analyzed by implementing the group key establishment phase in the Contiki operating system and by simulating it with the Cooja simulator. Furthermore, the applicability of the protocol is analyzed and justified by an analysis of the storage overhead, communication overhead, and energy consumption. The simulator shows an energy consumption of only 112 mJ per node for group key establishment. The results obtained in this thesis demonstrate the feasibility of the scheme, it’s computational, and communication costs are further comparable to other similar approaches.
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.

Full text
Abstract:
Les systèmes distribués sont composés de nombreux sous-systèmes distants les uns des autres. Afin de réaliser une même tâche, les sous-systèmes communiquent à la fois avec l’environnement par des messages externes et avec d’autres sous-systèmes par des messages internes, via un réseau de communication. En pratique, les systèmes distribués mettent en jeu plusieurs types d’erreurs, propres aux sous-systèmes les constituant, ou en lien avec les communications internes. Afin de s’assurer de leur bon fonctionnement, savoir tester de tels systèmes est essentiel. Cependant, il est très compliqué de les tester car sans horloge globale, les sous-systèmes ne peuvent pas facilement synchroniser leurs envois de messages, ce qui explique l’existence des situations non déterministes. Le test à base de modèles (MBT) est une approche qui consiste à vérifier si le comportement d’un système sous test (SUT) est conforme à son modèle, qui spécifie les comportements souhaités. MBT comprend deux étapes principales: la génération de cas de test et le calcul de verdict. Dans cette thèse, nous nous intéressons à la génération de cas de test dans les systèmes distribués. Nous utilisons les systèmes de transition symbolique temporisé à entrées et sorties (TIOSTS) et les analysons à l’aide des techniques d’exécution symbolique pour obtenir les comportements symboliques du système distribué. Dans notre approche, l’architecture de test permet d’observer au niveau de chaque soussystème à la fois les messages externes émis vers l’environnement et les messages internes reçus et envoyés. Notre framework de test comprend plusieurs étapes: sélectionner un objectif de test global, défini comme un comportement particulier exhibé par exécution symbolique, projeter l’objectif de test global sur chaque sous-système pour obtenir des objectifs de test locaux, dériver des cas de test unitaires pour chacun des sous-systèmes. L’exécution du test consiste à exécuter des cas de test locaux sur les sous-systèmes paramétrés par les objectifs de tests en calculant à la volée les données de test à soumettre au sous-système en fonction de données observées. Enfin, nous mettons en œuvre notre approche sur un cas d’étude décrivant un protocole utilisé dans le contexte de l’IoT
Distributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
APA, Harvard, Vancouver, ISO, and other styles
10

Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Full text
Abstract:
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IoT Protocol"

1

D, Stockand James, and Shapiro Mark S, eds. Ion channels: Methods and protocols. Totowa, N.J: Humana Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gamper, Nikita. Ion channels: Methods and protocols. New York: Humana Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

N, Lopatin Anatoli, and Nichols Colin G, eds. Ion channel localization methods and protocols. Totowa, NJ: Humana Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Inc, Cisco Systems, ed. Cisco IOS: Solutions for network protocols. Indianapolis, IN: Macmillan Technical Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1971-, Yan Qing, ed. Membrane transporters: Methods and protocols. Totowa, N.J: Humana Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Held, Gilbert. Cisco IOS IP: Field guide. New York: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Held, Gilbert. Cisco IOS IP field guide. London: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cisco IOS in a nutshell. 2nd ed. Beijing: O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cisco IOS in a nutshell: A desktop quick reference for IOS on IP networks. Beijing: O'Reilly, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman, and Diana Mather. Protocol to Manage Relationships Today. NL Amsterdam: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.

Full text
Abstract:
Protocol to Manage Relationships Today explains the contemporary value of protocol, not only for monarchies or diplomatic institutes, but for any non-profit or for-profit organisation. This book presents modern protocol as a tool to build strong, authentic networks of reciprocal relationships. When used effectively protocol can: - Increase the effect of the networking activities of an organisation. Protocol gives a professional structure to relationship management, to achieve access to the 'right' networks and a reciprocal relationship with the most valued stakeholders. - Deepen relationships. In our world there is so much focus on pragmatism in building relationships - protocol focuses on the common ground to gain value. - Be used as a valuable tool in a post COVID-19 era, where the need for space and time to build real and authentic relationships is well understood. The book defines how tested values perfectly fit in today's society, where modern organisations want to build effective relationships and communities. This book is focused on developing an increasingly vital expertise for professionals who deal with complex relationship management issues on a strategic and tactical operational level. They come from different fields, such as government institutions, non-profit organisations and commercial environments. This book also gives protocol officers a contemporary approach towards the application of protocol. It is not designed as a complete guide to all the rules of protocol, but it describes how to translate the context into a tailor-made protocol for each meeting or event. The book explains protocol as a flexible method to handle unique situations. Protocol is presented on four levels: the 'why' of protocol; the strategic and tactical level; the practical implementation; and the execution of protocol. Protocol to Manage Relationships Today is written by Europe's foremost protocol experts with collective years of experience with the management of networking meetings and events at the highest level.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IoT Protocol"

1

Sasikaladevi, N., K. Geetha, S. Aarthi, and C. Mala. "Smart Card Based Privacy-Preserving Lightweight Authentication Protocol." In Cloud IoT, 257–65. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerjee, Bannishikha, and Geetali Saha. "Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices." In Cloud IoT, 199–218. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality, 103–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality, 93–138. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jang, Dae-il, Taeeun Kim, and HwanKuk Kim. "A Design of IoT Protocol Fuzzer." In Lecture Notes in Electrical Engineering, 242–46. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guillén, Edward, Jeisson Sánchez, and Leonardo Ramírez López. "IoT Protocol Model on Healthcare Monitoring." In VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016, 193–96. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things from Hype to Reality, 97–152. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Muzaffar, Shahzad, and Ibrahim Abe M. Elfadel. "Automatic Protocol Configuration." In Secure, Low-Power IoT Communication Using Edge-Coded Signaling, 69–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anjali, Yeole, and D. R. Kalbande. "MAC-Based Group Management Protocol for IoT [MAC GMP-IoT]." In Lecture Notes on Data Engineering and Communications Technologies, 23–28. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abhishek, CH N. S., Chungath Srinivasan, Lakshmy K.V., and P. Mohan Anand. "SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device." In Lecture Notes in Networks and Systems, 811–21. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5529-6_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IoT Protocol"

1

Saito, Kenta, and Hiroaki Nishi. "Application Protocol Conversion Corresponding to Various IoT Protocols." In IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Unwala, Ishaq, Zafar Taqvi, and Jiang Lu. "Thread: An IoT Protocol." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cazac, Marin. "AAA protocol in IoT." In 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.

Full text
Abstract:
This document is representing not only the description of AAA protocol. It is representing real production problems which I encountered in many years of work with it. Each from this problem was taken separately. It was analyzed and the best solution was applied to it. Article is containing not only analyzing of the problem. In this document the solution described was developed and tested in time on different networks starting with few hundred devices and finishing with tens of thousands of them. On production, solution applied worked for years. Based on this point, I can conclude that problems which were on the production, where solved by applying of those solutions. In order to understand those problems, is needed to understand how this protocol is working and where are the bottleneck points of it.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang, and Norman Chang. "OneM2M-based IoT protocol integration." In 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lucena, Mateus, Roberto Milton Scheffel, and Antonio Augusto Frohlich. "IoT Gateway Integrity Checking Protocol." In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, and Pascale Minet. "A lightweight IoT security protocol." In 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Zhiyan, Bao Xi, and Yongfeng Yuan. "Analysis on IOT communication protocol." In 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gvozdenovic, Stefan, Johannes K. Becker, John Mikulskis, and David Starobinski. "Multi-Protocol IoT Network Reconnaissance." In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

N., Jagadish, C. Kanagasabapathi, and Siva S. Yellampalli. "IrLite Protocol For IoT Connectivity." In 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). IEEE, 2019. http://dx.doi.org/10.1109/i2ct45611.2019.9033850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Velastegui, Homero J., and Acurio M. Santiago. "IoT-based Security Alarm Protocol." In 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IoT Protocol"

1

Ravindran, Vijay, and Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, December 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, April 2000. http://dx.doi.org/10.17487/rfc2801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eastlake, D., and C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, March 2003. http://dx.doi.org/10.17487/rfc3504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames, and Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, June 2022. http://dx.doi.org/10.36967/2293713.

Full text
Abstract:
Following a review of Vital Signs – indicators of ecosystem health – in the coastal parks of the Northeast Coastal and Barrier Network (NCBN), knowledge of shoreline change was ranked as the top variable for monitoring. Shoreline change is a basic element in the management of any coastal system because it contributes to the understanding of the functioning of the natural resources and to the administration of the cultural resources within the parks. Collection of information on the vectors of change relies on the establishment of a rigorous system of protocols to monitor elements of the coastal geomorphology that are guided by three basic principles: 1) all of the elements in the protocols are to be based on scientific principles; 2) the products of the monitoring must relate to issues of importance to park management; and 3) the application of the protocols must be capable of implementation at the local level within the NCBN. Changes in ocean shoreline position are recognized as interacting with many other elements of the Ocean Beach-Dune Ecosystem and are thus both driving and responding to the variety of natural and cultural factors active at the coast at a variety of temporal and spatial scales. The direction and magnitude of shoreline change can be monitored through the application of a protocol that tracks the spatial position of the neap-tide, high tide swash line under well-defined conditions of temporal sampling. Spring and fall surveys conducted in accordance with standard operating procedures will generate consistent and comparable shoreline position data sets that can be incorporated within a data matrix and subsequently analyzed for temporal and spatial variations. The Ocean Shoreline Position Monitoring Protocol will be applied to six parks in the NCBN: Assateague Island National Seashore, Cape Cod National Seashore, Fire Island National Seashore, Gateway National Recreation Area, George Washington Birthplace National Monument, and Sagamore Hill National Historic Site. Monitoring will be accomplished with a Global Positioning System (GPS )/ Global Navigation Satellite System (GNSS) unit capable of sub-meter horizontal accuracy that is usually mounted on an off-road vehicle and driven along the swash line. Under the guidance of a set of Standard Operating Procedures (SOPs) (Psuty et al., 2022), the monitoring will generate comparable data sets. The protocol will produce shoreline change metrics following the methodology of the Digital Shoreline Analysis System developed by the United States Geological Survey. Annual Data Summaries and Trend Reports will present and analyze the collected data sets. All collected data will undergo rigorous quality-assurance and quality-control procedures and will be archived at the offices of the NCBN. All monitoring products will be made available via the National Park Service’s Integrated Resource Management Applications Portal.
APA, Harvard, Vancouver, ISO, and other styles
6

Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), September 2021. http://dx.doi.org/10.19088/k4d.2021.133.

Full text
Abstract:
This rapid review synthesises the literature on how community-based management of acute malnutrition (CMAM) programmes could be adapted in settings of conflict and fragility. It identifies multiple factors affecting the quality and effectiveness of CMAM services including the health system, community engagement and linkages with other programmes, including education, sanitation, and early childhood development. Family MUAC (Mid-Upper Arm Circumference) is a useful tool to increase community participation and detect early cases of moderate acute malnutrition (MAM) and severe acute malnutrition (SAM) more effectively and less likely to require inpatient care. The literature does not say a lot about m-Health solutions (using mobile devises and applications) in data collection and surveillance systems. Many of the above-mentioned issues are relevant for CMAM programmes in settings of non-emergency, emergency, conflict and fragility. However, there are special circumstance in conflict and fragile settings that need adaptation and simplification of the standard protocols. Because of a broken or partly broken health system in settings of conflict and fragility, local governments are not able to fund access to adequate inpatient and outpatient treatment centres. NGOs and humanitarian agencies are often able to set up stand-alone outpatient therapeutic programmes or mobile centres in the most affected regions. The training of community health volunteers (CHVs) is important and implementing Family MUAC. Importantly, research shows that: Low literacy of CHVs is not a problem to achieve good nutritional outcomes as long as protocols are simplified. Combined/simplified protocols are not inferior to standard protocols. However, due to complexities and low funding, treatment is focused on SAM and availability for children with MAM is far less prioritised, until they deteriorate to SAM. There is widespread confusion about combined/simplified protocol terminology and content, because there is no coherence at the global level.
APA, Harvard, Vancouver, ISO, and other styles
7

Zareian, Farzin, and Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, November 2020. http://dx.doi.org/10.55461/olpv6741.

Full text
Abstract:
This report is one of a series of reports documenting the methods and findings of a multi-year, multi-disciplinary project coordinated by the Pacific Earthquake Engineering Research Center (PEER) and funded by the California Earthquake Authority (CEA). The overall project is titled “Quantifying the Performance of Retrofit of Cripple Walls and Sill Anchorage in Single-Family Wood-Frame Buildings,” henceforth referred to as the “PEER–CEA Project.” The overall objective of the PEER–CEA project is to provide scientifically-based information (e.g., testing, analysis, and resulting loss models) that measure and assess the effectiveness of seismic retrofit to reduce the risk of damage and associated losses (repair costs) of wood-frame houses with cripple wall and sill anchorage deficiencies as well as retrofitted conditions that address those deficiencies. Tasks that support and inform the loss-modeling effort are: (1) collecting and summarizing existing information and results of previous research on the performance of wood-frame houses; (2) identifying construction features to characterize alternative variants of wood-frame houses; (3) characterizing earthquake hazard and ground motions at representative sites in California; (4) developing cyclic loading protocols and conducting laboratory tests of cripple wall panels, wood-frame wall subassemblies, and sill anchorages to measure and document their response (strength and stiffness) under cyclic loading; and (5) the computer modeling, simulations, and the development of loss models as informed by a workshop with claims adjustors. This report is a product of Working Group 3.2 and focuses on Loading Protocol Development for Component Testing. It presents the background, development process, and recommendations for a quasi-static loading protocol to be used for cyclic testing of cripple wall components of wood-frame structures. The recommended loading protocol was developed for component testing to support the development of experimentally informed analytical models for cripple wall components. These analytical models are utilized for the performance-based assessment of wood-frame structures in the context of the PEER–CEA Project. The recommended loading protocol was developed using nonlinear dynamic analysis of representative multi-degree-of-freedom (MDOF) systems subjected to sets of single-component ground motions that varied in location and hazard level. Cumulative damage of the cripple wall components of the MDOF systems was investigated. The result is a testing protocol that captures the loading history that a cripple wall may experience in various seismic regions in California.
APA, Harvard, Vancouver, ISO, and other styles
8

Allende López, Marcos, and Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Edited by Alejandro Pardo and Mariana Gutierrez. Inter-American Development Bank, May 2022. http://dx.doi.org/10.18235/0004243.

Full text
Abstract:
This paper presents a protocol to manage decentralized access and use of Permissioned Public Blockchain Networks using Ethereum technology as the underlying protocol. It proposes a solution to avoid DDOS and enforce accountability while eliminating transaction fees. The protocol has been tested and implemented in the LACChain Blockchain Networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Davidson, K., and Y. Kawatsura. Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, April 2000. http://dx.doi.org/10.17487/rfc2802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kawatsura, Y., M. Hiroya, and H. Beykirch. Payment Application Programmers Interface (API) for v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, November 2004. http://dx.doi.org/10.17487/rfc3867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography