Academic literature on the topic 'IoT Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IoT Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IoT Protocol"
Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Full textKurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textKhelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Full textHussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.
Full textSarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Full textOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Full textWytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (October 18, 2021): 6904. http://dx.doi.org/10.3390/s21206904.
Full textSon, Heesuk, and Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–25. http://dx.doi.org/10.1145/3430501.
Full textOniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (February 6, 2020): 861. http://dx.doi.org/10.3390/s20030861.
Full textDissertations / Theses on the topic "IoT Protocol"
Karim, Hawkar. "IoT Networking Using MPTCP Protocol." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.
Full textPettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.
Full textInternet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Bassi, Lorenzo. "Orchestration of a MEC-based multi-protocol IoT environment." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.
Full textFakhraddin, Haider. "Toward IoT : Implementation of WSN based MQTT Data Protocol." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.
Full textShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Full textSilva, Douglas Simões. "Formal verification and access control approach of an IoT protocol." reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.
Full textMade available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Full textFerrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.
Full textNguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Full textDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Full textBooks on the topic "IoT Protocol"
D, Stockand James, and Shapiro Mark S, eds. Ion channels: Methods and protocols. Totowa, N.J: Humana Press, 2006.
Find full textGamper, Nikita. Ion channels: Methods and protocols. New York: Humana Press, 2013.
Find full textN, Lopatin Anatoli, and Nichols Colin G, eds. Ion channel localization methods and protocols. Totowa, NJ: Humana Press, 2001.
Find full textInc, Cisco Systems, ed. Cisco IOS: Solutions for network protocols. Indianapolis, IN: Macmillan Technical Pub., 1998.
Find full text1971-, Yan Qing, ed. Membrane transporters: Methods and protocols. Totowa, N.J: Humana Press, 2003.
Find full textHeld, Gilbert. Cisco IOS IP: Field guide. New York: McGraw-Hill, 2000.
Find full textHeld, Gilbert. Cisco IOS IP field guide. London: McGraw-Hill, 2000.
Find full textCisco IOS in a nutshell. 2nd ed. Beijing: O'Reilly, 2005.
Find full textCisco IOS in a nutshell: A desktop quick reference for IOS on IP networks. Beijing: O'Reilly, 2002.
Find full textWijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman, and Diana Mather. Protocol to Manage Relationships Today. NL Amsterdam: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.
Full textBook chapters on the topic "IoT Protocol"
Sasikaladevi, N., K. Geetha, S. Aarthi, and C. Mala. "Smart Card Based Privacy-Preserving Lightweight Authentication Protocol." In Cloud IoT, 257–65. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.
Full textBanerjee, Bannishikha, and Geetali Saha. "Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices." In Cloud IoT, 199–218. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.
Full textRayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality, 103–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.
Full textRayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality, 93–138. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.
Full textJang, Dae-il, Taeeun Kim, and HwanKuk Kim. "A Design of IoT Protocol Fuzzer." In Lecture Notes in Electrical Engineering, 242–46. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.
Full textGuillén, Edward, Jeisson Sánchez, and Leonardo Ramírez López. "IoT Protocol Model on Healthcare Monitoring." In VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016, 193–96. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.
Full textRayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things from Hype to Reality, 97–152. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.
Full textMuzaffar, Shahzad, and Ibrahim Abe M. Elfadel. "Automatic Protocol Configuration." In Secure, Low-Power IoT Communication Using Edge-Coded Signaling, 69–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.
Full textAnjali, Yeole, and D. R. Kalbande. "MAC-Based Group Management Protocol for IoT [MAC GMP-IoT]." In Lecture Notes on Data Engineering and Communications Technologies, 23–28. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.
Full textAbhishek, CH N. S., Chungath Srinivasan, Lakshmy K.V., and P. Mohan Anand. "SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device." In Lecture Notes in Networks and Systems, 811–21. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5529-6_61.
Full textConference papers on the topic "IoT Protocol"
Saito, Kenta, and Hiroaki Nishi. "Application Protocol Conversion Corresponding to Various IoT Protocols." In IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.
Full textUnwala, Ishaq, Zafar Taqvi, and Jiang Lu. "Thread: An IoT Protocol." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.
Full textCazac, Marin. "AAA protocol in IoT." In 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.
Full textWu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang, and Norman Chang. "OneM2M-based IoT protocol integration." In 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.
Full textLucena, Mateus, Roberto Milton Scheffel, and Antonio Augusto Frohlich. "IoT Gateway Integrity Checking Protocol." In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.
Full textHammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, and Pascale Minet. "A lightweight IoT security protocol." In 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.
Full textLiu, Zhiyan, Bao Xi, and Yongfeng Yuan. "Analysis on IOT communication protocol." In 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.
Full textGvozdenovic, Stefan, Johannes K. Becker, John Mikulskis, and David Starobinski. "Multi-Protocol IoT Network Reconnaissance." In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.
Full textN., Jagadish, C. Kanagasabapathi, and Siva S. Yellampalli. "IrLite Protocol For IoT Connectivity." In 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). IEEE, 2019. http://dx.doi.org/10.1109/i2ct45611.2019.9033850.
Full textVelastegui, Homero J., and Acurio M. Santiago. "IoT-based Security Alarm Protocol." In 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.
Full textReports on the topic "IoT Protocol"
Ravindran, Vijay, and Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, December 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.
Full textBurdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, April 2000. http://dx.doi.org/10.17487/rfc2801.
Full textEastlake, D., and C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2935.
Full textEastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, March 2003. http://dx.doi.org/10.17487/rfc3504.
Full textPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames, and Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, June 2022. http://dx.doi.org/10.36967/2293713.
Full textQuak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), September 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Full textZareian, Farzin, and Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, November 2020. http://dx.doi.org/10.55461/olpv6741.
Full textAllende López, Marcos, and Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Edited by Alejandro Pardo and Mariana Gutierrez. Inter-American Development Bank, May 2022. http://dx.doi.org/10.18235/0004243.
Full textDavidson, K., and Y. Kawatsura. Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, April 2000. http://dx.doi.org/10.17487/rfc2802.
Full textKawatsura, Y., M. Hiroya, and H. Beykirch. Payment Application Programmers Interface (API) for v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, November 2004. http://dx.doi.org/10.17487/rfc3867.
Full text