To see the other types of publications on this topic, follow the link: IoT Protocol.

Journal articles on the topic 'IoT Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
2

Denny, Kurniawan, Ashar Muhammad, and Ar Rosyid Harits. "10.11591/ijece.v13i3.pp2827-2836." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827–36. https://doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
3

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment su
APA, Harvard, Vancouver, ISO, and other styles
4

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
APA, Harvard, Vancouver, ISO, and other styles
5

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements a
APA, Harvard, Vancouver, ISO, and other styles
6

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access
APA, Harvard, Vancouver, ISO, and other styles
7

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT con
APA, Harvard, Vancouver, ISO, and other styles
8

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for devi
APA, Harvard, Vancouver, ISO, and other styles
9

Wytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (2021): 6904. http://dx.doi.org/10.3390/s21206904.

Full text
Abstract:
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an
APA, Harvard, Vancouver, ISO, and other styles
10

Son, Heesuk, and Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3430501.

Full text
Abstract:
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated
APA, Harvard, Vancouver, ISO, and other styles
11

R. Suganthi. "Efficient Routing Protocol (ERP) for MANETS-IoT Systems." Journal of Information Systems Engineering and Management 10, no. 2 (2025): 670–79. https://doi.org/10.52783/jisem.v10i2.2776.

Full text
Abstract:
An Internet of Things (IoT)-integrated mobile ad hoc network (MANET), referred to as MANET-IoT systems, consists of interconnected mobile and IoT devices, often operating with limited battery capacity. In such systems, existing routing protocols consume significant energy and time for path identification, which impacts the overall system performance. The purpose of this paper is to suggest a new Efficient Routing protocol (ERP) Protocol for MANET-IoT systems to enhance network performance by efficiently selecting intermediate forwarding nodes according to the Position details about the destina
APA, Harvard, Vancouver, ISO, and other styles
12

Ragnar, Mikael Halldórsson, Dushku Edlira, and Dragoni Nicola. "ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services." IEEE ACCESS Volume 9 (October 25, 2021): 144880–94. https://doi.org/10.1109/ACCESS.2021.3122391.

Full text
Abstract:
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devices. Traditional RA protocols aim to detect the presence of malicious code in the static memory of a device. In the IoT domain, RA research is currently following two main directions: Dynamic RA and Swarm RA. Dynamic RA schemes intend to detect runtime attacks that hijack the control-flow execution of a running program without injecting new malicious code into the memory. On the other hand, swarm RA protocols focus on attesting efficiently and effectively a large number of IoT devices. However,
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, JoonYoung, SungJin Yu, KiSung Park, YoHan Park, and YoungHo Park. "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments." Sensors 19, no. 10 (2019): 2358. http://dx.doi.org/10.3390/s19102358.

Full text
Abstract:
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a sma
APA, Harvard, Vancouver, ISO, and other styles
14

Oniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (2020): 861. http://dx.doi.org/10.3390/s20030861.

Full text
Abstract:
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system
APA, Harvard, Vancouver, ISO, and other styles
15

Kim, Taehun, Deokkyu Kwon, Yohan Park, and Youngho Park. "Blockchain-Based Secure Authentication Protocol for Fog-Enabled IoT Environments." Mathematics 13, no. 13 (2025): 2142. https://doi.org/10.3390/math13132142.

Full text
Abstract:
Fog computing technology grants computing and storage resources to nearby IoT devices, enabling a fast response and ensuring data locality. Thus, fog-enabled IoT environments provide real-time and convenient services to users in healthcare, agriculture, and road traffic monitoring. However, messages are exchanged on public channels, which can be targeted to various security attacks. Hence, secure authentication protocols are critical for reliable fog-enabled IoT services. In 2024, Harbi et al. proposed a remote user authentication protocol for fog-enabled IoT environments. They claimed that th
APA, Harvard, Vancouver, ISO, and other styles
16

Ren, Jie, and Lijuan Liu. "A Study on Information Classification and Storage in Cloud Computing Data Centers Based on Group Collaborative Intelligent Clustering." Journal of Electrical and Computer Engineering 2022 (March 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/1476661.

Full text
Abstract:
Internet of things (IoT) and cloud computing are combined to form a cloud computing data center, and cloud computing provides virtualization, storage, computing, and other support services for IoT applications. Data is the foundation and core of cloud IoT platform applications, and massive multisource heterogeneous IoT data aggregation and storage have basic requirements such as real-time, security, and scalability. This paper focuses on the aggregation and storage methods of massive heterogeneous cloud IoT data, solving the multisource data aggregation problem caused by inconsistent protocols
APA, Harvard, Vancouver, ISO, and other styles
17

Sun, Da-Zhi, Yi-Na Gao, and Yangguang Tian. "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices." Sensors 23, no. 14 (2023): 6559. http://dx.doi.org/10.3390/s23146559.

Full text
Abstract:
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in
APA, Harvard, Vancouver, ISO, and other styles
18

Kadhim, Abdulkareem A., and Sarah A. Rafea. "IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK." Iraqi Journal of Information and Communications Technology 1, no. 1 (2021): 58–69. http://dx.doi.org/10.31987/ijict.1.1.172.

Full text
Abstract:
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN. The routing protocol for low power and lossy (RPL) network enable connectivity of WSN over IoT. Nodes in RPL optimized its path using objective function (OF), which depends on different node/link metrics. In this paper, the performance of IoT-WSN stack consisting of CoAP, 6LoWPAN and two proposed protocols based on RPL are evaluated. The two proposed protoco
APA, Harvard, Vancouver, ISO, and other styles
19

Kadhim, Dheyaa Jasim, and Omar Abdulsattar Hamad. "Improving IoT Applications Using a Proposed Routing Protocol." Journal of Engineering 20, no. 11 (2023): 50–62. http://dx.doi.org/10.31026/j.eng.2014.11.04.

Full text
Abstract:
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, som
APA, Harvard, Vancouver, ISO, and other styles
20

Oh, Soo-Yeon, Yong-Joon Lee, and Sung-Ho Hwang. "Design and Implementation of IoT Gateway with MQTT and IEC 61850 MMS Protocol." International Journal of Membrane Science and Technology 10, no. 1 (2023): 64–71. http://dx.doi.org/10.15379/ijmst.v10i1.1430.

Full text
Abstract:
With microgrids deployed in multiple areas, communication technologies that control devices and collect data play an important role. Microgrid environments are similar to the internet of things (IoT) environment, where multiple devices exchange information. Recent studies have attempted to utilize IoT protocols as communication protocols for microgrids. Studies have also begun on interworking IoT protocols with IEC 61850, an existing protocol for power utility. In this study, we designed an IoT gateway that maps message queuing telemetry transport (MQTT), an IoT protocol, to the IEC 61850 data
APA, Harvard, Vancouver, ISO, and other styles
21

Bhowmik, Ronok, and Md Hasnat Riaz. "An extended review of the application layer messaging protocol of the internet of things." Bulletin of Electrical Engineering and Informatics 12, no. 5 (2023): 3124–33. http://dx.doi.org/10.11591/eei.v12i5.5236.

Full text
Abstract:
In the internet of things (IoT), there are resource-constrained and immense heterogeneous electronic gadgets worldwide. Till now, no single IoT application layer messaging protocol is the best, nor is anyone axiomatic for every requirement. This paper exhaustively summarizes information on the messaging protocols from the available previous research sources online. Our goal is to encapsulate a simple guideline so that users can choose an optimal messaging protocol quickly according to development requirements and specifications. For this purpose, we have reviewed the literature on six enabling
APA, Harvard, Vancouver, ISO, and other styles
22

Sana, Touhami, and Belghachi Mohamed. "A novel secure and energy aware LOADng routing protocol for IoT: an application to smart agriculture." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 2 (2025): 1005. http://dx.doi.org/10.11591/ijeecs.v37.i2.pp1005-1013.

Full text
Abstract:
<span>In the burgeoning domain of the internet of things (IoT), efficient and secure communication protocols are crucial for the seamless operation of diverse applications. This paper proposes a novel routing protocol, termed secure and energy aware LOADng (SEA-LOADng), tailored for IoT deployments in the context of smart agriculture. The protocol is designed to address the unique challenges posed by agricultural environments, including limited energy resources and the need for robust security measures. The proposed protocol leverages LOADng, a lightweight and efficient routing protocol
APA, Harvard, Vancouver, ISO, and other styles
23

Touhami, Sana Belghachi Mohamed. "A novel secure and energy aware LOADng routing protocol for IoT: an application to smart agriculture." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 2 (2025): 1005–13. https://doi.org/10.11591/ijeecs.v37.i2.pp1005-1013.

Full text
Abstract:
In the burgeoning domain of the internet of things (IoT), efficient and secure communication protocols are crucial for the seamless operation of diverse applications. This paper proposes a novel routing protocol, termed secure and energy aware LOADng (SEA-LOADng), tailored for IoT deployments in the context of smart agriculture. The protocol is designed to address the unique challenges posed by agricultural environments, including limited energy resources and the need for robust security measures. The proposed protocol leverages LOADng, a lightweight and efficient routing protocol suitable for
APA, Harvard, Vancouver, ISO, and other styles
24

HERIANSYAH, HERIANSYAH, AHMAD REYNALDI NOPRIANSYAH, and SWADEXI ISTIQPHARA. "Evaluasi Kinerja Testbed Routing Protocol berbasis NodeMCU ESP8266 pada Perangkat IoT." MIND Journal 5, no. 2 (2021): 135–48. http://dx.doi.org/10.26760/mindjournal.v5i2.135-148.

Full text
Abstract:
AbstrakJaringan Ad hoc pada perangkat Internet of Things (IoT) mempunyai sifat yang yang dinamis dengan node pada jaringan yang berperan sebagai router dan bergerak bebas secara random tanpa bantuan infrasturktur komunikasi sehingga topologi berubah sangat cepat seiring dengan perubahan posisi. Perubahan ini sangat mempengaruhi kualitas layanan pada perangkat IoT itu sendiri. Penelitian ini bertujuan untuk mengevaluasi protocol routing yang sudah ada dengan cara mengimplementasikan routing protocol tersebut di perangkat testbed berbasis NodeMCU ESP8266. Hal ini bertujuan untuk memilih protocol
APA, Harvard, Vancouver, ISO, and other styles
25

Tian, Yuan, Nanyijia Zhang, and Jian Li. "Two Novel Semi-Quantum Secure Direct Communication Protocols in IoT." Sensors 24, no. 24 (2024): 7990. https://doi.org/10.3390/s24247990.

Full text
Abstract:
As Internet of Things (IoT) technology continues to advance, there is a growing awareness of IoT security within the industry. Quantum communication technology can potentially significantly improve the communication security of IoT devices. Based on semi-quantum cryptography and utilizing single photons, this paper introduces two semi-quantum secure direct communication (SQSDC) protocols for use in smart door locks. Protocol 1 is more efficient, and the efficiency analysis shows that the communication efficiency is as high as 28.57%. Security analysis demonstrates the asymptotic security of th
APA, Harvard, Vancouver, ISO, and other styles
26

Jiang, Lili, and Hui Cui. "Private and Mutual Authentication Protocols for Internet of Things." Mathematics 11, no. 8 (2023): 1929. http://dx.doi.org/10.3390/math11081929.

Full text
Abstract:
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that are surrounding them. Secure communications between IoT devices have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for devices such that sensitive information including device owner’s identity and device type can be leaked. In this paper, based on attribute-based encryption (ABE), we propose two private and mutual authentication protocols to protect the privacy of IoT devices. The first protocol is a three-message key exchange
APA, Harvard, Vancouver, ISO, and other styles
27

Kang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.

Full text
Abstract:
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterf
APA, Harvard, Vancouver, ISO, and other styles
28

Shykhmat, A., and V. Veres. "SELECTION OF PROTOCOLS FOR DATA TRANSMISSION FROM INTERNET OF THINGS DEVICES TO CLOUD PROVIDERS." Computer systems and network 5, no. 1 (2023): 149–59. http://dx.doi.org/10.23939/csn2023.01.149.

Full text
Abstract:
The Internet of Things (IoT) enables the creation of networks between devices, people, applications, and the Internet, creating new ecosystems with higher productivity, better energy efficiency, and higher profitability. Nodes in these networks must have the ability to communicate and exchange data, which requires the use of data transfer protocols. However, choosing the right protocol for a specific use case is not always straightforward. This paper provides an overview of two existing data transfer protocols, MQTT and HTTP, compares the amount of tariffed traffic generated by each protocol,
APA, Harvard, Vancouver, ISO, and other styles
29

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.

Full text
Abstract:
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be co
APA, Harvard, Vancouver, ISO, and other styles
30

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Full text
Abstract:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critica
APA, Harvard, Vancouver, ISO, and other styles
31

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for commun
APA, Harvard, Vancouver, ISO, and other styles
32

Singh, Kamred Udham. "Design Of Energy Efficient and Secure Routing Protocol for Wsn in Iot." Mathematical Statistician and Engineering Applications 70, no. 2 (2021): 1434–41. http://dx.doi.org/10.17762/msea.v70i2.2336.

Full text
Abstract:

 
 
 
 Abstract
 This paper proposes an energy-efficient and secure routing system for wireless sensor networks (WSNs) in the Internet of Things (IoT). The proposed routing protocol improves packet delivery ratio, end-to-end latency, and network lifetime over existing protocols. The protocol under consideration reduces node energy consumption, increasing the network's lifetime, while ensuring data security. Simulation studies using several metrics evaluate the proposed procedure. The recommended protocol outperforms existing protocols in energy efficiency and security
APA, Harvard, Vancouver, ISO, and other styles
33

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore,
APA, Harvard, Vancouver, ISO, and other styles
34

Ahmad, Farooq, Muhammad Tayyab Chaudhry, Muhammad Hasan Jamal, et al. "Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets." PLOS ONE 18, no. 8 (2023): e0285700. http://dx.doi.org/10.1371/journal.pone.0285700.

Full text
Abstract:
In the Internet of things (IoT), data packets are accumulated and disseminated across IoT devices without human intervention, therefore the privacy and security of sensitive data during transmission are crucial. For this purpose, multiple routing techniques exist to ensure security and privacy in IoT Systems. One such technique is the routing protocol for low power and lossy networks (RPL) which is an IPv6 protocol commonly used for routing in IoT systems. Formal modeling of an IoT system can validate the reliability, accuracy, and consistency of the system. This paper presents the formal mode
APA, Harvard, Vancouver, ISO, and other styles
35

Islam, Mahbubul, Hossain Jamil, Samiul Pranto, Rupak Das, Al Amin, and Arshia Khan. "Future Industrial Applications: Exploring LPWAN-Driven IoT Protocols." Sensors 24, no. 8 (2024): 2509. http://dx.doi.org/10.3390/s24082509.

Full text
Abstract:
The Internet of Things (IoT) will bring about the next industrial revolution in Industry 4.0. The communication aspect of IoT devices is one of the most critical factors in choosing the device that is suitable for use. Thus far, the IoT physical layer communication challenges have been met with various communications protocols that provide varying strengths and weaknesses. This paper summarizes the network architectures of some of the most popular IoT wireless communications protocols. It also presents a comparative analysis of some of the critical features, including power consumption, covera
APA, Harvard, Vancouver, ISO, and other styles
36

Mamlook, Rustom, Omer F. Khan, and Thabit Sultan Mohammed. "Bridging for cross protocol talk in IOT devices using windows communication foundation." International Journal of Engineering & Technology 7, no. 3.29 (2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Full text
Abstract:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Ho
APA, Harvard, Vancouver, ISO, and other styles
37

Mao, Yuxin, Chenqian Zhou, Yun Ling, and Jaime Lloret. "An Optimized Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT)." Sensors 19, no. 2 (2019): 243. http://dx.doi.org/10.3390/s19020243.

Full text
Abstract:
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN). Therefore, it is an important issue for IoT applications to achieve efficient data transmission in DTN. In order to improve delivery rate and optimize delivery delay with low overhead in DTN for IoT applications, we propose a new routing protocol, called Scheduling-Probabilistic Routing Protocol using History of Encounters and Transitivity (PROPHET). In this protocol, we calculate the delivery predictability according to the encountering fre
APA, Harvard, Vancouver, ISO, and other styles
38

Radwan, S. Abujassar. "Developing QoS by Priority Routing for Real Time Data in Internet of Things (IoT) Urban Scenarios." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 45–61. https://doi.org/10.5281/zenodo.3587385.

Full text
Abstract:
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees the wide range offered by the quality of services. In this paper, we will introduce a smart p
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Bai, Xiangyi Zhang, Runhua Shi, Mingwu Zhang, and Guoxing Zhang. "SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT." Mathematics 10, no. 12 (2022): 2120. http://dx.doi.org/10.3390/math10122120.

Full text
Abstract:
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorit
APA, Harvard, Vancouver, ISO, and other styles
40

Husnain, Muhammad, Khizar Hayat, Enrico Cambiaso, et al. "Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System." Sensors 22, no. 2 (2022): 567. http://dx.doi.org/10.3390/s22020567.

Full text
Abstract:
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQT
APA, Harvard, Vancouver, ISO, and other styles
41

Dargaoui, Souhayla, Mourade Azrour, Allaoui El, et al. "Elliptic curve cryptography and biometrics for iot authentication." Serbian Journal of Electrical Engineering 22, no. 2 (2025): 223–41. https://doi.org/10.2298/sjee2502223d.

Full text
Abstract:
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks makes it vulnerable to malicious use. Hence, the security of the user?s data is now a serious matter in an IoT environment. Since authentication may prevent hackers from recovering and using data transmitted between IoT devices, researchers have proposed many lightweight IoT authentication protocols over the past decades. Many of these protocols are bu
APA, Harvard, Vancouver, ISO, and other styles
42

Surya, P., Asuman Suenbuel, and Arockia Selvakumar Arockia Doss. "Industrial Internet of Things - Control of Industry Simulation Through Different Protocols." Journal of Physics: Conference Series 2115, no. 1 (2021): 012011. http://dx.doi.org/10.1088/1742-6596/2115/1/012011.

Full text
Abstract:
Abstract In past few years there is a great demand for internet of things (IoT), It has become an important part of smart technologies. There have been many researches going-on in internet of things in both academics and industries. IoT using in industries is also known as Industrial Internet of Things (IIoT). Where smart sensors are used along with IoT are used. This research work is done to identify the best protocol for high-speed data transmission with no loss of data to prevent command lag between mobile controller and industry. In this research a soda filling Industry simulation with 3 d
APA, Harvard, Vancouver, ISO, and other styles
43

Wadullah Tareq, Roaa, and Turkan Ahmed Khaleel. "Implementation of MQTT Protocol in Health Care Based on IoT Systems: A Study." International journal of electrical and computer engineering systems 12, no. 4 (2021): 215–23. http://dx.doi.org/10.32985/ijeces.12.4.5.

Full text
Abstract:
Internet of things IoT systems have become one of the most promising technologies in all fields. Data transmission is one of the important aspects, and the tendency to messaging protocols is an important aspect of IoT systems. One of these most important protocols is MQTT. This protocol depends on the Publish/Subscribe model, and it is a lightweight protocol. Reliability, simplicity, quality of service levels, and being Resource-constrained make MQTT common in the IoT industry. This paper designed an IoT device that consists of the sensor MLX 90614 non-contact IR Temperature connected to a dev
APA, Harvard, Vancouver, ISO, and other styles
44

Viel, Felipe, Luis Augusto Silva, Valderi Reis Quietinho Leithardt, Juan Francisco De Paz Santana, Raimundo Celeste Ghizoni Teive, and Cesar Albenes Zeferino. "An Efficient Interface for the Integration of IoT Devices with Smart Grids." Sensors 20, no. 10 (2020): 2849. http://dx.doi.org/10.3390/s20102849.

Full text
Abstract:
The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this ar
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Chien-Ming, and Shuangshuang Liu. "Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure." Security and Communication Networks 2021 (September 30, 2021): 1–13. http://dx.doi.org/10.1155/2021/6537678.

Full text
Abstract:
The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve th
APA, Harvard, Vancouver, ISO, and other styles
46

A, Mahesh Reddy, and Kameswara Rao M. "A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications." Scalable Computing: Practice and Experience 25, no. 3 (2024): 1647–57. http://dx.doi.org/10.12694/scpe.v25i3.2692.

Full text
Abstract:
The utilization of IoT is expanding across various domains, including telecare, intelligent home systems, and transportation networks. In these environments, IoT devices generate data gathered on remote servers, requiring external users to authenticate themselves to access the data. However, existing authentication protocols for IoT must meet the crucial requirements of speed, security against multiple attacks, and ensuring user anonymity and un-traceability. The main objective of this work is to find lightweight symmetric cryptography-based user authentication protocol tailored for IoT-based
APA, Harvard, Vancouver, ISO, and other styles
47

Ramezan, Gholamreza, and Cyril Leung. "A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts." Wireless Communications and Mobile Computing 2018 (November 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/4029591.

Full text
Abstract:
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the identification and authentication of each device, the BCR protocol operates in a distributed manner with no CA. The BCR protocol utilizes smart contracts to discover a route to a destination or data gateway within heterogeneous IoT networks. Any intermediary device can guarantee a route from a source IoT device to a destination device or gateway. We compa
APA, Harvard, Vancouver, ISO, and other styles
48

Dawood, Ali. "A Robust Privacy Preserving Authentication Scheme for IOT Environment by 5G Technology." AlKadhim Journal for Computer Science 2, no. 1 (2024): 12–27. http://dx.doi.org/10.61710/kjcs.v2i1.56.

Full text
Abstract:
In recent years, secure communication between the interconnected components of the internet of things has become an important and worrying issue due to some attacks on the IoT. The Internet of Things (IOT) is the integration of things with the world of the Internet, where this integration takes place by adding devices or programs to be smart and, as a result, they will be able to communicate with one another and participate in all elements of life quite efficiently. Accordingly, we've developed an authentication protocol for the IoT ecosystem; it's primary function is to ensure the safety of d
APA, Harvard, Vancouver, ISO, and other styles
49

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer prot
APA, Harvard, Vancouver, ISO, and other styles
50

Hamid, Harth Ghassan, and Zainab T. Alisa. "Survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1663–72. https://doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!