Journal articles on the topic 'IoT, Security IoT, IoT Protocol, 5G'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IoT, Security IoT, IoT Protocol, 5G.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Full textSanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez, and Antonio Skarmeta. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G." Sensors 20, no. 3 (February 7, 2020): 882. http://dx.doi.org/10.3390/s20030882.
Full textPark, Kisung, and Youngho Park. "On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks." Applied Sciences 12, no. 9 (April 23, 2022): 4265. http://dx.doi.org/10.3390/app12094265.
Full textPan, Shin-Hung, and Shu-Ching Wang. "Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing." Sensors 21, no. 2 (January 19, 2021): 671. http://dx.doi.org/10.3390/s21020671.
Full textBrooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol." International Journal of UbiComp 13, no. 2 (April 30, 2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.
Full textGupta, Sunita, Meenakshi Nawal, Neha Janu, and Dinesh Goyal. "IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN." ECS Transactions 107, no. 1 (April 24, 2022): 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.
Full textWu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari, and Chienming Chen. "Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks." Drones 6, no. 1 (December 31, 2021): 10. http://dx.doi.org/10.3390/drones6010010.
Full textKhalid, Madiha, Umar Mujahid, and Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags." Security and Communication Networks 2019 (July 21, 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.
Full textMathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis, and Michail-Alexandros Kourtis. "On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids." Energies 14, no. 10 (May 14, 2021): 2818. http://dx.doi.org/10.3390/en14102818.
Full textChen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry, and Long Li. "Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (October 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/3116593.
Full textBehmanesh, Ali, Nasrin Sayfouri, and Farahnaz Sadoughi. "Technological Features of Internet of Things in Medicine: A Systematic Mapping Study." Wireless Communications and Mobile Computing 2020 (July 27, 2020): 1–27. http://dx.doi.org/10.1155/2020/9238614.
Full textCandal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (September 5, 2020): 5054. http://dx.doi.org/10.3390/s20185054.
Full textFan, Kai, Panfei Song, and Yintang Yang. "ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G." Mobile Information Systems 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2349149.
Full textSong, Haoxiang, Zhe Tu, and Yajuan Qin. "Blockchain-Based Access Control and Behavior Regulation System for IoT." Sensors 22, no. 21 (October 30, 2022): 8339. http://dx.doi.org/10.3390/s22218339.
Full textGupta, Divya, Shalli Rani, Aman Singh, and Juan Luis Vidal Mazon. "Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach." Wireless Communications and Mobile Computing 2022 (July 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/6983655.
Full textIslam, Naveed, Khalid Haseeb, Muhammad Ali, and Gwanggil Jeon. "Secured Protocol with Collaborative IoT-Enabled Sustainable Communication Using Artificial Intelligence Technique." Sustainability 14, no. 14 (July 21, 2022): 8919. http://dx.doi.org/10.3390/su14148919.
Full textChuang, Yun-Hsin, and Yuh-Min Tseng. "CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks." Symmetry 13, no. 4 (April 16, 2021): 698. http://dx.doi.org/10.3390/sym13040698.
Full textEledlebi, Khouloud, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, and Yousof Al-Hammadi. "Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions." Sensors 22, no. 23 (November 22, 2022): 9063. http://dx.doi.org/10.3390/s22239063.
Full textSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (May 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Full textWazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, and Youngho Park. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment." Sensors 19, no. 24 (December 14, 2019): 5539. http://dx.doi.org/10.3390/s19245539.
Full textLiao, Han-Teng, Tsung-Ming Lo, and Chung-Lien Pan. "Knowledge Mapping Analysis of Intelligent Ports: Research Facing Global Value Chain Challenges." Systems 11, no. 2 (February 8, 2023): 88. http://dx.doi.org/10.3390/systems11020088.
Full textEl Mahdi, Fatna, Ahmed Habbani, Zaid Kartit, and Bachir Bouamoud. "Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol." Wireless Communications and Mobile Computing 2020 (April 4, 2020): 1–9. http://dx.doi.org/10.1155/2020/1468976.
Full textXu, Li, Jiaqi Chen, Ming Liu, and Xiaoyi Wang. "Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT." Electronics 8, no. 2 (January 31, 2019): 146. http://dx.doi.org/10.3390/electronics8020146.
Full textYadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.
Full textXiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (March 2, 2020): 1366. http://dx.doi.org/10.3390/s20051366.
Full textGupta, Nishu, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva, and Ariel Teles. "Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET." Future Internet 12, no. 4 (April 1, 2020): 63. http://dx.doi.org/10.3390/fi12040063.
Full textHazratifard, Mehdi, Fayez Gebali, and Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial." Sensors 22, no. 19 (October 9, 2022): 7655. http://dx.doi.org/10.3390/s22197655.
Full textLin, Yen, Jeng-Ywan Jeng, Yi-Yu Liu, and Jheng-Jia Huang. "A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand." Electronics 11, no. 5 (February 23, 2022): 678. http://dx.doi.org/10.3390/electronics11050678.
Full textChaudhari, Bharat S., Marco Zennaro, and Suresh Borkar. "LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations." Future Internet 12, no. 3 (March 6, 2020): 46. http://dx.doi.org/10.3390/fi12030046.
Full textJiao, Runhai, Hong Ouyang, Yukun Lin, Yaoming Luo, Gang Li, Zaiyu Jiang, and Qian Zheng. "A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme." Information 10, no. 5 (May 10, 2019): 175. http://dx.doi.org/10.3390/info10050175.
Full textWong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks." Sensors 20, no. 9 (April 29, 2020): 2511. http://dx.doi.org/10.3390/s20092511.
Full textYan, Xiaobei, and Maode Ma. "An efficient anonymous group handover authentication protocol for MTC devices for 5G networks." MATEC Web of Conferences 355 (2022): 03052. http://dx.doi.org/10.1051/matecconf/202235503052.
Full textLin, Tzu-Wei, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, and Bo-Yu Huang. "A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems." Sensors 21, no. 8 (April 20, 2021): 2880. http://dx.doi.org/10.3390/s21082880.
Full textLi, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities." Entropy 21, no. 5 (May 15, 2019): 497. http://dx.doi.org/10.3390/e21050497.
Full textZhang, Xvpeng, Bingqiang Liu, Yaqi Zhao, Xiaoyu Hu, Zixuan Shen, Zhaoxia Zheng, Zhenglin Liu, et al. "Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices." Sensors 22, no. 23 (November 25, 2022): 9160. http://dx.doi.org/10.3390/s22239160.
Full textWang, Yi, Zizhou Su, Kai Huang, Jie Yan, Sui Wang, and Weisheng Ye. "Research on Pulse Power Wireless Communication Network Based on LoRa Technology." Journal of Physics: Conference Series 2433, no. 1 (February 1, 2023): 012003. http://dx.doi.org/10.1088/1742-6596/2433/1/012003.
Full textSalleras, Xavier, and Vanesa Daza. "SANS: Self-Sovereign Authentication for Network Slices." Security and Communication Networks 2020 (November 23, 2020): 1–8. http://dx.doi.org/10.1155/2020/8823573.
Full textDanbatta, Kafilu, and Binta Usman. "PRICE BASED TRAFFIC CONGESTION CONTROL IN THE UPCOMING 5G DEPLOYMENT." FUDMA JOURNAL OF SCIENCES 5, no. 4 (February 21, 2022): 400–405. http://dx.doi.org/10.33003/fjs-2021-0504-842.
Full textMourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (December 20, 2021): 3175. http://dx.doi.org/10.3390/electronics10243175.
Full textKhelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Full textSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Full textOgbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (August 22, 2022): 6313. http://dx.doi.org/10.3390/s22166313.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Full textJain, Anshul, Tanya Singh, Satyendra Kumar Sharma, and Vikas Prajapati. "Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 001–38. http://dx.doi.org/10.28945/4675.
Full textMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Full textHasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (September 30, 2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Full textAl Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (February 8, 2023): 867. http://dx.doi.org/10.3390/electronics12040867.
Full textSarica, Alper Kaan, and Pelin Angin. "Explainable Security in SDN-Based IoT Networks." Sensors 20, no. 24 (December 20, 2020): 7326. http://dx.doi.org/10.3390/s20247326.
Full text