Academic literature on the topic 'IOTU'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IOTU.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IOTU"

1

Osman, Radwa Ahmed, Sherine Nagy Saleh, and Yasmine N. M. Saleh. "A Novel Interference Avoidance Based on a Distributed Deep Learning Model for 5G-Enabled IoT." Sensors 21, no. 19 (September 30, 2021): 6555. http://dx.doi.org/10.3390/s21196555.

Full text
Abstract:
The co-existence of fifth-generation (5G) and Internet-of-Things (IoT) has become inevitable in many applications since 5G networks have created steadier connections and operate more reliably, which is extremely important for IoT communication. During transmission, IoT devices (IoTDs) communicate with IoT Gateway (IoTG), whereas in 5G networks, cellular users equipment (CUE) may communicate with any destination (D) whether it is a base station (BS) or other CUE, which is known as device-to-device (D2D) communication. One of the challenges that face 5G and IoT is interference. Interference may exist at BSs, CUE receivers, and IoTGs due to the sharing of the same spectrum. This paper proposes an interference avoidance distributed deep learning model for IoT and device to any destination communication by learning from data generated by the Lagrange optimization technique to predict the optimum IoTD-D, CUE-IoTG, BS-IoTD and IoTG-CUE distances for uplink and downlink data communication, thus achieving higher overall system throughput and energy efficiency. The proposed model was compared to state-of-the-art regression benchmarks, which provided a huge improvement in terms of mean absolute error and root mean squared error. Both analytical and deep learning models reached the optimal throughput and energy efficiency while suppressing interference to any destination and IoTG.
APA, Harvard, Vancouver, ISO, and other styles
2

Ullah, Ikram, Gerard de Roode, Nirvana Meratnia, and Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, no. 5 (March 6, 2021): 1834. http://dx.doi.org/10.3390/s21051834.

Full text
Abstract:
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Shelendra Kumar, and Nishtha Kesswani. "IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 116–42. http://dx.doi.org/10.4018/ijisp.2020040107.

Full text
Abstract:
Many emerging fields are adopting Internet of Things technologies to incorporate smartness in respective areas. Several IoT based application area produces large volumes of real time data. Data aggregated through sensor nodes may contain highly sensitive information. An effective and successful IoT system must protect sensitive data from revealing to unauthorized persons. In this article, the authors present an efficient privacy-preserving mechanism called Internet of Things privacy (IoTp). The research simulates and analyzes the effectiveness of the proposed data aggregation and data access mechanism for a typical IoT system. Proposed IoTp scheme ensures privacy at data collection, data store and data access phases of the IoT system. The authors have compared proposed work with existing model. Results show that IoTp scheme is efficient and lightweight mechanism for data collection and data access. It is suitable for the resource constrained IoT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Junsheng, Wenyuan Ren, Aijun Zhang, Shuangcun Li, Jianping Tan, and Hongtai Liu. "Mechanical Properties and Microstructure Analysis of Cement Mortar Mixed with Iron Ore Tailings." Buildings 13, no. 1 (January 6, 2023): 149. http://dx.doi.org/10.3390/buildings13010149.

Full text
Abstract:
In order to study the feasibility and sand substitution mechanism of cement mortar mixed with iron ore tailings (IOT), iron ore tailings cement mortars (referred to as IOTC) with IOT content of 0%, 25%, and 50% were made and tested. First, the basic properties of IOT used were measured to verify the theoretical feasibility. Second, the uniaxial compressive and tensile strengths, as well as the crack resistance performance of IOTC under different curing ages and different sand substitution rates were tested. Third, the techniques of inductively coupled plasma atomic emission spectrometry (ICP-OES), X-ray diffraction (XRD), nuclear magnetic resonance (NMR), scanning electron microscopy and energy-dispersive spectroscopy (SEM-EDS) were used to study the influence of curing age and different sand substitution rates on the chemical, mineralogical, and microstructural characteristics of IOTC. The sand substitution mechanism of IOT was then discussed. The research results proved the feasibility of using IOT to substitute standard sand in cement mortar. Within substitution rate of 0–50%, the mechanical properties increased with the increase of substitution rate. Though limited chemical effects were found by adding IOT, in comparison with standard sand mortar, more hydration products were found and the pore size distribution was changed for IOTC, which corresponds to its mechanical improvement.
APA, Harvard, Vancouver, ISO, and other styles
5

Rawat, Abhimanyu, Vanesa Daza, and Matteo Signorini. "Offline Scaling of IoT Devices in IOTA Blockchain." Sensors 22, no. 4 (February 12, 2022): 1411. http://dx.doi.org/10.3390/s22041411.

Full text
Abstract:
An increased pattern of hidden Internet of Things (IoT) devices has been observed. Due to the increased number of security attacks, a large number of IoT devices are disappearing from the public internet. Operating blockchain operations in such ad hoc connectivity becomes challenging. However, multiple past studies have pointed towards IOTA Distributed Ledger Technology (DLT) that closely caters to offline blockchain use cases. However, there has been little to no empirical study or introduction to time bounds on transaction confirmation. Therefore, this study explains what provisions the existing IOTA blockchain has to accommodate the increased pattern of hidden IoT devices, and if IOTA is truly sufficient as a solution. In summary, we approach research questions by analyzing the studies that explore the trend of offline IoT devices and evaluating the relevance of offline blockchains, assessing the IOTA specification and codebase around offline transaction-making capabilities and pointing out some bounds that IOTA blockchain nodes must follow towards incoming transactions. Furthermore, we confirm by experimental runs that outside and within the tight time bounds transactions in offline Tangle can become stale and not get confirmed, and the effective time-bound can be even less. Realizing the need for a better offline blockchain scalability solution.
APA, Harvard, Vancouver, ISO, and other styles
6

Partida, Alberto, Regino Criado, and Miguel Romance. "Visibility Graph Analysis of IOTA and IoTeX Price Series: An Intentional Risk-Based Strategy to Use 5G for IoT." Electronics 10, no. 18 (September 17, 2021): 2282. http://dx.doi.org/10.3390/electronics10182282.

Full text
Abstract:
The transformation of time series into complex networks through visibility graphs is an innovative way to study time-based events. In this work, we use visibility graphs to transform IOTA and IoTeX price volatility time series into complex networks. Our aim is twofold: first, to better understand the markets of the two most capitalised Internet of Things (IoT) platforms at the time of writing. IOTA runs on a public directed acyclic graph (DAG) and IoTeX on a blockchain. Second, to suggest how 5G can improve information security in these two key IoT platforms. The analysis of the networks created by the natural and horizontal visibility graphs shows, first, that both IOTA and IoTeX are still at their infancy in their development, with IoTex seemingly developing faster. Second, both IoT tokens form communities in a hierarchical structure, and third, 5G can accelerate their development. We use intentional risk management as a lever to understand the impact of 5G on IOTA and IoTeX. Our results lead us to provide a set of design recommendations that contribute to improving information security in future 5G-based IoT implementations.
APA, Harvard, Vancouver, ISO, and other styles
7

K. M, Delphin Raj, Jinyoung Lee, Eunbi Ko, Soo-Young Shin, Jung-Il Namgung, Sun-Ho Yum, and Soo-Hyun Park. "Underwater Network Management System in Internet of Underwater Things: Open Challenges, Benefits, and Feasible Solution." Electronics 9, no. 7 (July 14, 2020): 1142. http://dx.doi.org/10.3390/electronics9071142.

Full text
Abstract:
As oceans cover the majority of the earth’s surface, it becomes inevitable in extending the concepts of Internet of Things (IoT) to ocean bodies, thereby tiling the way for a new drift in the digital world, the Internet of Underwater Things (IoUT). The primary objective of IoUT is the creation of a network of several smart interconnected undersea things, to digitally link water bodies by using devices such as autonomous underwater vehicles. Since the traditional ideas of IoT cannot be merely expanded to underwater, due to the difference in environmental characteristics, this puts forward a variety of challenges for scientists to work with IoUT, and one such challenge is the network management with IoUT. This paper gives an overview on (1) underwater network management systems (U-NMS) using acoustic communication in IoUT; (2) the challenges and benefits and use cases of U-NMS; (3) fault, configuration, accounting, performance, security and constrained management (FCAPSC) functionalities of U-NMS and (4) a comparison between network management system in IoT and U-NMS system in IoUT. Additionally, this paper shows the prototype design and implementation setup of U-NMS in a laboratory environment, using lightweight machine to machine (LWM2M) and acoustic communication technology for IoUT. This paper will contribute much to the profit of researchers and industry players in uncovering the critical areas of the Internet of Underwater Things.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Qian, Qingguo Tang, Weiwei Zhao, Zhiyuan Su, Cong Liang, Xinhui Duan, and Jinsheng Liang. "Ultrafine Grinded and Silane Grafted Iron Ore Tailings as Reinforcing Filler of Styrene Butadiene Rubber." Materials 15, no. 5 (February 25, 2022): 1756. http://dx.doi.org/10.3390/ma15051756.

Full text
Abstract:
In order to realize the high value-added resource utilization of solid waste and reduce the cost of rubber manufacturing, iron ore tailings (IOTs) were used as raw material to prepare a reinforcing filler of rubber through ultrafine grinding and surface organic modification techniques. We studied the effects of ball mill grinding conditions on the particle size and distribution of grinded iron ore tailings (G-IOTs). The effects of bis-(triethoxy-silyl-propyl)-tetrasulfide (Si69)-modified G-IOT (Si69-G-IOT) loading levels on the cure characteristics, static mechanical and dynamic mechanical properties of the styrene butadiene rubber (SBR) composites were also explored in this paper. The grinding and modification mechanism of IOTs and the combination of filler and SBR matrix were explored by grinding simulation of population balance model, X-ray diffraction analysis, Fourier transform infrared spectroscopy and scanning electron microscopy. The results showed that when grinding IOTs at 2000 r/min for 150 min, the particle size distribution of the resulting G-IOTs was the narrowest, with a D90 value of 4.42 μm. The tensile strength and elongation at break of SBR filled with 120 phr Si69-G-IOT were 14.97 MPa and 596.36%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yuanyu, Ruka Nakanishi, Masahiro Sasabe, and Shoji Kasahara. "Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things." Sensors 21, no. 15 (July 26, 2021): 5053. http://dx.doi.org/10.3390/s21155053.

Full text
Abstract:
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput.
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed Osman, Radwa, and Amira I. Zaki. "Energy-Efficient and Reliable Internet of Things for 5G: A Framework for Interference Control." Electronics 9, no. 12 (December 17, 2020): 2165. http://dx.doi.org/10.3390/electronics9122165.

Full text
Abstract:
The Internet of Things (IoT) is one of the promising paradigms that enable massive machines and devices to communicate with each other in future communication networks to promote a high level of awareness about our world and improve our daily life. IoT devices (IoTDs) communicate with an IoT base station (IoTBS) or IoT gateway (IoTG) by sharing the resources of other cellular users (CUEs). Due to the leakage of the spectral efficiency, interference exists among IoTG and base station (BS) due to CUEs and IoTDs. In this paper, a new framework is proposed called the interference control model. This proposed model aims to control the interference among IoTG and BS and is based on using the Lagrange optimization technique to reduce interference and maximize the energy efficiency and reliability of the IoT and cellular networks in fifth-generation (5G) systems. First, we formulate the multi-objective optimization problem to achieve the objective of the proposed model. Then, based on the optimization strategy, we derive the closed-form expressions of key quality-of-service (QoS) performance such as system reliability, throughput, and energy efficiency. Finally, the proposed algorithm has been evaluated and examined through different assumptions and several simulation scenarios. The obtained results validate the effectiveness and the accuracy of our proposed idea and also indicate significant improvement in the network performance of IoT and cellular networks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IOTU"

1

GALIMBERTI, ANDREA. "DNA barcoding: a link between basic and applied science." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2011. http://hdl.handle.net/10281/18920.

Full text
Abstract:
DNA barcoding is a recent and widely used molecular-based identification system that aims to identify biological specimens, and to assign them to a given species. However, DNA barcoding is even more than this, and besides many practical uses, it can be considered the core of an integrated taxonomic system, where bioinformatics plays a key role. Quite soon since its development (in 2003) it became clear that DNA barcoding was suitable for two different purposes: (i) the molecular identification of already described species and (ii) the discovery of undescribed species (the so called ‘DNA taxonomy’). However, such a method has generated a vast debate in the scientific community, which has been from the beginning, deeply divided into pros and cons. The main objective of this research project was to investigate the strength of coherence reached in combining a standardized molecular methodology with classical biological information (e.g. morphology, ecology, host specificity), toward the synthesis of an integrated approach to taxonomy. In order to satisfy this requirement, nine case studies encompassing a wide panel of taxa (i.e. animal, plant and environmental samples) subjected to different taxonomic uncertainties or potentially dealing with economical, conservation or health implications (e.g. food traceability, parasites infectiveness, etc.) have been investigated. More than 500 hundreds biological samples were collected directly in the field or retrieved from museum, herbariums or other institutional collections, allowing to create a synergic network among different disciplines and research fields. Standardization in the collection and processing of biological samples, as well as in the bioinformatic approaches used to manage and analyse molecular data has been a fundamental point in the experimental workflow we adopted. The results obtained with our analyses clearly showed that DNA barcoding represents a powerful tool for taxonomy and it can act as an effective supporting tool for the traceability of food products, for the diagnosis of endoparasites and for the characterization of environmental biodiversity. Although some limitations arise from the incomplete coverage of the existing diversity, the inherent characteristics of the molecular markers adopted as barcodes and other factors, the method showed to be more flexible than expected.
APA, Harvard, Vancouver, ISO, and other styles
2

STEINER, BENEDIKT, and VINCENT NEIDLINGER. "Impact of the Distributed Ledger Technology (DLT) IOTA on Smart Cities." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301276.

Full text
Abstract:
This article analyses the impact of the IOTA distributed ledger technology (DLT) on smart cities. The world population is rapidly increasing while at the same time trends such as urbanization shape future demographics. Thus, fast-growing cities face the challenge of increasing demands in resources such as energy, water, transportation, while at the same time aiming to increase life quality by reducing burdens such as pollution and waste. The concept of a “Smart City” emerged with the ambition to solve a city’s issues by creating social and economic advantages while providing efficient resource allocation processes. Nevertheless, current information communication technologies tend to underperform a smartcities systems requirement since the quantity of connected devices increases which slows down the transition of a city becoming smart. The distributed ledger technology IOTA promises to enable automated, feeless transactions and processes with a high level of integrity, which may impact the development of smart cities. In this research the IOTA technology is introduced and investigated. The advantages of IOTA compared to conventional information communication technologies and the blockchain technology are highlighted. Thereafter, the current state of IOTA in smart cities is reviewed by analysing current research and use cases. To investigate the concept of a smart city the smart city initiative framework, including its subcategories is introduced. Additionally, different experts working on IOTA integrations related to smart city initiatives were interviewed giving insights into their field ofexpertise. Finally, an analysis and discussion of the IOTA technology use cases are put into relation with the multi-level perspective framework (Geels, 2006) highlighting the positive impact of IOTA on the development of smart cities.
I den här artikeln analyseras effekterna av IOTA:s teknik för distribuerade huvudböcker (DLT) på smarta städer. Världens befolkning ökar snabbt samtidigt som trender som urbanisering formar framtidens demografi. Snabbt växande städer står därför inför utmaningen att öka kraven på resurser som energi, vatten och transporter, samtidigt som de strävar efter att öka livskvaliteten genom att minska belastningar som föroreningar och avfall. Begreppet smart stad uppstod med ambitionen att lösa stadensproblem genom att skapa sociala och ekonomiska fördelar och samtidigt tillhandahålla effektiva processer för resursfördelning. Den nuvarande informations- och kommunikationstekniken tenderar dock att inte uppfylla kraven på system för smarta städer, eftersom mängden anslutna enheter ökar, vilket gör att övergången till en smart stad blir långsammare. Den distribuerade huvudbokstekniken IOTA lovar att möjliggöra automatiserade, felfria transaktioner och processer med en hög grad av integritet, vilket kan påverka utvecklingen av smarta städer. I den här forskningen introduceras och undersöks IOTA-tekniken. Fördelarna med IOTA jämfört med konventionell informationskommunikationsteknik och blockkedjetekniken lyfts fram. Därefter granskas det nuvarande läget för IOTA i smarta städer genom att analysera aktuell forskning och användningsfall. För att undersöka begreppet smart stad introduceras ramverket för initiativet för smarta städer, inklusive dess underkategorier. Dessutom intervjuades olika experter som arbetar med IOTA-integrationer isamband med initiativ för smarta städer för att ge en inblick i deras expertisområde. Slutligen analyseras och diskuteras IOTA-teknikens användningsområden i förhållande till ramverket för flernivåperspektivet (Geels, 2006), där IOTA:s positiva inverkan på utvecklingen av smarta städer lyfts fram.
APA, Harvard, Vancouver, ISO, and other styles
3

Vörös, Ondrej. "Návrh IoT zařízení komunikujícího pomocí standardu NB-IoT." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400550.

Full text
Abstract:
This diploma thesis deals with the design of low-power IoT device communicating by using the NB-IoT standard. The theoretical part of the thesis is dedicated to the explanation of the principles and capabilities of communication in IoT networks Sigfox, LoRa and NB-IoT, and also its physical layer, network architecture, techonology principles and frequency bands used. The application part of the thesis is dedicated to design of the NB-IoT device from the system design through the selection of main components to the detailed physical design of the device. Two prototypes of the device with two different radio modules used are fabricated on which is performed measurement of the power profile of the device in various operation modes.
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammadnia, Hamzeh. "IoT-NETZ: Spoong Attack Mitigation in IoT Network." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260250.

Full text
Abstract:
The phenomenal growth of the Internet of Things (IoT) and popularity of the mobile stations have rapidly increased the demand of WLAN network (known as IEEE 802.11 and WiFi). WLAN is a low-cost alternative of the cellular network and being an unlicensed spectrum to build the master plan of embedding the Internet in everything -&-anywhere. At the same time, monitoring the number of IoT and WiFi-enabled devices across residential and enterprises is not trivial. Therefore, future WiFi network architecture requires an agile management paradigm to provide internal support and security for WiFi networks.The operation of IoT and mobile device applications relies on scalability and high-performance computing of clouds. Cloud computing has completely centralized the current data center networking architecture and it provides computation-intensive, high-speed network, and realtime responses to the requests of IoT. The IoT-to-cloud communication is the essence of network security concerns and it is in grievous need of constant security improvement along the inter-networking. Based on the number of researches and analysis on generated traffic by IoT, it has been observed there are the significant number of massive spoofing-oriented attacks targeting cloud services are launched from compromised IoT.On the basis of reviewing prior researches on mostly-conducted network attacks by IoT, there is a challenging and common characteristic which has been frequently utilized in the numerous massive Internet attacks, known as spoofing. This work will survey the existing proposed solutions which have been deployed to protect both traditional and softwarized network paradigms. Then, it proposes the approach of this work that enables IoT-hosting networks protected by employing Software-defined Wireless Networking (SDWN) within the proposed model to mitigate spoofing -oriented network attacks. In addition, the proposed solution provides the environmental sustainability feature by saving power consumption in networking devices during network operation. The practical improvement in the proposed model is measured and evaluated within the emulated environment of Mininet-WiFi.
Den fenomenala tillväxten av IoT och populariteten hos mobilstationerna har snabbt ökat efterfrågan på WLAN-nätverk (känd som IEEE 802.11 och WiFi). WLAN är ett billigt alternativ för mobilnätet och är ett olicensierat spektrum för att bygga huvudplanen för att bädda in Internet i allt-och-var som helst. Samtidigt är det inte trivialt att övervaka antalet IoT och WiFi-aktiverade enheter över bostäder och företag. Därför kräver framtida WiFi nätverksarkitektur ett smidigt hantering paradigm för att tillhandahålla internt stöd och säkerhet för WiFi-nätverk.Användningen av IoT och mobilanvändningsapplikationer är beroende av skalbarhet och högpresterande beräkningar av moln. Cloud computing har helt centraliserat den nuvarande datacenters nätverksarkitektur och det ger beräkningsintensiva, höghastighetsnätverk och realtidssvar påbegäran från IoT. IoT-till-moln kommunikationen är kärnan i nätverkssäkerhetshänsyn och de har ett allvarligt behov av ständig förbättring och säkerhetshärdning inom deras internätverk. Baserat på antalet undersökningar och analyser av genererad trafik av IoT har det observerats. Det finns det betydande antalet massiva spoofing-orienterade attacker som riktar sig mot molntjänster, lanseras från komprometterad IoT.På grundval av att granska tidigare undersökningar om IoTs mest genomförda nätverksattacker finns det en utmanande och gemensam egenskap som ofta utnyttjats i de många massiva internetattackerna. Detta arbete kommer att undersöka de befintliga lösningarna som har implementerats för att skydda både traditionella och mjukvariga nätverksparadigmer. Därefter föreslår det tillvägagångssättet för detta arbete som möjliggör IoT-värdnät skyddade genom att använda SDWN inom den föreslagna modellen för att mildra poofing-orienterade nätverksattacker. Dessutom erbjuder den föreslagna lösningen miljöhållbarhet genom att spara strömförbrukning i nätverksenheter under nätverksdrift. Den praktiska förbättringen av den föreslagna modellen mäts och utvärderas inom den omgivande miljön av Mininet-WiFi.
APA, Harvard, Vancouver, ISO, and other styles
5

Король, Н. В. "Технологія IoT." Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/51032.

Full text
Abstract:
IoT (Internet of things) – це сукупність усіх фізичних об’єктів, об’єднаних в одну мережу та в яких вбудовані технології для комунікації один з одним або з зовнішнім світом. IoT розглядається, як мережа, яка спроможна покращити та полегшити більшу частину видів нашої діяльності. Поширення даної технології може створити нову еволюцію всіх пристроїв, які можуть мати доступ до мережі Інтернет. Пристрої, які базуються на аналітиці даних, вони спроможні отримувати , аналізувати та обмінюватись інформацією.
APA, Harvard, Vancouver, ISO, and other styles
6

Okumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.

Full text
Abstract:
The Internet of Things is the networking of electronic devices, or “Things”, that enables them to collect and share data, as well as interact with their physical surround- ings. Analyzing this collected data allows us to make smarter economic decisions. These interconnected networks are usually driven by low-powered micro-controllers or cheap CPUs that are designed to function optimally with very little hardware. As scale and computational requirements increase, these micro-controllers are unable to grow without being physically replaced. This thesis proposes a system, IoTA, that assists the Internet of Things by pro- viding a shared computational resource for endpoint devices. This solution extends the functionality of endpoint devices without the need of physical replacement. The IoTA system is designed to be easily integrable to any existing IoT network. This system presents a model that allows for seamless processing of jobs submitted by endpoint devices while keeping scalability and flexibility in mind. Additionally, IoTA is built on top of existing IoT protocols. Evaluation shows there is a significant performance benefit in processing computationally heavy algorithms on the IoTA system as compared to processing them locally on the endpoint devices themselves.
APA, Harvard, Vancouver, ISO, and other styles
7

Lu, Lu. "IoT Network Watchdog." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34008.

Full text
Abstract:
The Internet of Things (IoT) plays an important role in the coming era of the Internet development. In addition to the convenience and opportunities it brings to us, there comes with the security issues, which could lead to the privacy leakage, it’s a threaten to the whole IoT system. To deal with the potential dangerous element hidden behind this technology, monitoring on the network would be indispensable. To develop and implements the digital network watchdog system that monitors the local network and the connected device, firstly, I surveyed the area related to the IoT attacks. The network monitor system provides basic network monitoring function, connected device tracking and monitoring function, reliable device operating function. I used the packages provided by Raspberry Pi to realize the general monitoring and transferred the captured result for further analysis. Also, I made use of SNMP and drawing tool to create graphs of different parameters in the monitoring of both network and connected devices. Then I implemented database with web service on Raspberry Pi to realize device operating. In evaluation, the system works well in general monitoring with all information provided and low lost package percentage, the graphs can provide situation of different parameters, and the respond time in the operation time of database is short. I discussed the ethical thinking and proposed the ethical thinking and future work.
APA, Harvard, Vancouver, ISO, and other styles
8

Vuollo, O. (Olli). "IoT sovitin palovaroittimeen." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201804071457.

Full text
Abstract:
Työn tarkoituksena on tutkia, markkinoilta löytyviä langattomia palovaroitinjärjestelmiä, sekä tutkia palovaroittimiin kytkettäviä lisäosia, joilla palovaroittimesta tulee älykäs. Tarkoituksena on myös toteuttaa IoT sovitin, jolla haluttu älykkyys saavutetaan. IoT sovittimen tulee havaita hälytys ja ilmoittaa käyttäjälle havaitusta hälytyksestä. Palovaroittimen hälytys voidaan havaita kolmella eri tavalla, jotka ovat virranmittaus, äänen havaitseminen sekä värinän havaitseminen. Ääni havaitaan äänisensorilla ja värinä piezo-elementillä. Työssä esitetään näiden havainnointimenetelmien toteutustavat ja testataan ääneen perustuvaa ilmaisinta IoT sovittimessa. Toteutettu IoT sovitin todettiin toimivaksi. Se havaitsi hälytyksen ja lähetti ilmoituksen havaitusta hälytyksestä käyttäjälle
The main target of this thesis is to study different wireless smoke detector systems found on the market. Plug-ins which are connected to smoke detectors that help interconnect smoke detectors are also investigated. The aim is also to design and test an IoT device that brings more intelligence to the smoke detector functionality. The main function of the proposed IoT device is to detect the alarm of the smoke detector and inform the user about the alarm. The alarm of the smoke detector can be detected at least in three different ways. Current measurement, sound detection and vibration detection are methods that can be utilized for alarm detection. The sound is detected by sound sensor and vibration is detected by piezo element. All of these detection types are introduced and the sound detection was chosen to be implemented. The implemented IoT device detected an alarm and sent a notification to the user
APA, Harvard, Vancouver, ISO, and other styles
9

Jaakola, P. (Pekka). "IoT-verkkoteknologioiden suorituskyky." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906012301.

Full text
Abstract:
Tiivistelmä. Jotta maailmasta voidaan tehdä älykkäämpi ja entistä automatisoidumpi tarvitaan teknologia, joka osaa kerätä, käsitellä, lähettää ja vastaanottaa dataa. Esineiden internet eli Internet of Things (IoT) on luotu juuri sitä varten. IoT on jo tähän hetkeen mennessä mullistanut maailmaa, mutta suurin osa sen kapasiteetista on vielä käyttämättä. IoT-verkkoteknologiat ovat juuri se osa IoT:tä, joka mahdollistaa datan lähetyksen ja vastaanottamisen. Tämän kandidaatin tutkielman aiheena on IoT verkkoteknologioiden suorituskyky keskittyen neljään teknologiaan. Teknologiat ovat Bluetooth Low Energy, ZigBee, LoRaWAN ja Narrowband IoT (NB-IoT). Tutkielmassa etsitään sopivinta teknologiaa sovellukseen, jossa kerätään anturidataa ja etäohjataan laitteita lähes reaaliaikaisesti internetin yli. Teknologioita tutkiessa keskitytään erityisesti niiden energiatehokkuuteen, verkkotopologioihin, laitteiden maksimimäärään verkossa, datansiirtonopeuteen ja viiveeseen. Jokaiseen mainittuun teknologiaan pureudutaan yksitellen esitellen myös niiden perustoimintatavat. Lopullisessa vertailussa teknologioita vertaillaan sen mukaan, että millaiseen sovellukseen teknologia on sopiva ja miten se soveltuu tutkielmassa esitettyyn sovellukseen. Tuloksista nähdään, että LoRaWAN ei ole ideaali teknologia, mikäli laitteita halutaan ohjata reaaliaikaisesti ilman viivettä. Bluetooth Low Energy:n todetaan olevan sopiva teknologia, jos sovelluksessa tarvitaan nopeaa tiedonsiirtonopeutta. NB-IoT:n toiminnan rajaaminen vain sinne, missä 4G kuuluvuus on hyvä, tekee siitä epäsopivan teknologian sovellukseen silloin, kun 4G kuuluvuus on huono. ZigBee on sopiva teknologia tutkielmassa mukana olleeseen sovellukseen sen pitkän kantaman, energiatehokkuuden, suuren kapasiteetin ja toimintavarmuuden vuoksi silloin, kun NB-IoT ei toimi.Performance of the IoT network technologies. Abstract. The modern world is becoming more and more automated and intelligent. Hence, the importance of having a technology that is capable of collecting, processing, sending and receiving data is essential. Internet of Things, or IoT for short, is made for that. IoT has already revolutionized the world, but still most of its capacity is unused. IoT network technologies are the part of the IoT that makes sending and receiving data possible. The topic of this Bachelor’s thesis is the performance of the IoT network technologies, concentrated on four technologies. The technologies are Bluetooth Low Energy, ZigBee, LoRaWAN and Narrowband-IoT. One main point on this thesis is to find a suitable technology for an application that collects sensor data and remotely controls devices over the Internet in near real-time. The most important features of the studied technologies for this thesis are energy efficiency, network topologies, maximum number of devices on the network, data transfer rate and latency. The basic structure of the technologies is also presented. At the final comparison, technologies are compared by for which application technology is suitable and how it suits the mentioned application. The given results show that LoRaWAN is not an ideal technology when devices need to be controlled in near real-time without latency. Bluetooth Low Energy is a suitable technology when the application needs fast bit rate. Narrowband-IoT is suitable technology when the reception of the 4G is strong enough. ZigBee’s wide range, good energy efficiency, large capacity and reliability makes it a suitable technology when the reception of the 4G is not strong enough.
APA, Harvard, Vancouver, ISO, and other styles
10

Blom, Albin. "NB-IoT Coverage : Development of a measuring instrument for NB-IoT." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-82550.

Full text
Abstract:
This report is an exposition of the development of a measuring instrument whosetask is to map the physical coverage of the NB-IoT network. The measuringinstrument was developed on TietoEvry's initiative, as it was in their interest to obtaina measuring instrument that can be used to map the coverage in parts of VarmlandsNB-IoT network. Which in this way provides an assessment for any future projectsinvolving NB-IoT. The development of the measuring instruments you can carry withyou out into the field, uses a microcomputer for collecting measurement data savedin a log file using Python. The report also describes a complimentary program that inturn takes and visualizes the acquired data in the form of markers on a map, whichshows the signal strength of the NB-IoT network. The visualization program is writtenin Java and is based on the open source project: jxmapviewer2. However, themeasuring instrument as it is today needs further testing to ensure the accuracy ofthe measuring instrument. Something that can be looked over in the future.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IOTU"

1

Roger, Balister, and Telenius-Lowe Steve, eds. IOTA directory. Bedford, England: Radio Society of Great Britain, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roger, Balister, and Telenius-Lowe Steve, eds. IOTA directory. Bedford, England: Radio Society of Great Britain, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IOU. London: Simon & Schuster, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Warner, Helen. IOU. Leicester: Charnwood, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1922-, Akiya Yutaka, ed. Ioku Yukihiko shishū. Tōkyō: Doyō Bijutsusha, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pi, Iota Sigma. The centennial history of Iota Sigma Pi: Honor society for women in chemistry founded 1902. [Covington, La.]: Iota Sigma Pi, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Klein, Scott. IoT Solutions in Microsoft's Azure IoT Suite. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2143-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Butun, Ismail, ed. Industrial IoT. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42500-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Verma, Jitendra Kumar, Deepak Kumar Saxena, Vicente González-Prida Díaz, and Vira Shendryk. Cloud IoT. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Desbiens, Frédéric. Building Enterprise IoT Solutions with Eclipse IoT Technologies. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-8882-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IOTU"

1

Ziegler, Sébastien, Cedric Crettaz, Latif Ladid, Srdjan Krco, Boris Pokric, Antonio F. Skarmeta, Antonio Jara, Wolfgang Kastner, and Markus Jung. "IoT6 – Moving to an IPv6-Based Future IoT." In The Future Internet, 161–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38082-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hellani, Hussein, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat, Ernesto Exposito, and Mourad Kmimech. "Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment." In Hybrid Intelligent Systems, 429–40. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49336-3_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Banerjee, Srijita, Adrish Bhattacharya, and Shampa Sen. "Healthcare IoT (H-IoT)." In Machine Learning and IoT, 247–63. Boca Raton : Taylor & Francis, 2019.: CRC Press, 2018. http://dx.doi.org/10.1201/9781351029940-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dalal, Sandeep, and Kamna Solanki. "Green-IoT (G-IoT)." In Green Internet of Things for Smart Cities, 1–21. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003032397-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sahoo, Subhashree, Debabrata Dansana, and Raghvendra Kumar. "“IoT”." In Handbook of IoT and Blockchain, 49–70. First edition. | Boca Raton, FL : CRC Press, 2021. | Series: Internet of everything (IoE). Security and privacy paradigm: CRC Press, 2020. http://dx.doi.org/10.1201/9780367854744-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Correia, Ricardo, Daniel Belo, and Nuno Borges Carvalho. "IoT." In Recent Wireless Power Transfer Technologies via Radio Waves, 209–30. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339243-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hariharan, U., K. Rajkumar, and Nilotpal Pathak. "IoT." In Security and Trust Issues in Internet of Things, 1–23. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003121664-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sahoo, Subhashree, Debabrata Dansana, and Raghvendra Kumar. "“IoT”." In Handbook of IoT and Blockchain, 49–70. First edition. | Boca Raton, FL : CRC Press, 2021. | Series: Internet of everything (IoE). Security and privacy paradigm: CRC Press, 2020. http://dx.doi.org/10.4324/9780367854744-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saxena, Deepak, and Jitendra Kumar Verma. "ERP on the Cloud." In Cloud IoT, 35–44. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dohare, Indu, and Karan Singh. "Lightweight Trust Evaluation in IoT." In Cloud IoT, 243–55. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IOTU"

1

Madureira, André Luiz, Francisco Renato Araújo, and Leobino Sampaio. "Um Protocolo IoT para Redução de Tráfego em Redes de Plano de Dados Programáveis." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc.2020.12328.

Full text
Abstract:
Dispositivos IoT geram grandes fluxos contínuos de dados, o que ocasiona congestionamentos, comprometendo a escalabilidade das redes IoT. A fim de solucionar esses problemas e facilitar a interoperabilidade entre os diversos dispositivos IoT, o Protocolo da Internet das Coisas (IoTP) foi proposto neste estudo. Ao utilizar o IoTP, é possível implementar algoritmos de agregação de dados que se adaptam às tecnologias de comunicação (Ethernet, 802.11, etc.) utilizadas pelos dispositivos IoT. Além disso, utilizando o IoTP, tais estratégias podem ser implementadas diretamente no hardware dos comutadores de pacotes. Os resultados de emulação mostram que o IoTP trouxe uma melhoria de 78% na eficiência da rede, além de permitir o controle sobre o atraso médio gerado pelas técnicas de agregação de dados. O IoTP também conseguiu reduzir o número de pacotes enviados pela rede, reduzindo o consumo de recursos computacionais dos comutadores de rede.
APA, Harvard, Vancouver, ISO, and other styles
2

Madureira, André L. R., and Leobino N. Sampaio. "IoTP: On Supporting IoT Data Aggregation Through Programmable Data Planes." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbrc_estendido.2021.17166.

Full text
Abstract:
In this dissertation, we introduced the Internet of Things Protocol (IoTP). An L2 communication protocol for IoT programmable data planes that supports the implementation of data aggregation algorithms inside hardware switches, at the network level. Through these features, IoTP provides support for the design of efficient and adaptable aggregation schemes that can adjust their operation according to network status and based on the different communication technologies used by IoT devices. We implemented IoTP using the P4 language and conducted emulation-based experiments through Mininet environment. Our findings show that IoTP accomplishes a 78% improvement in network efficiency, as well as allowing control over the average delay generated by data aggregation techniques.
APA, Harvard, Vancouver, ISO, and other styles
3

Barbosa, Caio Martins, Vinicius F. S. Mota, Roberta Lima Gomes, and Jose Gonçalves Pereira Filho. "Sensor Store: uma loja de dados de IoT usando Tangle." In I Workshop em Blockchain: Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wblockchain.2019.7484.

Full text
Abstract:
Em um mundo cada vez mais conectado, os dispositivos conectados, que formam a chamada Internet das Coisas (IoT) se tornarão cada vez mais presentes no cotidiano das pessoas, seja monitorando ou atuando no ambiente ao seu redor. A onipresença da IoT produzirá uma quantidade excessiva de dados sobre os mais diversos fenômenos físicos. Vislumbrando um potencial mercado, este trabalho propõe uma arquitetura para comercialização de dados de sensores. Os dados dos dispositivos estarão publicados na Tangle, uma tecnologia de livros-razão distribuídos (DLTs) que armazenará os dados de forma imutável e permitirá a realização de pagamentos em criptomoeda IOTA sem cobrança de taxas de recompensa.
APA, Harvard, Vancouver, ISO, and other styles
4

Moreira, Jonas V., and Antônio M. Alberti. "Mercado de Espectro com IOTA." In Workshop em Blockchain: Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/wblockchain.2022.223444.

Full text
Abstract:
Este artigo introduz uma nova arquitetura de Mercado de Espectro Eletromagnético com o criptoativo IOTA, visando compartilhamento de espectro licenciado e não licenciado. Por meio de vendas temporárias de direito de transmissão de espectro licenciado, usuários primários são remunerados com IOTAs pelo aluguel de seus direitos de transmissão à usuários secundários. Dispositivos IoT dotados com capacidade de sensoriamento varrem um determinado espaço geográfico, para alimentar o banco de dados do mercado com oportunidades de transmissão de espectro não licenciado, remunerando seus proprietários pelas verificações. Resultados experimentais mostram que a arquitetura é factível, dado que o tempo de negociação de espectro foi em média igual a 181 milissegundos, e o tempo de verificação de ocupação do espectro, feito pelos dispositivos IoT, ficou entre 5 e 34 segundos, dependendo da quantidade de sensores envolvidos na operação.
APA, Harvard, Vancouver, ISO, and other styles
5

Siever, Bill, and Michael P. Rogers. "An IoTa of IoT (Abstract Only)." In SIGCSE '17: The 48th ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3017680.3017820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keršič, Vid, and Muhamed Turkanović. "Uporaba platforme IOTA za zbiranje IOT podatkov." In OTS 2019 Sodobne informacijske tehnologije in storitve. University of Maribor Press, 2019. http://dx.doi.org/10.18690/978-961-286-282-4.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gunathilake, S., T. Ramachandra, and U. G. D. Madushika. "CARBON FOOTPRINT ANALYSIS OF CONSTRUCTION ACTIVITIES IN SRI LANKA: AN INPUT-OUTPUT TABLE." In Beyond sustainability reflections across spaces. Faculty of Architecture Research Unit, 2021. http://dx.doi.org/10.31705/faru.2021.29.

Full text
Abstract:
The construction industry is one of the major contributors that emits carbon into the environment. When considering the carbon emission in the local context, even though there are Input-Output Tables (IOTs) that applies to all types of industries in Sri Lanka, there seems to be limited focuses on IOTs specifically relating to the construction activities which is vital for the need due to its outstanding contribution to the carbon footprint of Sri Lanka. Hence, this study aims to calculate the carbon footprint construction activities in Sri Lanka using IOT with a bottom-up approach. The required data were extracted from published documents of Survey of Construction Industry by Census and Statistics, and The Inventory of Carbon and Energy (ICE) database of UK. Carbon footprint of construction activities were calculated using IOT with a bottom-up approach. The analysis revealed that the road and railway sector have the highest contribution of 48% to the monetary value of the construction industry meanwhile it accounts for 44% of the highest carbon emission to the atmosphere in the year 2020. Subsequently, activities related to non-residential residential, and utilities contribute to 20%, 15%, and 12% of total carbon emission respectively. In terms of construction materials, cement-based activities (59%) were the highest contributor while rubble and metal-based (23%), and iron and steel-based activities (17%) were next level contributors to the carbon emission due to construction. The analysis concluded that the as the initiatives, public sector projects including road and railway sector and utilities should integrate more sustainable construction practices as they are responsible for more than 50% of carbon emission.
APA, Harvard, Vancouver, ISO, and other styles
8

Concepcion Leon, Adrian, and Markus Endler. "Secure distributed ledgers to support IoT technologies data." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7356.

Full text
Abstract:
Blockchain and Tangle are data structures used to create an immutable public record of data insured by a network of peer-to-peer participants who maintain a set of constantly growing data records known as ledgers. Blockchain and Tangle technologies are a decentralized solution that guarantees the exchange of large amounts of trusted messages, among billions of connected IoT devices, which are very valuable as they are valid and complete. This highly encrypted and secure peer-to-peer messaging mechanism is adopted in this project to manage the processing of IoT transactions and the coordination between the devices that interact with the process. To maintain private transactions, secure and trustless, the distributed consensus algorithms are responsible for validating and choosing transactions and recording them in the global ledger. The results showed that the speed of the consensus algorithms can affect the creation in real time of reliable stories that track the events of the IoT networks. After incorporating Complex Event Processing that allows selecting only those high level events, it is possible to get an improvement in many situations. The result is a Middleware system that provides a framework for the construction of large-scale computer applications that use Complex Events Processing and different decentralized ledgers such as the blockchain of Ethereum or IOTA Tangle, for secure data storage.
APA, Harvard, Vancouver, ISO, and other styles
9

Fang, Zheng, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, and Prasant Mohapatra. "IOTA: A Framework for Analyzing System-Level Security of IoTs." In 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2022. http://dx.doi.org/10.1109/iotdi54339.2022.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Namboodiri, Vinod, Francisco Rafful Garfias, Ajay Abraham, and Siny Joseph. "On the Application of Accessible Wayfinding Systems for Tourism." In 2022 IEEE 2nd IoT Vertical and Topical Summit for Tourism (IoTT). IEEE, 2022. http://dx.doi.org/10.1109/iott56174.2022.9925902.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IOTU"

1

Borge, T. W. GBS IOTE Feed Measurements. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada387801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stancari, Giulio, J. Jarvis, N. Kuklev, I. Lobach, A. Romanov, J. Ruan, J. Santucci, and A. Valishev. Detecting Single Electrons in IOTA. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1498551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Burov, Alexey. Beam instability issues in IOTA. Office of Scientific and Technical Information (OSTI), February 2014. http://dx.doi.org/10.2172/1331790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barth, Steve, and James Muller. Infrastructure Operations Tool Access (IOTA). Fort Belvoir, VA: Defense Technical Information Center, July 2004. http://dx.doi.org/10.21236/ada426305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yung, Kailim W., Jason Sellazzo, and Norm Fanning. A Commercial IOTV Cleaning Study. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada519348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hofer, M., R. Tomas, A. Romanov, G. Stancari, A. Valishev, N. Kuklev, and S. Szustkowski. Nonlinear Optics Measurements in IOTA. Office of Scientific and Technical Information (OSTI), March 2021. http://dx.doi.org/10.2172/1779489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kievit, Sander de. IoT in home. Denmark: River Publishers, November 2017. http://dx.doi.org/10.13052/popcas018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cuthill, Barbara. Profile of the IoT Core Baseline for Consumer IoT Products. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Young, Samantha. Characterization of the IOTA Proton Source. Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1460384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Megas, Katerina N., Michael Fagan, and David Lemire. Workshop Summary Report for “Building the Federal Profile for IoT Device Cybersecurity” Virtual Workshop. National Institute of Standards and Technology, January 2021. http://dx.doi.org/10.6028/nist.ir.8322.

Full text
Abstract:
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020. NISTIR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers and NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline provide general guidance on how manufacturers can understand and approach their role in supporting customers’ cybersecurity needs and goals. As discussed in those documents, specific sectors and use cases may require more specific guidance than what is included in NISTIR 8259A’s core baseline for IoT devices. NIST conducted the virtual workshop “Building the Federal Profile for IoT Device Cybersecurity” to discuss and gather community input on the creation of a federal profile of the core baseline for use by federal agencies. This publication provides a summary of the workshop. The baseline will be published in NISTIR 8259D, Profile of the IoT Core Baseline for the Federal Government.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography