Journal articles on the topic 'Protocoles de communications'

To see the other types of publications on this topic, follow the link: Protocoles de communications.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protocoles de communications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He, and Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management." Systems 11, no. 7 (June 24, 2023): 322. http://dx.doi.org/10.3390/systems11070322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
City zones have become increasingly overcrowded due to the extensive population widening ratio and the swift relocation of people from villages. The traffic monitoring process is a significant issue in these areas due to the massive traffic flow on the roads. This research proposed a cluster-based improved authentication and communication protocol for an Intelligent Transportation System in Vehicular AdHoc Networks (VANETs). Our primary objective is to optimize resource sharing in vehicular communication. We enhanced the reliability, scalability, and stability of fast-moving VANETs by introducing cluster-based routing protocols for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications. We used a third-party certification authority for vehicle authentication to address security and privacy concerns. Our proposed protocol support minimizes the end-to-end (E2E) delay and route request and reduces link failure. Our protocol’s leading yield includes throughput enhancement, TCP Socket Initialization time minimization, TCP handshake response speedup, and DNS lookup improvement. The protocols are centered on short-range peer-to-peer (P2P) wireless communication in a 400 m radius cluster. They include innovative P2P wireless communications on VANET using minimized resources. The proposed protocols deliver a secure authentication mechanism with a securely generated vehicle authentication key provided by a certification authority. Furthermore, we have developed RESTful APIs in vehicular communication for implementation purposes and also offered and implemented algorithms for resource sharing regarding V2V and V2I communication. Ultimately, we evaluated the performance of our experiments.
2

Sangam, Sahana V., Sahana S. Kulkarni, and Asst Prof Chaitanya K. Jambotkar. "Smart Grid Communication Protocols." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif, and Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed." Energies 17, no. 2 (January 11, 2024): 373. http://dx.doi.org/10.3390/en17020373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Fifth-generation networks promise wide availability of wireless communication with inherent security features. The 5G standards also outline access for different applications requiring low latency, machine-to-machine communication, or mobile broadband. These networks can be advantageous to numerous applications that require widespread and diverse communications. One such application is found in smart grids. Smart grid networks, and Operational Technology (OT) networks in general, utilize a variety of communication protocols for low-latency control, data monitoring, and reporting at every level. Transitioning these network communications from wired Wide Area Networks (WANs) to wireless communication through 5G can provide additional benefits to their security and network configurability. However, introducing these wireless capabilities may also result in a degradation of network latency. In this paper, we propose utilizing 5G for smart grid communications, and we evaluate the latency impacts of encapsulating GOOSE, Modbus, and DNP3 for transmission over a 5G network. The OpenAirInterface open-source library is utilized to deploy an in-lab 5G Core Network and gNB for testing with off-the-shelf User Equipment (UE). This creates an effective 5G test platform for experimenting with different OT protocols such as GOOSE. The results are validated by measuring two different Intelligent Electronic Devices’ contact closure times for each network configuration. These tests are also conducted for varying packet sizes in order to isolate different sources of network latency. Our study outlines the latency impact of communication over 5G for time-critical and non-critical applications regarding their transition toward private 5G-based OT network implementations. The conducted experiments illustrate that in the case of GOOSE packets, simple encapsulation may exceed the protocol’s time-critical nature, and, therefore, additional measures must be taken to ensure a viable transition of GOOSE to 5G services. However, non-critical applications are shown to be viable for migration to 5G.
4

Gee, K. "Communications network protocols." Computer Communications 8, no. 5 (October 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (May 1997): 685. http://dx.doi.org/10.2307/3502853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (May 1, 1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suleman, Danladi, Rania Shibl, and Keyvan Ansari. "Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions." Smart Cities 6, no. 5 (October 6, 2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Networking protocols have undergone significant developments and adaptations to cater for unique communication needs within the IoT paradigm. However, meeting these requirements in the context of vehicle-to-infrastructure (V2I) communications becomes a multidimensional problem due to factors like high mobility, intermittent connectivity, rapidly changing topologies, and an increased number of nodes. Thus, examining these protocols based on their characteristics and comparative analyses from the literature has shown that there is still room for improvement, particularly in ensuring efficiency in V2I interactions. This study aims to investigate the most viable network protocols for V2I communications, focusing on ensuring data quality (DQ) across the first three layers of the IoT protocol stack. This presents an improved understanding of the performance of network protocols in V2I communication. The findings of this paper showed that although each protocol offers unique strengths when evaluated against the identified dimensions of DQ, a cross-layer protocol fusion may be necessary to meet specific DQ dimensions. With the complexities and specific demands of V2I communications, it’s clear that no single protocol from our tri-layered perspective can solely fulfil all IP-based communication requirements given that the V2I communication landscape is teeming with heterogeneity, where a mixture of protocols is required to address unique communication demands.
9

Singh, Rameshwar, and Prof Gayatri Bhoyar. "Green Communications Using Ambient Backscattered: The Review Paper." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: Green communication aims at addressing the exploration of sustainability regarding environmental conditions, energy efficiency, and communication purpose mainly on mobiles. Green communication is a duty to strengthen corporate responsibility towards the environment and motivate an ecological generation of network equipment and systems. The paper attempts topresent the latest research in green communications using Ambient Backscatter. Recent ideas of mobile technology involve the growth in the number of equipment exploited every day which has resulted in the requirement to innovate in the field of energy-efficient communications. The paper presents a literature survey on the protocols to improve energy efficiency in green communication networks. It elaborates on the various aspects of analysis, design, distribution, and expansion of protocols, and architectures of green communications and networking. We firstpresent the fundamentals of backscatter communications and briefly review bistatic backscatter communications systems. The general architecture, advantages, and limitations of ambient backscatter communications systems are discussed. Additionally, emerging applications of ambient backscatter communications are highlighted, and we outline some open issues and future research.
10

Boczkowski, Lucas, Iordanis Kerenidis, and Frédéric Magniez. "Streaming Communication Protocols." ACM Transactions on Computation Theory 10, no. 4 (October 17, 2018): 1–21. http://dx.doi.org/10.1145/3276748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Derrick, John, and Sally Fincher. "Teaching Communication Protocols." Computer Science Education 10, no. 3 (December 2000): 195–202. http://dx.doi.org/10.1076/0899-3408(200012)10:3;1-s;ft195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Patel, Ahmed. "Communication network protocols." Computer Communications 9, no. 6 (December 1986): 317. http://dx.doi.org/10.1016/0140-3664(86)90055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Naik, K., and B. Sarikaya. "Testing communication protocols." IEEE Software 9, no. 1 (January 1992): 27–37. http://dx.doi.org/10.1109/52.108777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gouda, M. G., and N. J. Multari. "Stabilizing communication protocols." IEEE Transactions on Computers 40, no. 4 (April 1991): 448–58. http://dx.doi.org/10.1109/12.88464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Islam, Mahbubul, Hossain Jamil, Samiul Pranto, Rupak Das, Al Amin, and Arshia Khan. "Future Industrial Applications: Exploring LPWAN-Driven IoT Protocols." Sensors 24, no. 8 (April 14, 2024): 2509. http://dx.doi.org/10.3390/s24082509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) will bring about the next industrial revolution in Industry 4.0. The communication aspect of IoT devices is one of the most critical factors in choosing the device that is suitable for use. Thus far, the IoT physical layer communication challenges have been met with various communications protocols that provide varying strengths and weaknesses. This paper summarizes the network architectures of some of the most popular IoT wireless communications protocols. It also presents a comparative analysis of some of the critical features, including power consumption, coverage, data rate, security, cost, and quality of service (QoS). This comparative study shows that low-power wide area network (LPWAN)-based IoT protocols (LoRa, Sigfox, NB-IoT, LTE-M) are more suitable for future industrial applications because of their energy efficiency, high coverage, and cost efficiency. In addition, the study also presents an Industrial Internet of Things (IIoT) application perspective on the suitability of LPWAN protocols in a particular scenario and addresses some open issues that need to be researched. Thus, this study can assist in deciding the most suitable IoT communication protocol for an industrial and production field.
16

Chittoor, Hari Hara Suthan, and Osvaldo Simeone. "Quantum Machine Learning for Distributed Quantum Protocols with Local Operations and Noisy Classical Communications." Entropy 25, no. 2 (February 14, 2023): 352. http://dx.doi.org/10.3390/e25020352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Distributed quantum information processing protocols such as quantum entanglement distillation and quantum state discrimination rely on local operations and classical communications (LOCC). Existing LOCC-based protocols typically assume the availability of ideal, noiseless, communication channels. In this paper, we study the case in which classical communication takes place over noisy channels, and we propose to address the design of LOCC protocols in this setting via the use of quantum machine learning tools. We specifically focus on the important tasks of quantum entanglement distillation and quantum state discrimination, and implement local processing through parameterized quantum circuits (PQCs) that are optimized to maximize the average fidelity and average success probability in the respective tasks, while accounting for communication errors. The introduced approach, Noise Aware-LOCCNet (NA-LOCCNet), is shown to have significant advantages over existing protocols designed for noiseless communications.
17

Zheng, Tongyi, Lei Ning, Qingsong Ye, and Fan Jin. "An XGB-Based Reliable Transmission Method in the mMTC Scenarios." Security and Communication Networks 2021 (December 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/9929051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Massive machine-type communications (mMTCs) for Internet of things are being developed thanks to the fifth-generation (5G) wireless systems. Narrowband Internet of things (NB-IoT) is an important communication technology for machine-type communications. It supports many different protocols for communication. The reliability and performance of application layer communication protocols are greatly affected by the retransmission time-out (RTO) algorithm. In order to improve the reliability and performance of machine-type communications, this study proposes a novel RTO algorithm UDP-XGB based on the user datagram protocol (UDP) and NB-IoT. It combines traditional algorithms with machine learning. The simulation results show that real round-trip time (RTT) is close to the RTO, which is obtained by this algorithm, and the reliability and performance of machine-type communications have improved.
18

PĂSCUȚOIU, Ovidiu, and Maria-Daniela TACHE (UNGUREANU). "UAV COMMUNICATION PROTOCOLS AND QUALITY OF SERVICE IN 5G COMMUNICATION." Review of the Air Force Academy 22, no. 1 (June 20, 2024): 5–10. http://dx.doi.org/10.19062/1842-9238.2024.22.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper aims to provide an overview of common network protocols in UAV communications with a focus on security and vulnerabilities. In order to assess the common types of vulnerabilities, various elements must be taken into account such as mission purpose, communication type and protocol. The paper will walk through the main types of UAV protocols and make a brief analysis in terms of communication network security. It will also look on 5G communication requirements in terms of quality of service.
19

Saleh, Kassem. "Synthesis of communications protocols." ACM SIGCOMM Computer Communication Review 26, no. 5 (October 1996): 40–59. http://dx.doi.org/10.1145/242896.242900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hunt, Ray. "Introducing data communications protocols." Computer Communications 9, no. 4 (August 1986): 201. http://dx.doi.org/10.1016/0140-3664(86)90224-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Adamovich, Igor Alekseevich, and Yuri Andreevich Klimov. "An FPGA packet communication protocol." Program Systems: Theory and Applications 11, no. 1 (March 25, 2020): 57–78. http://dx.doi.org/10.25209/2079-3316-2020-11-1-57-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
When creating computer boards with FPGA or application-specific chips, it is often needed to connect several chips. Existing available buses do not have all the properties required by the authors’ task at hand: packet transmission, using a small number of GPIO pins, sufficient bandwidth. We describe a packet communication protocol that uses GPIO pins and has bandwidth up to 10 MB/s at a frequency of 20 MHz.
22

Graham, Richard L., Brian W. Barrett, Galen M. Shipman, Timothy S. Woodall, and George Bosilca. "Open MPI: A High Performance, Flexible Implementation of MPI Point-to-Point Communications." Parallel Processing Letters 17, no. 01 (March 2007): 79–88. http://dx.doi.org/10.1142/s0129626407002880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Open MPI's point-to-point communications abstractions, described in this paper, handle several different communications scenarios, with a portable, high-performance design and implementation. These abstractions support two types of low-level communication protocols – general purpose point-to-point communications, like the OpenIB interface, and MPI-like interfaces, such as Myricom's MX library. Support for the first type of protocols makes use of all communications resources available to a given application run, with optional support for communications error recovery. The latter provides a interface layer, relying on the communications library to guarantee correct MPI message ordering and matching. This paper describes the three point-to-point communications protocols currently supported in the Open MPI implementation, supported with performance data. This includes comparisons with other MPI implementations using the OpenIB, MX, and GM communications libraries.
23

Zhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (October 2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state [Formula: see text]-[Formula: see text] quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.
24

Gray, Chrispin Alfred, Leith Campbell, Robert Ayre, and Kerry Hinton. "Energy-Efficient Network Protocols for Domestic IoT Application Design." Journal of Telecommunications and the Digital Economy 7, no. 2 (June 30, 2019): 50–73. http://dx.doi.org/10.18080/jtde.v7n2.184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the future Internet of Things, many common household devices will have communications interfaces added. The gathering of data from these household IoT-enabled devices will incur an energy cost and, in this paper, we investigate the impact of different communications technologies and protocols on that cost. As a first step towards energy-efficient design, we have measured the power consumption of several popular wireless interfaces – Bluetooth (Classic and Low Energy), ZigBee, Wi-Fi and 433 MHz module (RF433). We then combine these measurements through the example of a simple domestic stock control application and we show how an energy-efficient communications paradigm can be designed in each case. In general, both the communications paradigm and the amount of traffic need to be considered for an energy-efficient design. This is a contribution to design guidelines for energy-efficient communication in the Internet of Things as it expands to encompass all consumer devices.
25

Manoufali, Mohamed, Hamada Alshaer, Peng-Yong Kong, and Shihab Jimaa. "An Overview of Maritime Wireless Mesh Communication Technologies and Protocols." International Journal of Business Data Communications and Networking 10, no. 1 (January 2014): 1–29. http://dx.doi.org/10.4018/ijbdcn.2014010101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Maritime wireless mesh networks (MWMNs) are conceived to provide network connectivity for maritime users and enable them to communicate with correspondent users connected to terrestrial communication networks. The high cost and low data-rate of satellite and other legacy maritime communication technologies and systems deployed in MWMNs pose major limitation to establish reliable and affordable maritime communications. In addition, the design of routing protocols in MWMNs remains a significant challenge due to the lack of reliable communication infrastructure and complexity of maritime environment. This paper explains the existing maritime communication technologies and routing protocols which could be deployed in implementing reliable MWMNs. Comprehensive guidelines are outlined to easily understand and critically assess the different deployed maritime communication networks and systems with routing protocols, and identify the milestones in the process of developing and implementing broadband MWMNs.
26

NARESH, K. VENKATA. "Implementation of OPC UA for Machine-to-Machine Communications in a Smart Factory." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 18, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of autonomous and intelligent robots in manufacturing plants is being made possible by advancements in communications technologies and the Industrial Internet of Things (IoT). These autonomous devices are capable of gathering data from several sensor devices and multiple linked device systems through the use of OPC UA communication protocols. These devices can transmit and receive enough data these days to allow them to make decisions. Organization of individual devices is the sole application where high-level decision-making powers are available; communication between devices only entails low- level processing. The purpose of these images is to increase the OPC UA protocol-enabled devices' communication capabilities. This involves choosing methods for data reception and processing between devices connected vertically (deeper devices) and horizontally (equal devices). Because of this, the energetic gadget device makes the manufacturing facility site visitors better. KEYWORDS: Internet of things, Machine, Communications, Enterprises, Protocols, OPC UA protocols
27

Aryandaru, Rico, Awang Noor Indra Wardana, and Agus Arif. "Komparasi Protokol Komunikasi pada Sistem Produksi Siber-Fisik berbasis IEC 61499." Jurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems) 14, no. 1 (April 24, 2020): 35–40. http://dx.doi.org/10.21776/jeeccis.v14i1.630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The change in the concept of an automation pyramid into an automation cloud in a cyber-physical production system makes data communication no longer stratified but can be done directly between devices. Based on IEC 61499, which defines the function blocks for building such communications, communication protocols can be run on various devices. Several communication protocols that can fulfill these requirements are OPC-UA, FBDK / IP, and MQTT. The research was conducted by comparing the three communication protocols for latency parameters and their jitters. The test method used to compare latency parameters is the variance analysis test and the Tukey test. The jitter value of the protocols are compared to the standard deviation parameter. The test results showed that the MQTT communication protocol had a faster latency value, with a 95% confidence level. The standard deviation of the variation value for OPC-UA, FBDK / IP, and MQTT showed the jitter value of 0.72 seconds, 0.35 seconds, and 0.64 seconds. Comparing the three communication protocols' standard deviation values showed that the FBDK / IP communication protocol has significantly less jitter than the OPC-UA and MQTT communication protocols.
28

Laber, Eduardo Sany, and Leonardo Gomes Holanda. "On asymmetric communication protocols." Electronic Notes in Discrete Mathematics 7 (April 2001): 6–9. http://dx.doi.org/10.1016/s1571-0653(04)00211-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Tian-Fu, and Mei-Jiun Sung. "Communication-efficient AUTHMAC_DH protocols." Computer Standards & Interfaces 30, no. 1-2 (January 2008): 71–77. http://dx.doi.org/10.1016/j.csi.2007.07.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wenban, A. S., J. W. O'Leary, and G. M. Brown. "Codesign of communication protocols." Computer 26, no. 12 (December 1993): 46–52. http://dx.doi.org/10.1109/2.247651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Atkinson, J. K. "Communication protocols in instrumentation." Journal of Physics E: Scientific Instruments 20, no. 5 (May 1987): 484–91. http://dx.doi.org/10.1088/0022-3735/20/5/001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lin, H. P., and H. E. Stovall. "Self-synchronizing communication protocols." IEEE Transactions on Computers 38, no. 5 (May 1989): 609–25. http://dx.doi.org/10.1109/12.24265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ayele, Eyuel Debebe, Javier Ferreira Gonzalez, and Wouter B. Teeuw. "Enhancing Cybersecurity in Distributed Microgrids: A Review of Communication Protocols and Standards." Sensors 24, no. 3 (January 28, 2024): 854. http://dx.doi.org/10.3390/s24030854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The effective operation of distributed energy sources relies significantly on the communication systems employed in microgrids. This article explores the fundamental communication requirements, structures, and protocols necessary to establish a secure connection in microgrids. This article examines the present difficulties facing, and progress in, smart microgrid communication technologies, including wired and wireless networks. Furthermore, it evaluates the incorporation of diverse security methods. This article showcases a case study that illustrates the implementation of a distributed cyber-security communication system in a microgrid setting. The study concludes by emphasizing the ongoing research endeavors and suggesting potential future research paths in the field of microgrid communications.
34

Koutras, Dimitris, George Stergiopoulos, Thomas Dasaklis, Panayiotis Kotzanikolaou, Dimitris Glynos, and Christos Douligeris. "Security in IoMT Communications: A Survey." Sensors 20, no. 17 (August 26, 2020): 4828. http://dx.doi.org/10.3390/s20174828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.
35

Narender Reddy Kampelli and Chandrasekhar Reddy Puttha. "Energy-Efficient Dynamic MAC Protocol for M2M Communication." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (February 24, 2024): 105–12. http://dx.doi.org/10.47392/irjaeh.2024.0020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the Internet of Things, which is vital for smart city applications, a vast network of battery-operated Machine Type Communication Devices (MTCDs) requires Machine Type Communication. These MTCDs connect directly to a network with a base station, facilitating a wide range of smart city functionalities. The development of energy-efficient communication protocols is essential to support the deployment of energy-constrained battery-operated devices. These protocols aim to minimize energy consumption, thereby enhancing network lifetime. Additionally, they must address scalability, reduce collisions and delays, and ensure a high Quality of Service (QoS) to effectively manage the vast number of devices involved. Clustering is a viable strategy to enhance scalability and energy efficiency in network communications. However, within this framework, particularly in the proposed Power Efficient Dynamic MAC protocol for M2M Communication (PMAC), there's still a need for energy-efficient communication between the Machine Type Communication Devices (MTCDs). This requirement is crucial to optimize the overall performance and sustainability of the network. In this paper, we analyses the Energy Efficient CSMA/CA (E-CSMA/CA) protocol, specifically developed for facilitating communication between Machine Type Communication Devices (MTCDs) in short-range communications. This analysis is set within the context of smart city applications, with a particular focus on smart metering. This approach underscores the importance of efficient, reliable communication protocols in modern urban infrastructure, especially for applications like smart metering that are integral to the smart city ecosystem.
36

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
37

Orrillo, Héctor, André Sabino, and Mário Marques da Silva. "Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models." Future Internet 16, no. 6 (June 6, 2024): 203. http://dx.doi.org/10.3390/fi16060203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The expansion of mobile connectivity with the arrival of 6G paves the way for the new Internet of Verticals (6G-IoV), benefiting autonomous driving. This article highlights the importance of vehicle-to-everything (V2X) and vehicle-to-vehicle (V2V) communication in improving road safety. Current technologies such as IEEE 802.11p and LTE-V2X are being improved, while new radio access technologies promise more reliable, lower-latency communications. Moreover, 3GPP is developing NR-V2X to improve the performance of communications between vehicles, while IEEE proposes the 802.11bd protocol, aiming for the greater interoperability and detection of transmissions between vehicles. Both new protocols are being developed and improved to make autonomous driving more efficient. This study analyzes and compares the performance of the protocols mentioned, namely 802.11p, 802.11bd, LTE-V2X, and NR-V2X. The contribution of this study is to identify the most suitable protocol that meets the requirements of V2V communications in autonomous driving. The relevance of V2V communication has driven intense research in the scientific community. Among the various applications of V2V communication are Cooperative Awareness, V2V Unicast Exchange, and V2V Decentralized Environmental Notification, among others. To this end, the performance of the Link Layer of these protocols is evaluated and compared. Based on the analysis of the results, it can be concluded that NR-V2X outperforms IEEE 802.11bd in terms of transmission latency (L) and data rate (DR). In terms of the packet error rate (PER), it is shown that both LTE-V2X and NR-V2X exhibit a lower PER compared to IEEE protocols, especially as the distance between the vehicles increases. This advantage becomes even more significant in scenarios with greater congestion and network interference.
38

Zadobrischi, Eduard, and Mihai Dimian. "Vehicular Communications Utility in Road Safety Applications: A Step toward Self-Aware Intelligent Traffic Systems." Symmetry 13, no. 3 (March 8, 2021): 438. http://dx.doi.org/10.3390/sym13030438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The potential of wireless technologies is significant in the area of the safety and efficiency of road transport and communications systems. The challenges and requirements imposed by end users and competent institutions demonstrate the need for viable solutions. A common protocol by which there could be vehicle-to-vehicle and vehicle-to-road communications is ideal for avoiding collisions and road accidents, all in a vehicular ad hoc network (VANET). Ways of transmitting warning messages simultaneously by vehicle-to-vehicle and vehicle-to-infrastructure communications by various multi-hop routings are set out. Approaches to how to improve communication reliability by achieving low latency are addressed through the multi-channel (MC) technique based on two non-overlaps for vehicle-to-vehicle (V2V) and vehicle-to-road (V2R) or road-to-vehicle (R2V) communications. The contributions of this paper offer an opportunity to use common communication adaptable protocols, depending on the context of the situation, coding techniques, scenarios, analysis of transfer rates, and reception of messages according to the type of protocol used. Communications between the road infrastructure and users through a relative communication protocol are highlighted and simulated in this manuscript. The results obtained by the proposed and simulated scenarios demonstrate that it is complementary and that the common node of V2V/V2R (R2V) communication protocols substantially improves the process of transmitting messages in low-latency conditions and is ideal for the development of road safety systems.
39

Omer Farooq, Muhammad. "RIoT: A Routing Protocol for the Internet of Things†." Computer Journal 63, no. 6 (March 17, 2020): 958–73. http://dx.doi.org/10.1093/comjnl/bxaa012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The routing protocol for low-power and lossy networks (RPL) is a standard routing framework for Internet of Things (IoT). It supports multipoint-to-point (MP-to-P), point-to-point (P-to-P) and point-to-multipoint (P-to-MP) communications. It is known that RPL’s control overhead can result in the protocol’s poor performance in P-to-P and P-to-MP communications especially in its non-storing mode of operation. Here, we present a routing protocol for the Internet of Things (RIoT) that supports MP-to-P, P-to-P and P-to-MP communications. The protocol can construct P-to-P and P-to-MP routes with relatively lower control overhead. Another salient feature of RIoT is that it supports multiple gateways in the same network with an aim to reduce memory requirement for storing a forwarding table. Furthermore, RIoT is also capable of handling mobility-based IoT use cases. To facilitate communication among nodes connected to different gateways in the same network, here we also present an inter-gateway communication mechanism. We implemented RIoT in the Contiki operating system, and it is extensively evaluated using emulation and real testbed-based experiments. We analyzed the impact of the number of gateways, radio duty cycling (RDC) and mobility on the routing protocols’ performance. Our results demonstrate that either with or without RDC RIoT demonstrates statistically significantly better packet delivery ratio, per-packet end-to-end delay and control overhead compared to the RPL-based protocol. RIoT’s multi-gateway communication architecture substantially reduces the memory requirement to store a forwarding table. Our results also demonstrate that multiple gateways in a network reduce the network partitioning problem in mobile scenarios. Hence, RIoT also demonstrates better performance in mobile scenarios compared to the RPL-based protocol.
40

Ametov, F. R., E. A. Bekirov, and M. M. Asanov. "Organization of Secure Communication between Programmable Logic Controllers Using the Open Platform Communications Protocol." Journal of Physics: Conference Series 2096, no. 1 (November 1, 2021): 012125. http://dx.doi.org/10.1088/1742-6596/2096/1/012125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Modern automated control systems in industrial and private enterprises are represented by a set of programmable logic devices and components from various manufacturers. They operate based on many of the most widely used protocols and interfaces. Some manufacturers have their own solutions that are mainly focused only on their product, without direct or indirect compatibility with third-party solutions. Many control systems used now operate on relatively old solutions that cannot be partially modernized due to lack of technical resources or financial unprofitability. The paper considers the most popular industrial protocols Modbus and Profibus, analyzes their advantages, as well as features of the structure and functionality. The study of the operation problems and information security of modern control systems is considered, solutions for their elimination are analyzed. A solution for the control systems modernization was proposed based on the analysis. It can become effective and financially justified due to its technical features, allowing it to be adapted to existing solutions. Conclusions about the effectiveness of the proposed solution were formulated based on the data collected and the goals achieved.
41

Suhr, Hiesun-Cecilia. "Understanding the emergence of social protocols on MySpace: Impact and its ramifications." Comunicar 17, no. 34 (March 1, 2010): 45–53. http://dx.doi.org/10.3916/c34-2010-02-04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Over the recent years, MySpace has been vital to fostering the growth of independent musicians’ followings and have played critical roles in helping mainstream artists maintain fan communities. The popularity of MySpace has been accompanied by the establishment of social protocols which allow musicians to network with one another in an efficient and successful way. These protocols have inspired the publication of various books (such as «MySpace Music Profit Monster!: Proven Online Marketing Stra - tegies!» by Nicky Kalliongis devoted to providing tips and strategies for musicians. While some of these protocols pertain to being savvy with the technological aspect of MySpace, other protocols are directly related to learning a particular manner to network on MySpace. Furthermore, these practices are considered a serious work as they require a lot of time and networking skills to achieve a certain level of success, i.e. increasing the number of friends on one’s network. Thus, this article examines the emerging social protocols on MySpace as a form of affective and immaterial labor. The author argues that the implementation of various tips as provided by MySpace expert will possibly have a regressive effect on musicians’ social networking practices as these could become a standardized and repetitive practice. As a whole, this article traces the evolution of MySpace, especially in regards to the decreasing popularity of the site as a current trend. En los últimos años, MySpace ha sido crucial para promover el aumento de los seguidores de músicos independientes y ha representado un papel muy importante a la hora de ayudar a artistas populares a mantener las comunidades de fans. La popularidad de MySpace ha ido acompañada del establecimiento de protocolos sociales que han permitido a los músicos establecer vínculos entre ellos de una manera eficaz y exitosa. Estos protocolos han servido de inspiración para publicar varios libros (como «MySpace Music Profit Monster!: Proven Online Marketing Strategies!» de Nicky Kalliongis) con consejos y estrategias para los músicos. Si bien, algunos de estos protocolos pretenden conocer el aspecto tecnológico de MySpace, otros protocolos están directamente relacionados con el aprendizaje de una manera particular de conexión en red a través de MySpace. Además, estas prácticas son consideradas un trabajo serio, ya que requieren mucho tiempo y habilidades de conexión en red para lograr un cierto nivel de éxito, es decir, aumentar el número de amigos en la red personal. Así que, en este artículo, se analizan los protocolos sociales emergentes en MySpace como una forma de trabajo afectivo e inmaterial. La autora sostiene que la implementación de algunos consejos, como los proporcionados por expertos en MySpace, posiblemente pueda tener un efecto regresivo en las prácticas de los músicos en redes sociales, ya que podrían estandarizarizarse y volverse repetitivas. En conjunto, este artículo describe la evolución de My - Space, sobre todo en lo que respecta a la decreciente popularidad del sitio como una tendencia actual.
42

Bochmann, G. v., G. W. Gerber, and J. M. Serre. "Semiautomatic Implementation of Communication Protocols." IEEE Transactions on Software Engineering SE-13, no. 9 (September 1987): 989–1000. http://dx.doi.org/10.1109/tse.1987.233521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dwivedi, Siddharth, and Mahim Sagar. "Communication Protocols in Public Health." Journal of Health Management 19, no. 2 (May 15, 2017): 340–51. http://dx.doi.org/10.1177/0972063417699719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This work was initiated primarily to analyze the role of communication in public health policy and hence develop protocols to design effective communication strategies. Research was motivated by the fact that the traditional approaches towards communication in health management have proved inadequate in front of the complexity of recent challenges. New and innovative ‘Integrated Communication Strategies’, which employ targeted communication tools for achieving public cooperation, have emerged as the need of the hour. This was revealed by the extensive literature review carried out by the authors. The fact that most of the researches so far have been either to empirically determine factor linkages and hierarchies on a small population sample or to analyze some specific aspect of the whole public communication architecture restricts their usability to large-scale, real-life situations. This research aims at constructing that big picture, a wholesome view of the role communication is expected to play in a public health programme and how the researches so far can be collated with insights from the case study of dengue fever in New Delhi carried out by the authors to yield protocols for designing highly effective communication programmes, which shall go long way in ensuring a successful health campaign.
44

Arizmendi, C. M. "Quantum Games Based Communication Protocols." Journal of Advances in Applied & Computational Mathematics 4, no. 1 (June 2, 2018): 35–39. http://dx.doi.org/10.15377/2409-5761.2017.04.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Tamy, Sara, Hicham Belhadaoui, Mahmoud Almostafa Rabbah, Nabila Rabbah, and Mounir Rifi. "SCADA Communication Real Time Protocols." Indian Journal of Science and Technology 12, no. 34 (September 30, 2019): 1–6. http://dx.doi.org/10.17485/ijst/2019/v12i34/147550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ishikawa, Ryuichiro. "Communication Protocols with Belief Messages." Theory and Decision 61, no. 1 (August 2006): 63–74. http://dx.doi.org/10.1007/s11238-005-6013-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Afrati, Foto, Christos H. Papadimitriou, and George Papageorgiou. "The synthesis of communication protocols." Algorithmica 3, no. 1-4 (November 1988): 451–72. http://dx.doi.org/10.1007/bf01762126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, N., and M. T. Liu. "Conformity analysis for communication protocols." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 216–26. http://dx.doi.org/10.1145/1013812.18197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bavel, Z., J. W. Gfrzymala-Busse, and Y.-T. Hsia. "New communication protocols from old." ACM SIGCOMM Computer Communication Review 17, no. 5 (October 1987): 136–50. http://dx.doi.org/10.1145/55483.55497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kündgen, André, and Janina Silvana P. Patno. "Expected reliability of communication protocols." Discrete Mathematics 342, no. 10 (October 2019): 2867–74. http://dx.doi.org/10.1016/j.disc.2018.12.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography