Literatura académica sobre el tema "IoT Protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "IoT Protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "IoT Protocol"
Kant, Daniel, Andreas Johannsen y Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Texto completoKurniawan, Denny, Muhammad Ashar y Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 3 (1 de junio de 2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.
Texto completoRekha, H. y M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n.º 1 (1 de enero de 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texto completoKhelf, Roumaissa, Nacira Ghoualmi-Zine y Marwa Ahmim. "TAKE-IoT". International Journal of Embedded and Real-Time Communication Systems 11, n.º 3 (julio de 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Texto completoHussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman y Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging". Energies 13, n.º 13 (30 de junio de 2020): 3346. http://dx.doi.org/10.3390/en13133346.
Texto completoSarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Texto completoOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim y YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes". Sensors 21, n.º 4 (21 de febrero de 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Texto completoWytrębowicz, Jacek, Krzysztof Cabaj y Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison". Sensors 21, n.º 20 (18 de octubre de 2021): 6904. http://dx.doi.org/10.3390/s21206904.
Texto completoSon, Heesuk y Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments". ACM Transactions on Internet Technology 22, n.º 2 (31 de mayo de 2022): 1–25. http://dx.doi.org/10.1145/3430501.
Texto completoOniga, Bogdan, Leon Denis, Vasile Dadarlat y Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems". Sensors 20, n.º 3 (6 de febrero de 2020): 861. http://dx.doi.org/10.3390/s20030861.
Texto completoTesis sobre el tema "IoT Protocol"
Karim, Hawkar. "IoT Networking Using MPTCP Protocol". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.
Texto completoPettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios". Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.
Texto completoInternet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Bassi, Lorenzo. "Orchestration of a MEC-based multi-protocol IoT environment". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.
Texto completoFakhraddin, Haider. "Toward IoT : Implementation of WSN based MQTT Data Protocol". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.
Texto completoShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Texto completoSilva, Douglas Simões. "Formal verification and access control approach of an IoT protocol". reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.
Texto completoMade available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
van, Leeuwen Daniel y Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices". Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Texto completoFerrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices". Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.
Texto completoNguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Texto completoDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol". Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Texto completoLibros sobre el tema "IoT Protocol"
D, Stockand James y Shapiro Mark S, eds. Ion channels: Methods and protocols. Totowa, N.J: Humana Press, 2006.
Buscar texto completoGamper, Nikita. Ion channels: Methods and protocols. New York: Humana Press, 2013.
Buscar texto completoN, Lopatin Anatoli y Nichols Colin G, eds. Ion channel localization methods and protocols. Totowa, NJ: Humana Press, 2001.
Buscar texto completoInc, Cisco Systems, ed. Cisco IOS: Solutions for network protocols. Indianapolis, IN: Macmillan Technical Pub., 1998.
Buscar texto completo1971-, Yan Qing, ed. Membrane transporters: Methods and protocols. Totowa, N.J: Humana Press, 2003.
Buscar texto completoHeld, Gilbert. Cisco IOS IP: Field guide. New York: McGraw-Hill, 2000.
Buscar texto completoHeld, Gilbert. Cisco IOS IP field guide. London: McGraw-Hill, 2000.
Buscar texto completoCisco IOS in a nutshell. 2a ed. Beijing: O'Reilly, 2005.
Buscar texto completoCisco IOS in a nutshell: A desktop quick reference for IOS on IP networks. Beijing: O'Reilly, 2002.
Buscar texto completoWijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman y Diana Mather. Protocol to Manage Relationships Today. NL Amsterdam: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.
Texto completoCapítulos de libros sobre el tema "IoT Protocol"
Sasikaladevi, N., K. Geetha, S. Aarthi y C. Mala. "Smart Card Based Privacy-Preserving Lightweight Authentication Protocol". En Cloud IoT, 257–65. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.
Texto completoBanerjee, Bannishikha y Geetali Saha. "Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices". En Cloud IoT, 199–218. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.
Texto completoRayes, Ammar y Samer Salam. "IoT Protocol Stack: A Layered View". En Internet of Things From Hype to Reality, 103–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.
Texto completoRayes, Ammar y Samer Salam. "IoT Protocol Stack: A Layered View". En Internet of Things From Hype to Reality, 93–138. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.
Texto completoJang, Dae-il, Taeeun Kim y HwanKuk Kim. "A Design of IoT Protocol Fuzzer". En Lecture Notes in Electrical Engineering, 242–46. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.
Texto completoGuillén, Edward, Jeisson Sánchez y Leonardo Ramírez López. "IoT Protocol Model on Healthcare Monitoring". En VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016, 193–96. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.
Texto completoRayes, Ammar y Samer Salam. "IoT Protocol Stack: A Layered View". En Internet of Things from Hype to Reality, 97–152. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.
Texto completoMuzaffar, Shahzad y Ibrahim Abe M. Elfadel. "Automatic Protocol Configuration". En Secure, Low-Power IoT Communication Using Edge-Coded Signaling, 69–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.
Texto completoAnjali, Yeole y D. R. Kalbande. "MAC-Based Group Management Protocol for IoT [MAC GMP-IoT]". En Lecture Notes on Data Engineering and Communications Technologies, 23–28. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.
Texto completoAbhishek, CH N. S., Chungath Srinivasan, Lakshmy K.V. y P. Mohan Anand. "SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device". En Lecture Notes in Networks and Systems, 811–21. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5529-6_61.
Texto completoActas de conferencias sobre el tema "IoT Protocol"
Saito, Kenta y Hiroaki Nishi. "Application Protocol Conversion Corresponding to Various IoT Protocols". En IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.
Texto completoUnwala, Ishaq, Zafar Taqvi y Jiang Lu. "Thread: An IoT Protocol". En 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.
Texto completoCazac, Marin. "AAA protocol in IoT". En 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.
Texto completoWu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang y Norman Chang. "OneM2M-based IoT protocol integration". En 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.
Texto completoLucena, Mateus, Roberto Milton Scheffel y Antonio Augusto Frohlich. "IoT Gateway Integrity Checking Protocol". En 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.
Texto completoHammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni y Pascale Minet. "A lightweight IoT security protocol". En 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.
Texto completoLiu, Zhiyan, Bao Xi y Yongfeng Yuan. "Analysis on IOT communication protocol". En 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.
Texto completoGvozdenovic, Stefan, Johannes K. Becker, John Mikulskis y David Starobinski. "Multi-Protocol IoT Network Reconnaissance". En 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.
Texto completoN., Jagadish, C. Kanagasabapathi y Siva S. Yellampalli. "IrLite Protocol For IoT Connectivity". En 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). IEEE, 2019. http://dx.doi.org/10.1109/i2ct45611.2019.9033850.
Texto completoVelastegui, Homero J. y Acurio M. Santiago. "IoT-based Security Alarm Protocol". En 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.
Texto completoInformes sobre el tema "IoT Protocol"
Ravindran, Vijay y Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, diciembre de 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.
Texto completoBurdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, abril de 2000. http://dx.doi.org/10.17487/rfc2801.
Texto completoEastlake, D. y C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, septiembre de 2000. http://dx.doi.org/10.17487/rfc2935.
Texto completoEastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, marzo de 2003. http://dx.doi.org/10.17487/rfc3504.
Texto completoPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames y Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, junio de 2022. http://dx.doi.org/10.36967/2293713.
Texto completoQuak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), septiembre de 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Texto completoZareian, Farzin y Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, noviembre de 2020. http://dx.doi.org/10.55461/olpv6741.
Texto completoAllende López, Marcos y Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Editado por Alejandro Pardo y Mariana Gutierrez. Inter-American Development Bank, mayo de 2022. http://dx.doi.org/10.18235/0004243.
Texto completoDavidson, K. y Y. Kawatsura. Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, abril de 2000. http://dx.doi.org/10.17487/rfc2802.
Texto completoKawatsura, Y., M. Hiroya y H. Beykirch. Payment Application Programmers Interface (API) for v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, noviembre de 2004. http://dx.doi.org/10.17487/rfc3867.
Texto completo