Artículos de revistas sobre el tema "IoT, Security IoT, IoT Protocol, 5G"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IoT, Security IoT, IoT Protocol, 5G".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.
Texto completoSanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez, and Antonio Skarmeta. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G." Sensors 20, no. 3 (2020): 882. http://dx.doi.org/10.3390/s20030882.
Texto completoPark, Kisung, and Youngho Park. "On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks." Applied Sciences 12, no. 9 (2022): 4265. http://dx.doi.org/10.3390/app12094265.
Texto completoPan, Shin-Hung, and Shu-Ching Wang. "Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing." Sensors 21, no. 2 (2021): 671. http://dx.doi.org/10.3390/s21020671.
Texto completoBrooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol." International Journal of UbiComp 13, no. 2 (2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.
Texto completoGupta, Sunita, Meenakshi Nawal, Neha Janu, and Dinesh Goyal. "IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN." ECS Transactions 107, no. 1 (2022): 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.
Texto completoWu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari, and Chienming Chen. "Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks." Drones 6, no. 1 (2021): 10. http://dx.doi.org/10.3390/drones6010010.
Texto completoKhalid, Madiha, Umar Mujahid, and Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags." Security and Communication Networks 2019 (July 21, 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.
Texto completoMathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis, and Michail-Alexandros Kourtis. "On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids." Energies 14, no. 10 (2021): 2818. http://dx.doi.org/10.3390/en14102818.
Texto completoChen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry, and Long Li. "Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (October 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/3116593.
Texto completoBehmanesh, Ali, Nasrin Sayfouri, and Farahnaz Sadoughi. "Technological Features of Internet of Things in Medicine: A Systematic Mapping Study." Wireless Communications and Mobile Computing 2020 (July 27, 2020): 1–27. http://dx.doi.org/10.1155/2020/9238614.
Texto completoCandal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (2020): 5054. http://dx.doi.org/10.3390/s20185054.
Texto completoFan, Kai, Panfei Song, and Yintang Yang. "ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G." Mobile Information Systems 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2349149.
Texto completoSong, Haoxiang, Zhe Tu, and Yajuan Qin. "Blockchain-Based Access Control and Behavior Regulation System for IoT." Sensors 22, no. 21 (2022): 8339. http://dx.doi.org/10.3390/s22218339.
Texto completoGupta, Divya, Shalli Rani, Aman Singh, and Juan Luis Vidal Mazon. "Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach." Wireless Communications and Mobile Computing 2022 (July 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/6983655.
Texto completoIslam, Naveed, Khalid Haseeb, Muhammad Ali, and Gwanggil Jeon. "Secured Protocol with Collaborative IoT-Enabled Sustainable Communication Using Artificial Intelligence Technique." Sustainability 14, no. 14 (2022): 8919. http://dx.doi.org/10.3390/su14148919.
Texto completoChuang, Yun-Hsin, and Yuh-Min Tseng. "CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks." Symmetry 13, no. 4 (2021): 698. http://dx.doi.org/10.3390/sym13040698.
Texto completoEledlebi, Khouloud, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, and Yousof Al-Hammadi. "Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions." Sensors 22, no. 23 (2022): 9063. http://dx.doi.org/10.3390/s22239063.
Texto completoSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Texto completoWazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, and Youngho Park. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment." Sensors 19, no. 24 (2019): 5539. http://dx.doi.org/10.3390/s19245539.
Texto completoLiao, Han-Teng, Tsung-Ming Lo, and Chung-Lien Pan. "Knowledge Mapping Analysis of Intelligent Ports: Research Facing Global Value Chain Challenges." Systems 11, no. 2 (2023): 88. http://dx.doi.org/10.3390/systems11020088.
Texto completoEl Mahdi, Fatna, Ahmed Habbani, Zaid Kartit, and Bachir Bouamoud. "Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol." Wireless Communications and Mobile Computing 2020 (April 4, 2020): 1–9. http://dx.doi.org/10.1155/2020/1468976.
Texto completoXu, Li, Jiaqi Chen, Ming Liu, and Xiaoyi Wang. "Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT." Electronics 8, no. 2 (2019): 146. http://dx.doi.org/10.3390/electronics8020146.
Texto completoYadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.
Texto completoXiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (2020): 1366. http://dx.doi.org/10.3390/s20051366.
Texto completoGupta, Nishu, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva, and Ariel Teles. "Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET." Future Internet 12, no. 4 (2020): 63. http://dx.doi.org/10.3390/fi12040063.
Texto completoHazratifard, Mehdi, Fayez Gebali, and Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial." Sensors 22, no. 19 (2022): 7655. http://dx.doi.org/10.3390/s22197655.
Texto completoLin, Yen, Jeng-Ywan Jeng, Yi-Yu Liu, and Jheng-Jia Huang. "A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand." Electronics 11, no. 5 (2022): 678. http://dx.doi.org/10.3390/electronics11050678.
Texto completoChaudhari, Bharat S., Marco Zennaro, and Suresh Borkar. "LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations." Future Internet 12, no. 3 (2020): 46. http://dx.doi.org/10.3390/fi12030046.
Texto completoJiao, Runhai, Hong Ouyang, Yukun Lin, et al. "A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme." Information 10, no. 5 (2019): 175. http://dx.doi.org/10.3390/info10050175.
Texto completoWong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks." Sensors 20, no. 9 (2020): 2511. http://dx.doi.org/10.3390/s20092511.
Texto completoYan, Xiaobei, and Maode Ma. "An efficient anonymous group handover authentication protocol for MTC devices for 5G networks." MATEC Web of Conferences 355 (2022): 03052. http://dx.doi.org/10.1051/matecconf/202235503052.
Texto completoLin, Tzu-Wei, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, and Bo-Yu Huang. "A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems." Sensors 21, no. 8 (2021): 2880. http://dx.doi.org/10.3390/s21082880.
Texto completoLi, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities." Entropy 21, no. 5 (2019): 497. http://dx.doi.org/10.3390/e21050497.
Texto completoZhang, Xvpeng, Bingqiang Liu, Yaqi Zhao, et al. "Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices." Sensors 22, no. 23 (2022): 9160. http://dx.doi.org/10.3390/s22239160.
Texto completoWang, Yi, Zizhou Su, Kai Huang, Jie Yan, Sui Wang, and Weisheng Ye. "Research on Pulse Power Wireless Communication Network Based on LoRa Technology." Journal of Physics: Conference Series 2433, no. 1 (2023): 012003. http://dx.doi.org/10.1088/1742-6596/2433/1/012003.
Texto completoSalleras, Xavier, and Vanesa Daza. "SANS: Self-Sovereign Authentication for Network Slices." Security and Communication Networks 2020 (November 23, 2020): 1–8. http://dx.doi.org/10.1155/2020/8823573.
Texto completoDanbatta, Kafilu, and Binta Usman. "PRICE BASED TRAFFIC CONGESTION CONTROL IN THE UPCOMING 5G DEPLOYMENT." FUDMA JOURNAL OF SCIENCES 5, no. 4 (2022): 400–405. http://dx.doi.org/10.33003/fjs-2021-0504-842.
Texto completoMourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (2021): 3175. http://dx.doi.org/10.3390/electronics10243175.
Texto completoKhelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Texto completoSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Texto completoOgbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (2022): 6313. http://dx.doi.org/10.3390/s22166313.
Texto completoRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, et al. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Texto completoJain, Anshul, Tanya Singh, Satyendra Kumar Sharma, and Vikas Prajapati. "Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 001–38. http://dx.doi.org/10.28945/4675.
Texto completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Texto completoHasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.
Texto completoRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texto completoNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Texto completoAl Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.
Texto completoSarica, Alper Kaan, and Pelin Angin. "Explainable Security in SDN-Based IoT Networks." Sensors 20, no. 24 (2020): 7326. http://dx.doi.org/10.3390/s20247326.
Texto completo