Artículos de revistas sobre el tema "IoT, Security IoT, IoT Protocol, 5G"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IoT, Security IoT, IoT Protocol, 5G".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud y Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis". Sensors 20, n.º 13 (28 de junio de 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Texto completoSanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez y Antonio Skarmeta. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G". Sensors 20, n.º 3 (7 de febrero de 2020): 882. http://dx.doi.org/10.3390/s20030882.
Texto completoPark, Kisung y Youngho Park. "On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks". Applied Sciences 12, n.º 9 (23 de abril de 2022): 4265. http://dx.doi.org/10.3390/app12094265.
Texto completoPan, Shin-Hung y Shu-Ching Wang. "Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing". Sensors 21, n.º 2 (19 de enero de 2021): 671. http://dx.doi.org/10.3390/s21020671.
Texto completoBrooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol". International Journal of UbiComp 13, n.º 2 (30 de abril de 2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.
Texto completoGupta, Sunita, Meenakshi Nawal, Neha Janu y Dinesh Goyal. "IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN". ECS Transactions 107, n.º 1 (24 de abril de 2022): 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.
Texto completoWu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari y Chienming Chen. "Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks". Drones 6, n.º 1 (31 de diciembre de 2021): 10. http://dx.doi.org/10.3390/drones6010010.
Texto completoKhalid, Madiha, Umar Mujahid y Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags". Security and Communication Networks 2019 (21 de julio de 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.
Texto completoMathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis y Michail-Alexandros Kourtis. "On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids". Energies 14, n.º 10 (14 de mayo de 2021): 2818. http://dx.doi.org/10.3390/en14102818.
Texto completoChen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry y Long Li. "Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks". Security and Communication Networks 2021 (21 de octubre de 2021): 1–12. http://dx.doi.org/10.1155/2021/3116593.
Texto completoBehmanesh, Ali, Nasrin Sayfouri y Farahnaz Sadoughi. "Technological Features of Internet of Things in Medicine: A Systematic Mapping Study". Wireless Communications and Mobile Computing 2020 (27 de julio de 2020): 1–27. http://dx.doi.org/10.1155/2020/9238614.
Texto completoCandal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira y Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks". Sensors 20, n.º 18 (5 de septiembre de 2020): 5054. http://dx.doi.org/10.3390/s20185054.
Texto completoFan, Kai, Panfei Song y Yintang Yang. "ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G". Mobile Information Systems 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2349149.
Texto completoSong, Haoxiang, Zhe Tu y Yajuan Qin. "Blockchain-Based Access Control and Behavior Regulation System for IoT". Sensors 22, n.º 21 (30 de octubre de 2022): 8339. http://dx.doi.org/10.3390/s22218339.
Texto completoGupta, Divya, Shalli Rani, Aman Singh y Juan Luis Vidal Mazon. "Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach". Wireless Communications and Mobile Computing 2022 (22 de julio de 2022): 1–9. http://dx.doi.org/10.1155/2022/6983655.
Texto completoIslam, Naveed, Khalid Haseeb, Muhammad Ali y Gwanggil Jeon. "Secured Protocol with Collaborative IoT-Enabled Sustainable Communication Using Artificial Intelligence Technique". Sustainability 14, n.º 14 (21 de julio de 2022): 8919. http://dx.doi.org/10.3390/su14148919.
Texto completoChuang, Yun-Hsin y Yuh-Min Tseng. "CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks". Symmetry 13, n.º 4 (16 de abril de 2021): 698. http://dx.doi.org/10.3390/sym13040698.
Texto completoEledlebi, Khouloud, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu y Yousof Al-Hammadi. "Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions". Sensors 22, n.º 23 (22 de noviembre de 2022): 9063. http://dx.doi.org/10.3390/s22239063.
Texto completoSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen y Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing". 網際網路技術學刊 23, n.º 3 (mayo de 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Texto completoWazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues y Youngho Park. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment". Sensors 19, n.º 24 (14 de diciembre de 2019): 5539. http://dx.doi.org/10.3390/s19245539.
Texto completoLiao, Han-Teng, Tsung-Ming Lo y Chung-Lien Pan. "Knowledge Mapping Analysis of Intelligent Ports: Research Facing Global Value Chain Challenges". Systems 11, n.º 2 (8 de febrero de 2023): 88. http://dx.doi.org/10.3390/systems11020088.
Texto completoEl Mahdi, Fatna, Ahmed Habbani, Zaid Kartit y Bachir Bouamoud. "Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol". Wireless Communications and Mobile Computing 2020 (4 de abril de 2020): 1–9. http://dx.doi.org/10.1155/2020/1468976.
Texto completoXu, Li, Jiaqi Chen, Ming Liu y Xiaoyi Wang. "Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT". Electronics 8, n.º 2 (31 de enero de 2019): 146. http://dx.doi.org/10.3390/electronics8020146.
Texto completoYadav, Neha, Sagar Pande, Aditya Khamparia y Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning". Wireless Communications and Mobile Computing 2022 (10 de marzo de 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.
Texto completoXiao, Liang, He Xu, Feng Zhu, Ruchuan Wang y Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol". Sensors 20, n.º 5 (2 de marzo de 2020): 1366. http://dx.doi.org/10.3390/s20051366.
Texto completoGupta, Nishu, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva y Ariel Teles. "Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET". Future Internet 12, n.º 4 (1 de abril de 2020): 63. http://dx.doi.org/10.3390/fi12040063.
Texto completoHazratifard, Mehdi, Fayez Gebali y Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial". Sensors 22, n.º 19 (9 de octubre de 2022): 7655. http://dx.doi.org/10.3390/s22197655.
Texto completoLin, Yen, Jeng-Ywan Jeng, Yi-Yu Liu y Jheng-Jia Huang. "A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand". Electronics 11, n.º 5 (23 de febrero de 2022): 678. http://dx.doi.org/10.3390/electronics11050678.
Texto completoChaudhari, Bharat S., Marco Zennaro y Suresh Borkar. "LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations". Future Internet 12, n.º 3 (6 de marzo de 2020): 46. http://dx.doi.org/10.3390/fi12030046.
Texto completoJiao, Runhai, Hong Ouyang, Yukun Lin, Yaoming Luo, Gang Li, Zaiyu Jiang y Qian Zheng. "A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme". Information 10, n.º 5 (10 de mayo de 2019): 175. http://dx.doi.org/10.3390/info10050175.
Texto completoWong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh y Tzu-Wei Lin. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks". Sensors 20, n.º 9 (29 de abril de 2020): 2511. http://dx.doi.org/10.3390/s20092511.
Texto completoYan, Xiaobei y Maode Ma. "An efficient anonymous group handover authentication protocol for MTC devices for 5G networks". MATEC Web of Conferences 355 (2022): 03052. http://dx.doi.org/10.1051/matecconf/202235503052.
Texto completoLin, Tzu-Wei, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu y Bo-Yu Huang. "A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems". Sensors 21, n.º 8 (20 de abril de 2021): 2880. http://dx.doi.org/10.3390/s21082880.
Texto completoLi, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao y Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities". Entropy 21, n.º 5 (15 de mayo de 2019): 497. http://dx.doi.org/10.3390/e21050497.
Texto completoZhang, Xvpeng, Bingqiang Liu, Yaqi Zhao, Xiaoyu Hu, Zixuan Shen, Zhaoxia Zheng, Zhenglin Liu et al. "Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices". Sensors 22, n.º 23 (25 de noviembre de 2022): 9160. http://dx.doi.org/10.3390/s22239160.
Texto completoWang, Yi, Zizhou Su, Kai Huang, Jie Yan, Sui Wang y Weisheng Ye. "Research on Pulse Power Wireless Communication Network Based on LoRa Technology". Journal of Physics: Conference Series 2433, n.º 1 (1 de febrero de 2023): 012003. http://dx.doi.org/10.1088/1742-6596/2433/1/012003.
Texto completoSalleras, Xavier y Vanesa Daza. "SANS: Self-Sovereign Authentication for Network Slices". Security and Communication Networks 2020 (23 de noviembre de 2020): 1–8. http://dx.doi.org/10.1155/2020/8823573.
Texto completoDanbatta, Kafilu y Binta Usman. "PRICE BASED TRAFFIC CONGESTION CONTROL IN THE UPCOMING 5G DEPLOYMENT". FUDMA JOURNAL OF SCIENCES 5, n.º 4 (21 de febrero de 2022): 400–405. http://dx.doi.org/10.33003/fjs-2021-0504-842.
Texto completoMourtzis, Dimitris, John Angelopoulos y Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends". Electronics 10, n.º 24 (20 de diciembre de 2021): 3175. http://dx.doi.org/10.3390/electronics10243175.
Texto completoKhelf, Roumaissa, Nacira Ghoualmi-Zine y Marwa Ahmim. "TAKE-IoT". International Journal of Embedded and Real-Time Communication Systems 11, n.º 3 (julio de 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Texto completoSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe y Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks". Security and Communication Networks 2018 (10 de diciembre de 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Texto completoOgbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz y Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security". Sensors 22, n.º 16 (22 de agosto de 2022): 6313. http://dx.doi.org/10.3390/s22166313.
Texto completoRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi y Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation". Mathematical Problems in Engineering 2021 (8 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Texto completoJain, Anshul, Tanya Singh, Satyendra Kumar Sharma y Vikas Prajapati. "Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study". Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 001–38. http://dx.doi.org/10.28945/4675.
Texto completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n.º 1 (20 de enero de 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Texto completoHasan*, Md Aaqeel, Dr Jaypal Medida y N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things". International Journal of Recent Technology and Engineering (IJRTE) 10, n.º 3 (30 de septiembre de 2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.
Texto completoRekha, H. y M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n.º 1 (1 de enero de 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texto completoNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath y Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform". International Journal of e-Collaboration 17, n.º 4 (octubre de 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Texto completoAl Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim y Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks". Electronics 12, n.º 4 (8 de febrero de 2023): 867. http://dx.doi.org/10.3390/electronics12040867.
Texto completoSarica, Alper Kaan y Pelin Angin. "Explainable Security in SDN-Based IoT Networks". Sensors 20, n.º 24 (20 de diciembre de 2020): 7326. http://dx.doi.org/10.3390/s20247326.
Texto completo