Littérature scientifique sur le sujet « IoT Protocol »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « IoT Protocol ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "IoT Protocol"
Kant, Daniel, Andreas Johannsen et Reiner Creutzburg. « Analysis of IoT Security Risks based on the exposure of the MQTT Protocol ». Electronic Imaging 2021, no 3 (18 juin 2021) : 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Texte intégralKurniawan, Denny, Muhammad Ashar et Harits Ar Rosyid. « Hybrid NarrowBand-internet of things protocol for real time data optimization ». International Journal of Electrical and Computer Engineering (IJECE) 13, no 3 (1 juin 2023) : 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.
Texte intégralRekha, H., et M. Siddappa. « Model Checking M2M and Centralised IOT authentication Protocols. » Journal of Physics : Conference Series 2161, no 1 (1 janvier 2022) : 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texte intégralKhelf, Roumaissa, Nacira Ghoualmi-Zine et Marwa Ahmim. « TAKE-IoT ». International Journal of Embedded and Real-Time Communication Systems 11, no 3 (juillet 2020) : 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Texte intégralHussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman et Mohamed Zorkany. « Internet of Things (IoT) Platform for Multi-Topic Messaging ». Energies 13, no 13 (30 juin 2020) : 3346. http://dx.doi.org/10.3390/en13133346.
Texte intégralSarvaiya, Ms Shilpa B. « Analysis of IoT Data Transfer Messaging Protocols on Application Layer ». International Journal for Research in Applied Science and Engineering Technology 10, no 7 (31 juillet 2022) : 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Texte intégralOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim et YoungHo Park. « A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes ». Sensors 21, no 4 (21 février 2021) : 1488. http://dx.doi.org/10.3390/s21041488.
Texte intégralWytrębowicz, Jacek, Krzysztof Cabaj et Jerzy Krawiec. « Messaging Protocols for IoT Systems—A Pragmatic Comparison ». Sensors 21, no 20 (18 octobre 2021) : 6904. http://dx.doi.org/10.3390/s21206904.
Texte intégralSon, Heesuk, et Dongman Lee. « An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments ». ACM Transactions on Internet Technology 22, no 2 (31 mai 2022) : 1–25. http://dx.doi.org/10.1145/3430501.
Texte intégralOniga, Bogdan, Leon Denis, Vasile Dadarlat et Adrian Munteanu. « Message-Based Communication for Heterogeneous Internet of Things Systems ». Sensors 20, no 3 (6 février 2020) : 861. http://dx.doi.org/10.3390/s20030861.
Texte intégralThèses sur le sujet "IoT Protocol"
Karim, Hawkar. « IoT Networking Using MPTCP Protocol ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.
Texte intégralPettersson, William. « An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & ; industrial scenarios ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.
Texte intégralInternet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Bassi, Lorenzo. « Orchestration of a MEC-based multi-protocol IoT environment ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.
Texte intégralFakhraddin, Haider. « Toward IoT : Implementation of WSN based MQTT Data Protocol ». Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.
Texte intégralShahidi, Hamed. « Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Texte intégralSilva, Douglas Simões. « Formal verification and access control approach of an IoT protocol ». reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.
Texte intégralMade available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
van, Leeuwen Daniel, et Leonel Taku Ayuk. « Security testing of the Zigbee communication protocol in consumer grade IoT devices ». Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Texte intégralFerrari, Nico. « Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.
Texte intégralNguyen, Ngo Minh Thang. « Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol ». Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Texte intégralDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Alm, Anton. « Internet of Things mesh network : Using the Thread networking protocol ». Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Texte intégralLivres sur le sujet "IoT Protocol"
D, Stockand James, et Shapiro Mark S, dir. Ion channels : Methods and protocols. Totowa, N.J : Humana Press, 2006.
Trouver le texte intégralGamper, Nikita. Ion channels : Methods and protocols. New York : Humana Press, 2013.
Trouver le texte intégralN, Lopatin Anatoli, et Nichols Colin G, dir. Ion channel localization methods and protocols. Totowa, NJ : Humana Press, 2001.
Trouver le texte intégralInc, Cisco Systems, dir. Cisco IOS : Solutions for network protocols. Indianapolis, IN : Macmillan Technical Pub., 1998.
Trouver le texte intégral1971-, Yan Qing, dir. Membrane transporters : Methods and protocols. Totowa, N.J : Humana Press, 2003.
Trouver le texte intégralHeld, Gilbert. Cisco IOS IP : Field guide. New York : McGraw-Hill, 2000.
Trouver le texte intégralHeld, Gilbert. Cisco IOS IP field guide. London : McGraw-Hill, 2000.
Trouver le texte intégralCisco IOS in a nutshell. 2e éd. Beijing : O'Reilly, 2005.
Trouver le texte intégralCisco IOS in a nutshell : A desktop quick reference for IOS on IP networks. Beijing : O'Reilly, 2002.
Trouver le texte intégralWijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman et Diana Mather. Protocol to Manage Relationships Today. NL Amsterdam : Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.
Texte intégralChapitres de livres sur le sujet "IoT Protocol"
Sasikaladevi, N., K. Geetha, S. Aarthi et C. Mala. « Smart Card Based Privacy-Preserving Lightweight Authentication Protocol ». Dans Cloud IoT, 257–65. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.
Texte intégralBanerjee, Bannishikha, et Geetali Saha. « Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices ». Dans Cloud IoT, 199–218. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.
Texte intégralRayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things From Hype to Reality, 103–54. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.
Texte intégralRayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things From Hype to Reality, 93–138. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.
Texte intégralJang, Dae-il, Taeeun Kim et HwanKuk Kim. « A Design of IoT Protocol Fuzzer ». Dans Lecture Notes in Electrical Engineering, 242–46. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.
Texte intégralGuillén, Edward, Jeisson Sánchez et Leonardo Ramírez López. « IoT Protocol Model on Healthcare Monitoring ». Dans VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016, 193–96. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.
Texte intégralRayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things from Hype to Reality, 97–152. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.
Texte intégralMuzaffar, Shahzad, et Ibrahim Abe M. Elfadel. « Automatic Protocol Configuration ». Dans Secure, Low-Power IoT Communication Using Edge-Coded Signaling, 69–77. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.
Texte intégralAnjali, Yeole, et D. R. Kalbande. « MAC-Based Group Management Protocol for IoT [MAC GMP-IoT] ». Dans Lecture Notes on Data Engineering and Communications Technologies, 23–28. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.
Texte intégralAbhishek, CH N. S., Chungath Srinivasan, Lakshmy K.V. et P. Mohan Anand. « SLAP-IoT : A Secure Lightweight Authentication Protocol for IoT Device ». Dans Lecture Notes in Networks and Systems, 811–21. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5529-6_61.
Texte intégralActes de conférences sur le sujet "IoT Protocol"
Saito, Kenta, et Hiroaki Nishi. « Application Protocol Conversion Corresponding to Various IoT Protocols ». Dans IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.
Texte intégralUnwala, Ishaq, Zafar Taqvi et Jiang Lu. « Thread : An IoT Protocol ». Dans 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.
Texte intégralCazac, Marin. « AAA protocol in IoT ». Dans 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.
Texte intégralWu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang et Norman Chang. « OneM2M-based IoT protocol integration ». Dans 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.
Texte intégralLucena, Mateus, Roberto Milton Scheffel et Antonio Augusto Frohlich. « IoT Gateway Integrity Checking Protocol ». Dans 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.
Texte intégralHammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni et Pascale Minet. « A lightweight IoT security protocol ». Dans 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.
Texte intégralLiu, Zhiyan, Bao Xi et Yongfeng Yuan. « Analysis on IOT communication protocol ». Dans 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.
Texte intégralGvozdenovic, Stefan, Johannes K. Becker, John Mikulskis et David Starobinski. « Multi-Protocol IoT Network Reconnaissance ». Dans 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.
Texte intégralN., Jagadish, C. Kanagasabapathi et Siva S. Yellampalli. « IrLite Protocol For IoT Connectivity ». Dans 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). IEEE, 2019. http://dx.doi.org/10.1109/i2ct45611.2019.9033850.
Texte intégralVelastegui, Homero J., et Acurio M. Santiago. « IoT-based Security Alarm Protocol ». Dans 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.
Texte intégralRapports d'organisations sur le sujet "IoT Protocol"
Ravindran, Vijay, et Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, décembre 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.
Texte intégralBurdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, avril 2000. http://dx.doi.org/10.17487/rfc2801.
Texte intégralEastlake, D., et C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, septembre 2000. http://dx.doi.org/10.17487/rfc2935.
Texte intégralEastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, mars 2003. http://dx.doi.org/10.17487/rfc3504.
Texte intégralPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames et Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol : Part I—Ocean Shoreline Position, Version 2. National Park Service, juin 2022. http://dx.doi.org/10.36967/2293713.
Texte intégralQuak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), septembre 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Texte intégralZareian, Farzin, et Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, novembre 2020. http://dx.doi.org/10.55461/olpv6741.
Texte intégralAllende López, Marcos, et Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Sous la direction de Alejandro Pardo et Mariana Gutierrez. Inter-American Development Bank, mai 2022. http://dx.doi.org/10.18235/0004243.
Texte intégralDavidson, K., et Y. Kawatsura. Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, avril 2000. http://dx.doi.org/10.17487/rfc2802.
Texte intégralKawatsura, Y., M. Hiroya et H. Beykirch. Payment Application Programmers Interface (API) for v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, novembre 2004. http://dx.doi.org/10.17487/rfc3867.
Texte intégral