Littérature scientifique sur le sujet « IoT Protocol »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « IoT Protocol ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "IoT Protocol"

1

Kant, Daniel, Andreas Johannsen et Reiner Creutzburg. « Analysis of IoT Security Risks based on the exposure of the MQTT Protocol ». Electronic Imaging 2021, no 3 (18 juin 2021) : 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Texte intégral
Résumé :
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kurniawan, Denny, Muhammad Ashar et Harits Ar Rosyid. « Hybrid NarrowBand-internet of things protocol for real time data optimization ». International Journal of Electrical and Computer Engineering (IJECE) 13, no 3 (1 juin 2023) : 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Texte intégral
Résumé :
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rekha, H., et M. Siddappa. « Model Checking M2M and Centralised IOT authentication Protocols. » Journal of Physics : Conference Series 2161, no 1 (1 janvier 2022) : 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Texte intégral
Résumé :
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP Machine to Machine authentication protocol and centralied IoT network Authentication Protocol RADIUS is formally verified using the well-known verification technique known as model checking technique and we have used the Scyther model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Khelf, Roumaissa, Nacira Ghoualmi-Zine et Marwa Ahmim. « TAKE-IoT ». International Journal of Embedded and Real-Time Communication Systems 11, no 3 (juillet 2020) : 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Texte intégral
Résumé :
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman et Mohamed Zorkany. « Internet of Things (IoT) Platform for Multi-Topic Messaging ». Energies 13, no 13 (30 juin 2020) : 3346. http://dx.doi.org/10.3390/en13133346.

Texte intégral
Résumé :
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sarvaiya, Ms Shilpa B. « Analysis of IoT Data Transfer Messaging Protocols on Application Layer ». International Journal for Research in Applied Science and Engineering Technology 10, no 7 (31 juillet 2022) : 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Texte intégral
Résumé :
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim et YoungHo Park. « A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes ». Sensors 21, no 4 (21 février 2021) : 1488. http://dx.doi.org/10.3390/s21041488.

Texte intégral
Résumé :
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wytrębowicz, Jacek, Krzysztof Cabaj et Jerzy Krawiec. « Messaging Protocols for IoT Systems—A Pragmatic Comparison ». Sensors 21, no 20 (18 octobre 2021) : 6904. http://dx.doi.org/10.3390/s21206904.

Texte intégral
Résumé :
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an assessment of the suitability of the protocols for the defined types of IoT devices and the identified communication purposes. We conclude the comparison with some recommendations of the protocol selection and usage.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Son, Heesuk, et Dongman Lee. « An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments ». ACM Transactions on Internet Technology 22, no 2 (31 mai 2022) : 1–25. http://dx.doi.org/10.1145/3430501.

Texte intégral
Résumé :
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Oniga, Bogdan, Leon Denis, Vasile Dadarlat et Adrian Munteanu. « Message-Based Communication for Heterogeneous Internet of Things Systems ». Sensors 20, no 3 (6 février 2020) : 861. http://dx.doi.org/10.3390/s20030861.

Texte intégral
Résumé :
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "IoT Protocol"

1

Karim, Hawkar. « IoT Networking Using MPTCP Protocol ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.

Texte intégral
Résumé :
The progress of technology is moving in a rapid pace forward, with new solutions and improvements being developed each year. Internet of Things (IoT) is one area of computer science that seen a growing interest from the population leading to more deployments of the technology. IoT devices often operate in low-power lossy networks making them depend upon low energy consumption but also high reliability. As the devices become more mobile this also exposes several challenges, one being connectivity in regard to mobility. Our proposed solution to this problem use Multipath Transmission Control Protocol (MPTCP) as a way of delivering high level of performance and connectivity and thereby high reliability. There has been research and implementations of MPTCP in different networks, however in low power radio networks, such as the ones IoT devices resides in, it is still a novel idea.  We reproduced and tested an implementation of MPTCP, against a similar network that is using regular TCP and compared the results. The MPTCP network showed a higher throughput and data transfer, proving to be more efficient while also providing a higher level of reliability in regard to connectivity. However, MPTCP showed a higher rate of packet retransmission compared to regular TCP. To be able to fully deploy MPTCP in low energy IoT devices there needs to be more improvements to accommodate the needs that such networks depend upon. There are use cases, such as for mobile cellular devices where MPTCP would make an impactful difference.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pettersson, William. « An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & ; industrial scenarios ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.

Texte intégral
Résumé :
Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. Området växer så pass fort att det förväntas vara 24 miljarder anslutna enheter vid år 2050, denna utökning leder i sin tur till ett ökat behov av förståelse för IoT protokollen som hanterar kommunikationen emellan enheterna. Detta för att kunna välja det mest optimala protokollet för ett givet scenario. Detta arbete kommer att välja ett lovande protokoll för undersökning samt evaluering gällande dess prestation berörande fördröjning, dataöverföringshastighet och skalbarhet.  Protokollet som valdes var MQTT (Message Queuing Telemetry Transport). Baserat på dessa evaluerade värden föra en diskussion gällande protokollets lämplighet inom scenariona. Värdena kommer att tas fram via tidmätningar start till slut för kommunikationen samt tid för att skicka en mängd meddelanden, båda i respekt till antalet samtidigt kommunicerande program. Testen körs med en lokal PC som agerar Broker och en Raspberry Pi som kör samtliga programmen i individuella terminaler. Resultaten var att fördröjningen verkar ha en näst intill linjär relation och dataöverföringshastighet ett exponentiellt avtagande beteende i respekt till samtidigt kommunicerande enheter. Dem mätta resultaten analyseras och diskuteras, och kommer till slutsatsen att protokollet är en lämplig kandidat för de flesta scenarion, så som smarta bilar, smarta hem och till viss del industriell användning. Den största nackdelen med protokollet var dess höga standardavvikelse gällande individuella meddelandens fördröjning.
Internet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described  as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Bassi, Lorenzo. « Orchestration of a MEC-based multi-protocol IoT environment ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.

Texte intégral
Résumé :
Nowadays we are witnessing to a continuous increasing of the number of IoT devices that must be configured and supported by modern networks. Considering an industrial environment, there is a huge number of these devices that need to coexist at the same time. Each one of them is using its own communication/transport protocol, and a huge effort needs to be done during the setup of the system. In addition, there are also different kind of architectures that can be used. That’s why the network setup is not so easy in this kind of heterogeneous environment. The answer to all these problems can be found in the emerging cloud and edge computing architectures, allowing new opportunities and challenges. They are capable of enable on-demand deployment of all the IoT services. In this thesis is proposed a Multi-access Edge Computing (MEC) approach to face all the possible multi-protocol scenarios. All the services are transformed into MEC-based services, even if they are running over multiple technological domains. As result, was proved that this kind of solution is effective and can simplify the deployment of IoT services by using some APIs defined by the MEC standard. As above mentioned, one of the most important tasks of these new generation’s networks is to be self-configurable in very low amount of time and this will be the scope of my research. The aim of this thesis is to try to reduce as much as possible the time that a certain network requires to be self-configured in an automatic way considering an Industrial IoT as a Service (IIoTaaS) scenario.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fakhraddin, Haider. « Toward IoT : Implementation of WSN based MQTT Data Protocol ». Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.

Texte intégral
Résumé :
Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used as the data exchange protocol to aggregate the data from WSN that incorporated local and remote sensor. ATmega 328 microcontroller unit, NodeMCU development board, SIM800L GSM module and DHT11 sensor modules where used to implement the nodes while Raspberry Pi 3B was used to implement a gateway that acts as the MQTT broker in order to aggregate the data. The proposed system has been implemented and tested successfully. The power consumption for the remote sensor nodes consumed only 20 mWh and the response time for the data transferred within the system’s network from the remote sensor node to the server is about 7 milliseconds with a total error of 0.11%. The system shows an excellent performance and provide a simple solution to link remote sensors which are out of the gateway’s local network coverage.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Shahidi, Hamed. « Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Texte intégral
Résumé :
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Silva, Douglas Simões. « Formal verification and access control approach of an IoT protocol ». reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.

Texte intégral
Résumé :
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2017.
Made available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
Styles APA, Harvard, Vancouver, ISO, etc.
7

van, Leeuwen Daniel, et Leonel Taku Ayuk. « Security testing of the Zigbee communication protocol in consumer grade IoT devices ». Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Texte intégral
Résumé :
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ferrari, Nico. « Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.

Texte intégral
Résumé :
The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. The integration of Wireless Sensor Networks in the Internet of Things creates new obstacles due to the necessity of finding a balance between the resources utilization and the applied security solutions. In multicast group communications, the energy consumption, bandwidth and processing overhead at the nodes are minimized in comparison to a point-to-point communication system. To securely transmit a message in order to maintain confidentiality of the data and the user’s privacy, usually involves human interaction or the pre-agreement upon some key, the latter unknown to an external attacker. In this thesis, the author proposed an authentication protocol based on the similar context between the correct devices and lightweight computationally secure group-key establishment, avoiding any kind of human involvement. The goal is achieved by having the devices calculate a fingerprint from their ambient context and through a fuzzy commitment scheme generating a commitment respectively opening value which is used to generate a common secret key between them. The tests are effected on real world data accumulated from different environments. The proposed scheme is based on elliptic curve cryptography and cryptographic one-way accumulators. Its feasibility is analyzed by implementing the group key establishment phase in the Contiki operating system and by simulating it with the Cooja simulator. Furthermore, the applicability of the protocol is analyzed and justified by an analysis of the storage overhead, communication overhead, and energy consumption. The simulator shows an energy consumption of only 112 mJ per node for group key establishment. The results obtained in this thesis demonstrate the feasibility of the scheme, it’s computational, and communication costs are further comparable to other similar approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Nguyen, Ngo Minh Thang. « Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol ». Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.

Texte intégral
Résumé :
Les systèmes distribués sont composés de nombreux sous-systèmes distants les uns des autres. Afin de réaliser une même tâche, les sous-systèmes communiquent à la fois avec l’environnement par des messages externes et avec d’autres sous-systèmes par des messages internes, via un réseau de communication. En pratique, les systèmes distribués mettent en jeu plusieurs types d’erreurs, propres aux sous-systèmes les constituant, ou en lien avec les communications internes. Afin de s’assurer de leur bon fonctionnement, savoir tester de tels systèmes est essentiel. Cependant, il est très compliqué de les tester car sans horloge globale, les sous-systèmes ne peuvent pas facilement synchroniser leurs envois de messages, ce qui explique l’existence des situations non déterministes. Le test à base de modèles (MBT) est une approche qui consiste à vérifier si le comportement d’un système sous test (SUT) est conforme à son modèle, qui spécifie les comportements souhaités. MBT comprend deux étapes principales: la génération de cas de test et le calcul de verdict. Dans cette thèse, nous nous intéressons à la génération de cas de test dans les systèmes distribués. Nous utilisons les systèmes de transition symbolique temporisé à entrées et sorties (TIOSTS) et les analysons à l’aide des techniques d’exécution symbolique pour obtenir les comportements symboliques du système distribué. Dans notre approche, l’architecture de test permet d’observer au niveau de chaque soussystème à la fois les messages externes émis vers l’environnement et les messages internes reçus et envoyés. Notre framework de test comprend plusieurs étapes: sélectionner un objectif de test global, défini comme un comportement particulier exhibé par exécution symbolique, projeter l’objectif de test global sur chaque sous-système pour obtenir des objectifs de test locaux, dériver des cas de test unitaires pour chacun des sous-systèmes. L’exécution du test consiste à exécuter des cas de test locaux sur les sous-systèmes paramétrés par les objectifs de tests en calculant à la volée les données de test à soumettre au sous-système en fonction de données observées. Enfin, nous mettons en œuvre notre approche sur un cas d’étude décrivant un protocole utilisé dans le contexte de l’IoT
Distributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Styles APA, Harvard, Vancouver, ISO, etc.
10

Alm, Anton. « Internet of Things mesh network : Using the Thread networking protocol ». Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Texte intégral
Résumé :
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "IoT Protocol"

1

D, Stockand James, et Shapiro Mark S, dir. Ion channels : Methods and protocols. Totowa, N.J : Humana Press, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gamper, Nikita. Ion channels : Methods and protocols. New York : Humana Press, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

N, Lopatin Anatoli, et Nichols Colin G, dir. Ion channel localization methods and protocols. Totowa, NJ : Humana Press, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Inc, Cisco Systems, dir. Cisco IOS : Solutions for network protocols. Indianapolis, IN : Macmillan Technical Pub., 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

1971-, Yan Qing, dir. Membrane transporters : Methods and protocols. Totowa, N.J : Humana Press, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Held, Gilbert. Cisco IOS IP : Field guide. New York : McGraw-Hill, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Held, Gilbert. Cisco IOS IP field guide. London : McGraw-Hill, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Cisco IOS in a nutshell. 2e éd. Beijing : O'Reilly, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cisco IOS in a nutshell : A desktop quick reference for IOS on IP networks. Beijing : O'Reilly, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Wijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman et Diana Mather. Protocol to Manage Relationships Today. NL Amsterdam : Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.

Texte intégral
Résumé :
Protocol to Manage Relationships Today explains the contemporary value of protocol, not only for monarchies or diplomatic institutes, but for any non-profit or for-profit organisation. This book presents modern protocol as a tool to build strong, authentic networks of reciprocal relationships. When used effectively protocol can: - Increase the effect of the networking activities of an organisation. Protocol gives a professional structure to relationship management, to achieve access to the 'right' networks and a reciprocal relationship with the most valued stakeholders. - Deepen relationships. In our world there is so much focus on pragmatism in building relationships - protocol focuses on the common ground to gain value. - Be used as a valuable tool in a post COVID-19 era, where the need for space and time to build real and authentic relationships is well understood. The book defines how tested values perfectly fit in today's society, where modern organisations want to build effective relationships and communities. This book is focused on developing an increasingly vital expertise for professionals who deal with complex relationship management issues on a strategic and tactical operational level. They come from different fields, such as government institutions, non-profit organisations and commercial environments. This book also gives protocol officers a contemporary approach towards the application of protocol. It is not designed as a complete guide to all the rules of protocol, but it describes how to translate the context into a tailor-made protocol for each meeting or event. The book explains protocol as a flexible method to handle unique situations. Protocol is presented on four levels: the 'why' of protocol; the strategic and tactical level; the practical implementation; and the execution of protocol. Protocol to Manage Relationships Today is written by Europe's foremost protocol experts with collective years of experience with the management of networking meetings and events at the highest level.
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "IoT Protocol"

1

Sasikaladevi, N., K. Geetha, S. Aarthi et C. Mala. « Smart Card Based Privacy-Preserving Lightweight Authentication Protocol ». Dans Cloud IoT, 257–65. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Banerjee, Bannishikha, et Geetali Saha. « Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices ». Dans Cloud IoT, 199–218. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things From Hype to Reality, 103–54. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Rayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things From Hype to Reality, 93–138. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Jang, Dae-il, Taeeun Kim et HwanKuk Kim. « A Design of IoT Protocol Fuzzer ». Dans Lecture Notes in Electrical Engineering, 242–46. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Guillén, Edward, Jeisson Sánchez et Leonardo Ramírez López. « IoT Protocol Model on Healthcare Monitoring ». Dans VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016, 193–96. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Rayes, Ammar, et Samer Salam. « IoT Protocol Stack : A Layered View ». Dans Internet of Things from Hype to Reality, 97–152. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Muzaffar, Shahzad, et Ibrahim Abe M. Elfadel. « Automatic Protocol Configuration ». Dans Secure, Low-Power IoT Communication Using Edge-Coded Signaling, 69–77. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Anjali, Yeole, et D. R. Kalbande. « MAC-Based Group Management Protocol for IoT [MAC GMP-IoT] ». Dans Lecture Notes on Data Engineering and Communications Technologies, 23–28. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Abhishek, CH N. S., Chungath Srinivasan, Lakshmy K.V. et P. Mohan Anand. « SLAP-IoT : A Secure Lightweight Authentication Protocol for IoT Device ». Dans Lecture Notes in Networks and Systems, 811–21. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5529-6_61.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "IoT Protocol"

1

Saito, Kenta, et Hiroaki Nishi. « Application Protocol Conversion Corresponding to Various IoT Protocols ». Dans IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Unwala, Ishaq, Zafar Taqvi et Jiang Lu. « Thread : An IoT Protocol ». Dans 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cazac, Marin. « AAA protocol in IoT ». Dans 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.

Texte intégral
Résumé :
This document is representing not only the description of AAA protocol. It is representing real production problems which I encountered in many years of work with it. Each from this problem was taken separately. It was analyzed and the best solution was applied to it. Article is containing not only analyzing of the problem. In this document the solution described was developed and tested in time on different networks starting with few hundred devices and finishing with tens of thousands of them. On production, solution applied worked for years. Based on this point, I can conclude that problems which were on the production, where solved by applying of those solutions. In order to understand those problems, is needed to understand how this protocol is working and where are the bottleneck points of it.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Wu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang et Norman Chang. « OneM2M-based IoT protocol integration ». Dans 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lucena, Mateus, Roberto Milton Scheffel et Antonio Augusto Frohlich. « IoT Gateway Integrity Checking Protocol ». Dans 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Hammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni et Pascale Minet. « A lightweight IoT security protocol ». Dans 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Liu, Zhiyan, Bao Xi et Yongfeng Yuan. « Analysis on IOT communication protocol ». Dans 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Gvozdenovic, Stefan, Johannes K. Becker, John Mikulskis et David Starobinski. « Multi-Protocol IoT Network Reconnaissance ». Dans 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

N., Jagadish, C. Kanagasabapathi et Siva S. Yellampalli. « IrLite Protocol For IoT Connectivity ». Dans 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). IEEE, 2019. http://dx.doi.org/10.1109/i2ct45611.2019.9033850.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Velastegui, Homero J., et Acurio M. Santiago. « IoT-based Security Alarm Protocol ». Dans 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "IoT Protocol"

1

Ravindran, Vijay, et Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, décembre 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Burdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, avril 2000. http://dx.doi.org/10.17487/rfc2801.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Eastlake, D., et C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, septembre 2000. http://dx.doi.org/10.17487/rfc2935.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Eastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, mars 2003. http://dx.doi.org/10.17487/rfc3504.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Pstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames et Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol : Part I—Ocean Shoreline Position, Version 2. National Park Service, juin 2022. http://dx.doi.org/10.36967/2293713.

Texte intégral
Résumé :
Following a review of Vital Signs – indicators of ecosystem health – in the coastal parks of the Northeast Coastal and Barrier Network (NCBN), knowledge of shoreline change was ranked as the top variable for monitoring. Shoreline change is a basic element in the management of any coastal system because it contributes to the understanding of the functioning of the natural resources and to the administration of the cultural resources within the parks. Collection of information on the vectors of change relies on the establishment of a rigorous system of protocols to monitor elements of the coastal geomorphology that are guided by three basic principles: 1) all of the elements in the protocols are to be based on scientific principles; 2) the products of the monitoring must relate to issues of importance to park management; and 3) the application of the protocols must be capable of implementation at the local level within the NCBN. Changes in ocean shoreline position are recognized as interacting with many other elements of the Ocean Beach-Dune Ecosystem and are thus both driving and responding to the variety of natural and cultural factors active at the coast at a variety of temporal and spatial scales. The direction and magnitude of shoreline change can be monitored through the application of a protocol that tracks the spatial position of the neap-tide, high tide swash line under well-defined conditions of temporal sampling. Spring and fall surveys conducted in accordance with standard operating procedures will generate consistent and comparable shoreline position data sets that can be incorporated within a data matrix and subsequently analyzed for temporal and spatial variations. The Ocean Shoreline Position Monitoring Protocol will be applied to six parks in the NCBN: Assateague Island National Seashore, Cape Cod National Seashore, Fire Island National Seashore, Gateway National Recreation Area, George Washington Birthplace National Monument, and Sagamore Hill National Historic Site. Monitoring will be accomplished with a Global Positioning System (GPS )/ Global Navigation Satellite System (GNSS) unit capable of sub-meter horizontal accuracy that is usually mounted on an off-road vehicle and driven along the swash line. Under the guidance of a set of Standard Operating Procedures (SOPs) (Psuty et al., 2022), the monitoring will generate comparable data sets. The protocol will produce shoreline change metrics following the methodology of the Digital Shoreline Analysis System developed by the United States Geological Survey. Annual Data Summaries and Trend Reports will present and analyze the collected data sets. All collected data will undergo rigorous quality-assurance and quality-control procedures and will be archived at the offices of the NCBN. All monitoring products will be made available via the National Park Service’s Integrated Resource Management Applications Portal.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), septembre 2021. http://dx.doi.org/10.19088/k4d.2021.133.

Texte intégral
Résumé :
This rapid review synthesises the literature on how community-based management of acute malnutrition (CMAM) programmes could be adapted in settings of conflict and fragility. It identifies multiple factors affecting the quality and effectiveness of CMAM services including the health system, community engagement and linkages with other programmes, including education, sanitation, and early childhood development. Family MUAC (Mid-Upper Arm Circumference) is a useful tool to increase community participation and detect early cases of moderate acute malnutrition (MAM) and severe acute malnutrition (SAM) more effectively and less likely to require inpatient care. The literature does not say a lot about m-Health solutions (using mobile devises and applications) in data collection and surveillance systems. Many of the above-mentioned issues are relevant for CMAM programmes in settings of non-emergency, emergency, conflict and fragility. However, there are special circumstance in conflict and fragile settings that need adaptation and simplification of the standard protocols. Because of a broken or partly broken health system in settings of conflict and fragility, local governments are not able to fund access to adequate inpatient and outpatient treatment centres. NGOs and humanitarian agencies are often able to set up stand-alone outpatient therapeutic programmes or mobile centres in the most affected regions. The training of community health volunteers (CHVs) is important and implementing Family MUAC. Importantly, research shows that: Low literacy of CHVs is not a problem to achieve good nutritional outcomes as long as protocols are simplified. Combined/simplified protocols are not inferior to standard protocols. However, due to complexities and low funding, treatment is focused on SAM and availability for children with MAM is far less prioritised, until they deteriorate to SAM. There is widespread confusion about combined/simplified protocol terminology and content, because there is no coherence at the global level.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zareian, Farzin, et Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, novembre 2020. http://dx.doi.org/10.55461/olpv6741.

Texte intégral
Résumé :
This report is one of a series of reports documenting the methods and findings of a multi-year, multi-disciplinary project coordinated by the Pacific Earthquake Engineering Research Center (PEER) and funded by the California Earthquake Authority (CEA). The overall project is titled “Quantifying the Performance of Retrofit of Cripple Walls and Sill Anchorage in Single-Family Wood-Frame Buildings,” henceforth referred to as the “PEER–CEA Project.” The overall objective of the PEER–CEA project is to provide scientifically-based information (e.g., testing, analysis, and resulting loss models) that measure and assess the effectiveness of seismic retrofit to reduce the risk of damage and associated losses (repair costs) of wood-frame houses with cripple wall and sill anchorage deficiencies as well as retrofitted conditions that address those deficiencies. Tasks that support and inform the loss-modeling effort are: (1) collecting and summarizing existing information and results of previous research on the performance of wood-frame houses; (2) identifying construction features to characterize alternative variants of wood-frame houses; (3) characterizing earthquake hazard and ground motions at representative sites in California; (4) developing cyclic loading protocols and conducting laboratory tests of cripple wall panels, wood-frame wall subassemblies, and sill anchorages to measure and document their response (strength and stiffness) under cyclic loading; and (5) the computer modeling, simulations, and the development of loss models as informed by a workshop with claims adjustors. This report is a product of Working Group 3.2 and focuses on Loading Protocol Development for Component Testing. It presents the background, development process, and recommendations for a quasi-static loading protocol to be used for cyclic testing of cripple wall components of wood-frame structures. The recommended loading protocol was developed for component testing to support the development of experimentally informed analytical models for cripple wall components. These analytical models are utilized for the performance-based assessment of wood-frame structures in the context of the PEER–CEA Project. The recommended loading protocol was developed using nonlinear dynamic analysis of representative multi-degree-of-freedom (MDOF) systems subjected to sets of single-component ground motions that varied in location and hazard level. Cumulative damage of the cripple wall components of the MDOF systems was investigated. The result is a testing protocol that captures the loading history that a cripple wall may experience in various seismic regions in California.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Allende López, Marcos, et Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Sous la direction de Alejandro Pardo et Mariana Gutierrez. Inter-American Development Bank, mai 2022. http://dx.doi.org/10.18235/0004243.

Texte intégral
Résumé :
This paper presents a protocol to manage decentralized access and use of Permissioned Public Blockchain Networks using Ethereum technology as the underlying protocol. It proposes a solution to avoid DDOS and enforce accountability while eliminating transaction fees. The protocol has been tested and implemented in the LACChain Blockchain Networks.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Davidson, K., et Y. Kawatsura. Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, avril 2000. http://dx.doi.org/10.17487/rfc2802.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kawatsura, Y., M. Hiroya et H. Beykirch. Payment Application Programmers Interface (API) for v1.0 Internet Open Trading Protocol (IOTP). RFC Editor, novembre 2004. http://dx.doi.org/10.17487/rfc3867.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie