Articles de revues sur le sujet « IoT Protocol »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : IoT Protocol.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « IoT Protocol ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Kant, Daniel, Andreas Johannsen et Reiner Creutzburg. « Analysis of IoT Security Risks based on the exposure of the MQTT Protocol ». Electronic Imaging 2021, no 3 (18 juin 2021) : 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Texte intégral
Résumé :
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kurniawan, Denny, Muhammad Ashar et Harits Ar Rosyid. « Hybrid NarrowBand-internet of things protocol for real time data optimization ». International Journal of Electrical and Computer Engineering (IJECE) 13, no 3 (1 juin 2023) : 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Texte intégral
Résumé :
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rekha, H., et M. Siddappa. « Model Checking M2M and Centralised IOT authentication Protocols. » Journal of Physics : Conference Series 2161, no 1 (1 janvier 2022) : 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Texte intégral
Résumé :
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP Machine to Machine authentication protocol and centralied IoT network Authentication Protocol RADIUS is formally verified using the well-known verification technique known as model checking technique and we have used the Scyther model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Khelf, Roumaissa, Nacira Ghoualmi-Zine et Marwa Ahmim. « TAKE-IoT ». International Journal of Embedded and Real-Time Communication Systems 11, no 3 (juillet 2020) : 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Texte intégral
Résumé :
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman et Mohamed Zorkany. « Internet of Things (IoT) Platform for Multi-Topic Messaging ». Energies 13, no 13 (30 juin 2020) : 3346. http://dx.doi.org/10.3390/en13133346.

Texte intégral
Résumé :
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sarvaiya, Ms Shilpa B. « Analysis of IoT Data Transfer Messaging Protocols on Application Layer ». International Journal for Research in Applied Science and Engineering Technology 10, no 7 (31 juillet 2022) : 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Texte intégral
Résumé :
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim et YoungHo Park. « A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes ». Sensors 21, no 4 (21 février 2021) : 1488. http://dx.doi.org/10.3390/s21041488.

Texte intégral
Résumé :
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wytrębowicz, Jacek, Krzysztof Cabaj et Jerzy Krawiec. « Messaging Protocols for IoT Systems—A Pragmatic Comparison ». Sensors 21, no 20 (18 octobre 2021) : 6904. http://dx.doi.org/10.3390/s21206904.

Texte intégral
Résumé :
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an assessment of the suitability of the protocols for the defined types of IoT devices and the identified communication purposes. We conclude the comparison with some recommendations of the protocol selection and usage.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Son, Heesuk, et Dongman Lee. « An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments ». ACM Transactions on Internet Technology 22, no 2 (31 mai 2022) : 1–25. http://dx.doi.org/10.1145/3430501.

Texte intégral
Résumé :
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Oniga, Bogdan, Leon Denis, Vasile Dadarlat et Adrian Munteanu. « Message-Based Communication for Heterogeneous Internet of Things Systems ». Sensors 20, no 3 (6 février 2020) : 861. http://dx.doi.org/10.3390/s20030861.

Texte intégral
Résumé :
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Lee, JoonYoung, SungJin Yu, KiSung Park, YoHan Park et YoungHo Park. « Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments ». Sensors 19, no 10 (22 mai 2019) : 2358. http://dx.doi.org/10.3390/s19102358.

Texte intégral
Résumé :
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a smartcard-based two-factor authentication protocol for multi-gateway IoT environments. However, we point out that Bae et al.’s protocol is vulnerable to user impersonation attacks, gateway spoofing attacks, and session key disclosure, and cannot provide a mutual authentication. In addition, we propose a three-factor mutual authentication protocol for multi-gateway IoT environments to resolve these security weaknesses. Then, we use Burrows–Abadi–Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. In conclusion, our proposed protocol is secure and applicable in multi-gateway IoT environments.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Ren, Jie, et Lijuan Liu. « A Study on Information Classification and Storage in Cloud Computing Data Centers Based on Group Collaborative Intelligent Clustering ». Journal of Electrical and Computer Engineering 2022 (25 mars 2022) : 1–11. http://dx.doi.org/10.1155/2022/1476661.

Texte intégral
Résumé :
Internet of things (IoT) and cloud computing are combined to form a cloud computing data center, and cloud computing provides virtualization, storage, computing, and other support services for IoT applications. Data is the foundation and core of cloud IoT platform applications, and massive multisource heterogeneous IoT data aggregation and storage have basic requirements such as real-time, security, and scalability. This paper focuses on the aggregation and storage methods of massive heterogeneous cloud IoT data, solving the multisource data aggregation problem caused by inconsistent protocols and the heterogeneous data storage problem caused by inconsistent data types. A heterogeneous network protocol adaptation and data aggregation method is proposed for the multisource data aggregation problem caused by protocol inconsistency. A protocol adaptation layer is set up in the IoT virtual gateway to achieve compatibility with multiple types of data aggregation protocols, ensuring adaptive access to different types of IoT nodes, and on this basis, data is transmitted to the cloud IoT platform through a unified interface, shielding the variability of IoT sensing devices. Given the problems of device forgery and malicious tampering in the data aggregation process, we propose a fast authentication and data storage method for IoT devices based on “API key” and implant the device authentication API key into the protocol adaptation layer of the virtual gateway to realize the source authentication of IoT nodes and ensure the authenticity of data.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Mohammadiounotikandi, Ali. « Presenting a Protocol to Increase IOT-Based Security ». Webology 19, no 1 (20 janvier 2022) : 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Texte intégral
Résumé :
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critical issue for IoT applications and proceeds to confront major challenges. This think about pointed to supply a convention to extend IoT-based security. The method proposed in this paper is to show modern conveyance engineering to extend IoT security. This unused design is based on a blockchain and can be actualized as a dispersed design in all layers of IoT. The findings of recreations and usage in genuine IoT scenarios appear that the execution of the proposed security conventions can be proficient and viable within the productivity and adequacy of distinctive levels of security and IoT accessibility.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Kadhim, Abdulkareem A., et Sarah A. Rafea. « IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK ». Iraqi Journal of Information and Communications Technology 1, no 1 (15 décembre 2021) : 58–69. http://dx.doi.org/10.31987/ijict.1.1.172.

Texte intégral
Résumé :
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN. The routing protocol for low power and lossy (RPL) network enable connectivity of WSN over IoT. Nodes in RPL optimized its path using objective function (OF), which depends on different node/link metrics. In this paper, the performance of IoT-WSN stack consisting of CoAP, 6LoWPAN and two proposed protocols based on RPL are evaluated. The two proposed protocols depend on a new OF based on link reliability and energy metric. The first is a modification of recently introduced protocol called Energy Threshold RPL (ETRPL) protocol. ETRPL uses the remaining energy of the preferred parent node as a metric. The other protocol used a new metric that combines energy consumption with ETX for all paths to the root called EERPL. The protocols are tested with full IoT-WSN stack and implemented using Cooja simulator. The results showed that ETRPL and EERPL performed better than standard RPL in terms of the energy consumption, average time delay, packet reception ratio, throughput and the number of dead nodes.
Styles APA, Harvard, Vancouver, ISO, etc.
15

HERIANSYAH, HERIANSYAH, AHMAD REYNALDI NOPRIANSYAH et SWADEXI ISTIQPHARA. « Evaluasi Kinerja Testbed Routing Protocol berbasis NodeMCU ESP8266 pada Perangkat IoT ». MIND Journal 5, no 2 (4 juillet 2021) : 135–48. http://dx.doi.org/10.26760/mindjournal.v5i2.135-148.

Texte intégral
Résumé :
AbstrakJaringan Ad hoc pada perangkat Internet of Things (IoT) mempunyai sifat yang yang dinamis dengan node pada jaringan yang berperan sebagai router dan bergerak bebas secara random tanpa bantuan infrasturktur komunikasi sehingga topologi berubah sangat cepat seiring dengan perubahan posisi. Perubahan ini sangat mempengaruhi kualitas layanan pada perangkat IoT itu sendiri. Penelitian ini bertujuan untuk mengevaluasi protocol routing yang sudah ada dengan cara mengimplementasikan routing protocol tersebut di perangkat testbed berbasis NodeMCU ESP8266. Hal ini bertujuan untuk memilih protocol routing yang paling optimal sebelum proses implementasi dilaksanakan. Pengujian ini berlaku untuk routing protocol yang sudah ada maupun yang baru. Kinerja protocol jaringan diukur melalui nilai Quality of Service (QoS) ditempatkan pada scenario berbeda yang terdiri dari throughput, delay, jitter, dan packet delivery ratio sesuai dengan perbedaan beban jaringan, mobilitas, dan ukuran jaringan. Hasil penelitian ini menunjukkan bahwa testbed yang dibangun berhasil mensimulasikan routing protocol yang ada untuk menghasilkan QoS yang baik pada perangkat IoT.Kata kunci: IoT, routing protocol, testbed, QoS.AbstractAd hoc networks on Internet of Things (IoT) devices have dynamic characteristics where the nodes on this network can operate as routers and move freely randomly without using any communication infrastructure so that the topology changes very quickly along with changes in position. This adjustment has a significant impact on the IoT device's service quality. This study aims to evaluate the existing routing protocols by implementing the routing protocol in a testbed based on NodeMCU ESP8266. It aims to choose the most optimal routing protocol before the implementation process is carried out. This test applies to both existing and new routing protocols. Network protocol performance is measured by the Quality of Service (QoS) value which includes throughput, delay, jitter, and packet delivery ratio in different scenarios based on network load, mobility, and different network sizes. The results show that this study was successful in simulating routing protocol in order to provide good QoS on IoT devices.Keywords: IoT, routing protocol, testbed, QoS.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kang, Baoyuan, Yanbao Han, Kun Qian et Jianqi Du. « Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment ». Mathematical Problems in Engineering 2020 (23 juin 2020) : 1–6. http://dx.doi.org/10.1155/2020/1970798.

Texte intégral
Résumé :
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim et Azizol Abdullah. « Authentication-Chains : Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks ». Electronics 12, no 4 (8 février 2023) : 867. http://dx.doi.org/10.3390/electronics12040867.

Texte intégral
Résumé :
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Tightiz, Lilia, et Hyosik Yang. « A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication ». Energies 13, no 11 (1 juin 2020) : 2762. http://dx.doi.org/10.3390/en13112762.

Texte intégral
Résumé :
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Shende, Dipali K., Sonavane S.S et Yogesh Angal. « A Comprehensive Survey of the Routing Schemes for IoT applications ». Scalable Computing : Practice and Experience 21, no 2 (27 juin 2020) : 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Texte intégral
Résumé :
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Mamlook, Rustom, Omer F. Khan et Thabit Sultan Mohammed. « Bridging for cross protocol talk in IOT devices using windows communication foundation ». International Journal of Engineering & ; Technology 7, no 3.29 (24 août 2018) : 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Texte intégral
Résumé :
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Home Kit by Apple. In view of such segmentation of IoT platforms, IoT Application’s development has been made complex, where IoT device and accompanying application compatibility with available platforms requires support for multiple protocols.To simplify the complexity introduced by multiple platforms, M2M [4] International standard was already proposed as the bridge for integrating IoT protocols. In our paper, we implement a proxy web service using Windows Communication Foundation (WCF) as a way to translate communication in one IoT protocol to another. In our implementation of middleware, we allowed the MQTT broker to accept messages, which were passed, to the Web Service from various devices over Hyper Text Protocol’s POST or GET Commands. Bridging between WCF Web Service and MQTT broker was enabled with duplex communication. Hence, devices supporting either HTTP protocol or MQTT protocol were able to communicate transparently.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Surya, P., Asuman Suenbuel et Arockia Selvakumar Arockia Doss. « Industrial Internet of Things - Control of Industry Simulation Through Different Protocols ». Journal of Physics : Conference Series 2115, no 1 (1 novembre 2021) : 012011. http://dx.doi.org/10.1088/1742-6596/2115/1/012011.

Texte intégral
Résumé :
Abstract In past few years there is a great demand for internet of things (IoT), It has become an important part of smart technologies. There have been many researches going-on in internet of things in both academics and industries. IoT using in industries is also known as Industrial Internet of Things (IIoT). Where smart sensors are used along with IoT are used. This research work is done to identify the best protocol for high-speed data transmission with no loss of data to prevent command lag between mobile controller and industry. In this research a soda filling Industry simulation with 3 different plants was controlled through a mobile application through different protocols with 4 different features of data transfer. The time of data sending and receiving from application and ESP32 controller are stored in a log. The speed of data transfer of all different protocols is compared. From the final result, ThingSpeak is an optimum protocol for this application which is 36% faster than HTTP in single data transfer and 39% faster than MQTT in continuous data transfer.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Liu, Bai, Xiangyi Zhang, Runhua Shi, Mingwu Zhang et Guoxing Zhang. « SEPSI : A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT ». Mathematics 10, no 12 (17 juin 2022) : 2120. http://dx.doi.org/10.3390/math10122120.

Texte intégral
Résumé :
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorithms may undermine the security and reliability of traditional protocols. Therefore, it is important to design more secure privacy-preserving set intersection protocols. In addition, identity information is also very important compared to data security. To this end, we propose a quantum privacy-preserving set intersection protocol for IoT scenarios, which has higher security and linear communication efficiency. This protocol can protect identity anonymity while protecting private data.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Husnain, Muhammad, Khizar Hayat, Enrico Cambiaso, Ubaid U. Fayyaz, Maurizio Mongelli, Habiba Akram, Syed Ghazanfar Abbas et Ghalib A. Shah. « Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System ». Sensors 22, no 2 (12 janvier 2022) : 567. http://dx.doi.org/10.3390/s22020567.

Texte intégral
Résumé :
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Mao, Yuxin, Chenqian Zhou, Yun Ling et Jaime Lloret. « An Optimized Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT) ». Sensors 19, no 2 (10 janvier 2019) : 243. http://dx.doi.org/10.3390/s19020243.

Texte intégral
Résumé :
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN). Therefore, it is an important issue for IoT applications to achieve efficient data transmission in DTN. In order to improve delivery rate and optimize delivery delay with low overhead in DTN for IoT applications, we propose a new routing protocol, called Scheduling-Probabilistic Routing Protocol using History of Encounters and Transitivity (PROPHET). In this protocol, we calculate the delivery predictability according to the encountering frequency among nodes. Two scheduling mechanisms are proposed to extend the traditional PROPHET protocol and improve performance in both storage and transmission in DTN. In order to evaluate the proposed routing protocol, we perform simulations and compare it with other routing protocols in an Opportunistic Network Environment (ONE) simulator. The results demonstrate that the proposed Scheduling-PROPHET can achieve better performances in several key aspects compared with the existing protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Wadullah Tareq, Roaa, et Turkan Ahmed Khaleel. « Implementation of MQTT Protocol in Health Care Based on IoT Systems : A Study ». International journal of electrical and computer engineering systems 12, no 4 (26 novembre 2021) : 215–23. http://dx.doi.org/10.32985/ijeces.12.4.5.

Texte intégral
Résumé :
Internet of things IoT systems have become one of the most promising technologies in all fields. Data transmission is one of the important aspects, and the tendency to messaging protocols is an important aspect of IoT systems. One of these most important protocols is MQTT. This protocol depends on the Publish/Subscribe model, and it is a lightweight protocol. Reliability, simplicity, quality of service levels, and being Resource-constrained make MQTT common in the IoT industry. This paper designed an IoT device that consists of the sensor MLX 90614 non-contact IR Temperature connected to a development board (Node MCU ESP8266). A person's temperature is one of the important vital signs. This system measures human temperature values and transmits the measured values to the Mosquitto broker by using the MQTT protocol in real-time. The technology used is Wi-Fi. The person or the doctor can read the patient’s temperature remotely through a program (Flutter Android Client) representing the subscriber. Also, MQTT protocol control packets of the system were analyzed using Wireshark. The three levels of QoS were used in subscriber clients to compare the throughput. The results indicate that QoS2 is more reliable and offers more throughput but more delay. The results also show that the average round trip time (RTT) of the MQTT protocol is five milliseconds which means optimal performance for IoT applications.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Viel, Felipe, Luis Augusto Silva, Valderi Reis Quietinho Leithardt, Juan Francisco De Paz Santana, Raimundo Celeste Ghizoni Teive et Cesar Albenes Zeferino. « An Efficient Interface for the Integration of IoT Devices with Smart Grids ». Sensors 20, no 10 (17 mai 2020) : 2849. http://dx.doi.org/10.3390/s20102849.

Texte intégral
Résumé :
The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this article presents an efficient software interface that provides integration between OSGP and CoAP. The results obtained demonstrate the effectiveness of the proposed solution, which presents low communication overhead and enables the integration between IoT and SG systems.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Ramezan, Gholamreza, et Cyril Leung. « A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts ». Wireless Communications and Mobile Computing 2018 (1 novembre 2018) : 1–14. http://dx.doi.org/10.1155/2018/4029591.

Texte intégral
Résumé :
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the identification and authentication of each device, the BCR protocol operates in a distributed manner with no CA. The BCR protocol utilizes smart contracts to discover a route to a destination or data gateway within heterogeneous IoT networks. Any intermediary device can guarantee a route from a source IoT device to a destination device or gateway. We compare the performance of BCR with that of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in a network of 14 devices. The results show that the routing overhead of the BCR protocol is 5 times lower compared to AODV at the cost of a slightly lower packet delivery ratio. BCR is fairly resistant to both Blackhole and Greyhole attacks. The results show that the BCR protocol enables distributed routing in heterogeneous IoT networks.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Chen, Chien-Ming, et Shuangshuang Liu. « Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure ». Security and Communication Networks 2021 (30 septembre 2021) : 1–13. http://dx.doi.org/10.1155/2021/6537678.

Texte intégral
Résumé :
The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve these shortcomings, we propose an improved protocol, which is proved to be secure by formal and informal analysis. In addition, after comparing the time and memory consumption with other protocols, we find that our protocol has more advantages.
Styles APA, Harvard, Vancouver, ISO, etc.
29

G. Hamid, Harth, et Zainab T. Alisa. « A survey on IoT application layer protocols ». Indonesian Journal of Electrical Engineering and Computer Science 21, no 3 (10 mars 2021) : 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Texte intégral
Résumé :
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
Styles APA, Harvard, Vancouver, ISO, etc.
30

Marinkovic, Bojan, Zoran Ognjanovic, Paola Glavan, Anton Kos et Anton Umek. « Correctness of the Chord protocol ». Computer Science and Information Systems 17, no 1 (2020) : 141–60. http://dx.doi.org/10.2298/csis181115017m.

Texte intégral
Résumé :
Internet of Things (IoT) can be seen as a cooperation of various devices with limited performances that participate in the same system. IoT devices compose a distributed architecture system. The core of every IoT system is its discovery and control services. To realize such services, some authors used the developed solutions from the different domains. One such solution is the Chord protocol, one of the first, the simplest and the most popular distributed protocols. Unfortunately, the application of the Chord protocol was realized using the correctness of the Chord protocol for granted, or by the very hard assumptions. In this paper we prove the correctness of the Chord protocol using the logic of time and knowledge with the respect to the set of possible executions, called regular runs. We provide the deterministic description of the correctness of the Chord protocol and consider Chord actions that maintain ring topology while the nodes can freely join or leave.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Jun, Hyun-Ji, et Hyo-Sik Yang. « Performance of the XMPP and the MQTT Protocols on IEC 61850-Based Micro Grid Communication Architecture ». Energies 14, no 16 (16 août 2021) : 5024. http://dx.doi.org/10.3390/en14165024.

Texte intégral
Résumé :
As micro grids are gradually being deployed in many areas, communication technology is becoming important for collecting data and controlling devices in micro grids. In a micro grid, various devices are distributed and perform their respective functions. These devices exchange information with each other and transmit information to the micro grid management system. This micro grid environment is similar to the IoT environment in which information is exchanged in the presence of a large number of devices. Recent studies have tried to apply various IoT protocols as a communication protocol in the micro grid. However, the data model used in current research is limited in proprietary data mapping. Recently, IEC TC 57 published another IEC 61850 series which maps the IEC 61850 services to XMPP (eXtensible Messaging Presence Protocol), which was the first IoT protocol mapping of IEC 61850. Few research has shown that the mapping of the IEC 61850 data model to the IoT protocol and communication boundary is limited in a lab environment. We developed a micro grid test-bed with an IEC 61850 data and service model, and mapped to two IoT protocols, that is, XMPP and the MQTT (Message Queuing Telemetry Transport). By combining IoT protocol with the IEC 61850 data and service model, the proposed micro grid architecture can provide interoperability with any DMS or other power utility system. Performance analysis was conducted on the test-bed by measuring various metrics, such as the response time, packet size, and packet loss, over a public network.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Peixoto, João Alvarez, André Borin Soares et Vitor Macedo Ochôa. « Internet das Coisas Industrial : um ensaio de protocolos IoT para manufatura industrial ». Revista Eletrônica Científica da UERGS 8, no 3 (23 décembre 2022) : 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Texte intégral
Résumé :
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O objetivo deste estudo é caracterizar as funcionalidades dos protocolos MQTT, HTTP e CoAP como uma aplicação de manufatura industrial, com painel de monitoramento nas plataformas Adafruit.IO, Tago.IO e Thinger.IO. É proposto um método para a realização de estudos semelhantes, em sistemas de manufatura interativa, com uso de protocolos e plataformas IIoT. Como forma de conexão da máquina com a internet, é utilizado o módulo ESP8266 NodeMCU. Na aplicação, as plataformas IIoT obtiveram resultados muito semelhantes, podendo ser a elas atribuídas o mesmo grau de importância para o estudo. Os protocolos diferenciaram-se, sendo o protocolo MQTT o que melhor respondeu às funcionalidades do sistema de manufatura proposto, ao oferecer sua comunicação assíncrona, sem necessidade de que os equipamentos estejam constantemente interagindo. Já o protocolo HTTP apresentou melhores recursos em APIs, mas sua conexão síncrona demanda uma boa rede de dados em internet. Por fim, o protocolo CoAP apresentou documentação insuficiente para acesso às plataformas e bibliotecas para uso em módulos microcontroladores. Palavras-chave: Protocolos; IIoT; plataformas; redes; indústria 4.0; programação. Abstract Industrial Internet of Things: a trial of IoT protocols for industrial manufacturing Changes in the goods and consumption market, caused by digital transformation, require manufacturing machines to be more interactive, with each other and with cloud monitoring panels. Connections via the Internet of Things (IoT) promote this desired degree of interaction and mobility, but the industrial environment demands increased reliability and security. The Industrial Internet of Things (IIoT) presents itself with protocols and platforms for this purpose. Knowing the characteristics of protocols and platforms, facing the desired manufacturing, becomes important. The objective of this study is to characterize the functionalities of the MQTT, HTTP and CoAP protocols in an industrial manufacturing application, with a monitoring panel on the Adafruit.IO, Tago.IO and Thinger.IO platforms. A method is proposed for carrying out similar studies in interactive manufacturing systems, using IIoT protocols and platforms. As a way of connecting the machine to the internet, the ESP8266 NodeMCU module is used. In the developed application, the IIoT platforms obtained very similar results, and they can be attributed the same degree of importance for the study. In the evaluation of the protocols, the MQTT protocol was the one that best met the functionalities of the proposed manufacturing system, providing its asynchronous communication, which does not requires the equipment to be constantly interacting. The HTTP protocol has better features in APIs, but its synchronous connection demands a good data network on the internet. The CoAP protocol presented insufficient documentation available for access to platforms and libraries, for use in microcontroller modules. Keywords: Protocols; IIoT; platforms; networks; industry 4.0; programming. Resumen Internet Industrial de las Cosas: un ensayo de protocolos IoT para la fabricación industrial En medio de los cambios en el mercado de bienes y de consumo provocados por la transformación digital, se requiere que las máquinas de fabricación sean más interactivas, tanto entre sí como con los paneles de control en la nube. Las conexiones dela Internet de las Cosas (IoT) promueven este grado deseado de interacción y movilidad, pero el entorno industrial exige una mayor fiabilidad y seguridad. La Internet Industrial de las Cosas (IIoT) se presenta con protocolos y plataformas para este fin. Conocer las características de los protocolos y las plataformas relacionados a la fabricación cobra importancia. El objetivo de este estudio es caracterizar las funcionalidades de los protocolos MQTT, HTTP y CoAP en una aplicación de fabricación industrial, con panel de control en las plataformas Adafruit.IO, Tago.IO y Thinger.IO. Se propone un método para realizar estudios similares, en sistemas de fabricación interactivos, utilizando protocolos y plataformas IIoT. Como forma de conectar la máquina a internet, se utiliza el módulo ESP8266 NodeMCU. En la aplicación, las plataformas IIoT obtuvieron resultados muy similares, pudiendo asignarles el mismo grado de importancia para el estudio. Los protocolos, en cambio, se mostraron diferentes, siendo el MQTT el que mejor respondió a las funcionalidades del sistema de fabricación propuesto, ofreciendo su comunicación asíncrona, no requiriendo que los equipos estén constantemente interactuando. El protocolo HTTP presentaba mejores recursos en las API, pero su conexión sincrónica exige una buena red de datos de internet. Por último, el protocolo CoAP presentó una documentación insuficiente para el acceso a las plataformas y bibliotecas, para su uso en módulos de microcontroladores. Palabras clave: Protocolos; IIoT; plataformas; redes; industria 4.0; programa.
Styles APA, Harvard, Vancouver, ISO, etc.
33

KOCAMUFTUOGLU, Arda, Okan AKBAY et Serkan KABA. « A Comparative Study on Industrial Communication Protocols Using IoT Platforms ». Eurasia Proceedings of Science Technology Engineering and Mathematics 14 (31 décembre 2021) : 57–65. http://dx.doi.org/10.55549/epstem.1050178.

Texte intégral
Résumé :
In this study, the industrial communication protocols used in internet of things platforms are explained and compared with respect to pre-defined metrics which are gathered from devices in the industrial area, communication protocol principles, customer feedback and device hardware capabilities. They are explained in detail for end users and systems. Communication protocols in industrial area are given and illustrated with comparative table. The presented information and comparisons provide guidance for industrial internet of things projects. The selection of communication protocol is a critical process for surviving and sustaining of IoT platforms. IoT platforms provide solutions for industrial area for both on premise and cloud based applications compatible with industrial communication protocols. This study is shaped by the IoT platform which is developed by Klemsan, improved by industrial communication protocols which are widely used in industrial area, are explained briefly. There are 13 evaluation metrics which are presented in detail that is necessary to be chosen between industrial communication protocols for IoT platforms.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Wang, Hongyuan, Jin Meng, Xilong Du, Tengfei Cao et Yong Xie. « Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function ». Security and Communication Networks 2022 (4 janvier 2022) : 1–11. http://dx.doi.org/10.1155/2022/1203691.

Texte intégral
Résumé :
Internet of Things (IoT) has been widely used in many fields, bringing great convenience to people’s traditional work and life. IoT generates tremendous amounts of data at the edge of network. However, the security of data transmission is facing severe challenges. In particular, edge IoT nodes cannot run complex encryption operations due to their limited computing and storage resources. Therefore, edge IoT nodes are more susceptible to various security attacks. To this end, a lightweight mutual authentication and key agreement protocol is proposed to achieve the security of IoT nodes’ communication. The protocol uses the reverse fuzzy extractor to acclimatize to the noisy environment and introduces the supplementary subprotocol to enhance resistance to the desynchronization attack. It uses only lightweight cryptographic operations, such as hash function, XORs, and PUF. It only stores one pseudo-identity. The protocol is proven to be secure by rigid security analysis based on improved BAN logic. Performance analysis shows the proposed protocol has more comprehensive functions and incurs lower computation and communication cost when compared with similar protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Wu, Tsu-Yang, Liyang Wang, Xinglan Guo, Yeh-Cheng Chen et Shu-Chuan Chu. « SAKAP : SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing ». Sustainability 14, no 17 (5 septembre 2022) : 11054. http://dx.doi.org/10.3390/su141711054.

Texte intégral
Résumé :
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in people’s daily lives. As the number of IoT devices increases, the amount of data to be processed also increases. The emergence of cloud computing can process the data of IoT devices in a timely manner, and it provides robust storage and computing capabilities to facilitate data resource sharing. Since wireless communication networks are unstable and open, it is easy for attackers to eavesdrop, intercept, and tamper with the messages sent. In addition, authentication protocols designed for IoT-enabled cloud computing environments still face many security challenges. Therefore, to address these security issues, we propose an Intel software-guard-extensions (SGX)-based authentication key agreement protocol in an IoT-enabled cloud computing environment. The goal is to ensure data privacy and sustainable communication between the entities. Moreover, SGX can resist several well-known attacks. Finally, we show the security using the real-or-random model, ProVerif, and informal analysis. We also compare the security and performance of the proposed protocol with existing protocols. The comparison results show that our proposed protocol reduces the communication cost by 7.07% compared to the best one among the current protocols and ensures sufficient security.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Deshmukh, Sneha R., et Vijay T. Raisinghani. « A Survey on Congestion Control Protocols for CoAP ». International Journal of Communication Networks and Information Security (IJCNIS) 14, no 2 (31 août 2022) : 111–23. http://dx.doi.org/10.17762/ijcnis.v14i2.5484.

Texte intégral
Résumé :
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Mohd Aman, Azana Hafizah, Rosilah Hassan, Aisha-Hassan Abdalla Hashim et Huda Adibah Mohd Ramli. « Investigation of Internet of Things Handover Process for Information Centric Networking and Proxy Mobile Internet Protocol ». Mehran University Research Journal of Engineering and Technology 38, no 4 (1 octobre 2019) : 867–74. http://dx.doi.org/10.22581/muet1982.1904.01.

Texte intégral
Résumé :
IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts and services. This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. These billions of devices are interconnected to each other either using unicast, multicast or broadcast communications, and mixture of static and mobile communications. This paper aims to investigate the parameters of mobility performance in handover process for mobile multicast IoT environment. Investigation is done quantitatively by evaluating the parameters of handover process for IoT in two networking protocols that are possible to support acceptable mobility performance for IoT. The protocols are ICN (Information Centric Networking) and Proxy Mobile Internet Protocol. The evaluation parameters include packet loss and service recovery time. The metrics are extracted from the handover process flow for each network protocol topology. The service recovery time parameter is assumed as the time duration for each message to travel from sender to receiver, while packet loss parameter depends on the packet arrival rate and service recovery time. The results show that the ICN performs better than Proxy Mobile Internet Protocol.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Mutombo, Vially Kazadi, Seungyeon Lee, Jusuk Lee et Jiman Hong. « EER-RL : Energy-Efficient Routing Based on Reinforcement Learning ». Mobile Information Systems 2021 (19 avril 2021) : 1–12. http://dx.doi.org/10.1155/2021/5589145.

Texte intégral
Résumé :
Wireless sensor devices are the backbone of the Internet of things (IoT), enabling real-world objects and human beings to be connected to the Internet and interact with each other to improve citizens’ living conditions. However, IoT devices are memory and power-constrained and do not allow high computational applications, whereas the routing task is what makes an object to be part of an IoT network despite of being a high power-consuming task. Therefore, energy efficiency is a crucial factor to consider when designing a routing protocol for IoT wireless networks. In this paper, we propose EER-RL, an energy-efficient routing protocol based on reinforcement learning. Reinforcement learning (RL) allows devices to adapt to network changes, such as mobility and energy level, and improve routing decisions. The performance of the proposed protocol is compared with other existing energy-efficient routing protocols, and the results show that the proposed protocol performs better in terms of energy efficiency and network lifetime and scalability.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Larmo, Anna, Antti Ratilainen et Juha Saarinen. « Impact of CoAP and MQTT on NB-IoT System Performance ». Sensors 19, no 1 (20 décembre 2018) : 7. http://dx.doi.org/10.3390/s19010007.

Texte intégral
Résumé :
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Agyemang, Justice Owusu, Jerry John Kponyo, James Dzisi Gadze, Henry Nunoo-Mensah et Dantong Yu. « A Lightweight Messaging Protocol for Internet of Things Devices ». Technologies 10, no 1 (29 janvier 2022) : 21. http://dx.doi.org/10.3390/technologies10010021.

Texte intégral
Résumé :
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to support the vast D2D communication. Several application layer protocols are being used for M2M communication protocols such as CoAP, MQTT, etc. Even though these messaging protocols have been designed for M2M communication, they are still not optimal for communications where message size and overhead are of much concern. This research paper presents a Lightweight Messaging Protocol (LiMP), which is a minified version of CoAP. We present a detailed protocol stack of the proposed messaging protocol and also perform a benchmark analysis of the protocol on some IoT devices. The proposed minified protocol achieves minimal overhead (a header size of 2 bytes) and has faster point-to-point communication from the benchmark analysis; for communication over LAN, the LiMP-TCP outperformed the CoAP-TCP by an average of 21% whereas that of LiMP-UDP was over 37%. For a device to remote server communication, LiMP outperformed CoAP by an average of 15%.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud et Abderrazak Jemai. « A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis ». Sensors 20, no 13 (28 juin 2020) : 3625. http://dx.doi.org/10.3390/s20133625.

Texte intégral
Résumé :
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Rocha, Murilo Silveira, Guilherme Serpa Sestito, Andre Luis Dias, Alfonso Celso Turcato, Dennis Brandão et Paolo Ferrari. « On the performance of OPC UA and MQTT for data exchange between industrial plants and cloud servers ». ACTA IMEKO 8, no 2 (27 juin 2019) : 80. http://dx.doi.org/10.21014/acta_imeko.v8i2.648.

Texte intégral
Résumé :
The Internet of Things (IoT) is a key technology in the development of Industry 4.0. An increasing number of new industrial devices are expected to communicate with each other by means of local (edge) and cloud computing servers. In this article, two well-known protocols used for IoT and Industrial IoT (IIoT) are compared in terms of their performance when they are used to send/receive data to/from cloud servers. Due to their wide diffusion and suitability, the considered protocols are open platform communication-unified architecture publisher-subscriber (OPC UA PubSub) (purposely developed and maintained by industrial consortia) and message queuing telemetry transport (MQTT), the most well-known message protocol originally developed by IBM. The performance comparison is carried out considering the overall quantity of the data transferred (user payload plus overhead) and the roundtrip time required to send in data and receive a feedback message in return. The experimental results include the evaluation of several cloud computing server and application scenarios, highlighting how each protocol is particularly suitable for certain situations. Finally, conclusions about the best choice for data exchange between devices are given.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Son, Seunghwan, Yohan Park et Youngho Park. « A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments ». Sustainability 13, no 16 (17 août 2021) : 9241. http://dx.doi.org/10.3390/su13169241.

Texte intégral
Résumé :
The Internet of Things (IoT) is being applied to various environments such as telecare systems, smart homes, and intelligent transportation systems. The information generated from IoT devices is stored at remote servers, and external users authenticate to the server for requesting access to the stored data. In IoT environments, the authentication process is required to be conducted efficiently, and should be secure against various attacks and ensure user anonymity and untraceability to ensure sustainability of the network. However, many existing protocols proposed in IoT environments do not meet these requirements. Recently, Rajaram et al. proposed a paring-based user authentication scheme. We found that the Rajaram et al. scheme is vulnerable to various attacks such as offline password guessing, impersonation, privileged insider, and known session-specific temporary information attacks. Additionally, as their scheme uses bilinear pairing, it requires high computation and communication costs. In this study, we propose a novel authentication scheme that resolves these security problems. The proposed scheme uses only hash and exclusive-or operations to be applicable in IoT environments. We analyze the proposed protocol using informal analysis and formal analysis methods such as the BAN logic, real-or-random (ROR) model, and the AVISPA simulation, and we show that the proposed protocol has better security and performance compared with existing authentication protocols. Consequently, the proposed protocol is sustainable and suitable for real IoT environments.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Khan, Shafiullah, Muhammad Muneer Umar, Chunhua Jin, Shaozhang Xiao, Zeeshan Iqbal et Noha Alnazzawi. « Game-Theory-Based Multimode Routing Protocol for Internet of Things ». Electronics 11, no 24 (12 décembre 2022) : 4134. http://dx.doi.org/10.3390/electronics11244134.

Texte intégral
Résumé :
Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes should not be limited to the interconnection of different nodes. In this paper, a multi-mode hybrid routing mechanism is proposed that can be installed on all or a limited number of nodes in a heterogenous IoT network. The nodes configured with the proposed protocols are termed smart nodes. These nodes can be used to connect multiple IoT networks into one. Furthermore, a game-theory-based model is proposed that is used for intercommunication among the smart nodes to gain optimal efficiency. Various performance matrices are assessed under different network scenarios. The simulation results show that the proposed mechanism outperforms in broader heterogeneous IoT networks with diverse nodes.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Haque, Md Alimul, Nourah Almrezeq, Shameemul Haque et A. A. Abd El-Aziz. « Device Access Control and Key Exchange (DACK) Protocol for Internet of Things ». International Journal of Cloud Applications and Computing 12, no 1 (janvier 2022) : 1–14. http://dx.doi.org/10.4018/ijcac.297103.

Texte intégral
Résumé :
Internet of Things is a promising technology but it also increases numerous security threats in data transmission. To secure neighboring sensing devices' communication in an IoT environment, a key agreement protocol is primordial. Various IoT data transmission mechanisms have been proposed in the literature to attain security. However, these propositions are not completely secure against all types of attacks. In this paper, a new certificate-based was proposed lightweight authentication and key agreement protocol for the IoT environment. The proposed protocol uses Elliptic Curves Cryptography and minimizes the number of operations needed to generate secret keys. Moreover, performed a detailed informal security analysis, and formal security verification using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, through which demonstrated that the proposed protocol is resilient against numerous known attacks. The implementation of the proposed protocol using the simulator to evaluate the impact of the proposed protocol on several network parameters.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Misic, Jelena, M. Zulfiker Ali et Vojislav B. Misic. « Protocol Architectures for IoT Domains ». IEEE Network 32, no 4 (juillet 2018) : 81–87. http://dx.doi.org/10.1109/mnet.2018.1700395.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Muzammal, Syeda Mariam, Raja Kumar Murugesan, NZ Jhanjhi, M. Shamim Hossain et Abdulsalam Yassine. « Trust and Mobility-Based Protocol for Secure Routing in Internet of Things ». Sensors 22, no 16 (18 août 2022) : 6215. http://dx.doi.org/10.3390/s22166215.

Texte intégral
Résumé :
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security is easy to adapt for resource-constrained IoT environments. In the existing trust-based security for RPL routing attacks, nodes’ mobility is not considered or limited to only the sender nodes. Similarly, these trust-based protocols are not evaluated for mobile IoT environments, particularly regarding RPL attacks. Hence, a trust and mobility-based secure routing protocol is proposed, termed as SMTrust, by critically analysing the trust metrics involving the mobility-based metrics in IoT. SMTrust intends to provide security against RPL Rank and Blackhole attacks. The proposed protocol is evaluated in three different scenarios, including static and mobile nodes in an IoT network. SMTrust is compared with the default RPL objective function, Minimum Rank with Hysteresis Objective Function (MRHOF), SecTrust, DCTM, and MRTS. The evaluation results indicate that the proposed protocol outperforms with respect to packet loss rate, throughput, and topology stability. Moreover, SMTrust is validated using routing protocol requirements analysis to ensure that it fulfils the consistency, optimality, and loop-freeness.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Akasiadis, Charilaos, Vassilis Pitsilis et Constantine D. Spyropoulos. « A Multi-Protocol IoT Platform Based on Open-Source Frameworks ». Sensors 19, no 19 (28 septembre 2019) : 4217. http://dx.doi.org/10.3390/s19194217.

Texte intégral
Résumé :
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Anufrienko, A. Yu. « Features of designing IoT systems ». Radio industry (Russia) 29, no 2 (30 mai 2019) : 28–34. http://dx.doi.org/10.21778/2413-9599-2019-29-2-28-34.

Texte intégral
Résumé :
The development of IoT systems, especially in the field of Industrial Internet of things with a large number of end devices is a complex scientific and technical problem. Inability to take into account the number of factors at the early stage leads to a negative result. This document demonstrates the scientific approach to the creation of the above systems. The IoT protocols, the IoT system architecture and its components are described in this article. The problems arising in the design of IoT systems are described. The basic characteristics of the most common protocols are systematized. The method for solution of the actual scientific and applied problem, allowing to design the IoT system, taking into account various fundamental parameters including the frequency range, bandwidth, data transfer rate, radiated power, range, work intensity, as well as the fundamental constraints, is proposed. As a result of the application of the described method, the optimal IoT protocol can be chosen to build a system, or to determine and optimize the parameters of the proprietary protocol. That makes it possible to build a reliable and scalable IoT system for the solution of the relevant experimental problems.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Yann Cedric Lawson, Teyi, et Senthilnathan T. « Effectiveness of the NIZKP Protocol for Authentication in IoT Environment ». International Journal of Engineering & ; Technology 7, no 2.6 (11 mars 2018) : 231. http://dx.doi.org/10.14419/ijet.v7i2.6.10775.

Texte intégral
Résumé :
Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie