Artykuły w czasopismach na temat „Internet of Things Network (IoTN)”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Internet of Things Network (IoTN).

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Internet of Things Network (IoTN)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Itagi, Manjunath, Dankan Gowda V, KDV Prasad, Pullela SVVSR Kumar, Shekhar R i B. Ashreetha. "Performance Analysis of Energy Efficiency and Security Solutions of Internet of Things Protocols". International Journal of Electrical and Electronics Research 11, nr 2 (26.06.2023): 442–50. http://dx.doi.org/10.37391/ijeer.110226.

Pełny tekst źródła
Streszczenie:
The scientific and business communities are showing considerable interest in wireless sensor networks (WSN). The availability of low-cost, small-scale components like CPUs, radios, and sensors, which are often combined into a single chip, is crucial. Parallel to the evolution of WSNs, the concepts of the IoT have been evolving in recent years. Wireless communication technologies may play a significant role in the implementation of IoT, despite the fact that IoT does not need or require any particular technology for communication. WSN assisted IoT networks can drive several applications in many industries. The proposed research explores the possibility of enhancing energy efficiency in WSN-assisted IoTN by balancing various challenging sensor network performance metrics. The base station's current placement inside the sensing field is predetermined by the preexisting routing algorithms. Our study examines the impact of base station placement outside and within the prescribed sensing domains on energy consumption and network longevity. In addition, methods for transferring data from the distributed source sensor to the base station while minimizing energy consumption are investigated. In this preliminary study, we focus on developing an algorithm for WSN-Assisted IoTN that can balance network factors such as hop count, communication distance, and residual energy. To further optimize the routing route between local cluster heads and the base station, a novel network architecture is built based on the Ant-optimization model, which uses centroid routing to balance energy consumption among local clusters. An open-source Network Simulator (NS-3) is used to model the behaviour of the proposed routing protocols and compare them to comparable existing network protocols. All of the suggested protocols have the same fundamentals for creating networks, however they vary in terms of routing, optimization, and performance depending on the development effort under consideration.
Style APA, Harvard, Vancouver, ISO itp.
2

Nourildean, Shayma Wail, Mustafa Dhia Hassib i Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review". Indonesian Journal of Electrical Engineering and Computer Science 27, nr 1 (1.07.2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Pełny tekst źródła
Streszczenie:
Recently, Internet of Things (IoT) technologies are developing technology with a variety of applications. The Internet of Things (IoTs) is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in Internet of Things (IoT) technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes’ construction with high-speed CPUs and low-power radio links. The IoT-based wireless Sensor network (WSN) is a game-changing smart monitoring solution. ZigBee standard is an important wireless sensor network (WSN) and Internet of Things (IoT) communication protocol in order to facilitate low-power, low-cost IoT applications and to handle numerous network topologies. This paper presented a review on the energy efficient and routing topologies of ZigBee WSN, applications of IoT enabled Wireless Sensor Network as well IoT WSN security challenges.
Style APA, Harvard, Vancouver, ISO itp.
3

Nikhat Akhtar i Yusuf Perwej. "The internet of nano things (IoNT) existing state and future Prospects". GSC Advanced Research and Reviews 5, nr 2 (30.11.2020): 131–50. http://dx.doi.org/10.30574/gscarr.2020.5.2.0110.

Pełny tekst źródła
Streszczenie:
The increase of intelligent environments suggests the interconnectivity of applications and the use of the Internet. For this reason, arise what is known as the Internet of Things (IoT). The expansion of the IoT concept gives access to the Internet of Nano Things (IoNT). A new communication networks paradigm based on nano technology and IoT, in other words, a paradigm with the capacity to interconnect nano-scale devices through existing networks. From the interconnection of these nano machines with the Internet emerged the concept of Internet of Nano Things (IoNT). The Internet of Nano-Things (IoNT) is a system of nano connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. The data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The nano-networks paradigm can empower the consumers to make a difference to their well-being by connecting data to personalized analysis within timely insights. The real-time data can be used in a diversification of nano-applications in the Internet of Nano-Things (IoNT), from preventive treatment to diagnostics and rehabilitation. In this paper intelligibly explains the Internet of Nano Things (IoNT), its architecture, challenges, explains the role of IoNT in global market, IoNT applications in various domains. Internet of things has provided countless new opportunity to create a powerful industrialized structure and many more. The key applications for IoNT communication including healthcare, transportation and logistics, defense and aerospace, media and entertainment, manufacturing, oil and gas, high speed data transfer & cellular, multimedia, immune system support and others services. In the end, since security is considered to be one of the main issues of the IoNT system, we provide an in-depth discussion on security, communication network and Internet of Nano Things (IoNT) market trends.
Style APA, Harvard, Vancouver, ISO itp.
4

Kumar, Sumit, i Zahid Raza. "Internet of Things". International Journal of Systems and Service-Oriented Engineering 7, nr 3 (lipiec 2017): 32–52. http://dx.doi.org/10.4018/ijssoe.2017070103.

Pełny tekst źródła
Streszczenie:
Internet of Things (IoT) is a novel approach of connecting things/objects and thus transmitting information between various entities of the physical world or to the control centers where this information can be interpreted. IoT has been poised as the next evolution of internet promising to change our lives by involving a seamless access to people and devices in a ubiquitous way leading to a smart world. These devices, often referred to as smart items or intelligent things can be home appliances, healthcare devices, vehicles, buildings, factories and almost anything networked and fitted with sensors, actuators, and/or embedded computers. IoT promises to make the world smarter and proactive by enabling things to talk and others to understand. This work first presents an insight into the origin of IoT and its network as well as data centric architecture while listing the major possibilities. The seemingly important role and challenges of using Wireless Sensor Networks (WSN) which acts as the base in sensing and monitoring has been discussed. Since, the future lies in utility computing, best realized in the form of cloud computing, a cloud centric view of IoT is also presented.
Style APA, Harvard, Vancouver, ISO itp.
5

Sankar, S., Ramasubbareddy Somula, R. Lakshmana Kumar, P. Srinivasan i M. Amala Jayanthi. "Trust-Aware Routing Framework for Internet of Things". International Journal of Knowledge and Systems Science 12, nr 1 (styczeń 2021): 48–59. http://dx.doi.org/10.4018/ijkss.2021010104.

Pełny tekst źródła
Streszczenie:
Establishing security in internet of things (IoT) is a critical challenge, as it is connected to the network's extremely resource-constrained devices. The RPL is a standard routing protocol for IoT. It is well-suited for low power and lossy networks (LLN). The RPL provides little security in the IoT network against various attacks. However, one needs to strengthen the security concern in RPL. So, this paper proposes a trust-aware, energy-based reliable routing (TAER-RPL) for IoT to enhance security among network nodes. The TAER-RPL is taken into account the routing metrics, namely trust, ETX, RER to pick the optimal parent for data transmission. The simulation is conducted in COOJA simulator. TAER-RPL's efficiency is compared with SecTrust-RPL and RPL. The TAER-RPL increases the lifespan of the network by 15%.
Style APA, Harvard, Vancouver, ISO itp.
6

Fadziso, Takudzwa. "Internet of Things in Agriculture for Smart Farming". Malaysian Journal of Medical and Biological Research 5, nr 2 (31.12.2018): 147–56. http://dx.doi.org/10.18034/mjmbr.v5i2.565.

Pełny tekst źródła
Streszczenie:
Internet of Things in Agricultural Farming’ deals with the use IoTs in providing farmers the means to do multiple parallel things with wifi connected and increase their productivity in turn increasing their yearly revenue and profits. This will not only help the farmer but the raw materials which come out will be more than what would have yielded if the farmer had done all by themselves. The IoT network comprises systems and a network of web-connected intelligent devices that employ encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The use of IoT in Agricultural Farming is no doubt going to greatly enhance farming and improve yields.
Style APA, Harvard, Vancouver, ISO itp.
7

Eltayeb, Mohamed A. "Internet of Things". International Journal of Hyperconnectivity and the Internet of Things 1, nr 1 (styczeń 2017): 1–18. http://dx.doi.org/10.4018/ijhiot.2017010101.

Pełny tekst źródła
Streszczenie:
In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.
Style APA, Harvard, Vancouver, ISO itp.
8

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera". American Journal of Trade and Policy 6, nr 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Pełny tekst źródła
Streszczenie:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identification keys. This will make content management easier. It will generate revenue for the person who takes the copyrighted picture. A watermark is an embedded signature in a thing. It could be embedded in a video, image, and other file types for distinction and marking for ownership. It could be visible or invisible. It also provides a means to trace a product to the owner. This work looks into how images with watermark can be connected to the IoT for tracking and fighting piracy.
Style APA, Harvard, Vancouver, ISO itp.
9

Maseleno, Andino, Wahidah Hashim, Y. C. Tang Alicia, A. Mahmoud Moamin i Marini Othman. "A Review on Smart Grid Internet of Things". Journal of Computational and Theoretical Nanoscience 17, nr 6 (1.06.2020): 2770–75. http://dx.doi.org/10.1166/jctn.2020.8941.

Pełny tekst źródła
Streszczenie:
Smart electrical network or better known as Smart Grid is one form of transformation and technological reform in the electricity industry. Smart Grid is a modern electrical energy network that intelligently integrates power grids with communications devices that support electricity generation and distribution networks to be more attractive, communicative and qualified. Smart Grid is also able to prevent and to isolate the interference quickly and present information on electrical data in real time. While the Internet of Thing (IoT) is a method that aims to maximize the benefits of internet connectivity to transfer and to process data or information through an internet network wirelessly, virtual and autonomous. IoT technically can be encouraged in developing smart grid network by integrating main power system infrastructure from generating side to end consumer through wireless sensor network automatically. With the utilization of IoT is expected to improve the reliability of information systems from the power grid as well as improve the efficiency of existing electrical infrastructure. This paper will present the concept of smart grid technology, IoT and discuss the IoT design and application model in smart grid network.
Style APA, Harvard, Vancouver, ISO itp.
10

Bynagari, Naresh Babu. "Industrial Application of Internet of Things". Asia Pacific Journal of Energy and Environment 3, nr 2 (31.12.2016): 75–82. http://dx.doi.org/10.18034/apjee.v3i2.576.

Pełny tekst źródła
Streszczenie:
‘Industrial application of Internet of Things deals with the application of Internet of things to produce industrial services. It analyzed how industries can carry out multiple services with function remotely using IoT-connected devices. The several benefits and drawbacks to the application of IoT services were also investigated. The IoT is a network of connected systems and smart devices that use encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The utilization of IoT for industrial functions will significantly improve industrial output, and in the future, more industries will come to apply IoT devices and systems for greater efficiency.
Style APA, Harvard, Vancouver, ISO itp.
11

Paramonov, Alexander, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy i Andrey Koucheryavy. "Fractals for Internet of Things Network Structure Planning". International Journal of Information Security and Privacy 16, nr 1 (1.01.2022): 1–12. http://dx.doi.org/10.4018/ijisp.305223.

Pełny tekst źródła
Streszczenie:
Wireless communication networks and technologies are witnessed a huge improvement which gain a large number of users. In addition, the choice and using methods of the network are depending on the environment in which it is created. Although the network in each case is unique, many of them share a lot of common. To this end, we propose a new approach for planning the structure of the Internet of Things (IoT) network based on fractals, where fractal figures are utilized to describe the structure of the target environment. Moreover, fractal dimension’s estimation, fraction area occupied by the target environment, and network model are used in the planning process. This approach allows you to choose a model that accurately describes the properties of the environment. Finally, the results proved the suitability of this approach for the IoT network structure planning in an urban or other environment based on the target environment’s data.
Style APA, Harvard, Vancouver, ISO itp.
12

Khan, Shafiullah, Muhammad Muneer Umar, Chunhua Jin, Shaozhang Xiao, Zeeshan Iqbal i Noha Alnazzawi. "Game-Theory-Based Multimode Routing Protocol for Internet of Things". Electronics 11, nr 24 (12.12.2022): 4134. http://dx.doi.org/10.3390/electronics11244134.

Pełny tekst źródła
Streszczenie:
Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes should not be limited to the interconnection of different nodes. In this paper, a multi-mode hybrid routing mechanism is proposed that can be installed on all or a limited number of nodes in a heterogenous IoT network. The nodes configured with the proposed protocols are termed smart nodes. These nodes can be used to connect multiple IoT networks into one. Furthermore, a game-theory-based model is proposed that is used for intercommunication among the smart nodes to gain optimal efficiency. Various performance matrices are assessed under different network scenarios. The simulation results show that the proposed mechanism outperforms in broader heterogeneous IoT networks with diverse nodes.
Style APA, Harvard, Vancouver, ISO itp.
13

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics". Advances in Multidisciplinary and scientific Research Journal Publication 1, nr 1 (26.07.2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Pełny tekst źródła
Streszczenie:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater forensics regime. These recommendations as well policy directions were also added Keywords: Internet of Things (IoT), Underwater Network Forensics, Cybersecurity, Compatibility BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Timothy Kwaku (2022): Internet of Things (IoT) & Underwater Network Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 291-300 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P47
Style APA, Harvard, Vancouver, ISO itp.
14

Javida Damirova, Javida Damirova, i Laman Musayeva Laman Musayeva. "INTERNET OF THINGS". PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, nr 02 (1.03.2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Pełny tekst źródła
Streszczenie:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many important studies and researches have been conducted to improve the technology through IoT. The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The main purpose of this review article is to provide a detailed discussion, both technologically and socially. It is not just about the connected devices but also about the hardware, software, connectivity and communication protocols, middleware and so much more to create Internet of Things solutions as mentioned. And it’s also about many processes and technologies. So, this is most important theme in our world. The article discusses various problems and key issues in IoT, architecture and important applications. The Internet of Things is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT has also demonstrated its importance and potential for economic and industrial growth in the developing region. It is also seen as a revolutionary step in the trading and stock markets. However, data and information security is an important concern and is highly desirable, which is a major challenge that needs to be addressed. The Internet, the biggest source of security threats and cyber attacks, has opened various doors for hackers, thereby discrediting information and data. IoT is committed to providing the best possible solutions to deal with data and information security issues. IoT's most important concern in trade and the economy is security. The IoT system consists of a large number of devices and sensors that communicate with each other. They can range from a Wi-Fi pet camera on your bookshelf to a medical device implanted in your body, like a pacemaker. As long as the device is able to connect to the internet and has sensors that transmit data, it can be considered an IoT device. As the IoT network grows and expands, the number of these sensors and devices is growing rapidly. These devices communicate with each other and transmit large amounts of information over the Internet. This information is very large and flows every second, and therefore deserves to be called great information. The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (mean - M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something. Today, these IoT projects are evolving and rapidly spreading to all platforms. It is possible to find IoT projects for each topic. As mentioned earlier, IoT projects are designed to make life easier. These projects, created to help as many people as possible, will be the most important part of our future lives. It will be impossible to imagine our lives without the Internet of Things and smart projects. A smart city with sensors covering all its regions using diverse tangible gadgets and objects all over the community and connected with the help of internet. The continuous expansion of IoT-based networks poses complex challenges such as data management and collection, storage and processing, and analytics. This article sheds light on the existing literature and describes their contributions to various aspects of IoT. This article will help readers and researchers understand IoT and its application to the real world Keywords: arduino, sensors, security systems, robotics, intelligent technology.
Style APA, Harvard, Vancouver, ISO itp.
15

Mahajan, Yash, i Dr Manish Vyas. "A Review on Security Frameworks for Software Defined Networks". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 02 (3.02.2024): 1–10. http://dx.doi.org/10.55041/ijsrem28497.

Pełny tekst źródła
Streszczenie:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive networks often come under security attacks, most common of which are jamming and eavesdropping attacks. In this paper, the basics of cognitive IoT networks have been presented with the focus of security aware cognitive IoT networks. Previous work in the allied domain has been discussed along with their salient features. Keywords: Wide Area Network (WAN), Internet of Things (IoT), cognitive radio network (CRN), security aware spectrum assignment, cyber-attacks, false alarm, and throughput.
Style APA, Harvard, Vancouver, ISO itp.
16

Singh, Upendra. "A Review on Securing Wireless Networks against Jamming Attacks". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 05 (12.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem33883.

Pełny tekst źródła
Streszczenie:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive networks often come under security attacks, most common of which are jamming and eavesdropping attacks. In this paper, the basics of cognitive IoT networks have been presented with the focus of security aware cognitive IoT networks. Previous work in the allied domain has been discussed along with their salient features. Keywords: Wide Area Network (WAN), Internet of Things (IoT), cognitive radio network (CRN), security aware spectrum assignment, cyber-attacks, false alarm, and throughput.
Style APA, Harvard, Vancouver, ISO itp.
17

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha i Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things". International Journal of Grid and High Performance Computing 11, nr 3 (lipiec 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Pełny tekst źródła
Streszczenie:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy IoT); 2) The optimized reactive route is dynamically adjusted based on fuzzy based prediction accurately from the number of routes provided by base protocol. If the selection accuracy is high, the performance enhances the network quality; 3) FLWP takes full advantage of energy to further enhance target tracking performance by properly selecting reactive routes in the network. Authors evaluated the efficiency of FLWP with simulation-based experiments. FLWP scheme improves the energy efficiency.
Style APA, Harvard, Vancouver, ISO itp.
18

Kaur, Prabhjot, Rupinder Singh i Rachhpal Singh. "Secured Clustered Internet of Things Wireless Sensor Network". International Journal of Computer Science and Mobile Computing 11, nr 6 (30.06.2022): 34–45. http://dx.doi.org/10.47760/ijcsmc.2022.v11i06.003.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is a swiftly evolving technology that will have a significant impact in the future. The Internet of Things (IoT) is a huge collection of interconnected networks, such as the Wireless Sensor Network (WSN), that make use of fast evolving devices and technologies. The risk of confidentiality of information and protection has increased as a result of the indefinite interconnection of a variety of applied sciences in IoT. WSN employs Low Energy Adaptive Clustering Hierarchy (LEACH) to create an energy-efficacious network that is vulnerable to a wide range of assaults, including the HELLO flood. This work employs AS-LEACH (Abundant Secure LEACH) as an extension to the LEACH protocol to protect cluster heads from Hello flood attacks. For the purpose of validating a sensor node as CH, AS-LEACH employs RBG color cube numbers, a distinct Abundant number, and each sensor node has its own unique ID. The NS2 network simulator is utilized to implement AS-LEACH and verify its efficiency in this proposed work.
Style APA, Harvard, Vancouver, ISO itp.
19

M, Dr DuraiPandian. "ENHANCED NETWORK PERFORMANCE AND MOBILITY MANAGEMENT OF IOT MULTI NETWORKS". Journal of Trends in Computer Science and Smart Technology 2019, nr 02 (15.12.2019): 95–105. http://dx.doi.org/10.36548/jtcsst.2019.2.003.

Pełny tekst źródła
Streszczenie:
The tremendous progress in the internet of things incorporating multitudes of wireless interfaces have ended up with dense deployment of multi-networks that are associated with the internet of things and supported by wireless communications that are heterogeneous. Effective management of the multi-networks with a proper flow scheduling and a mobility management in order to provide a seamless conveyance are a tedious and a challenging task. The incompatibility of the software defined networks to manage with the densely deployed multi networks has increased the necessity for developing a more suitable flow scheduler and mobility manager for the multi networks of internet of things. So this paper presents the Improved- flow scheduling and the mobility management protocol (IFSMM) to guarantee the network performance that provides a seamless accessing of internet of things. The IFSMM is simulated using the NS-2 to confirm the performance achievement through the proper management of the transmission on the grounds of throughput, latency and the jitter.
Style APA, Harvard, Vancouver, ISO itp.
20

Baek, Jinsuk, Munene W. Kanampiu i Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration". Applied Sciences 11, nr 14 (7.07.2021): 6280. http://dx.doi.org/10.3390/app11146280.

Pełny tekst źródła
Streszczenie:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
Style APA, Harvard, Vancouver, ISO itp.
21

Sholla, Sahil, Sukhkirandeep Kaur, Gh Rasool Begh, Roohie Naaz Mir i M. Ahsan Chishti. "Clustering Internet of Things: A Review". Journal of Science and Technology: Issue on Information and Communications Technology 3, nr 2 (31.12.2017): 21. http://dx.doi.org/10.31130/jst.2017.61.

Pełny tekst źródła
Streszczenie:
Internet of Things is a paradigm shift in networking that seeks to connect virtually all things on the planet. Given the constrained nature of smart devices, energy efficient routing would play a key role in successful deployment of such networks. Clustering algorithms organize nodes of a network into groups or clusters and a specific designated node, cluster head is responsible for its cluster. Clustering algorithms have been particularly suggested in the context of Wireless Sensor Networks (WSN) but their application may also address similar challenges in Internet of Things (IoT). Clustering would facilitate energy efficient routing and topology management by delegating large chunk of communication overhead to cluster head. This paper presents a review of various clustering algorithms, analyses routing characteristics of various IoT domains and suggests appropriate clustering algorithms for each domain.
Style APA, Harvard, Vancouver, ISO itp.
22

S., BÎRLEANU. "Software Defined (SDN) Based Internet of Things (IoT) networks". Scientific Bulletin of Naval Academy XXIV, nr 1 (15.07.2021): 103–10. http://dx.doi.org/10.21279/1454-864x-21-i1-012.

Pełny tekst źródła
Streszczenie:
The exponential growth of IoT devices connected to the Internet has led to the need to develop a new technology for managing them. The challenges posed by the implementation of IoT networks have emerged in the control and management of IoT applications and networks that become difficult to maintain, the programming of IoT devices. In addition, IoT devices are not designed to allow centralized management and control. Things get even more complicated when the IoT administrator has to manually configure all distributed IoT devices to add each new feature to the network. Software-Defined Networking - SDN solves existing network-level problems by providing the ability to build increasingly complex IoT-based systems in a simpler and more flexible manner. The paper aims to detail the evolution of SDN and IoT networks and an analysis of the benefits and challenges of SDN and IoT integration.
Style APA, Harvard, Vancouver, ISO itp.
23

Yaokumah, Winfred, Richard Nunoo Clottey i Justice Kwame Appati. "Network Intrusion Detection in Internet of Things (IoT)". International Journal of Smart Security Technologies 8, nr 1 (styczeń 2021): 49–65. http://dx.doi.org/10.4018/ijsst.2021010104.

Pełny tekst źródła
Streszczenie:
The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper offered a systematic review of studies on intrusion detection in IoT, focusing on metrics, methods, datasets, and attack types. This review used 33 network intrusion detection papers in 31 journals and 2 conference proceedings. The results revealed that the majority of the studies used generated or private datasets. Machine learning (ML)-based methods (85%) were used in the studies, while the rest used statistical methods. Eight categories of metrics were identified as prominent in evaluating IoT performance, and 94.9% of the ML-based methods employed average detection rate. Moreover, over 20 attacks on IoT networks were detected, with denial of service (DoS) and sinkhole being the majority. Based on the review, the future direction of research should focus on using public datasets, machine learning-based methods, and metrics such as resource consumption, energy consumption, and power consumption.
Style APA, Harvard, Vancouver, ISO itp.
24

Hemmati, Mahdi. "Analyzing the Effect of Social Internet of Things on Making the Internet Marketing Smart". Modern Applied Science 10, nr 9 (20.07.2016): 213. http://dx.doi.org/10.5539/mas.v10n9p213.

Pełny tekst źródła
Streszczenie:
The development of social internet of things in recent years led to widening the data and information scope. A wide scope of new services caused by this procedure. In this regard, a new pattern called the social internet of things is created by integrating the social network and internet of things (IOT) which shows the network communication of things. IOS can put a step toward the marketing world. In this paper, the effect of IoT on internet marketing and making it smart are taken into consideration by considering marketing in human social network.
Style APA, Harvard, Vancouver, ISO itp.
25

Romario Bhattacharyya, Tamoghno, i Dr M. Pushpalatha. "Routing protocols for internet of things: a survey". International Journal of Engineering & Technology 7, nr 2.4 (10.03.2018): 196. http://dx.doi.org/10.14419/ijet.v7i2.4.13038.

Pełny tekst źródła
Streszczenie:
The world of wireless sensor network(WSN) is widening day by day and the latest technology in use the Internet of Things known as IOT is the latest craze in it. But the IOT technique and its devices requires routing protocols in situations like low power and lossy networks(LLNs) which brings great challenges. In many and some emergency cases, like in case of large and more data traffic which causes to lead in network congestions and also brings loss in packets and delay. In order to overcome all this problems , many group research and individuals are trying and focusing on different solutions to maximize the throughput for the RPL network. In this paper we will we studying and reviewing some of the different methods that has been taken to maximize the throughput in the network and hence try to come to a conclusion for the future techniques needed to be done.
Style APA, Harvard, Vancouver, ISO itp.
26

Natarajan, Munusamy. "Future internet: Application of internet of things to libraries". IP Indian Journal of Library Science and Information Technology 7, nr 2 (15.11.2022): 68–74. http://dx.doi.org/10.18231/j.ijlsit.2022.013.

Pełny tekst źródła
Streszczenie:
This paper explains the technical perspective of Internet of Things (IoTs) with definitions and the evolution of IoT. The characteristics like interconnectivity, heterogeneity, dynamic change, safety and connectivity are emphasized with IoT architecture. Different layers like the perception layer, network layer, middleware layer, application layer and business layer are explained. Application of IoT in different disciplines like in healthcare, agriculture, transportation is discussed. Emphasized the developments of smart cities with smart homes interconnecting the appliances, smart buildings for their operations from remote, smart environment and smart governance. Smart healthcare is also included under smart cities with parking lots in cities. Then IoT applications in libraries are discussed from entry of users, circulation desk, restoration of books, virtual library and book tracing, information literacy, cloud computing for the e-resources stored and accessed from publishers’ website and fire detection and protection for the safety of documents in libraries. The challenges and issues faced while implementing the IoT like privacy and security, accuracy, transaction, hacking, expenditure, system development and user training are mentioned. It has been concluded that IoT is in infancy stage for library professionals and they should try to implement and the future lies on their interest in latest technological applications.
Style APA, Harvard, Vancouver, ISO itp.
27

Liu, Xia, Bing Yao, Wan Jia Zhang, Xiang En Chen i Xiao Min Zhang. "Fractal Growing Network Models Related with the Internet of Things". Applied Mechanics and Materials 644-650 (wrzesień 2014): 2471–75. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2471.

Pełny tekst źródła
Streszczenie:
We focus on produce network models by constructive operations based on configurations in order to provide various network models for The Internet of Things (IoT) such that these models may be economic and strong in building real networks of IoT.
Style APA, Harvard, Vancouver, ISO itp.
28

Đekić, Milica. "The Internet of Things security challenges". Tehnika 75, nr 6 (2020): 678–83. http://dx.doi.org/10.5937/tehnika2005678d.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may feel so thankful for being the part of an IoT community. On the other hand, the consumers would spend less time thinking about the possible security concerns being linked to this new improvement. In this paper, we intend to discuss how secure our IoT infrastructure is, what its strategic implications are and why cyber industry should invest more time and effort in order to better research and develop this concept. In addition, we would try to deal a bit more with the IoT crawlers as the tools for investigating the IoT network and being so handy for both - researchers and hacker's groups.
Style APA, Harvard, Vancouver, ISO itp.
29

Mahmudova, Shafagat. "Intelligent Systems for the Internet of Things: Essence, Perspectives and Problems". International Journal of Natural Sciences Research 9, nr 1 (4.11.2021): 17–25. http://dx.doi.org/10.18488/journal.63.2021.91.17.25.

Pełny tekst źródła
Streszczenie:
This article outlines the Internet of Things (IoT). The Internet of Things describes a network of physical objects, i.e., the “thing” including sensors, software, and other technologies for connection and data sharing with other devices and systems over the Internet. In other words, IoT is a relatively new technology enabling many “smart” devices to get connected, to analyze, process, and transfer data to each other and connect to a network. The article clarifies the essence of intelligent systems for the Internet of Things, and analyzes the most popular software for the IoT platform. It studies high-level systems for IoT and analyzes available literature in this field. It highlights most advanced IoT software of 2021. The article also identifies the prospects and challenges of intelligent systems for the Internet of Things. The creation of new intelligent systems for IoT and the development of technology will greatly contribute to the development of economy.
Style APA, Harvard, Vancouver, ISO itp.
30

Yadav, Neha, Sagar Pande, Aditya Khamparia i Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning". Wireless Communications and Mobile Computing 2022 (10.03.2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is implemented. In particular, to detect malicious Internet of Things network traffic, a deep learning algorithm has been used. The identity solution ensures the security of operation and supports the Internet of Things connectivity protocols to interoperate. An intrusion detection system (IDS) is one of the popular types of network security technology that is used to secure the network. According to our experimental results, the proposed architecture for intrusion detection will easily recognize real global intruders. The use of a neural network to detect attacks works exceptionally well. In addition, there is an increasing focus on providing user-centric cybersecurity solutions, which necessitate the collection, processing, and analysis of massive amounts of data traffic and network connections in 5G networks. After testing, the autoencoder model, which effectively reduces detection time as well as effectively improves detection precision, has outperformed. Using the proposed technique, 99.76% of accuracy was achieved.
Style APA, Harvard, Vancouver, ISO itp.
31

França, Cinthya M., Rodrigo S. Couto i Pedro B. Velloso. "Missing Data Imputation in Internet of Things Gateways". Information 12, nr 10 (17.10.2021): 425. http://dx.doi.org/10.3390/info12100425.

Pełny tekst źródła
Streszczenie:
In an Internet of Things (IoT) environment, sensors collect and send data to application servers through IoT gateways. However, these data may be missing values due to networking problems or sensor malfunction, which reduces applications’ reliability. This work proposes a mechanism to predict and impute missing data in IoT gateways to achieve greater autonomy at the network edge. These gateways typically have limited computing resources. Therefore, the missing data imputation methods must be simple and provide good results. Thus, this work presents two regression models based on neural networks to impute missing data in IoT gateways. In addition to the prediction quality, we analyzed both the execution time and the amount of memory used. We validated our models using six years of weather data from Rio de Janeiro, varying the missing data percentages. The results show that the neural network regression models perform better than the other imputation methods analyzed, based on the averages and repetition of previous values, for all missing data percentages. In addition, the neural network models present a short execution time and need less than 140 KiB of memory, which allows them to run on IoT gateways.
Style APA, Harvard, Vancouver, ISO itp.
32

Tatarnikova, Tatyana M., i Pavel Yu Bogdanov. "Metric characteristics of anomalous traffic detection in internet of things". T-Comm 16, nr 1 (2022): 15–21. http://dx.doi.org/10.36724/2072-8735-2022-16-1-15-21.

Pełny tekst źródła
Streszczenie:
The urgent problem of timely detection of abnormal traffic in the Internet of Things networks, which wastes the energy of sensor devices, is discussed. Anomalous traffic means traffic that contains malicious software that implements an attacking effect on the nodes of the Internet of Things. Timely detection of abnormal traffic contributes to the preservation of the service life and, accordingly, the performance of the services provided by the Internet of Things. The subject of this research is the application of metric characteristics to detect abnormal traffic in the Internet of Things networks. The aim of the work is to propose a system of metrics that allow registering signatures of individual sensor devices or patterns of their behavior and assessing the mode of operation of individual network segments. Since the Internet of Things is built on a hierarchical basis - from a wireless sensor network to a global network, the attack detection system covers all levels - from a sensor device to a global cloud. Detection of abnormal traffic both in the wireless sensor network and at the level of wired networks - local and global - is implemented using metrics. A metric is a qualitative or quantitative indicator that reflects one or another characteristic of the functioning of an infocommunication network. Analysis of the sources showed the lack of systematization of metric characteristics for the Internet of Things networks. Research findings include: a description of the elements that make up the IoT ecosystem; layered model of the architecture of the Internet of things; an abnormal traffic detection metrics system containing a wide range of predictive, diagnostic and retrospective metrics. The proposed system of metrics can be used to build intrusion detection systems in IoT networks.
Style APA, Harvard, Vancouver, ISO itp.
33

Susanto, Fredy, Ni Komang Prasiani i Putu Darmawan. "IMPLEMENTASI INTERNET OF THINGS DALAM KEHIDUPAN SEHARI-HARI". Jurnal Imagine 2, nr 1 (21.04.2022): 35–40. http://dx.doi.org/10.35886/imagine.v2i1.329.

Pełny tekst źródła
Streszczenie:
ABSTRACT Internet of Things or abbreviated as IoT is a technology that innovates surrounding objects with the internet so that daily activities become easier and more efficient. The Internet of Things is a technology that allows objects around us to be connected to the Internet. The importance of the Internet of Things can be seen with the increasing number of applications in various lines of life today. IoT gives us many ideas to participate in various aspects of development ranging from micro to macro around the world. The internet of things has made it a separate field of research since the development of internet technology (IT) and other communication media. The methodology used in the development of IoT is of various kinds. From the real time system to the use of the prototype flow. The more human needs about technology are developing, the more research will be present, the internet of things is one of the thoughts of researchers who optimize several tools such as sensor media, Radio Frequency Identification (RFID), Wireless Sensor Networks and other Smart Objects that allow humans easy to interact with all equipment connected to the internet network. Keywords: IoT, RFID, Wireless Sensor Network, Smart Object ABSTRAK Internet of Things atau disingkat dengan istilah IoT merupakan teknologi yang menginovasi benda-benda sekitar dengan internet agar aktivitas sehari-hari menjadi lebih mudah dan efisien. Internet of Things adalah teknologi yang memungkinkan benda-benda di sekitar kita terhubung dengan Internet. Pentingnya Internet of Things dapat dilihat dengan semakin banyaknya diterapkan dalam berbagai lini kehidupan saat ini. IoT memberikan kita banyak gagasan untuk turut berperan serta dalam berbagai segi perkembangan mulai dari hal mikro hingga makro di seluruh dunia. Internet of things menjadikannya sebuah bidang penelitian tersendiri sejak berkembangnya teknologi internet (IT) dan media komunikasi lain. Metodology yang yang digunakan dalam pengembangan IoT ini adalah berbagai macam. Dari yang real time system hingga penggunaan alur prototype. Semakin berkembang keperluan manusia tentang teknologi, maka semakin banyak penelitian yang akan hadir, internet of things adalah salah satu hasil pemikiran para peneliti yang mengoptimasi beberapa alat seperti media sensor, Radio Frequency Identification (RFID), Wireless Sensor Network serta Smart Object lain yang memungkinkan manusia mudah berinteraksi dengan semua peralatan yang terhubung dengan jaringan internet. Kata kunci : IoT, RFID, Wireless Sensor Network, Smart Object
Style APA, Harvard, Vancouver, ISO itp.
34

Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam A. Khan, Muhammad Waseem Akhtar, Asad Waqar Malik, Arslan Munir, Jawad Ahmad i Balawal Shabir. "Evolution towards Smart and Software-Defined Internet of Things". AI 3, nr 1 (21.02.2022): 100–123. http://dx.doi.org/10.3390/ai3010007.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened up new and vast domains for connecting not only people, but also all kinds of simple objects and phenomena all around us. With billions of heterogeneous devices connected to the Internet, the network architecture must evolve to accommodate the expected increase in data generation while also improving the security and efficiency of connectivity. Traditional IoT architectures are primitive and incapable of extending functionality and productivity to the IoT infrastructure’s desired levels. Software-Defined Networking (SDN) and virtualization are two promising technologies for cost-effectively handling the scale and versatility required for IoT. In this paper, we discussed traditional IoT networks and the need for SDN and Network Function Virtualization (NFV), followed by an analysis of SDN and NFV solutions for implementing IoT in various ways.
Style APA, Harvard, Vancouver, ISO itp.
35

Bediya, Arun Kumar, i Rajendra Kumar. "A Novel Intrusion Detection System for Internet of Things Network Security". Journal of Information Technology Research 14, nr 3 (lipiec 2021): 20–37. http://dx.doi.org/10.4018/jitr.2021070102.

Pełny tekst źródła
Streszczenie:
Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at IoT networks and distributed denial of service (DDoS) attack is one of the most dangerous among them. Blockchain technology can be utilized to develop a framework to protect IoT systems; blockchain is a new technology used for cryptocurrency transactions. This paper proposed BIoTIDS an intrusion detection system for the IoT network using blockchain. BIoTIDS is able to detect an intruder in the IoT network and also able to identify DDoS attacks in IoT networks.
Style APA, Harvard, Vancouver, ISO itp.
36

Andersson, Per, i Lars-Gunnar Mattsson. "Service innovations enabled by the “internet of things”". IMP Journal 9, nr 1 (13.04.2015): 85–106. http://dx.doi.org/10.1108/imp-01-2015-0002.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to develop a new conceptual framework that reflects network dynamics in Internet of Things (IoT)-enabled service innovation processes. Design/methodology/approach – Based on literature on service innovations, business networks and IoT, dynamic concepts are selected. Aided by information about an evolving case “The connected vehicle”, propositions about interaction between the variables in the framework are formulated. Findings – A conceptual framework consisting of four interacting variables: overlapping, intermediating, objectification of actors and business modelling is developed, linking several streams of research. Propositions are motivated and issues for further research questions formulated. Research limitations/implications – The framework may stimulate further research on IoT-enabled service innovations. Practical implications – Understanding network dynamics for developing and implementing business models for service innovations. Originality/value – The conceptual framework provides an original contribution to understanding IoT-enabled service innovations.
Style APA, Harvard, Vancouver, ISO itp.
37

Vaishnavi, D., Shawon Rahman i D. Ramalingam. "Towards Cloud of Things from Internet of Things". International Journal of Engineering & Technology 7, nr 4.6 (25.09.2018): 112. http://dx.doi.org/10.14419/ijet.v7i4.6.20443.

Pełny tekst źródła
Streszczenie:
The techniques Internet of things (IoT) and Cloud Computing (CC) are becoming a part of our day-to-day life; where IoT connects a billion numbers of devices to share the information by communicating each other and CC grants convenient, on-demand scalable network access in order to utilize the computing resources and it facilitates dynamic data integration from diverse sources. Both techniques are having their own pros and cons. So, a novel paradigm called cloud of things (CoT) is modeled by integrating the both CC and IoT, which enables a large number of applications to get advantages of IoT as well as CC. This paper delivers the basics of the technologies, motivations to model the cloud of things and its benefits. Also, it discusses the implementation challenges.
Style APA, Harvard, Vancouver, ISO itp.
38

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics". Advances in Multidisciplinary and scientific Research Journal Publication 1, nr 1 (20.07.2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious activity, emerge as a top priority in the effective deployment of IoT networks. Key words: Information Security, IoT, Privacy Preserving, Cyber Security, Cyber Criminals
Style APA, Harvard, Vancouver, ISO itp.
39

Singh, Jaydeep. "Internet of Things with Smart Contract". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 4505–9. http://dx.doi.org/10.22214/ijraset.2022.43446.

Pełny tekst źródła
Streszczenie:
Abstract- Smart contract is an automatic contract with the agreement between two parties, written into few lines of code. Agreements contained live across a distributed, decentralized blockchain network. Code controls the execution and transactions that are tractable and not changed [1]. This are the digital contract stored in block chain and executes automatically when condition meets [1]. IOT is network of physical devices that embedded with different sensors, software for exchanging data over internet [2].this are having advantages in all sectors including medical science, home automation, security etc. [2]. Future is IOT and smart contract technology is bright in near future as all IOT has lot of applications with use of smart contract technology to maintain integrity of data [2]. Keywords – Smart Contract, IOT, blockchain
Style APA, Harvard, Vancouver, ISO itp.
40

Dong, Yu, i Jun Hua Guo. "Research on Malicious Security Issues of Internet of Things for Mobile Internet". Applied Mechanics and Materials 687-691 (listopad 2014): 1888–91. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1888.

Pełny tekst źródła
Streszczenie:
As a new generation network model, Internet of Things (IOT) is the integration and expansion of traditional network and technology. Traditional network security and technical security problems still exist in the system of IOT, but it also add more private information and involve a number of confidential information. Security management, security and other information security issues has been put forward higher requirements. This paper gives simple description for the concept of things, the architecture and core technology and summarily describes the response to network security networking security technology.
Style APA, Harvard, Vancouver, ISO itp.
41

Casado-Vara, Roberto, Zita Vale, Javier Prieto i Juan Corchado. "Fault-Tolerant Temperature Control Algorithm for IoT Networks in Smart Buildings". Energies 11, nr 12 (7.12.2018): 3430. http://dx.doi.org/10.3390/en11123430.

Pełny tekst źródła
Streszczenie:
The monitoring of the Internet of things networks depends to a great extent on the availability and correct functioning of all the network nodes that collect data. This network nodes all of which must correctly satisfy their purpose to ensure the efficiency and high quality of monitoring and control of the internet of things networks. This paper focuses on the problem of fault-tolerant maintenance of a networked environment in the domain of the internet of things. Based on continuous-time Markov chains, together with a cooperative control algorithm, a novel feedback model-based predictive hybrid control algorithm is proposed to improve the maintenance and reliability of the internet of things network. Virtual sensors are substituted for the sensors that the algorithm predicts will not function properly in future time intervals; this allows for maintaining reliable monitoring and control of the internet of things network. In this way, the internet of things network improves its robustness since our fault tolerant control algorithm finds the malfunction nodes that are collecting incorrect data and self-correct this issue replacing malfunctioning sensors with new ones. In addition, the proposed model is capable of optimising sensor positioning. As a result, data collection from the environment can be kept stable. The developed continuous-time control model is applied to guarantee reliable monitoring and control of temperature in a smart supermarket. Finally, the efficiency of the presented approach is verified with the results obtained in the conducted case study.
Style APA, Harvard, Vancouver, ISO itp.
42

Park, Sang-Hyun, Seungryong Cho i Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things". Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.

Pełny tekst źródła
Streszczenie:
In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneously using the residual energy of each node and ETX metric in the context of the typical AODV protocol. In the simulations, we verify that the proposed algorithm has longer network lifetime and consumes the residual energy of each node more evenly when compared with the typical AODV protocol.
Style APA, Harvard, Vancouver, ISO itp.
43

Alam, Tanweer. "Internet of things: review, architecture and applications". Computer Science and Information Technologies 3, nr 1 (1.03.2022): 31–38. http://dx.doi.org/10.11591/csit.v3i1.p31-38.

Pełny tekst źródła
Streszczenie:
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Style APA, Harvard, Vancouver, ISO itp.
44

Tanweer Alam. "Internet of things: review, architecture and applications". Computer Science and Information Technologies 3, nr 1 (1.03.2022): 31–38. http://dx.doi.org/10.11591/csit.v3i1.pp31-38.

Pełny tekst źródła
Streszczenie:
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Style APA, Harvard, Vancouver, ISO itp.
45

Asif, Anisur Rahman, Fatema Zahra i Mohammad Abdul Matin. "Cognitive solution for IoT communication technologies – emphasis on 5G". Journal of Electrical Engineering 71, nr 2 (1.04.2020): 131–37. http://dx.doi.org/10.2478/jee-2020-0020.

Pełny tekst źródła
Streszczenie:
AbstractThe 5G cellular network technology, in collaboration with Internet of Things (IoT), is envisaged to connect the world together through a flawless Internet connection between devices and sensors. The things in IoT term can be of any smart devices or Internet-enabled sensors that can share information in order to perform a task collectively or individually. On the other hand, Cognitive Internet of Things plays a vital role in utilizing available spectrum for 5G networks. Addition of cognitive feature to the things can allow decision making capability, thereby reducing the overall traffic congestion and improving the efficiency of the whole IoT system. Therefore, it is of great concern to develop an intelligent network to address a few challenges such as heterogeneity and volume of devices in 5G. The aim of this article is to provide a critical review of existing IoT communication Technologies and highlight several challenges and their potential solutions associated with Cognitive IoT based 5G networks.
Style APA, Harvard, Vancouver, ISO itp.
46

Fichera, Luca, Giovanni Li-Destri i Nunzio Tuccitto. "Fluorescent nanoparticle-based Internet of things". Nanoscale 12, nr 17 (2020): 9817–23. http://dx.doi.org/10.1039/d0nr01365j.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Mishra, Shailendra. "SDN-Based Secure Architecture for IoT". International Journal of Knowledge and Systems Science 11, nr 4 (październik 2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.

Pełny tekst źródła
Streszczenie:
Internet of things (IoT) means connecting things through the internet. The growing market for IoT also attracts malicious individuals trying to gain access to the marketplace. Security issues are among the most significant worries in companies that rely on the cloud of things to do business. SDN-based architecture has improved the security of IoT networks. The centralized controller is responsible for managing the critical network's operations, and growing the network size increases the network load in the controller. Controllers in SDN-based architecture are still facing security challenges such as unauthorized access, configuration issues, distributed denial of service (DDoS) attacks, and a man-in-the-middle (MITM) attacks. The attack scenario and security of SDN-based IoT networks are evaluated in this research. The simulation results show that the proposed approach and security solutions are fast and effective in mitigating the attacks.
Style APA, Harvard, Vancouver, ISO itp.
48

Hammoudeh, Mohammad, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes, Bamidele Adebisi i Ahcene Bounceur. "Network Traffic Analysis for Threat Detection in the Internet of Things". IEEE Internet of Things Magazine 3, nr 4 (grudzień 2020): 40–45. http://dx.doi.org/10.1109/iotm.0001.2000015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Park, Jong. "Advances in Future Internet and the Industrial Internet of Things". Symmetry 11, nr 2 (16.02.2019): 244. http://dx.doi.org/10.3390/sym11020244.

Pełny tekst źródła
Streszczenie:
After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security.
Style APA, Harvard, Vancouver, ISO itp.
50

Khudoyberdiev, Jin i Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS". Electronics 8, nr 4 (17.04.2019): 442. http://dx.doi.org/10.3390/electronics8040442.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor services based on Domain Name System (DNS) in the Open Connectivity Foundation (OCF) environment. We have used the Internet of Things Platform and DNS server for IoT Resource auto-registration and discovery in the Internet Protocol version 4 (IPv4). An existing system called Domain Name Auto-Registration in Internet Protocol version 6 can be used for Internet of Things devices for auto-registration and resource discovery. However, this system is not acceptable in the existing internet networks, because the highest percentage of the networks on the Internet are configured in Internet Protocol version 4. Through the proposed auto-registration system, clients can be able to discover the resources and access the services in the OCF network. Constrained Application Protocol (CoAP) is utilized for the IoT device auto-registration and accessing the services in the OCF network.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii