To see the other types of publications on this topic, follow the link: Internet of Things Network (IoTN).

Journal articles on the topic 'Internet of Things Network (IoTN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet of Things Network (IoTN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Itagi, Manjunath, Dankan Gowda V, KDV Prasad, Pullela SVVSR Kumar, Shekhar R, and B. Ashreetha. "Performance Analysis of Energy Efficiency and Security Solutions of Internet of Things Protocols." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 442–50. http://dx.doi.org/10.37391/ijeer.110226.

Full text
Abstract:
The scientific and business communities are showing considerable interest in wireless sensor networks (WSN). The availability of low-cost, small-scale components like CPUs, radios, and sensors, which are often combined into a single chip, is crucial. Parallel to the evolution of WSNs, the concepts of the IoT have been evolving in recent years. Wireless communication technologies may play a significant role in the implementation of IoT, despite the fact that IoT does not need or require any particular technology for communication. WSN assisted IoT networks can drive several applications in many
APA, Harvard, Vancouver, ISO, and other styles
2

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, Internet of Things (IoT) technologies are developing technology with a variety of applications. The Internet of Things (IoTs) is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in Internet of Things (IoT) technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes’ construction with high-speed CPUs and low
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Wang *. Yi bin Hou. "INVESTIGATION ON THE INTERNET OF THINGS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 861–79. https://doi.org/10.5281/zenodo.221118.

Full text
Abstract:
Do IOT problem definition and research. Research on Internet of things, first research object, Re research alliance,Re study network. Objects are things in the Internet of things, Link is how objects connect to the network, Network is what this network is. Objective function is the key problem. Can start with simple and critical questions. Algorithm is the solution to the problem steps. What is the Internet of things, objects connected to the Internet is the Internet of things, cup networking, car networking. Things better than other networks, is composed of what objects, what composition, wha
APA, Harvard, Vancouver, ISO, and other styles
4

Nikhat Akhtar and Yusuf Perwej. "The internet of nano things (IoNT) existing state and future Prospects." GSC Advanced Research and Reviews 5, no. 2 (2020): 131–50. http://dx.doi.org/10.30574/gscarr.2020.5.2.0110.

Full text
Abstract:
The increase of intelligent environments suggests the interconnectivity of applications and the use of the Internet. For this reason, arise what is known as the Internet of Things (IoT). The expansion of the IoT concept gives access to the Internet of Nano Things (IoNT). A new communication networks paradigm based on nano technology and IoT, in other words, a paradigm with the capacity to interconnect nano-scale devices through existing networks. From the interconnection of these nano machines with the Internet emerged the concept of Internet of Nano Things (IoNT). The Internet of Nano-Things
APA, Harvard, Vancouver, ISO, and other styles
5

Nikhat, Akhtar, and Perwej Yusuf. "The internet of nano things (IoNT) existing state and future Prospects." GSC Advanced Research and Reviews 5, no. 2 (2020): 131–50. https://doi.org/10.5281/zenodo.4319652.

Full text
Abstract:
The increase of intelligent environments suggests the interconnectivity of applications and the use of the Internet. For this reason, arise what is known as the Internet of Things (IoT). The expansion of the IoT concept gives access to the Internet of Nano Things (IoNT). A new communication networks paradigm based on nano technology and IoT, in other words, a paradigm with the capacity to interconnect nano-scale devices through existing networks. From the interconnection of these nano machines with the Internet emerged the concept of Internet of Nano Things (IoNT). The Internet of Nano-Things
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Sumit, and Zahid Raza. "Internet of Things." International Journal of Systems and Service-Oriented Engineering 7, no. 3 (2017): 32–52. http://dx.doi.org/10.4018/ijssoe.2017070103.

Full text
Abstract:
Internet of Things (IoT) is a novel approach of connecting things/objects and thus transmitting information between various entities of the physical world or to the control centers where this information can be interpreted. IoT has been poised as the next evolution of internet promising to change our lives by involving a seamless access to people and devices in a ubiquitous way leading to a smart world. These devices, often referred to as smart items or intelligent things can be home appliances, healthcare devices, vehicles, buildings, factories and almost anything networked and fitted with se
APA, Harvard, Vancouver, ISO, and other styles
7

Fadziso, Takudzwa. "Internet of Things in Agriculture for Smart Farming." Malaysian Journal of Medical and Biological Research 5, no. 2 (2018): 147–56. http://dx.doi.org/10.18034/mjmbr.v5i2.565.

Full text
Abstract:
Internet of Things in Agricultural Farming’ deals with the use IoTs in providing farmers the means to do multiple parallel things with wifi connected and increase their productivity in turn increasing their yearly revenue and profits. This will not only help the farmer but the raw materials which come out will be more than what would have yielded if the farmer had done all by themselves. The IoT network comprises systems and a network of web-connected intelligent devices that employ encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The use of
APA, Harvard, Vancouver, ISO, and other styles
8

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer network
APA, Harvard, Vancouver, ISO, and other styles
9

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Full text
Abstract:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identificatio
APA, Harvard, Vancouver, ISO, and other styles
10

K., Thamizhmaran. "Network Privacy Reflection using Internet of Things." Recent Trends in Control and Converter 3, no. 3 (2021): 1–11. https://doi.org/10.5281/zenodo.4477853.

Full text
Abstract:
<em>The current IP and other networks such as Power Smart Grids are fast developing, thus ensuing in diverse connectivity methodologies. This has led to the emergence of &quot;the Internet of Things&rdquo; (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminous generation and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022. The resultant structure will benefit man
APA, Harvard, Vancouver, ISO, and other styles
11

Eltayeb, Mohamed A. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 1 (2017): 1–18. http://dx.doi.org/10.4018/ijhiot.2017010101.

Full text
Abstract:
In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent.
APA, Harvard, Vancouver, ISO, and other styles
12

Maseleno, Andino, Wahidah Hashim, Y. C. Tang Alicia, A. Mahmoud Moamin, and Marini Othman. "A Review on Smart Grid Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2770–75. http://dx.doi.org/10.1166/jctn.2020.8941.

Full text
Abstract:
Smart electrical network or better known as Smart Grid is one form of transformation and technological reform in the electricity industry. Smart Grid is a modern electrical energy network that intelligently integrates power grids with communications devices that support electricity generation and distribution networks to be more attractive, communicative and qualified. Smart Grid is also able to prevent and to isolate the interference quickly and present information on electrical data in real time. While the Internet of Thing (IoT) is a method that aims to maximize the benefits of internet con
APA, Harvard, Vancouver, ISO, and other styles
13

Ioannou, Christiana, and Vasos Vassiliou. "Security Agent Location in the Internet of Things." IEEE Access 7 (July 12, 2019): 95844–56. https://doi.org/10.1109/ACCESS.2019.2928414.

Full text
Abstract:
The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users&#39; privacy. The current work examines the issue of security agent location using indicative intrusion detection techni
APA, Harvard, Vancouver, ISO, and other styles
14

Khan, Shafiullah, Muhammad Muneer Umar, Chunhua Jin, Shaozhang Xiao, Zeeshan Iqbal, and Noha Alnazzawi. "Game-Theory-Based Multimode Routing Protocol for Internet of Things." Electronics 11, no. 24 (2022): 4134. http://dx.doi.org/10.3390/electronics11244134.

Full text
Abstract:
Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes
APA, Harvard, Vancouver, ISO, and other styles
15

Bynagari, Naresh Babu. "Industrial Application of Internet of Things." Asia Pacific Journal of Energy and Environment 3, no. 2 (2016): 75–82. http://dx.doi.org/10.18034/apjee.v3i2.576.

Full text
Abstract:
‘Industrial application of Internet of Things deals with the application of Internet of things to produce industrial services. It analyzed how industries can carry out multiple services with function remotely using IoT-connected devices. The several benefits and drawbacks to the application of IoT services were also investigated. The IoT is a network of connected systems and smart devices that use encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The utilization of IoT for industrial functions will significantly improve industrial output, and
APA, Harvard, Vancouver, ISO, and other styles
16

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246–61. https://doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, internet of things (IoT) technologies are developing technology with a variety of applications. The IoT is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in IoT technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes&rsquo; construction with high-speed CPUs and low-power radio links. The IoTbased WSN
APA, Harvard, Vancouver, ISO, and other styles
17

Sankar, S., Ramasubbareddy Somula, R. Lakshmana Kumar, P. Srinivasan, and M. Amala Jayanthi. "Trust-Aware Routing Framework for Internet of Things." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 48–59. http://dx.doi.org/10.4018/ijkss.2021010104.

Full text
Abstract:
Establishing security in internet of things (IoT) is a critical challenge, as it is connected to the network's extremely resource-constrained devices. The RPL is a standard routing protocol for IoT. It is well-suited for low power and lossy networks (LLN). The RPL provides little security in the IoT network against various attacks. However, one needs to strengthen the security concern in RPL. So, this paper proposes a trust-aware, energy-based reliable routing (TAER-RPL) for IoT to enhance security among network nodes. The TAER-RPL is taken into account the routing metrics, namely trust, ETX,
APA, Harvard, Vancouver, ISO, and other styles
18

Paramonov, Alexander, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy, and Andrey Koucheryavy. "Fractals for Internet of Things Network Structure Planning." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–12. http://dx.doi.org/10.4018/ijisp.305223.

Full text
Abstract:
Wireless communication networks and technologies are witnessed a huge improvement which gain a large number of users. In addition, the choice and using methods of the network are depending on the environment in which it is created. Although the network in each case is unique, many of them share a lot of common. To this end, we propose a new approach for planning the structure of the Internet of Things (IoT) network based on fractals, where fractal figures are utilized to describe the structure of the target environment. Moreover, fractal dimension’s estimation, fraction area occupied by the ta
APA, Harvard, Vancouver, ISO, and other styles
19

Singh, Upendra. "A Review on Securing Wireless Networks against Jamming Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33883.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive
APA, Harvard, Vancouver, ISO, and other styles
20

Mahajan, Yash, and Dr Manish Vyas. "A Review on Security Frameworks for Software Defined Networks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28497.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive
APA, Harvard, Vancouver, ISO, and other styles
21

Soni, Priyanka. "A Review on Securing Wireless Networks against IIRS Proliferation and Jamming Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40846.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive
APA, Harvard, Vancouver, ISO, and other styles
22

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Full text
Abstract:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater
APA, Harvard, Vancouver, ISO, and other styles
23

Akilandeshwari., K., S. Mohanapriya., and Sri. R. Sandhyia. "Internet of Things." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 715–20. https://doi.org/10.5281/zenodo.3842993.

Full text
Abstract:
The Internet of Things IoT is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers UIDs and the ability to transfer data over a network without requiring human to human or human to computer interaction. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the smart home , covering devices and appliances such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances that support one or more common ecosystems, and can b
APA, Harvard, Vancouver, ISO, and other styles
24

Baek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (2021): 6280. http://dx.doi.org/10.3390/app11146280.

Full text
Abstract:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Inste
APA, Harvard, Vancouver, ISO, and other styles
25

M, Dr DuraiPandian. "ENHANCED NETWORK PERFORMANCE AND MOBILITY MANAGEMENT OF IOT MULTI NETWORKS." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (2019): 95–105. http://dx.doi.org/10.36548/jtcsst.2019.2.003.

Full text
Abstract:
The tremendous progress in the internet of things incorporating multitudes of wireless interfaces have ended up with dense deployment of multi-networks that are associated with the internet of things and supported by wireless communications that are heterogeneous. Effective management of the multi-networks with a proper flow scheduling and a mobility management in order to provide a seamless conveyance are a tedious and a challenging task. The incompatibility of the software defined networks to manage with the densely deployed multi networks has increased the necessity for developing a more su
APA, Harvard, Vancouver, ISO, and other styles
26

Hemmati, Mahdi. "Analyzing the Effect of Social Internet of Things on Making the Internet Marketing Smart." Modern Applied Science 10, no. 9 (2016): 213. http://dx.doi.org/10.5539/mas.v10n9p213.

Full text
Abstract:
The development of social internet of things in recent years led to widening the data and information scope. A wide scope of new services caused by this procedure. In this regard, a new pattern called the social internet of things is created by integrating the social network and internet of things (IOT) which shows the network communication of things. IOS can put a step toward the marketing world. In this paper, the effect of IoT on internet marketing and making it smart are taken into consideration by considering marketing in human social network.
APA, Harvard, Vancouver, ISO, and other styles
27

Kaur, Prabhjot, Rupinder Singh, and Rachhpal Singh. "Secured Clustered Internet of Things Wireless Sensor Network." International Journal of Computer Science and Mobile Computing 11, no. 6 (2022): 34–45. http://dx.doi.org/10.47760/ijcsmc.2022.v11i06.003.

Full text
Abstract:
The Internet of Things (IoT) is a swiftly evolving technology that will have a significant impact in the future. The Internet of Things (IoT) is a huge collection of interconnected networks, such as the Wireless Sensor Network (WSN), that make use of fast evolving devices and technologies. The risk of confidentiality of information and protection has increased as a result of the indefinite interconnection of a variety of applied sciences in IoT. WSN employs Low Energy Adaptive Clustering Hierarchy (LEACH) to create an energy-efficacious network that is vulnerable to a wide range of assaults, i
APA, Harvard, Vancouver, ISO, and other styles
28

S., BÎRLEANU. "Software Defined (SDN) Based Internet of Things (IoT) networks." Scientific Bulletin of Naval Academy XXIV, no. 1 (2021): 103–10. http://dx.doi.org/10.21279/1454-864x-21-i1-012.

Full text
Abstract:
The exponential growth of IoT devices connected to the Internet has led to the need to develop a new technology for managing them. The challenges posed by the implementation of IoT networks have emerged in the control and management of IoT applications and networks that become difficult to maintain, the programming of IoT devices. In addition, IoT devices are not designed to allow centralized management and control. Things get even more complicated when the IoT administrator has to manually configure all distributed IoT devices to add each new feature to the network. Software-Defined Networkin
APA, Harvard, Vancouver, ISO, and other styles
29

Javida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Full text
Abstract:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many im
APA, Harvard, Vancouver, ISO, and other styles
30

Sholla, Sahil, Sukhkirandeep Kaur, Gh Rasool Begh, Roohie Naaz Mir, and M. Ahsan Chishti. "Clustering Internet of Things: A Review." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 2 (2017): 21. http://dx.doi.org/10.31130/jst.2017.61.

Full text
Abstract:
Internet of Things is a paradigm shift in networking that seeks to connect virtually all things on the planet. Given the constrained nature of smart devices, energy efficient routing would play a key role in successful deployment of such networks. Clustering algorithms organize nodes of a network into groups or clusters and a specific designated node, cluster head is responsible for its cluster. Clustering algorithms have been particularly suggested in the context of Wireless Sensor Networks (WSN) but their application may also address similar challenges in Internet of Things (IoT). Clustering
APA, Harvard, Vancouver, ISO, and other styles
31

Romario Bhattacharyya, Tamoghno, and Dr M. Pushpalatha. "Routing protocols for internet of things: a survey." International Journal of Engineering & Technology 7, no. 2.4 (2018): 196. http://dx.doi.org/10.14419/ijet.v7i2.4.13038.

Full text
Abstract:
The world of wireless sensor network(WSN) is widening day by day and the latest technology in use the Internet of Things known as IOT is the latest craze in it. But the IOT technique and its devices requires routing protocols in situations like low power and lossy networks(LLNs) which brings great challenges. In many and some emergency cases, like in case of large and more data traffic which causes to lead in network congestions and also brings loss in packets and delay. In order to overcome all this problems , many group research and individuals are trying and focusing on different solutions
APA, Harvard, Vancouver, ISO, and other styles
32

Mahmudova, Shafagat. "Intelligent Systems for the Internet of Things: Essence, Perspectives and Problems." International Journal of Natural Sciences Research 9, no. 1 (2021): 17–25. http://dx.doi.org/10.18488/journal.63.2021.91.17.25.

Full text
Abstract:
This article outlines the Internet of Things (IoT). The Internet of Things describes a network of physical objects, i.e., the “thing” including sensors, software, and other technologies for connection and data sharing with other devices and systems over the Internet. In other words, IoT is a relatively new technology enabling many “smart” devices to get connected, to analyze, process, and transfer data to each other and connect to a network. The article clarifies the essence of intelligent systems for the Internet of Things, and analyzes the most popular software for the IoT platform. It studi
APA, Harvard, Vancouver, ISO, and other styles
33

Algarni, Sumaiah, and Fathi E. Abd El-Samie. "Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things." Future Internet 17, no. 1 (2025): 37. https://doi.org/10.3390/fi17010037.

Full text
Abstract:
The Internet of Things (IoT) represents a rapidly growing field, where billions of intelligent devices are interconnected through the Internet, enabling the seamless sharing of data and resources. These smart devices are typically employed to sense various environmental characteristics, including temperature, motion of objects, and occupancy, and transfer their values to the nearest access points for further analysis. The exponential growth in sensor availability and deployment, powered by recent advances in sensor fabrication, has greatly increased the complexity of IoT network architecture.
APA, Harvard, Vancouver, ISO, and other styles
34

Yaokumah, Winfred, Richard Nunoo Clottey, and Justice Kwame Appati. "Network Intrusion Detection in Internet of Things (IoT)." International Journal of Smart Security Technologies 8, no. 1 (2021): 49–65. http://dx.doi.org/10.4018/ijsst.2021010104.

Full text
Abstract:
The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper offered a systematic review of studies on intrusion detection in IoT, focusing on metrics, methods, datasets, and attack types. This review used 33 network intrusion detection papers in 31 journals and 2 conference proceedings. The results revealed that the majority of the studies used generated or private datasets. Machine learning (ML)-based methods (85%) were used in the studies, while the rest used statistical methods.
APA, Harvard, Vancouver, ISO, and other styles
35

Yadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.

Full text
Abstract:
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is impleme
APA, Harvard, Vancouver, ISO, and other styles
36

Tatarnikova, Tatyana M., and Pavel Yu Bogdanov. "Metric characteristics of anomalous traffic detection in internet of things." T-Comm 16, no. 1 (2022): 15–21. http://dx.doi.org/10.36724/2072-8735-2022-16-1-15-21.

Full text
Abstract:
The urgent problem of timely detection of abnormal traffic in the Internet of Things networks, which wastes the energy of sensor devices, is discussed. Anomalous traffic means traffic that contains malicious software that implements an attacking effect on the nodes of the Internet of Things. Timely detection of abnormal traffic contributes to the preservation of the service life and, accordingly, the performance of the services provided by the Internet of Things. The subject of this research is the application of metric characteristics to detect abnormal traffic in the Internet of Things netwo
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Xia, Bing Yao, Wan Jia Zhang, Xiang En Chen, and Xiao Min Zhang. "Fractal Growing Network Models Related with the Internet of Things." Applied Mechanics and Materials 644-650 (September 2014): 2471–75. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2471.

Full text
Abstract:
We focus on produce network models by constructive operations based on configurations in order to provide various network models for The Internet of Things (IoT) such that these models may be economic and strong in building real networks of IoT.
APA, Harvard, Vancouver, ISO, and other styles
38

Jeyakumar, V. "Future Internet of Things with Software Defined Networking." International Journal of Advance Research and Innovative Ideas in Education 7, no. 2 (2021): 562–71. https://doi.org/10.5281/zenodo.4738436.

Full text
Abstract:
Future Internet of Things (IoT) will hook up with the web billions of heterogeneous smart devices with the capacity of interacting with the environment. Therefore, the proposed solutions from an IoT networking perspective must take under consideration the scalability of IoT nodes also because the operational cost of deploying the networking infrastructure. This will generate an enormous volume of knowledge, which poses an incredible challenge both from the transport, and processing of data point of view. Moreover, security issues appear, thanks to the very fact that untrusted IoT devices are i
APA, Harvard, Vancouver, ISO, and other styles
39

Natarajan, Munusamy. "Future internet: Application of internet of things to libraries." IP Indian Journal of Library Science and Information Technology 7, no. 2 (2022): 68–74. http://dx.doi.org/10.18231/j.ijlsit.2022.013.

Full text
Abstract:
This paper explains the technical perspective of Internet of Things (IoTs) with definitions and the evolution of IoT. The characteristics like interconnectivity, heterogeneity, dynamic change, safety and connectivity are emphasized with IoT architecture. Different layers like the perception layer, network layer, middleware layer, application layer and business layer are explained. Application of IoT in different disciplines like in healthcare, agriculture, transportation is discussed. Emphasized the developments of smart cities with smart homes interconnecting the appliances, smart buildings f
APA, Harvard, Vancouver, ISO, and other styles
40

Susanto, Fredy, Ni Komang Prasiani, and Putu Darmawan. "IMPLEMENTASI INTERNET OF THINGS DALAM KEHIDUPAN SEHARI-HARI." Jurnal Imagine 2, no. 1 (2022): 35–40. http://dx.doi.org/10.35886/imagine.v2i1.329.

Full text
Abstract:
ABSTRACT&#x0D; Internet of Things or abbreviated as IoT is a technology that innovates surrounding objects with the internet so that daily activities become easier and more efficient. The Internet of Things is a technology that allows objects around us to be connected to the Internet. The importance of the Internet of Things can be seen with the increasing number of applications in various lines of life today. IoT gives us many ideas to participate in various aspects of development ranging from micro to macro around the world. The internet of things has made it a separate field of research sin
APA, Harvard, Vancouver, ISO, and other styles
41

França, Cinthya M., Rodrigo S. Couto, and Pedro B. Velloso. "Missing Data Imputation in Internet of Things Gateways." Information 12, no. 10 (2021): 425. http://dx.doi.org/10.3390/info12100425.

Full text
Abstract:
In an Internet of Things (IoT) environment, sensors collect and send data to application servers through IoT gateways. However, these data may be missing values due to networking problems or sensor malfunction, which reduces applications’ reliability. This work proposes a mechanism to predict and impute missing data in IoT gateways to achieve greater autonomy at the network edge. These gateways typically have limited computing resources. Therefore, the missing data imputation methods must be simple and provide good results. Thus, this work presents two regression models based on neural network
APA, Harvard, Vancouver, ISO, and other styles
42

Đekić, Milica. "The Internet of Things security challenges." Tehnika 75, no. 6 (2020): 678–83. http://dx.doi.org/10.5937/tehnika2005678d.

Full text
Abstract:
The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may
APA, Harvard, Vancouver, ISO, and other styles
43

Bediya, Arun Kumar, and Rajendra Kumar. "A Novel Intrusion Detection System for Internet of Things Network Security." Journal of Information Technology Research 14, no. 3 (2021): 20–37. http://dx.doi.org/10.4018/jitr.2021070102.

Full text
Abstract:
Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at I
APA, Harvard, Vancouver, ISO, and other styles
44

Dong, Yu, and Jun Hua Guo. "Research on Malicious Security Issues of Internet of Things for Mobile Internet." Applied Mechanics and Materials 687-691 (November 2014): 1888–91. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1888.

Full text
Abstract:
As a new generation network model, Internet of Things (IOT) is the integration and expansion of traditional network and technology. Traditional network security and technical security problems still exist in the system of IOT, but it also add more private information and involve a number of confidential information. Security management, security and other information security issues has been put forward higher requirements. This paper gives simple description for the concept of things, the architecture and core technology and summarily describes the response to network security networking secu
APA, Harvard, Vancouver, ISO, and other styles
45

Casado-Vara, Roberto, Zita Vale, Javier Prieto, and Juan Corchado. "Fault-Tolerant Temperature Control Algorithm for IoT Networks in Smart Buildings." Energies 11, no. 12 (2018): 3430. http://dx.doi.org/10.3390/en11123430.

Full text
Abstract:
The monitoring of the Internet of things networks depends to a great extent on the availability and correct functioning of all the network nodes that collect data. This network nodes all of which must correctly satisfy their purpose to ensure the efficiency and high quality of monitoring and control of the internet of things networks. This paper focuses on the problem of fault-tolerant maintenance of a networked environment in the domain of the internet of things. Based on continuous-time Markov chains, together with a cooperative control algorithm, a novel feedback model-based predictive hybr
APA, Harvard, Vancouver, ISO, and other styles
46

Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam A. Khan, et al. "Evolution towards Smart and Software-Defined Internet of Things." AI 3, no. 1 (2022): 100–123. http://dx.doi.org/10.3390/ai3010007.

Full text
Abstract:
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened up new and vast domains for connecting not only people, but also all kinds of simple objects and phenomena all around us. With billions of heterogeneous devices connected to the Internet, the network architecture must evolve to accommodate the expected increase in data generation while also improving the security and efficiency of connectivity.
APA, Harvard, Vancouver, ISO, and other styles
47

Andersson, Per, and Lars-Gunnar Mattsson. "Service innovations enabled by the “internet of things”." IMP Journal 9, no. 1 (2015): 85–106. http://dx.doi.org/10.1108/imp-01-2015-0002.

Full text
Abstract:
Purpose – The purpose of this paper is to develop a new conceptual framework that reflects network dynamics in Internet of Things (IoT)-enabled service innovation processes. Design/methodology/approach – Based on literature on service innovations, business networks and IoT, dynamic concepts are selected. Aided by information about an evolving case “The connected vehicle”, propositions about interaction between the variables in the framework are formulated. Findings – A conceptual framework consisting of four interacting variables: overlapping, intermediating, objectification of actors and busi
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Jaydeep. "Internet of Things with Smart Contract." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 4505–9. http://dx.doi.org/10.22214/ijraset.2022.43446.

Full text
Abstract:
Abstract- Smart contract is an automatic contract with the agreement between two parties, written into few lines of code. Agreements contained live across a distributed, decentralized blockchain network. Code controls the execution and transactions that are tractable and not changed [1]. This are the digital contract stored in block chain and executes automatically when condition meets [1]. IOT is network of physical devices that embedded with different sensors, software for exchanging data over internet [2].this are having advantages in all sectors including medical science, home automation,
APA, Harvard, Vancouver, ISO, and other styles
49

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Full text
Abstract:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious act
APA, Harvard, Vancouver, ISO, and other styles
50

Park, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.

Full text
Abstract:
In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneous
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!