To see the other types of publications on this topic, follow the link: IoT configuration.

Journal articles on the topic 'IoT configuration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT configuration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fahmi Limas Ptr, Agus, and B. Herawan Hayadi. "IOT Network Automation Implementation in Router Configuration Handling." Jurnal MESIL (Mesin Elektro Sipil) 3, no. 1 (2022): 13–21. http://dx.doi.org/10.53695/jm.v3i1.639.

Full text
Abstract:
Network Automation or network automation in terms is the process of automating the configuration, management, testing, deployment, and operation of physical and virtual devices in a network. Thus, in this study, we will discuss the design of an IoT-based system for handling router configurations. This IoT-based router handling system uses the Python programming language which will be used as a command source on the server as a router configuration control. This system can also remotely use a smartphone so that it can be seen whether the configuration is running or system error. With this IoT-b
APA, Harvard, Vancouver, ISO, and other styles
2

Košťál, Kristián, Pavol Helebrandt, Matej Belluš, Michal Ries, and Ivan Kotuliak. "Management and Monitoring of IoT Devices Using Blockchain." Sensors 19, no. 4 (2019): 856. http://dx.doi.org/10.3390/s19040856.

Full text
Abstract:
Nowadays, we are surrounded by a large number of IoT (Internet of Things) devices and sensors. These devices are designed to make life easier and more comfortable. Blockchain technology, especially its mass application, is becoming a term number one. Adoption of blockchain into enterprise networks still has a few challenges that need to be tackled. Utilizing blockchain can bring increased security and efficiency of network maintenance. The key feature of the blockchain, immutability, brings resistance to unauthorized modifications. The whole history of device configuration changes is stored in
APA, Harvard, Vancouver, ISO, and other styles
3

Nassef, Omar, Toktam Mahmoodi, Foivos Michelinakis, Kashif Mahmood, and Ahmed Elmokashfi. "Optimising Performance for NB-IoT UE Devices through Data Driven Models." Journal of Sensor and Actuator Networks 10, no. 1 (2021): 21. http://dx.doi.org/10.3390/jsan10010021.

Full text
Abstract:
This paper presents a data driven framework for performance optimisation of Narrow-Band IoT user equipment. The proposed framework is an edge micro-service that suggests one-time configurations to user equipment communicating with a base station. Suggested configurations are delivered from a Configuration Advocate, to improve energy consumption, delay, throughput or a combination of those metrics, depending on the user-end device and the application. Reinforcement learning utilising gradient descent and genetic algorithm is adopted synchronously with machine and deep learning algorithms to pre
APA, Harvard, Vancouver, ISO, and other styles
4

Pineda-Rico, Zaira, Pedro Cruz Alcantar, Ulises Pineda-Rico, and Francisco Javier Martinez-Lopez. "Configuration of an IoT microhydraulic power generation system for education." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 44–51. https://doi.org/10.11591/ijeecs.v27.i1.pp44-51.

Full text
Abstract:
Internet of things (IoT) involves the communication of all kinds of things embedded with sensors, electronics, software and people connected to the internet. Knowledge of IoT in the classroom provides an experience for engineering students to explore different career options. Under this scope, an IoT platform on the Arduino UNO and Raspberry Pi 3 development boards was built for academic purposes. The IoT platform was configured to monitor a microhydraulic power generation system used for the study of small-scale hydraulic power production, using a hydraulic head provided by a system of hydrau
APA, Harvard, Vancouver, ISO, and other styles
5

Skirelis, Julius, and Dalius Navakauskas. "Performance Analysis of Edge Computing in IoT." Elektronika ir Elektrotechnika 26, no. 1 (2020): 72–77. http://dx.doi.org/10.5755/j01.eie.26.1.23235.

Full text
Abstract:
Upcoming 5G technology and the demand for near real-time response services raise the need for optimizing current IoT solutions. The aim of this paper is to model and execute the performance analysis of network structures suitable for Edge Computing in IoT. The prior research into different topology and parameter sets have not provided sufficient clarity, on which parameters had a considerable impact on overall system performance; therefore, repetitive simulations were performed to express dispersion of alternating values, as well as determining its confidence intervals. The paper presents Edge
APA, Harvard, Vancouver, ISO, and other styles
6

Ijiga, Owoicho E., Reza Malekian, and Uche A. K. Chude-Okonkwo. "Enabling Emergent Configurations in the Industrial Internet of Things for Oil and Gas Explorations: A Survey." Electronics 9, no. 8 (2020): 1306. http://dx.doi.org/10.3390/electronics9081306.

Full text
Abstract:
Several heterogeneous, intelligent, and distributed devices can be connected to interact with one another over the Internet in what is termed internet of things (IoT). Also, the concept of IoT can be exploited in the industrial environment for enhancing the production of goods and services and for mitigating the risk of disaster occurrences. This application of IoT for enhancing industrial production is known as industrial IoT (IIoT). Emergent configuration (EC) is a technology that can be adopted to enhance the operation and collaboration of IoT connected devices in order to improve the effic
APA, Harvard, Vancouver, ISO, and other styles
7

Baek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (2021): 6280. http://dx.doi.org/10.3390/app11146280.

Full text
Abstract:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Inste
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Ruipeng, Chen Xu, and Mengjun Xie. "Secure Decentralized IoT Service Platform Using Consortium Blockchain." Sensors 22, no. 21 (2022): 8186. http://dx.doi.org/10.3390/s22218186.

Full text
Abstract:
[RZ]In the past decade, blockchain technology has gained popularity in Internet of Things (IoT) systems. A blockchain—as a distributed and immutable ledger secured by strong cryptography algorithms—brings a new perspective to secure IoT systems. [RZ]ManyAlthough many studies have been devoted to integrating blockchain into IoT device management, access control, data integrity, security, and privacy[RZ]. In comparison, the, blockchain-facilitated IoT communication is [RZ]still much less studied. [RZ]Nonetheless, we see the potential of blockchain in decentralizing and securing IoT communication
APA, Harvard, Vancouver, ISO, and other styles
9

Coêlho, Roger William, Elvio João Leonardo, Luciana Andréia Fondazzi Martimiano, and Ronan Assumpção Silva. "A survey of the characteristics of SDN, NFV and information security in IoT and 5G networks." Revista Brasileira de Computação Aplicada 15, no. 3 (2023): 96–105. http://dx.doi.org/10.5335/rbca.v15i3.14645.

Full text
Abstract:
Background, The 5G technology has emerged as a trusted source to meet the increased demand of Internet of Things (IoT) devices, in addition to enabling Internet connectivity at high broadband speeds. Another important feature of 5G is the use of techniques such as Software Defined Networking (SDN) and Network Functions Virtualization (NVF), mechanisms responsible for performing network configurations through software, in addition to massive control and management of devices using the network configuration functions or device virtualization. Results, The concern with information security in the
APA, Harvard, Vancouver, ISO, and other styles
10

Kotama, I. Nyoman Darma, Nobuo Funabiki, Yohanes Yohanie Fridelin Panduman, et al. "Implementation of Sensor Input Setup Assistance Service Using Generative AI for SEMAR IoT Application Server Platform." Information 16, no. 2 (2025): 108. https://doi.org/10.3390/info16020108.

Full text
Abstract:
For rapid deployments of various IoT application systems, we have developed Smart Environmental Monitoring and Analytical in Real-Time (SEMAR) as an integrated server platform. It is equipped with rich functions for collecting, analyzing, and visualizing various data. Unfortunately, the proper configuration of SEMAR with a variety of IoT devices can be complex and challenging for novice users, since it often requires technical expertise. The assistance of Generative AI can be helpful to solve this drawback. In this paper, we present an implementation of a sensor input setup assistance service
APA, Harvard, Vancouver, ISO, and other styles
11

Pineda-Rico, Zaira, Pedro Cruz Alcantar, Ulises Pineda-Rico, and Francisco Javier Martinez-Lopez. "Configuration of an IoT microhydraulic power generation system for education." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 44. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp44-51.

Full text
Abstract:
Internet of things (IoT) involves the communication of all kinds of things embedded with sensors, electronics, software and people connected to the internet. Knowledge of IoT in the classroom provides an experience for engineering students to explore different career options. Under this scope, an IoT platform on the Arduino UNO and Raspberry Pi 3 development boards was built for academic purposes. The IoT platform was configured to monitor a microhydraulic power generation system used for the study of small-scale hydraulic power production, using a hydraulic head provided by a system of hydrau
APA, Harvard, Vancouver, ISO, and other styles
12

Coêlho, Roger William, Ronan Assumpção Silva, Luciana Andréia Fondazzi Martimiano, and Elvio João Leonardo. "IoT and 5G Networks: A Discussion of SDN, NFV and Information Security." Journal of the Brazilian Computer Society 30, no. 1 (2024): 212–27. http://dx.doi.org/10.5753/jbcs.2024.3021.

Full text
Abstract:
Having an infrastructure capable of exchanging data at high speed is an efficient way to drive the evolution and development of new applications and existing services. The 5G technology has emerged as a trusted source to meet the increased demand of Internet of Things (IoT) devices connected to the network, in addition to enabling Internet connectivity at high broadband speeds. Another important feature of 5G is to allow the use of Software Defined Network (SDN) and Network Function Virtualization (NFV), mechanisms responsible for performing network configurations through software, as well as
APA, Harvard, Vancouver, ISO, and other styles
13

Sousa, Patrícia, Luís Magalhães, João Resende, Rolando Martins, and Luís Antunes. "Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE." Sensors 21, no. 17 (2021): 5898. http://dx.doi.org/10.3390/s21175898.

Full text
Abstract:
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication,
APA, Harvard, Vancouver, ISO, and other styles
14

Schiboni, Giovanni, Juan Carlos Suarez, Rui Zhang, and Oliver Amft. "DynDSE: Automated Multi-Objective Design Space Exploration for Context-Adaptive Wearable IoT Edge Devices." Sensors 20, no. 21 (2020): 6104. http://dx.doi.org/10.3390/s20216104.

Full text
Abstract:
We describe a simulation-based Design Space Exploration procedure (DynDSE) for wearable IoT edge devices that retrieve events from streaming sensor data using context-adaptive pattern recognition algorithms. We provide a formal characterisation of the design space, given a set of system functionalities, components and their parameters. An iterative search evaluates configurations according to a set of requirements in simulations with actual sensor data. The inherent trade-offs embedded in conflicting metrics are explored to find an optimal configuration given the application-specific condition
APA, Harvard, Vancouver, ISO, and other styles
15

Luo, Bingqing, Feng Xiang, Zhixin Sun, and Yudong Yao. "BLE Neighbor Discovery Parameter Configuration for IoT Applications." IEEE Access 7 (2019): 54097–105. http://dx.doi.org/10.1109/access.2019.2912493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, F., S. Zhu, H. Lin, N. Xu, and H. Li. "Fast Access Method of IoT Smart Terminal Based On C/S Architecture." Journal of Physics: Conference Series 2476, no. 1 (2023): 012089. http://dx.doi.org/10.1088/1742-6596/2476/1/012089.

Full text
Abstract:
Abstract In order to achieve efficient access and fast access of intelligent terminals, this paper proposes a fast access method for intelligent terminals of the Internet of Things based on C/S architecture. First, a terminal auto configuration program is developed; The automatic configuration program sends application configuration information to the configuration server; Then, the server verifies the identity of the terminal and feeds back the corresponding configuration information. Finally, the automatic configuration program automatically configures the terminal according to the feedback
APA, Harvard, Vancouver, ISO, and other styles
17

Tam, Prohim, Sa Math, and Seokhoon Kim. "Priority-Aware Resource Management for Adaptive Service Function Chaining in Real-Time Intelligent IoT Services." Electronics 11, no. 19 (2022): 2976. http://dx.doi.org/10.3390/electronics11192976.

Full text
Abstract:
The growth of the Internet of Things (IoT) in various mission-critical applications generates service heterogeneity with different priority labels. A set of virtual network function (VNF) orders represents service function chaining (SFC) for a particular service to robustly execute in a network function virtualization (NFV)-enabled environment. In IoT networks, the configuration of adaptive SFC has emerged to ensure optimality and elasticity of resource expenditure. In this paper, priority-aware resource management for adaptive SFC is provided by modeling the configuration of real-time IoT ser
APA, Harvard, Vancouver, ISO, and other styles
18

Judvaitis, Janis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, and Leo Selavo. "A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum." Applied System Innovation 7, no. 6 (2024): 130. https://doi.org/10.3390/asi7060130.

Full text
Abstract:
Developing and managing complex IoT–Edge–Cloud Continuum (IECC) systems are challenging due to the system complexity and diversity. Internet of Things (IoT), Edge, and Cloud components combined with artificial intelligence (AI) in data processing systems must ensure strong security and privacy for data sources. The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. These contributions collectively address the critical challenges inherent in heterogeneous environments such as sc
APA, Harvard, Vancouver, ISO, and other styles
19

Miki, Masato, Toshihiro Yamauchi, and Satoru Kobayashi. "Effectiveness of MAC Systems based on LSM and their Security Policy Configuration for Protecting IoT Devices." Journal of Internet Services and Information Security 14, no. 3 (2024): 293–315. http://dx.doi.org/10.58346/jisis.2024.i3.018.

Full text
Abstract:
The number of attacks exploiting Internet of Things (IoT) devices has been increasing with the emergence of IoT malware targeting IoT devices. The use of IoT devices in a wide variety of situations has resulted in an urgent need to improve the security of the IoT devices themselves. However, the IoT devices themselves have low hardware performance and their operating systems and applications are not frequently updated, leaving many devices vulnerable to IoT malware attacks. Mandatory Access Control (MAC) systems based on Linux Security Modules (LSM), such as SELinux and AppArmor, can mitigate
APA, Harvard, Vancouver, ISO, and other styles
20

Szydłowski, Piotr, and Karol Zaręba. "Implementation of Communication Stack for Battery-Powered NB-IoT Devices." Pomiary Automatyka Robotyka 27, no. 3 (2023): 73–83. http://dx.doi.org/10.14313/par_249/73.

Full text
Abstract:
In this article we present how to implement an efficient communication stack for wireless, battery-powered NB-IoT loggers. Based on the experience gained by designing and developing loggers’ software, we present our analyses performed in order to select the appropriate communication protocols, data serialisation format, configuration of the NB-IoT module and proprietary algorithms developed to optimise the number of transmissions and the amount of data sent. We also present the obtained results together with an analysis of the impact of individual configuration parameters on the devices’ batte
APA, Harvard, Vancouver, ISO, and other styles
21

Celia, Garrido Hidalgo, Olivares Montes Teresa, Javier Ramirez F., and Roda Sánchez Luis. "An end-to-end Internet of Things solution for Reverse Supply Chain Management in Industry 4.0." Computers in Industry 112 (November 1, 2019): 1–13. https://doi.org/10.1016/j.compind.2019.103127.

Full text
Abstract:
The recent increase in the number of products returned from customers to retailers, supported by the adoption of environment-friendly policies, has led to a growing need to manage backward materials and information flows in the supply chain (SC) domain. Although numerous authors are contributing towards circular economy (CE) with end-of-life (EoL) approaches minimizing the negative impact of Waste Electric and Electronic Equipment (WEEE), the information infrastructure behind SC calls for novel approaches based on Information and Communication Technologies (ICT). In fact, this is one of the ma
APA, Harvard, Vancouver, ISO, and other styles
22

Jaskierny, Leszek, and Leszek Kotulski. "A Self-Adapting IoT Network Configuration Supported by Distributed Graph Transformations." Applied Sciences 13, no. 23 (2023): 12718. http://dx.doi.org/10.3390/app132312718.

Full text
Abstract:
The research described in this article aims to propose the creation of a framework that would enable the self-optimization of IoT device networks. The work is based on two foundations: distributed graph transformations and a flexible IoT network supported by the several standards and definitions proposed by The Open Group, such as the definition of microservices architecture (MSA) as well as IoT and semantic interoperability standards, providing a broader context for the research. It introduces the concept of capabilities, both at the individual device and network levels, which are used to des
APA, Harvard, Vancouver, ISO, and other styles
23

Gupta, Prince, Rajeev Sharma, and Sachi Gupta. "Reconfigurable data intensive service for low latency cyber-physical systems and IoT communication." International Journal of Reconfigurable and Embedded Systems (IJRES) 13, no. 3 (2024): 491. http://dx.doi.org/10.11591/ijres.v13.i3.pp491-501.

Full text
Abstract:
<span>The fourth industrial revolution is realized through the many developments in cyber-physical systems (CPS) made possible by the widespread use of the internet of things (IoT). CPS sensor networks must enable mobile and wireless CPSs with their specific flexibility and heterogeneity needs without compromising quality of service (QoS). The research article focuses on reconfigurable data communication hardware for numerous IoT-supporting infrastructures and performance estimation using delay, power, throughput, and packet delivery ratio (PDR) for different IoT node configurations. Tre
APA, Harvard, Vancouver, ISO, and other styles
24

Rákay, Róbert. "SENSOR EXPANSION FOR INDUSTRIAL CONTROLLER BASED ON IOT GATEWAY." Technical Sciences and Technologies, no. 3(29) (2022): 144–50. http://dx.doi.org/10.25140/2411-5363-2022-3(29)-144-150.

Full text
Abstract:
Based on the current trends of industrial applications and internet of things, a distributed system solution is proposed. The work presents a description of used communication methods, connected devices, the support software and the necessary configuration. Low-cost IoT-based sensor augmentation can be used to keep older machines and companies competitive when new equipment is not available for purchase. The main sensor functions of an older industrial controller can be extended by the data, which is measured on the microcontrollers. This is demonstrated on the example of a system solution wit
APA, Harvard, Vancouver, ISO, and other styles
25

El Hassan, Adil Abou, Abdelmalek El Mehdi, and Mohammed Saber. "NB-IoT and LTE-M towards massive MTC: Complete performance evaluation for 5G mMTC." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 308. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp308-320.

Full text
Abstract:
Since the emerging 5G wireless network is expected to significantly revolutionize thefield of communication, its standardization and design should regard the internet ofthings (IoT) among the main orientations. Also, emerging IoT applications introducenew requirements other than throughput to support massive machine-type commu-nication (mMTC) where small data packets are occasionally sent. Therefore, moreimportance is attached to coverage, latency, power consumption, and connection den-sity. For this purpose, the third generation partnership project (3GPP) has introducedtwo novel cellular IoT
APA, Harvard, Vancouver, ISO, and other styles
26

Hassan, Adil Abou El, Abdelmalek El Mehdi, and Mohammed Saber. "NB-IoT and LTE-M towards massive MTC: Complete performance evaluation for 5G mMTC." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 308–20. https://doi.org/10.11591/ijeecs.v23.i1.pp308-320.

Full text
Abstract:
Since the emerging 5G wireless network is expected to significantly revolutionize the field of communication, its standardization and design should regard the internet of things (IoT) among the main orientations. Also, emerging IoT applications introduce new requirements other than throughput to support massive machine-type communication (mMTC) where small data packets are occasionally sent. Therefore, more importance is attached to coverage, latency, power consumption, and connection density. For this purpose, the third generation partnership project (3GPP) has introduced two novel cellular I
APA, Harvard, Vancouver, ISO, and other styles
27

Lee, Jong-Hyouk. "IPv6 Address Configuration for Privacy Protection in the IoT." Journal of Security Engineering 12, no. 3 (2015): 239–46. http://dx.doi.org/10.14257/jse.2015.06.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hankaniemi, Mikko. "Staying Connected." Industrial Vehicle Technology International 29, no. 2 (2021): 53. http://dx.doi.org/10.12968/s1471-115x(23)70195-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Agiwal, Mamta, Mukesh Kumar Maheshwari, and Hu Jin. "Power Efficient Random Access for Massive NB-IoT Connectivity." Sensors 19, no. 22 (2019): 4944. http://dx.doi.org/10.3390/s19224944.

Full text
Abstract:
Sensors enabled Internet of things (IoT) has become an integral part of the modern, digital and connected ecosystem. Narrowband IoT (NB-IoT) technology is one of its economical versions preferable when low power and resource limited sensors based applications are considered. One of the major characteristics of NB-IoT technology is its offer of reliable coverage enhancement (CE) which is achieved by repeating the transmission of signals. This repeated transmission of the same signal challenges power saving in low complexity NB-IoT devices. Additionally, the NB-IoT devices are expected to suffer
APA, Harvard, Vancouver, ISO, and other styles
30

Mishko, Oleksiy, Danylo Matiuk, and Maryna Derkach. "Security of remote iot system management by integrating firewall configuration into tunneled traffic." Scientific journal of the Ternopil national technical university 115, no. 3 (2024): 122–29. http://dx.doi.org/10.33108/visnyk_tntu2024.03.122.

Full text
Abstract:
The issue of increasing the security level of the IoT system is considered in this paper. To provide individual and secure access to the system remotely, firewall data packet filtering rules were integrated into the VPN connection using the WireGuard protocol. Such security mechanism was implemented and tested on the developed smart lighting system, which enables effective control of lighting brightness in real time. The IoT system is based on ESP32 microcontroller and is integrated with Home Assistant platform. Using web server and Docker technology, the system is efficient and flexible to ma
APA, Harvard, Vancouver, ISO, and other styles
31

M, Chandrasekaran, and Rajesh P K. "Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data." Scientific Temper 14, no. 02 (2023): 323–28. http://dx.doi.org/10.58414/scientifictemper.2023.14.2.12.

Full text
Abstract:
The automotive original equipment manufacturers (OEM) current challenge of deriving the optimized cost to customer for the product when the product is configured dynamically. For every OEM the product they sell is bounded by warranty terms, thus the product configuration they offer should be reliable to withstand the warranty period. This paper discusses about the optimization of cost of the power train configuration which is offered to the customer is incorporated with the product cost and the provisional warranty cost. For a target cost the product planner must configure a power train config
APA, Harvard, Vancouver, ISO, and other styles
32

Abdulqadir, H. R., and N. S. Ahmed. "Fog Computing Analysis Based on Internet of Thing: A Review." International Journal of Science and Business 5, no. 3 (2021): 137–47. https://doi.org/10.5281/zenodo.4534437.

Full text
Abstract:
Cloud machine architectures face many drawbacks due to the improved autonomous and distributed IoT configuration. The IoT is closer to the cloud infrastructure. The fog offers IoT data care and storage locally on IoT devices rather than in the cloud. The fog provides quicker responses and better performance in relation to the cloud. The best alternative for IoT to provide powerful and effective resources for many IoT customers may therefore be called Fog Computing. This paper aims at fog computing's state-of-the-art and alignment with IoT in detailing the advantages and challenges of imple
APA, Harvard, Vancouver, ISO, and other styles
33

Panduman, Yohanes Yohanie Fridelin, Nobuo Funabiki, Sho Ito, et al. "An Edge Device Framework in SEMAR IoT Application Server Platform." Information 14, no. 6 (2023): 312. http://dx.doi.org/10.3390/info14060312.

Full text
Abstract:
Nowadays, the Internet of Things (IoT) has become widely used at various places and for various applications. To facilitate this trend, we have developed the IoT application server platform called SEMAR (Smart Environmental Monitoring and Analytical in Real-Time), which offers standard features for collecting, displaying, and analyzing sensor data. An edge device is usually installed to connect sensors with the server, where the interface configuration, the data processing, the communication protocol, and the transmission interval need to be defined by the user. In this paper, we proposed an e
APA, Harvard, Vancouver, ISO, and other styles
34

Ding, Jupeng, Chih-Lin I, Jintao Wang, and Jian Song. "Channel Characteristics of Hybrid Power Line Communication and Visible Light Communication Based on Distinct Optical Beam Configurations for 6G IoT Network." Applied Sciences 14, no. 17 (2024): 7481. http://dx.doi.org/10.3390/app14177481.

Full text
Abstract:
In the envisioned 6G internet of things (IoT), visible light communication (VLC) has emerged as one promising candidate to mitigate the frequency spectrum crisis. However, when working as the access point, VLC has to be connected with the backbone network via other wire communication solutions. Typically, power line communication (PLC) is viewed as an excellent match to VLC, which is capable of providing both a power supply and backbone network connection. Generally, the integration of PLC and VLC is taken into consideration for the above hybrid system for channel characteristics analysis. How
APA, Harvard, Vancouver, ISO, and other styles
35

Ledesma, Oscar, Paula Lamo, Juan A. Fraire, María Ruiz, and Miguel A. Sánchez. "Architectural Framework and Feasibility of Internet of Things-Driven Mars Exploration via Satellite Constellations." Electronics 13, no. 7 (2024): 1289. http://dx.doi.org/10.3390/electronics13071289.

Full text
Abstract:
This study outlines a technical framework for Internet of Things (IoT) communications on Mars, leveraging Long Range (LoRa) technology to connect Martian surface sensors and orbiting satellites. The designed architecture adapts terrestrial satellite constellation models to Martian environments and the specific needs of interplanetary communication with Earth. It incorporates multiple layers, including Martian IoT nodes, satellite linkage, constellation configuration, and Earth communication, emphasizing potential Martian IoT applications. The analysis covers four critical feasibility aspects:
APA, Harvard, Vancouver, ISO, and other styles
36

Wong, Khang-Siang, and Tat-Chee Wan. "Current State of Multicast Routing Protocols for Disruption Tolerant Networks: Survey and Open Issues." Electronics 8, no. 2 (2019): 162. http://dx.doi.org/10.3390/electronics8020162.

Full text
Abstract:
The deployment of Internet of Things (IoT) applications in remote areas, such as environmental sensing areas, requires Disruption Tolerant Networking (DTN) support due to the lack of continuous network connectivity. IoT devices in DTN generate and store data until a network link is available for data transmission. Data mules or ferries are scheduled to travel among intermittent networks to collect data and disseminate configuration updates from control centers to all participating nodes in a reliable manner. The incorporation of efficient, reliable multicast algorithms into DTN helps to overco
APA, Harvard, Vancouver, ISO, and other styles
37

Abdallah, Boubaker, Sabrine Khriji, Rym Chéour, Charbel Lahoud, Klaus Moessner, and Olfa Kanoun. "Improving the Reliability of Long-Range Communication against Interference for Non-Line-of-Sight Conditions in Industrial Internet of Things Applications." Applied Sciences 14, no. 2 (2024): 868. http://dx.doi.org/10.3390/app14020868.

Full text
Abstract:
LoRa technology, renowned for its low-power, long-range capabilities in IoT applications, faces challenges in real-world scenarios, including fading channels, interference, and environmental obstacles. This paper aims to study the reliability of LoRa in Non-Line-of-Sight (NLoS) conditions and in noisy and mobile environments for Industrial IoT (IIoT) applications. Experimental measurements consider factors like vegetation and infrastructure, introducing mobility to replicate NLoS conditions. Utilizing an open-source LoRa Physical Layer (PHY) Software-Defined Radio (SDR) prototype developed wit
APA, Harvard, Vancouver, ISO, and other styles
38

Si-Mohammed, Samir, Thomas Begin, Isabelle Guérin Lassous, and Pascale Vicat-Blanc. "HINTS: A methodology for IoT network technology and configuration decision." Internet of Things 22 (July 2023): 100678. http://dx.doi.org/10.1016/j.iot.2023.100678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ai, Songpu, Antorweep Chakravorty, and Chunming Rong. "Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures." Sensors 19, no. 3 (2019): 721. http://dx.doi.org/10.3390/s19030721.

Full text
Abstract:
The progress of technology on energy and IoT fields has led to an increasingly complicated electric environment in low-voltage local microgrid, along with the extensions of electric vehicle, micro-generation, and local storage. It is required to establish a home energy management system (HEMS) to efficiently integrate and manage household energy micro-generation, consumption and storage, in order to realize decentralized local energy systems at the community level. Domestic power demand prediction is of great importance for establishing HEMS on realizing load balancing as well as other smart e
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Jinfeng, and Haolin Zhou. "Impact of Radial Grounding Model Granularity on Directivity of 433 MHz Monopole Antennas with Flat and Inclined Radials for ISM IoT Applications." Annals of Emerging Technologies in Computing 9, no. 1 (2025): 44–57. https://doi.org/10.33166/aetic.2025.01.003.

Full text
Abstract:
Grounding is a critical factor in the performance of quarter-wave monopole antennas. Previous studies have explored finite, continuous grounding configurations with one- and two-dimensional variations in size for a 433 MHz vertical monopole antenna, identifying optimal geometries that maximize directivity while minimizing material costs and grounding size. However, these findings are not directly applicable to mission-critical environments (e.g., space, airborne, underwater, or ground-based applications) where continuous metallic grounding may be unavailable. This study extends the investigati
APA, Harvard, Vancouver, ISO, and other styles
41

Ganchev, Ivan, and Zhanlin Ji. "The Use of a Modelling & Simulation Tier by the EMULSION IoT Platform." WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL 17 (March 3, 2022): 133–41. http://dx.doi.org/10.37394/23203.2022.17.15.

Full text
Abstract:
This paper presents some design aspects of the EMULSION IoT platform, developed as a typical example of the horizontal IoT platforms. The architectural overview and multi-tiered structure of the platform are described, with special attention being paid to its modelling & simulation tier as a novel architectural element proposed for inclusion in similar IoT platforms. Used to model cyber-physical-social (CPS) objects and IoT services, along with their attributes and temporal/spatial/event characteristics, this tier is also utilized to simulate the actual provision of IoT services in order t
APA, Harvard, Vancouver, ISO, and other styles
42

Garg, Umang, Santosh Kumar, and Aniket Mahanti. "IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets." Future Internet 16, no. 6 (2024): 212. http://dx.doi.org/10.3390/fi16060212.

Full text
Abstract:
The tremendous growth of the Internet of Things (IoT) has gained a lot of attention in the global market. The massive deployment of IoT is also inherent in various security vulnerabilities, which become easy targets for hackers. IoT botnets are one type of critical malware that degrades the performance of the IoT network and is difficult to detect by end-users. Although there are several traditional IoT botnet mitigation techniques such as access control, data encryption, and secured device configuration, these traditional mitigation techniques are difficult to apply due to normal traffic beha
APA, Harvard, Vancouver, ISO, and other styles
43

Hong, Tao, Xiao Yu, Ziwei Liu, Xiaojin Ding, and Gengxin Zhang. "Narrowband Internet of Things via Low Earth Orbit Satellite Networks: An Efficient Coverage Enhancement Mechanism Based on Stochastic Geometry Approach." Sensors 24, no. 6 (2024): 2004. http://dx.doi.org/10.3390/s24062004.

Full text
Abstract:
With the development of IoT technology and 5G massive machine-type communication, the 3GPP standardization body considered as viable the integration of Narrowband Internet of Things (NB-IoT) in low Earth orbit (LEO) satellite-based architectures. However, the presence of the LEO satellite channel comes up with new challenges for the NB-IoT random access procedures and coverage enhancement mechanism. In this paper, an Adaptive Coverage Enhancement (ACE) method is proposed to meet the requirement of random access parameter configurations for diverse applications. Based on stochastic geometry the
APA, Harvard, Vancouver, ISO, and other styles
44

Zolidah, Kasiran, and Napi Rizaki. "Randomize IPv6 Stateless Address Autoconfiguration in None-stable Storage Arduino Devices." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 1 (2018): 254–60. https://doi.org/10.11591/ijeecs.v12.i1.pp254-260.

Full text
Abstract:
The pervasiveness of IoT device requires each device to have a unique address number in order to communicate. Internet Standard specified in RFC4941-Privacy Extension for SLAAC had question raised on the randomness of the IPv6 address generated due to the shortcoming of device random generator algorithm. Improvements to the RFC’s have been proposed and Arduino Uno had been selected as IoT platform since it currently supports IPv6 implementation. An enhancement algorithm was developed. The generated IPv6 address is then tested against ENT Random Test tool for observation and conclusion.
APA, Harvard, Vancouver, ISO, and other styles
45

Mook KANG, Jang, Choel Hee YOON, and Jiho SHIN. "A Study on Development of IoT Software Vulnerability (Using Fake Information) Response System based on Artificial Intelligence." International Journal of Engineering & Technology 7, no. 3.33 (2018): 157. http://dx.doi.org/10.14419/ijet.v7i3.33.18598.

Full text
Abstract:
The use of IoT devices such as wearable digital devices based on mobile devices is increasingly evident. In IoT-based environment, communication protocol of IoT category and lightweight special environment software are used instead of universal network configuration. Due to the operating structure of IoT, preparation of countermeasures to automatically analyze IoT software vulnerabilities based on artificial intelligence should be considered. Because of the rapid growth of IoT equipment and the expectation that there will be a sharp increase in the need to identify facts about vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
46

Sorin R., Sintea. "Smart Plant Energy Control using IoT Technology." Scientific Bulletin of Naval Academy XIX, no. 1 (2018): 509–17. http://dx.doi.org/10.21279/1454-864x-18-i1-075.

Full text
Abstract:
In the new era, the monitoring and control of electricity production and consumption in a factory remain important objectives. Following the emergent Industry 4.0 paradigm, plants and manufacturing companies shift to a new development strategy of automation. We present a solution and the supporting technology to create a factory network infrastructure for monitoring and optimizing the electrical power consumption using Kaa IoT technology for data transfer and infrastructure configuration.
APA, Harvard, Vancouver, ISO, and other styles
47

Altulaihan, Esra, Mohammed Amin Almaiah, and Ahmed Aljughaiman. "Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms." Sensors 24, no. 2 (2024): 713. http://dx.doi.org/10.3390/s24020713.

Full text
Abstract:
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without re
APA, Harvard, Vancouver, ISO, and other styles
48

Lin, Yun-Wei, Yi-Bing Lin, and Tai-Hsiang Yen. "SimTalk: Simulation of IoT Applications." Sensors 20, no. 9 (2020): 2563. http://dx.doi.org/10.3390/s20092563.

Full text
Abstract:
The correct implementation and behavior of Internet of Things (IoT) applications are seldom investigated in the literature. This paper shows how the simulation mechanism can be integrated well into an IoT application development platform for correct implementation and behavior investigation. We use an IoT application development platform called IoTtalk as an example to describe how the simulation mechanism called SimTalk can be built into this IoT platform. We first elaborate on how to implement the simulator for an input IoT device (a sensor). Then we describe how an output IoT device (an act
APA, Harvard, Vancouver, ISO, and other styles
49

Díaz Zayas, Almudena, Francisco Javier Rivas Tocado, and Pilar Rodríguez. "Evolution and Testing of NB-IoT Solutions." Applied Sciences 10, no. 21 (2020): 7903. http://dx.doi.org/10.3390/app10217903.

Full text
Abstract:
NB-IoT is the first 3GPP technology that has been specifically developed for IoT. In this paper, we will introduce the most important NB-IoT features included in Release 14, Release 15, and Release 16 and the need for testing of NB-IoT solutions. This paper is focused on demonstrating the potential of the new experimentation features included into the TRIANGLE testbed to support testing and benchmarking of Narrowband Internet of Thing (NB-IoT) solutions. TRIANGLE provides an experimentation framework that offers a high level of abstraction using a framework that allows for defining and executi
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, Juyeon, and Jae-Hoon Kim. "Trustworthy Transaction Spreading Using Node Reliability Estimation in IoT Blockchain Networks." Applied Sciences 12, no. 17 (2022): 8737. http://dx.doi.org/10.3390/app12178737.

Full text
Abstract:
Blockchain network architecture is a promising technology for constructing highly secure Internet of Things (IoT) networks. IoT networks typically comprise various sensors and actuators. Blockchain network technology can be applied to secure control robots in smart factories or reliable drone deliveries in smart cities. The wide spread of transactions and shared smart contracts across blockchain networks guarantees ultimate network security. A typical wired blockchain network maintains sufficient redundancy within a stable configuration. However, IoT blockchain networks exhibit unavoidable ins
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!