Academic literature on the topic 'IoT Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IoT Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IoT Protocol"

1

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
2

Denny, Kurniawan, Ashar Muhammad, and Ar Rosyid Harits. "10.11591/ijece.v13i3.pp2827-2836." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827–36. https://doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
3

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment su
APA, Harvard, Vancouver, ISO, and other styles
4

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
APA, Harvard, Vancouver, ISO, and other styles
5

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements a
APA, Harvard, Vancouver, ISO, and other styles
6

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access
APA, Harvard, Vancouver, ISO, and other styles
7

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT con
APA, Harvard, Vancouver, ISO, and other styles
8

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for devi
APA, Harvard, Vancouver, ISO, and other styles
9

Wytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (2021): 6904. http://dx.doi.org/10.3390/s21206904.

Full text
Abstract:
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an
APA, Harvard, Vancouver, ISO, and other styles
10

Son, Heesuk, and Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3430501.

Full text
Abstract:
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IoT Protocol"

1

Karim, Hawkar. "IoT Networking Using MPTCP Protocol." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.

Full text
Abstract:
The progress of technology is moving in a rapid pace forward, with new solutions and improvements being developed each year. Internet of Things (IoT) is one area of computer science that seen a growing interest from the population leading to more deployments of the technology. IoT devices often operate in low-power lossy networks making them depend upon low energy consumption but also high reliability. As the devices become more mobile this also exposes several challenges, one being connectivity in regard to mobility. Our proposed solution to this problem use Multipath Transmission Control Pro
APA, Harvard, Vancouver, ISO, and other styles
2

Pettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.

Full text
Abstract:
Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. Området växer så pass fort att det förväntas vara 24 miljarder anslutna enheter vid år 2050, denna utökning leder i sin tur till ett ökat behov av förståelse för IoT protokollen som hanterar kommunikationen emellan enheterna. Detta för att kunna välja det mest optimala protokollet för ett givet sc
APA, Harvard, Vancouver, ISO, and other styles
3

Bassi, Lorenzo. "Orchestration of a MEC-based multi-protocol IoT environment." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.

Full text
Abstract:
Nowadays we are witnessing to a continuous increasing of the number of IoT devices that must be configured and supported by modern networks. Considering an industrial environment, there is a huge number of these devices that need to coexist at the same time. Each one of them is using its own communication/transport protocol, and a huge effort needs to be done during the setup of the system. In addition, there are also different kind of architectures that can be used. That’s why the network setup is not so easy in this kind of heterogeneous environment. The answer to all these problems can be
APA, Harvard, Vancouver, ISO, and other styles
4

Fakhraddin, Haider. "Toward IoT : Implementation of WSN based MQTT Data Protocol." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.

Full text
Abstract:
Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used a
APA, Harvard, Vancouver, ISO, and other styles
5

Shahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Full text
Abstract:
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these t
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Douglas Simões. "Formal verification and access control approach of an IoT protocol." reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2017.<br>Made available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017<br>Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo vo
APA, Harvard, Vancouver, ISO, and other styles
7

van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Full text
Abstract:
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissi
APA, Harvard, Vancouver, ISO, and other styles
8

Ferrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.

Full text
Abstract:
The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. The integration of Wireless Sensor Networks in the Internet of Things creates new obstacles due to the necessity of finding a balance between the resources utilization and the applied security solutions. In multicast
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.

Full text
Abstract:
Les systèmes distribués sont composés de nombreux sous-systèmes distants les uns des autres. Afin de réaliser une même tâche, les sous-systèmes communiquent à la fois avec l’environnement par des messages externes et avec d’autres sous-systèmes par des messages internes, via un réseau de communication. En pratique, les systèmes distribués mettent en jeu plusieurs types d’erreurs, propres aux sous-systèmes les constituant, ou en lien avec les communications internes. Afin de s’assurer de leur bon fonctionnement, savoir tester de tels systèmes est essentiel. Cependant, il est très compliqué de l
APA, Harvard, Vancouver, ISO, and other styles
10

Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Full text
Abstract:
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combine
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IoT Protocol"

1

Gamper, Nikita. Ion channels: Methods and protocols. Humana Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Stockand James, and Shapiro Mark S, eds. Ion channels: Methods and protocols. Humana Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

N, Lopatin Anatoli, and Nichols Colin G, eds. Ion channel localization methods and protocols. Humana Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1971-, Yan Qing, ed. Membrane transporters: Methods and protocols. Humana Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Held, Gilbert. Cisco IOS IP field guide. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Held, Gilbert. Cisco IOS IP: Field guide. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Brown Ian, ed. Cisco IOS cookbook. 2nd ed. O'Reilly, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wijers, Jean Paul, Isabel Amaral, William Hanson, Bengt-Arne Hulleman, and Diana Mather. Protocol to Manage Relationships Today. Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463724159.

Full text
Abstract:
Protocol to Manage Relationships Today explains the contemporary value of protocol, not only for monarchies or diplomatic institutes, but for any non-profit or for-profit organisation. This book presents modern protocol as a tool to build strong, authentic networks of reciprocal relationships. When used effectively protocol can: - Increase the effect of the networking activities of an organisation. Protocol gives a professional structure to relationship management, to achieve access to the 'right' networks and a reciprocal relationship with the most valued stakeholders. - Deepen relationships.
APA, Harvard, Vancouver, ISO, and other styles
9

Leinwand, Allan. Cisco router configuration. Cisco Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Leinwand, Allan. Cisco router configuration. 2nd ed. Cisco, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IoT Protocol"

1

Sasikaladevi, N., K. Geetha, S. Aarthi, and C. Mala. "Smart Card Based Privacy-Preserving Lightweight Authentication Protocol." In Cloud IoT. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerjee, Bannishikha, and Geetali Saha. "Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices." In Cloud IoT. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99516-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things From Hype to Reality. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44860-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jang, Dae-il, Taeeun Kim, and HwanKuk Kim. "A Design of IoT Protocol Fuzzer." In Lecture Notes in Electrical Engineering. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5041-1_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guillén, Edward, Jeisson Sánchez, and Leonardo Ramírez López. "IoT Protocol Model on Healthcare Monitoring." In VII Latin American Congress on Biomedical Engineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th -28th, 2016. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4086-3_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rayes, Ammar, and Samer Salam. "IoT Protocol Stack: A Layered View." In Internet of Things from Hype to Reality. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90158-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Muzaffar, Shahzad, and Ibrahim Abe M. Elfadel. "Automatic Protocol Configuration." In Secure, Low-Power IoT Communication Using Edge-Coded Signaling. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95914-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sasikaladevi, N., K. Geetha, S. Aarthi, and C. Mala. "Energy-Efficient Privacy-Preserving Vehicle Registration (ENTRANCE) Protocol for V2X Communication in VANET." In Cloud IoT. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anjali, Yeole, and D. R. Kalbande. "MAC-Based Group Management Protocol for IoT [MAC GMP-IoT]." In Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8339-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IoT Protocol"

1

Mishra, Suneeta, Vidushi Sharma, and Vimlesh Kr. "RPL Protocol Performance Analysis Across Multiple IoT Topologies." In 2025 International Conference on Cognitive Computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI). IEEE, 2025. https://doi.org/10.1109/ic3ecsbhi63591.2025.10990999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huai, Zhensong, Yingbo Li, Xiaolong Yan, He Wu, and Jing Liu. "CGKDP: Concurrent Group Key Distribution Protocol." In 2023 11th International Conference on Information Technology: IoT and Smart City (ITIoTSC). IEEE, 2023. http://dx.doi.org/10.1109/itiotsc60379.2023.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saito, Kenta, and Hiroaki Nishi. "Application Protocol Conversion Corresponding to Various IoT Protocols." In IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2020. http://dx.doi.org/10.1109/iecon43393.2020.9255101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Unwala, Ishaq, Zafar Taqvi, and Jiang Lu. "Thread: An IoT Protocol." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cazac, Marin. "AAA protocol in IoT." In 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/nwc.03.

Full text
Abstract:
This document is representing not only the description of AAA protocol. It is representing real production problems which I encountered in many years of work with it. Each from this problem was taken separately. It was analyzed and the best solution was applied to it. Article is containing not only analyzing of the problem. In this document the solution described was developed and tested in time on different networks starting with few hundred devices and finishing with tens of thousands of them. On production, solution applied worked for years. Based on this point, I can conclude that problems
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Chia-Wei, Fuchun Joseph Lin, Chia-Hong Wang, and Norman Chang. "OneM2M-based IoT protocol integration." In 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017. http://dx.doi.org/10.1109/cscn.2017.8088630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lucena, Mateus, Roberto Milton Scheffel, and Antonio Augusto Frohlich. "IoT Gateway Integrity Checking Protocol." In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, and Pascale Minet. "A lightweight IoT security protocol." In 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Zhiyan, Bao Xi, and Yongfeng Yuan. "Analysis on IOT communication protocol." In 2012 International Conference on Information and Automation (ICIA). IEEE, 2012. http://dx.doi.org/10.1109/icinfa.2012.6246795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gvozdenovic, Stefan, Johannes K. Becker, John Mikulskis, and David Starobinski. "Multi-Protocol IoT Network Reconnaissance." In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IoT Protocol"

1

Ravindran, Vijay, and Chockalingam Vannila. An Energy-efficient Clustering Protocol for IoT Wireless Sensor Networks Based on Cluster Supervisor Management. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, 2021. http://dx.doi.org/10.7546/crabs.2021.12.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Niles, Kendall, Jason Ray, Kenneth Niles, Andrew Maxwell, and Anton Netchaev. Monitoring for analytes through LoRa and LoRaWAN technology. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/49457.

Full text
Abstract:
The purpose of this research is to investigate the use of a communication network utilizing Long Range (LoRa) low-power wide-area network protocol for the telemetry of detected target chemicals. The sensor platform under development allows traditional electrochemical techniques to be executed with a low Size, Weight, and Power (low SWaP) system that is deployable using an autonomous or remote-controlled vehicle. Once in the field, the sensors communicate target chemical concentrations to a centralized gateway through LoRa to an Internet of Things (IoT) network. Researchers are currently deploy
APA, Harvard, Vancouver, ISO, and other styles
3

Rojas Sánchez, Laura. IDB's Environmental and Social Grievance Protocol 2022: Annual Report. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0004983.

Full text
Abstract:
In addition to the project-led grievance mechanisms and the independent accountability office, MICI, the IDB also provides a channel for stakeholders to contact the institution directly when interested in filing a complaint about the environmental or social performance of IDB-financed projects. An IDB Environmental and Social Grievance Protocol has been set up since November 2021 to guide project teams to respond to claimants and address the issues raised effectively. The 2022 Annual Report of the IDB's Environmental and Social Grievance Protocol provides an overview of the environmental or so
APA, Harvard, Vancouver, ISO, and other styles
4

Burdett, D. Internet Open Trading Protocol - IOTP Version 1.0. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eastlake, D., and C. Smith. Internet Open Trading Protocol (IOTP) HTTP Supplement. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Eastlake, D. Internet Open Trading Protocol (IOTP) Version 1, Errata. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

de Klerk, Kyle. Energising Africa's Digital Economy: Cross-Border Data Flows and the African Continental FTA. Commonwealth Secretariat, 2023. https://doi.org/10.14217/comsec.1118.

Full text
Abstract:
The African Continental Free Trade Area (AfCFTA) is the largest free trade agreement in the world by number of members and geographical area covered. It spans 54 African countries, 2 with a combined gross domestic product (GDP) of US$3.5 trillion and 1 billion consumers. Although initial trading under the agreement officially commenced in 2021, there are still ongoing negotiations on several outstanding protocols. This issue of Trade Hot Topics provides an overviewof the ongoing debate regarding cross-border data flows and their restriction. It examines this debate in light of Africa’s digital
APA, Harvard, Vancouver, ISO, and other styles
8

Pstuty, Norbert, Mark Duffy, Dennis Skidds, et al. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, 2022. http://dx.doi.org/10.36967/2293713.

Full text
Abstract:
Following a review of Vital Signs – indicators of ecosystem health – in the coastal parks of the Northeast Coastal and Barrier Network (NCBN), knowledge of shoreline change was ranked as the top variable for monitoring. Shoreline change is a basic element in the management of any coastal system because it contributes to the understanding of the functioning of the natural resources and to the administration of the cultural resources within the parks. Collection of information on the vectors of change relies on the establishment of a rigorous system of protocols to monitor elements of the coasta
APA, Harvard, Vancouver, ISO, and other styles
9

FDG-PET/CT SUV for Response to Cancer Therapy, Clinically Feasible Profile. Chair Nathan Hall and Jeffrey Yap. Radiological Society of North America (RSNA) / Quantitative Imaging Biomarkers Alliance (QIBA), 2023. http://dx.doi.org/10.1148/qiba/20230615.

Full text
Abstract:
This QIBA Profile documents specifications and requirements to provide comparability and consistency for quantitative FDG-PET across scanners in oncology. It can be applied to both clinical trial use as well as individual patient management. This document organizes acquisition, reconstruction and post-processing, analysis and interpretation as steps in a pipeline that transforms data to information to knowledge. The document, developed through the efforts of the QIBA FDG-PET Biomarker Committee, has shared content with the FDG-PET UPICT protocol, as well as additional material focused on the d
APA, Harvard, Vancouver, ISO, and other styles
10

Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.133.

Full text
Abstract:
This rapid review synthesises the literature on how community-based management of acute malnutrition (CMAM) programmes could be adapted in settings of conflict and fragility. It identifies multiple factors affecting the quality and effectiveness of CMAM services including the health system, community engagement and linkages with other programmes, including education, sanitation, and early childhood development. Family MUAC (Mid-Upper Arm Circumference) is a useful tool to increase community participation and detect early cases of moderate acute malnutrition (MAM) and severe acute malnutrition
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!