To see the other types of publications on this topic, follow the link: Network; Internet of Things.

Journal articles on the topic 'Network; Internet of Things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network; Internet of Things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jin, Wang *. Yi bin Hou. "INVESTIGATION ON THE INTERNET OF THINGS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 861–79. https://doi.org/10.5281/zenodo.221118.

Full text
Abstract:
Do IOT problem definition and research. Research on Internet of things, first research object, Re research alliance,Re study network. Objects are things in the Internet of things, Link is how objects connect to the network, Network is what this network is. Objective function is the key problem. Can start with simple and critical questions. Algorithm is the solution to the problem steps. What is the Internet of things, objects connected to the Internet is the Internet of things, cup networking, car networking. Things better than other networks, is composed of what objects, what composition, what nature, what innovation and superiority. Internet of things four key technologies are widely used, these four technologies are mainly RFID, WSN, M2M, as well as the integration of the two. RFID can be achieved using MATLAB, NS2, Android, WSN can use NS2, OMNET++ implementation, M2M can be developed using JAVA. Therefore, this paper focuses on the advantages of Internet of things than the internet.
APA, Harvard, Vancouver, ISO, and other styles
2

He, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.

Full text
Abstract:
Security of Internet of things network is difficult to manage because Internet of things devices are heterogeneous and always deployed in remote places. Based on these features, attacks against Internet of things network like distributed denial-of-service and system intrusion are easier than traditional network. In order to enhance Internet of things network’s security, in this article we propose the concept of intrinsic security to establish a trusted and autonomy Internet of things network. Intrinsic security emphasizes that network itself must be trusted and security autonomous to address the security problems which are caused by remote and heterogeneous. Based on this thought, we designed the architecture of Trusted Autonomy Security System. Trusted Autonomy Security System maintains a LAN characterized by trusted and security autonomy, in which all Internet of things network gateways formed a decentralized autonomy system to evaluate if other gateways or Internet of things devices are secure. Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. In addition, the decentralized architecture could reduce security risks caused by compromise of single node in Internet of things network. With these advantages, it can be expected that this novel idea will have more development in Internet of things scenarios with high security requirements.
APA, Harvard, Vancouver, ISO, and other styles
3

Espada, Jordán Pascual, Ronald R. Yager, and Bin Guo. "Internet of things: Smart things network and communication." Journal of Network and Computer Applications 42 (June 2014): 118–19. http://dx.doi.org/10.1016/j.jnca.2014.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Sumit, and Zahid Raza. "Internet of Things." International Journal of Systems and Service-Oriented Engineering 7, no. 3 (2017): 32–52. http://dx.doi.org/10.4018/ijssoe.2017070103.

Full text
Abstract:
Internet of Things (IoT) is a novel approach of connecting things/objects and thus transmitting information between various entities of the physical world or to the control centers where this information can be interpreted. IoT has been poised as the next evolution of internet promising to change our lives by involving a seamless access to people and devices in a ubiquitous way leading to a smart world. These devices, often referred to as smart items or intelligent things can be home appliances, healthcare devices, vehicles, buildings, factories and almost anything networked and fitted with sensors, actuators, and/or embedded computers. IoT promises to make the world smarter and proactive by enabling things to talk and others to understand. This work first presents an insight into the origin of IoT and its network as well as data centric architecture while listing the major possibilities. The seemingly important role and challenges of using Wireless Sensor Networks (WSN) which acts as the base in sensing and monitoring has been discussed. Since, the future lies in utility computing, best realized in the form of cloud computing, a cloud centric view of IoT is also presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Sankar, S., Ramasubbareddy Somula, R. Lakshmana Kumar, P. Srinivasan, and M. Amala Jayanthi. "Trust-Aware Routing Framework for Internet of Things." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 48–59. http://dx.doi.org/10.4018/ijkss.2021010104.

Full text
Abstract:
Establishing security in internet of things (IoT) is a critical challenge, as it is connected to the network's extremely resource-constrained devices. The RPL is a standard routing protocol for IoT. It is well-suited for low power and lossy networks (LLN). The RPL provides little security in the IoT network against various attacks. However, one needs to strengthen the security concern in RPL. So, this paper proposes a trust-aware, energy-based reliable routing (TAER-RPL) for IoT to enhance security among network nodes. The TAER-RPL is taken into account the routing metrics, namely trust, ETX, RER to pick the optimal parent for data transmission. The simulation is conducted in COOJA simulator. TAER-RPL's efficiency is compared with SecTrust-RPL and RPL. The TAER-RPL increases the lifespan of the network by 15%.
APA, Harvard, Vancouver, ISO, and other styles
6

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, Internet of Things (IoT) technologies are developing technology with a variety of applications. The Internet of Things (IoTs) is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in Internet of Things (IoT) technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes’ construction with high-speed CPUs and low-power radio links. The IoT-based wireless Sensor network (WSN) is a game-changing smart monitoring solution. ZigBee standard is an important wireless sensor network (WSN) and Internet of Things (IoT) communication protocol in order to facilitate low-power, low-cost IoT applications and to handle numerous network topologies. This paper presented a review on the energy efficient and routing topologies of ZigBee WSN, applications of IoT enabled Wireless Sensor Network as well IoT WSN security challenges.
APA, Harvard, Vancouver, ISO, and other styles
7

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Full text
Abstract:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identification keys. This will make content management easier. It will generate revenue for the person who takes the copyrighted picture. A watermark is an embedded signature in a thing. It could be embedded in a video, image, and other file types for distinction and marking for ownership. It could be visible or invisible. It also provides a means to trace a product to the owner. This work looks into how images with watermark can be connected to the IoT for tracking and fighting piracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Fragkou, Evangelia, Dimitrios Papakostas, Theodoros Kasidakis, and Dimitrios Katsaros. "Multilayer Backbones for Internet of Battlefield Things." Future Internet 14, no. 6 (2022): 186. http://dx.doi.org/10.3390/fi14060186.

Full text
Abstract:
The Internet of Battlefield Things is a newly born cyberphysical system and, even though it shares a lot with the Internet of Things and with ad hoc networking, substantial research is required to cope with its scale and peculiarities. This article examines a fundamental problem pertaining to the routing of information, i.e., the calculation of a backbone network. We model an IoBT network as a network with multiple layers and employ the concept of domination for multilayer networks. This is a significant departure from earlier works, and in spite of the huge literature on the topic during the past twenty years, the problem in IoBT networks is different since these networks are multilayer networks, thus making inappropriate all the past, related literature because it deals with single layer (flat) networks. We establish the computational complexity of our problem, and design a distributed algorithm for computing connected dominating sets with small cardinality. We analyze the performance of the proposed algorithm on generated topologies, and compare it against two—the only existing—competitors. The proposed algorithm establishes itself as the clear winner in all experiments concerning the dominating set from a size-wise and an energy-wise perspective achieving a performance gain of about 15%.
APA, Harvard, Vancouver, ISO, and other styles
9

Imran, Zeba Ghaffar, Abdullah Alshahrani, Muhammad Fayaz, Ahmed Mohammed Alghamdi, and Jeonghwan Gwak. "A Topical Review on Machine Learning, Software Defined Networking, Internet of Things Applications: Research Limitations and Challenges." Electronics 10, no. 8 (2021): 880. http://dx.doi.org/10.3390/electronics10080880.

Full text
Abstract:
In recent years, rapid development has been made to the Internet of Things communication technologies, infrastructure, and physical resources management. These developments and research trends address challenges such as heterogeneous communication, quality of service requirements, unpredictable network conditions, and a massive influx of data. One major contribution to the research world is in the form of software-defined networking applications, which aim to deploy rule-based management to control and add intelligence to the network using high-level policies to have integral control of the network without knowing issues related to low-level configurations. Machine learning techniques coupled with software-defined networking can make the networking decision more intelligent and robust. The Internet of Things application has recently adopted virtualization of resources and network control with software-defined networking policies to make the traffic more controlled and maintainable. However, the requirements of software-defined networking and the Internet of Things must be aligned to make the adaptations possible. This paper aims to discuss the possible ways to make software-defined networking enabled Internet of Things application and discusses the challenges solved using the Internet of Things leveraging the software-defined network. We provide a topical survey of the application and impact of software-defined networking on the Internet of things networks. We also study the impact of machine learning techniques applied to software-defined networking and its application perspective. The study is carried out from the different perspectives of software-based Internet of Things networks, including wide-area networks, edge networks, and access networks. Machine learning techniques are presented from the perspective of network resources management, security, classification of traffic, quality of experience, and quality of service prediction. Finally, we discuss challenges and issues in adopting machine learning and software-defined networking for the Internet of Things applications.
APA, Harvard, Vancouver, ISO, and other styles
10

K., Thamizhmaran. "Network Privacy Reflection using Internet of Things." Recent Trends in Control and Converter 3, no. 3 (2021): 1–11. https://doi.org/10.5281/zenodo.4477853.

Full text
Abstract:
<em>The current IP and other networks such as Power Smart Grids are fast developing, thus ensuing in diverse connectivity methodologies. This has led to the emergence of &quot;the Internet of Things&rdquo; (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminous generation and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices. We commence with a description of a generalized IoT enabled network&#39;s security architecture as well as how the various elements constituting them interact. We then describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations</em>
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Guobin, and Tangsen Huang. "Community privacy estimation method based on key node method in space social Internet of Things." International Journal of Distributed Sensor Networks 15, no. 10 (2019): 155014771988313. http://dx.doi.org/10.1177/1550147719883131.

Full text
Abstract:
Based on the research of social network and the Internet of Things, a new research topic in the field of Internet of Things, Social Internet of Things is gradually formed. The SIoT applies the research results of SIoT from different aspects of the Internet of Things, and solves the specific problems in the research of Internet of Things, which brings new opportunities for the development of the Internet of Things. With the development of the Internet of Things technology, in the spatial social Internet of Things structure, user information includes sensitive attributes and non-sensitive attribute information. This information can be inferred from public user information to infer the information of the private user and even speculate on sensitive attributes. This article proposes an information speculation method based on the core users of spatial social networks, and estimates the non-core user information through the core user public information. First, the user’s spatial social network is divided into communities, and the core nodes of the community in the spatial social network are calculated by PageRank algorithm and the convergence of the algorithm is proved. Then, through the public information of the core nodes divided by the community in the space social network, the private information of relevant users to these core nodes can be speculated. Finally, by experimental analyzing the community structures of SIoT (Social Internet of Things) like Twitter, Sina Weibo, ER random networks, and NW small-world network, and making 5%, 10%, 15%, 20% information anonymous respectively in these four kinds of networks, we can analyze their clustering coefficient, Q-modularity and properties. Finally, the key node information of the four spatial social structures is speculated to analyze the effectiveness of the proposed method. Compared with the non-core speculation method, this method has advantages in speculative information integrity and time.
APA, Harvard, Vancouver, ISO, and other styles
12

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer networks. In the process of analysis, publicly available information sources and scientific approaches were utilized, including contemporary scientific publications, analytical reports, and resources from leading companies, such as Cisco, specializing in network equipment and configuration of corporate networks. This approach allows for the consideration of the latest trends and technological solutions in the field of IoT security. One of the key issues addressed is the development of an extended and improved technological design for the IoT system. Considering the constant evolution of technologies, it is essential to ensure a high level of adaptability and flexibility of security measures to effectively operate in various conditions and circumstances. An additional emphasis is placed on studying the impact of an extended and improved technological design of the IoT system. It is crucial to establish synergy between new technological solutions and existing network structures to achieve maximum effectiveness in enhancing security and efficiency. Therefore, the scientific work focuses on a comprehensive analysis and implementation of cutting-edge security measures for IoT in corporate networks, taking into account contemporary trends and data security requirements.
APA, Harvard, Vancouver, ISO, and other styles
13

Ren, Qiong, and Jun Tao. "The Research on Information Collection System Design for Internet of Things." Advanced Materials Research 926-930 (May 2014): 2662–65. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2662.

Full text
Abstract:
The Internet of Things is proposed as a new boom of the internet and based on internet user extension and extended to any goods and goods, exchange of information and communication networks. Internet of thing technology application in different fields has been widely expanded and mature. Perception layer in the Internet of Things system information collection is the foundation of realization of something connected, bright sets the starting point, this article is to information through self-organization network for data transmission, to unified management of information collection module, finally achieving all the functions of Internet information collection system.
APA, Harvard, Vancouver, ISO, and other styles
14

Parsaei, Mohammad Reza, Ahmad Reza Parnian, Samaneh Miri Rostami, and Reza Javidan. "RPL LOAD BALANCING IN INTERNET OF THINGS." IIUM Engineering Journal 18, no. 2 (2017): 137–50. http://dx.doi.org/10.31436/iiumej.v18i2.702.

Full text
Abstract:
ABSTRACT:Â The wide address space provided by Internet Protocol version 6 (IPv6) lets any thing to be identified uniquely. consistency of the modified version of IPv6 protocol stack with smart objects, facilitated the Internet interconnection of the networks of smart objects and introduced Internet of things. A smart object is a small micro-electronic device that consists of a communication device, a small microprocessor and a sensor or an actuator. A network made of such devices is called low-power and lossy network. RPL routing protocol that is consistent to IPv6, is designed to be used in these kinds of networks. Load balancing is not considered in the RPL design process. Whenever RPL is used in large scale low-power and lossy networks some nodes will suffer from congestion and this problem severely degrades network performance. In this paper, we consider solutions provided to tackle RPL load balancing problems. Load balancing algorithms and protoclos are evaluated through simulation. We evaluate IETF RPL implementation and LB-RPL method with Contiki OS Java (COOJA) simulator. They are assessed comprehensively through metrics such as Packet delivery Ratio, Average End to End delay, and Gateway Throughput. LB-RPL improves RPL in terms of Packet delivery Ratio and throughput but increases Average End to End delay. Simulations results show that RPL load balancing needs extensive works to be performed yet.
APA, Harvard, Vancouver, ISO, and other styles
15

Ioannou, Christiana, and Vasos Vassiliou. "Security Agent Location in the Internet of Things." IEEE Access 7 (July 12, 2019): 95844–56. https://doi.org/10.1109/ACCESS.2019.2928414.

Full text
Abstract:
The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users&#39; privacy. The current work examines the issue of security agent location using indicative intrusion detection techniques for network layer attacks. We analyze the methodology, operation, as well as the complexity of each technique. Through the extensive implementation and experimentation, we are able to conclude that the local security agents have the same performance results with centralized and decentralized approaches, but with negligible overhead. As such, they are useful when internal network communication, or network augmentation with monitoring nodes, is not feasible.
APA, Harvard, Vancouver, ISO, and other styles
16

Elksne, Mārīte, Artūrs Solovjovs, and Artis Teilāns. "ENOSE FOR INTERNET OF THINGS." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 24 (April 22, 2020): 40–46. http://dx.doi.org/10.17770/het2020.24.6748.

Full text
Abstract:
System “eNose” is developed within a project “eNose for Internet of things”, which is a part of a project contest “Research Grant of Rezekne Acadaemy of Technologies”. The aim of this work is to explore whether it is possible to detect spoiled food with help of sensors and a neural network. System “eNose” is intended to detect and classify spoiled food products within storages and notify related users. Detection and classification are performed by four gas sensors and a neural network. As a result, a web application was developed that performs such functions as storage and sensor registration, neural network training, spoiled food detection based on sensor data, and user permission control. It was concluded that sensors for this application must be very precise in order to receive best possible results.
APA, Harvard, Vancouver, ISO, and other styles
17

Paramonov, Alexander, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy, and Andrey Koucheryavy. "Fractals for Internet of Things Network Structure Planning." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–12. http://dx.doi.org/10.4018/ijisp.305223.

Full text
Abstract:
Wireless communication networks and technologies are witnessed a huge improvement which gain a large number of users. In addition, the choice and using methods of the network are depending on the environment in which it is created. Although the network in each case is unique, many of them share a lot of common. To this end, we propose a new approach for planning the structure of the Internet of Things (IoT) network based on fractals, where fractal figures are utilized to describe the structure of the target environment. Moreover, fractal dimension’s estimation, fraction area occupied by the target environment, and network model are used in the planning process. This approach allows you to choose a model that accurately describes the properties of the environment. Finally, the results proved the suitability of this approach for the IoT network structure planning in an urban or other environment based on the target environment’s data.
APA, Harvard, Vancouver, ISO, and other styles
18

M, Dr DuraiPandian. "ENHANCED NETWORK PERFORMANCE AND MOBILITY MANAGEMENT OF IOT MULTI NETWORKS." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (2019): 95–105. http://dx.doi.org/10.36548/jtcsst.2019.2.003.

Full text
Abstract:
The tremendous progress in the internet of things incorporating multitudes of wireless interfaces have ended up with dense deployment of multi-networks that are associated with the internet of things and supported by wireless communications that are heterogeneous. Effective management of the multi-networks with a proper flow scheduling and a mobility management in order to provide a seamless conveyance are a tedious and a challenging task. The incompatibility of the software defined networks to manage with the densely deployed multi networks has increased the necessity for developing a more suitable flow scheduler and mobility manager for the multi networks of internet of things. So this paper presents the Improved- flow scheduling and the mobility management protocol (IFSMM) to guarantee the network performance that provides a seamless accessing of internet of things. The IFSMM is simulated using the NS-2 to confirm the performance achievement through the proper management of the transmission on the grounds of throughput, latency and the jitter.
APA, Harvard, Vancouver, ISO, and other styles
19

Tatarnikova, Tatyana M., and Pavel Yu Bogdanov. "Metric characteristics of anomalous traffic detection in internet of things." T-Comm 16, no. 1 (2022): 15–21. http://dx.doi.org/10.36724/2072-8735-2022-16-1-15-21.

Full text
Abstract:
The urgent problem of timely detection of abnormal traffic in the Internet of Things networks, which wastes the energy of sensor devices, is discussed. Anomalous traffic means traffic that contains malicious software that implements an attacking effect on the nodes of the Internet of Things. Timely detection of abnormal traffic contributes to the preservation of the service life and, accordingly, the performance of the services provided by the Internet of Things. The subject of this research is the application of metric characteristics to detect abnormal traffic in the Internet of Things networks. The aim of the work is to propose a system of metrics that allow registering signatures of individual sensor devices or patterns of their behavior and assessing the mode of operation of individual network segments. Since the Internet of Things is built on a hierarchical basis - from a wireless sensor network to a global network, the attack detection system covers all levels - from a sensor device to a global cloud. Detection of abnormal traffic both in the wireless sensor network and at the level of wired networks - local and global - is implemented using metrics. A metric is a qualitative or quantitative indicator that reflects one or another characteristic of the functioning of an infocommunication network. Analysis of the sources showed the lack of systematization of metric characteristics for the Internet of Things networks. Research findings include: a description of the elements that make up the IoT ecosystem; layered model of the architecture of the Internet of things; an abnormal traffic detection metrics system containing a wide range of predictive, diagnostic and retrospective metrics. The proposed system of metrics can be used to build intrusion detection systems in IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Eltayeb, Mohamed A. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 1 (2017): 1–18. http://dx.doi.org/10.4018/ijhiot.2017010101.

Full text
Abstract:
In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
21

Akilandeshwari., K., S. Mohanapriya., and Sri. R. Sandhyia. "Internet of Things." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 715–20. https://doi.org/10.5281/zenodo.3842993.

Full text
Abstract:
The Internet of Things IoT is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers UIDs and the ability to transfer data over a network without requiring human to human or human to computer interaction. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the smart home , covering devices and appliances such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smart phones and smart speakers. Akilandeshwari. K | Mohanapriya. S | Sandhyia Sri. R &quot;Internet of Things&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29939.pdf
APA, Harvard, Vancouver, ISO, and other styles
22

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha, and Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things." International Journal of Grid and High Performance Computing 11, no. 3 (2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Full text
Abstract:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy IoT); 2) The optimized reactive route is dynamically adjusted based on fuzzy based prediction accurately from the number of routes provided by base protocol. If the selection accuracy is high, the performance enhances the network quality; 3) FLWP takes full advantage of energy to further enhance target tracking performance by properly selecting reactive routes in the network. Authors evaluated the efficiency of FLWP with simulation-based experiments. FLWP scheme improves the energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
23

Lu, Fei, Haojing Huang, Zhenjiang Shi, and Zihan Lin. "Research on Security Strategies for Wireless Sensor Networks in Internet of Things Applications." Education Reform and Development 6, no. 11 (2024): 127–33. http://dx.doi.org/10.26689/erd.v6i11.8891.

Full text
Abstract:
With the development of modern science and technology, the Internet of Things has been widely used in many fields, and it involves a wide range of technologies, among which the most important technology is the sensor, the most basic technology. The sensor network node working environment has been very complex and demanding; if slightly relaxed, it will lead to the sensor facing many security risks. Therefore, strengthening the security of wireless sensor networks has become an essential part of the Internet of Things project. This paper mainly starts with an overview of the Internet of Things and wireless sensor networks, analyzes the security challenges and impacts of wireless sensor networks, and discusses the main security threats and countermeasures. The purpose is to implement wireless sensor network security strategies for Internet of Things applications and build a comprehensive and multi-level security protection system through various means. To ensure that the sensor network can operate stably and safely in a complex environment, Internet of Things technology‘s healthy and sustainable development can be promoted.
APA, Harvard, Vancouver, ISO, and other styles
24

Paramonov, Alexander, and Sergey Bushelenkov. "Route selection method in the Internet of Things." Telecom IT 10, no. 1 (2022): 34–44. http://dx.doi.org/10.31854/2307-1303-2022-10-1-34-44.

Full text
Abstract:
The article analyzes the route selection problem in a high-density Internet of Things network, proposes a route model that describes the equivalent data transfer rate, taking into account mutual influences between network nodes. Subject of study. The subject of the study is the wireless networks of the Internet of things. Method. The study uses analytical methods for estimating the data transfer rate, taking into account the mutual influences of network nodes, as well as the simulation method. The paper shows that the choice of the optimal number of transit nodes can be made at which the maximum data transfer rate is achieved. Main results. The results of the work are a route model in a high-density internet-of-things network and a method for constructing a route that makes it possible to achieve data transfer rates close to the maximum. Practical significance. The practical significance of the results obtained lies in the proposal of a method for choosing a route in a highdensity Internet of Things network.
APA, Harvard, Vancouver, ISO, and other styles
25

Maseleno, Andino, Wahidah Hashim, Y. C. Tang Alicia, A. Mahmoud Moamin, and Marini Othman. "A Review on Smart Grid Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2770–75. http://dx.doi.org/10.1166/jctn.2020.8941.

Full text
Abstract:
Smart electrical network or better known as Smart Grid is one form of transformation and technological reform in the electricity industry. Smart Grid is a modern electrical energy network that intelligently integrates power grids with communications devices that support electricity generation and distribution networks to be more attractive, communicative and qualified. Smart Grid is also able to prevent and to isolate the interference quickly and present information on electrical data in real time. While the Internet of Thing (IoT) is a method that aims to maximize the benefits of internet connectivity to transfer and to process data or information through an internet network wirelessly, virtual and autonomous. IoT technically can be encouraged in developing smart grid network by integrating main power system infrastructure from generating side to end consumer through wireless sensor network automatically. With the utilization of IoT is expected to improve the reliability of information systems from the power grid as well as improve the efficiency of existing electrical infrastructure. This paper will present the concept of smart grid technology, IoT and discuss the IoT design and application model in smart grid network.
APA, Harvard, Vancouver, ISO, and other styles
26

Yadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.

Full text
Abstract:
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is implemented. In particular, to detect malicious Internet of Things network traffic, a deep learning algorithm has been used. The identity solution ensures the security of operation and supports the Internet of Things connectivity protocols to interoperate. An intrusion detection system (IDS) is one of the popular types of network security technology that is used to secure the network. According to our experimental results, the proposed architecture for intrusion detection will easily recognize real global intruders. The use of a neural network to detect attacks works exceptionally well. In addition, there is an increasing focus on providing user-centric cybersecurity solutions, which necessitate the collection, processing, and analysis of massive amounts of data traffic and network connections in 5G networks. After testing, the autoencoder model, which effectively reduces detection time as well as effectively improves detection precision, has outperformed. Using the proposed technique, 99.76% of accuracy was achieved.
APA, Harvard, Vancouver, ISO, and other styles
27

Abramov, Vadym. "PROTECTED CABLE INTERFACES OF THE SENSORY NETWORKS OF THINGS INTERNET." Cybersecurity: Education, Science, Technique, no. 5 (2019): 73–82. http://dx.doi.org/10.28925/2663-4023.2019.5.7382.

Full text
Abstract:
The principles of construction and parameters of sensor network interfaces are characterized, which are characterized by a large number of sensors and a considerable distance of information transmission to the central point or server. The majority of sensors on the Internet of Things system have little performance. In this case, the sensor network requires protection against interference and interference. Only cable networks are eligible for this group of sensor networks. Sensor networks are most suitable for cable industrial networks. The analysis and comparison of industrial cable network interfaces shows that the most appropriate requirements are the RS-485 interface and its derivative interfaces. All industrial network cable interfaces are very good at satisfying one requirement and not meeting the other. Passive fiber optic network is the most satisfying. It is convenient to use passive fiber optic (PON) technologies to build such a network. There are currently quite a number of passive fiber splitter technologies that can be used to create a multipoint trunk or ring passive fiber optic network. Networks with fiber-optic encoders, which also have a large number for measuring different physical parameters, are very convenient and efficient. For the exchange of information in these networks, it is convenient to use the 1- wire interface protocol, which is supplemented by the use of frequency signals. Such networks will be lightweight and compact over time on moving objects and in hazardous conditions. The materials of the article are of interest for carrying out the educational process in universities, in particular at the Kyiv University named after B. Grinchenko.
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Yong, Wei Qing Yang, Dan Zhu, Jing Liu, and Ji Rong Xue. "Environmental Perception Internet of Things Intelligent, Network Technology Research and Application." Advanced Materials Research 971-973 (June 2014): 2013–17. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.2013.

Full text
Abstract:
The environmental perception internet of things architecture is proposed. Combined with the specific application, the environmental perception internet of things knowledge base, intelligent optimization methods based on knowledge, and environmental perception internet of things security heterogeneous communication network are proposed. They are applied in vehicles path planning. Combination of different types of sensors, the environmental perception internet of things can be applied to military, security, home and building networks, industrial control, public places surveillance, agriculture control, medical and other fields.
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Yunfa, and Mingyi Li. "A privacy protection mechanism for numerical control information in Internet of things." International Journal of Distributed Sensor Networks 13, no. 8 (2017): 155014771772631. http://dx.doi.org/10.1177/1550147717726312.

Full text
Abstract:
The application of numerical control machine tool in the Internet of things has attracted large number of attention. It is a complex network system that integrates sensor network, Internet, and mobile communication network. However, some security issues have not been solved by Internet security technology. In order to enhance the security of system, we, respectively, propose a lightweight authentication method for wireless sensor networks and an Internet data privacy protection strategy based on organizational characteristics of computerized numerical control machine tool and the numerical control information transmission mode in Internet of things. The two methods constitute a privacy protection mechanism for numerical control information in Internet of things. In order to show the effectiveness of the privacy protection mechanisms, series of analysis about safety is presented. Analysis results show that this mechanism can ensure the security of information and the privacy of the numerical control machine tool in Internet of things.
APA, Harvard, Vancouver, ISO, and other styles
30

Romario Bhattacharyya, Tamoghno, and Dr M. Pushpalatha. "Routing protocols for internet of things: a survey." International Journal of Engineering & Technology 7, no. 2.4 (2018): 196. http://dx.doi.org/10.14419/ijet.v7i2.4.13038.

Full text
Abstract:
The world of wireless sensor network(WSN) is widening day by day and the latest technology in use the Internet of Things known as IOT is the latest craze in it. But the IOT technique and its devices requires routing protocols in situations like low power and lossy networks(LLNs) which brings great challenges. In many and some emergency cases, like in case of large and more data traffic which causes to lead in network congestions and also brings loss in packets and delay. In order to overcome all this problems , many group research and individuals are trying and focusing on different solutions to maximize the throughput for the RPL network. In this paper we will we studying and reviewing some of the different methods that has been taken to maximize the throughput in the network and hence try to come to a conclusion for the future techniques needed to be done.
APA, Harvard, Vancouver, ISO, and other styles
31

Sholla, Sahil, Sukhkirandeep Kaur, Gh Rasool Begh, Roohie Naaz Mir, and M. Ahsan Chishti. "Clustering Internet of Things: A Review." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 2 (2017): 21. http://dx.doi.org/10.31130/jst.2017.61.

Full text
Abstract:
Internet of Things is a paradigm shift in networking that seeks to connect virtually all things on the planet. Given the constrained nature of smart devices, energy efficient routing would play a key role in successful deployment of such networks. Clustering algorithms organize nodes of a network into groups or clusters and a specific designated node, cluster head is responsible for its cluster. Clustering algorithms have been particularly suggested in the context of Wireless Sensor Networks (WSN) but their application may also address similar challenges in Internet of Things (IoT). Clustering would facilitate energy efficient routing and topology management by delegating large chunk of communication overhead to cluster head. This paper presents a review of various clustering algorithms, analyses routing characteristics of various IoT domains and suggests appropriate clustering algorithms for each domain.
APA, Harvard, Vancouver, ISO, and other styles
32

Casado-Vara, Roberto, Zita Vale, Javier Prieto, and Juan Corchado. "Fault-Tolerant Temperature Control Algorithm for IoT Networks in Smart Buildings." Energies 11, no. 12 (2018): 3430. http://dx.doi.org/10.3390/en11123430.

Full text
Abstract:
The monitoring of the Internet of things networks depends to a great extent on the availability and correct functioning of all the network nodes that collect data. This network nodes all of which must correctly satisfy their purpose to ensure the efficiency and high quality of monitoring and control of the internet of things networks. This paper focuses on the problem of fault-tolerant maintenance of a networked environment in the domain of the internet of things. Based on continuous-time Markov chains, together with a cooperative control algorithm, a novel feedback model-based predictive hybrid control algorithm is proposed to improve the maintenance and reliability of the internet of things network. Virtual sensors are substituted for the sensors that the algorithm predicts will not function properly in future time intervals; this allows for maintaining reliable monitoring and control of the internet of things network. In this way, the internet of things network improves its robustness since our fault tolerant control algorithm finds the malfunction nodes that are collecting incorrect data and self-correct this issue replacing malfunctioning sensors with new ones. In addition, the proposed model is capable of optimising sensor positioning. As a result, data collection from the environment can be kept stable. The developed continuous-time control model is applied to guarantee reliable monitoring and control of temperature in a smart supermarket. Finally, the efficiency of the presented approach is verified with the results obtained in the conducted case study.
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Upendra. "A Review on Securing Wireless Networks against Jamming Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33883.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive networks often come under security attacks, most common of which are jamming and eavesdropping attacks. In this paper, the basics of cognitive IoT networks have been presented with the focus of security aware cognitive IoT networks. Previous work in the allied domain has been discussed along with their salient features. Keywords: Wide Area Network (WAN), Internet of Things (IoT), cognitive radio network (CRN), security aware spectrum assignment, cyber-attacks, false alarm, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
34

Mahajan, Yash, and Dr Manish Vyas. "A Review on Security Frameworks for Software Defined Networks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28497.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive networks often come under security attacks, most common of which are jamming and eavesdropping attacks. In this paper, the basics of cognitive IoT networks have been presented with the focus of security aware cognitive IoT networks. Previous work in the allied domain has been discussed along with their salient features. Keywords: Wide Area Network (WAN), Internet of Things (IoT), cognitive radio network (CRN), security aware spectrum assignment, cyber-attacks, false alarm, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
35

Soni, Priyanka. "A Review on Securing Wireless Networks against IIRS Proliferation and Jamming Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40846.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive networks often come under security attacks, most common of which are jamming and eavesdropping attacks. In this paper, the basics of cognitive IoT networks have been presented with the focus of security aware cognitive IoT networks. Previous work in the allied domain has been discussed along with their salient features. Keywords: Wide Area Network (WAN), Internet of Things (IoT), cognitive radio network (CRN), security aware spectrum assignment, cyber-attacks, false alarm, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
36

Khan, Shafiullah, Muhammad Muneer Umar, Chunhua Jin, Shaozhang Xiao, Zeeshan Iqbal, and Noha Alnazzawi. "Game-Theory-Based Multimode Routing Protocol for Internet of Things." Electronics 11, no. 24 (2022): 4134. http://dx.doi.org/10.3390/electronics11244134.

Full text
Abstract:
Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes should not be limited to the interconnection of different nodes. In this paper, a multi-mode hybrid routing mechanism is proposed that can be installed on all or a limited number of nodes in a heterogenous IoT network. The nodes configured with the proposed protocols are termed smart nodes. These nodes can be used to connect multiple IoT networks into one. Furthermore, a game-theory-based model is proposed that is used for intercommunication among the smart nodes to gain optimal efficiency. Various performance matrices are assessed under different network scenarios. The simulation results show that the proposed mechanism outperforms in broader heterogeneous IoT networks with diverse nodes.
APA, Harvard, Vancouver, ISO, and other styles
37

Kaur, Prabhjot, Rupinder Singh, and Rachhpal Singh. "Secured Clustered Internet of Things Wireless Sensor Network." International Journal of Computer Science and Mobile Computing 11, no. 6 (2022): 34–45. http://dx.doi.org/10.47760/ijcsmc.2022.v11i06.003.

Full text
Abstract:
The Internet of Things (IoT) is a swiftly evolving technology that will have a significant impact in the future. The Internet of Things (IoT) is a huge collection of interconnected networks, such as the Wireless Sensor Network (WSN), that make use of fast evolving devices and technologies. The risk of confidentiality of information and protection has increased as a result of the indefinite interconnection of a variety of applied sciences in IoT. WSN employs Low Energy Adaptive Clustering Hierarchy (LEACH) to create an energy-efficacious network that is vulnerable to a wide range of assaults, including the HELLO flood. This work employs AS-LEACH (Abundant Secure LEACH) as an extension to the LEACH protocol to protect cluster heads from Hello flood attacks. For the purpose of validating a sensor node as CH, AS-LEACH employs RBG color cube numbers, a distinct Abundant number, and each sensor node has its own unique ID. The NS2 network simulator is utilized to implement AS-LEACH and verify its efficiency in this proposed work.
APA, Harvard, Vancouver, ISO, and other styles
38

Hemmati, Mahdi. "Analyzing the Effect of Social Internet of Things on Making the Internet Marketing Smart." Modern Applied Science 10, no. 9 (2016): 213. http://dx.doi.org/10.5539/mas.v10n9p213.

Full text
Abstract:
The development of social internet of things in recent years led to widening the data and information scope. A wide scope of new services caused by this procedure. In this regard, a new pattern called the social internet of things is created by integrating the social network and internet of things (IOT) which shows the network communication of things. IOS can put a step toward the marketing world. In this paper, the effect of IoT on internet marketing and making it smart are taken into consideration by considering marketing in human social network.
APA, Harvard, Vancouver, ISO, and other styles
39

Romanova, A. A. "Simulation Model of Information Interaction in the Internet of Things." LETI Transactions on Electrical Engineering & Computer Science 15, no. 8 (2022): 69–76. http://dx.doi.org/10.32603/2071-8985-2022-15-8-69-76.

Full text
Abstract:
A simulation model of a wireless sensor network of the Internet of Things is considered, combining smart things with autonomous power supply, which exchange information communications with each other. The simulation model is presented in the form of a multiple access system, describes the objects of information interaction, and can be used for experimentation in order to design, analyze and evaluate the functioning of wireless sensor networks of the Internet of Things. The simulation model will allow us to determine which parameters of the wireless sensor network of the Internet of Things and how they affect the simulated system, the quality of service indicators in the network: probabilistic and temporal characteristics of information interaction. Experiments based on the developed simulation model allow us to calculate and analyze the influence of the parameters of the wireless Internet of Things network: the intensity of generated messages, the number of channels, the power of transmitted signals, service time, etc.
APA, Harvard, Vancouver, ISO, and other styles
40

Bynagari, Naresh Babu. "Industrial Application of Internet of Things." Asia Pacific Journal of Energy and Environment 3, no. 2 (2016): 75–82. http://dx.doi.org/10.18034/apjee.v3i2.576.

Full text
Abstract:
‘Industrial application of Internet of Things deals with the application of Internet of things to produce industrial services. It analyzed how industries can carry out multiple services with function remotely using IoT-connected devices. The several benefits and drawbacks to the application of IoT services were also investigated. The IoT is a network of connected systems and smart devices that use encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The utilization of IoT for industrial functions will significantly improve industrial output, and in the future, more industries will come to apply IoT devices and systems for greater efficiency.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
41

Yaokumah, Winfred, Richard Nunoo Clottey, and Justice Kwame Appati. "Network Intrusion Detection in Internet of Things (IoT)." International Journal of Smart Security Technologies 8, no. 1 (2021): 49–65. http://dx.doi.org/10.4018/ijsst.2021010104.

Full text
Abstract:
The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper offered a systematic review of studies on intrusion detection in IoT, focusing on metrics, methods, datasets, and attack types. This review used 33 network intrusion detection papers in 31 journals and 2 conference proceedings. The results revealed that the majority of the studies used generated or private datasets. Machine learning (ML)-based methods (85%) were used in the studies, while the rest used statistical methods. Eight categories of metrics were identified as prominent in evaluating IoT performance, and 94.9% of the ML-based methods employed average detection rate. Moreover, over 20 attacks on IoT networks were detected, with denial of service (DoS) and sinkhole being the majority. Based on the review, the future direction of research should focus on using public datasets, machine learning-based methods, and metrics such as resource consumption, energy consumption, and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
42

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Full text
Abstract:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater forensics regime. These recommendations as well policy directions were also added Keywords: Internet of Things (IoT), Underwater Network Forensics, Cybersecurity, Compatibility BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security &amp; Forensics. Open Access. Distributed Free Citation: Timothy Kwaku (2022): Internet of Things (IoT) &amp; Underwater Network Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security &amp; Forensics. Pp 291-300 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P47
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Byung Moo, Mayuresh Patil, Preston Hunt, and Imran Khan. "An Easy Network Onboarding Scheme for Internet of Things Networks." IEEE Access 7 (2019): 8763–72. http://dx.doi.org/10.1109/access.2018.2890072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246–61. https://doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, internet of things (IoT) technologies are developing technology with a variety of applications. The IoT is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in IoT technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes&rsquo; construction with high-speed CPUs and low-power radio links. The IoTbased WSN is a game-changing smart monitoring solution. ZigBee standard is an important WSN and IoT communication protocol in order to facilitate low-power, low-cost IoT applications and to handle numerous network topologies. This paper presented a review on the energy efficient and routing topologies of ZigBee WSN, applications of IoT enabled WSN as well IoT WSN security challenges.
APA, Harvard, Vancouver, ISO, and other styles
45

Mendes, Cleiton, Raphael Osaki, and Cesar Da Costa. "Internet of Things in Automated Production." European Journal of Engineering Research and Science 2, no. 10 (2017): 13. http://dx.doi.org/10.24018/ejers.2017.2.10.499.

Full text
Abstract:
Industry 4.0 is being presented as the fourth industrial revolution in which intelligent machines, advanced sensors, and smart logistic networks and suppliers will be connected to the internet of things. Such an intelligent network would create a cyber-physical system that scan store all of the supply chain data in the cloud and allow access to these data through different devices connected to the internet. Thus, the factory of the future could be established. This project proposes the creation of a manufacturing cell at the shop floor level based on the concepts of Industry 4.0. The effects on production of industry 4.0 emerging with this mind is very important. Therefore, the impacts in production of industry 4.0 are examined in this paper.
APA, Harvard, Vancouver, ISO, and other styles
46

Mendes, Cleiton, Raphael Osaki, and Cesar Da Costa. "Internet of Things in Automated Production." European Journal of Engineering and Technology Research 2, no. 10 (2017): 13–16. http://dx.doi.org/10.24018/ejeng.2017.2.10.499.

Full text
Abstract:
Industry 4.0 is being presented as the fourth industrial revolution in which intelligent machines, advanced sensors, and smart logistic networks and suppliers will be connected to the internet of things. Such an intelligent network would create a cyber-physical system that scan store all of the supply chain data in the cloud and allow access to these data through different devices connected to the internet. Thus, the factory of the future could be established. This project proposes the creation of a manufacturing cell at the shop floor level based on the concepts of Industry 4.0. The effects on production of industry 4.0 emerging with this mind is very important. Therefore, the impacts in production of industry 4.0 are examined in this paper.
APA, Harvard, Vancouver, ISO, and other styles
47

Dilip Kumar Shaw. "Real life Applications of Internet of Things." International Journal of Information Technology and Business 4, no. 2 (2022): 27–37. https://doi.org/10.24246/ijiteb.422022.27-37.

Full text
Abstract:
The Internet of Things is the next technological revolution after the revolution of computer and internet. IoT integrates the new technologies of computing and communication (e.g. Sensor networks, RFID, Mobile communication and IPV6 etc). The Internet of Things is an emerging topic of technical, social, and economic significance. The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate exchange and consume data with minimal human intervention. Internet connect “all people”, Internet of Things connect “all things”. Interconnection of Things or Objects or Machines, e.g., sensors, actuators, mobile phones, electronic devices, home appliances, any existing items and interact with each other via Internet
APA, Harvard, Vancouver, ISO, and other styles
48

Javida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Full text
Abstract:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many important studies and researches have been conducted to improve the technology through IoT. The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The main purpose of this review article is to provide a detailed discussion, both technologically and socially. It is not just about the connected devices but also about the hardware, software, connectivity and communication protocols, middleware and so much more to create Internet of Things solutions as mentioned. And it’s also about many processes and technologies. So, this is most important theme in our world. The article discusses various problems and key issues in IoT, architecture and important applications. The Internet of Things is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT has also demonstrated its importance and potential for economic and industrial growth in the developing region. It is also seen as a revolutionary step in the trading and stock markets. However, data and information security is an important concern and is highly desirable, which is a major challenge that needs to be addressed. The Internet, the biggest source of security threats and cyber attacks, has opened various doors for hackers, thereby discrediting information and data. IoT is committed to providing the best possible solutions to deal with data and information security issues. IoT's most important concern in trade and the economy is security. The IoT system consists of a large number of devices and sensors that communicate with each other. They can range from a Wi-Fi pet camera on your bookshelf to a medical device implanted in your body, like a pacemaker. As long as the device is able to connect to the internet and has sensors that transmit data, it can be considered an IoT device. As the IoT network grows and expands, the number of these sensors and devices is growing rapidly. These devices communicate with each other and transmit large amounts of information over the Internet. This information is very large and flows every second, and therefore deserves to be called great information. The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (mean - M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something. Today, these IoT projects are evolving and rapidly spreading to all platforms. It is possible to find IoT projects for each topic. As mentioned earlier, IoT projects are designed to make life easier. These projects, created to help as many people as possible, will be the most important part of our future lives. It will be impossible to imagine our lives without the Internet of Things and smart projects. A smart city with sensors covering all its regions using diverse tangible gadgets and objects all over the community and connected with the help of internet. The continuous expansion of IoT-based networks poses complex challenges such as data management and collection, storage and processing, and analytics. This article sheds light on the existing literature and describes their contributions to various aspects of IoT. This article will help readers and researchers understand IoT and its application to the real world Keywords: arduino, sensors, security systems, robotics, intelligent technology.
APA, Harvard, Vancouver, ISO, and other styles
49

Vangelista, Lorenzo, and Marco Centenaro. "Worldwide Connectivity for the Internet of Things Through LoRaWAN." Future Internet 11, no. 3 (2019): 57. http://dx.doi.org/10.3390/fi11030057.

Full text
Abstract:
The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.
APA, Harvard, Vancouver, ISO, and other styles
50

Park, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.

Full text
Abstract:
In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneously using the residual energy of each node and ETX metric in the context of the typical AODV protocol. In the simulations, we verify that the proposed algorithm has longer network lifetime and consumes the residual energy of each node more evenly when compared with the typical AODV protocol.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography