|
|
|
Marco Calabretta,Riccardo Pecori,Massimo Vecchio,Luca Veltri
Pág. 320 - 331
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more an...
ver más
|
|
|
|
|
|
|
Ivan Vaccari, Maurizio Aiello and Enrico Cambiaso
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQT...
ver más
|
|
|
|
|
|
|
Teh-Lu Liao, Hong-Ru Lin, Pei-Yen Wan and Jun-Juh Yan
In recent years, Internet of Things (IoT) has developed rapidly and been widely used in industry, agriculture, e-health, smart cities, and families. As the total amount of data transmission will increase dramatically, security will become a very importan...
ver más
|
|
|
|
|
|
|
Yushan Li and Satoshi Fujita
This paper proposes a novel event-driven architecture for enhancing edge-based vehicular systems within smart transportation. Leveraging the inherent real-time, scalable, and fault-tolerant nature of the Elixir language, we present an innovative architec...
ver más
|
|
|
|
|
|
|
Tse-Chuan Hsu
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and d...
ver más
|
|
|
|
|
|
|
Cristian D?Ortona, Daniele Tarchi and Carla Raffaelli
Many innovative services are emerging based on the Internet of Things (IoT) technology, aiming at fostering better sustainability of our cities. New solutions integrating Information and Communications Technologies (ICTs) with sustainable transport media...
ver más
|
|
|
|
|
|
|
Dmitry Yakupov
Pág. 90 - 98
The development of software applications for Internet of Things (IoT) devices involves solving many difficult tasks, one of which is the choice of a suitable protocol for information exchange. Internet of Things devices have a number of features, such as...
ver más
|
|
|
|
|
|
|
Yuya Sasaki, Tetsuya Yokotani
Pág. 21 - 29
The hypertext transfer protocol (HTTP) has been widely used as a communication protocol for Internet access. However, for Internet of things (IoT) communication, which is expected to grow in the future, HTTP requires a large overhead and cannot provide e...
ver más
|
|
|
|
|
|
|
S. Seleznev,V. Yakovlev
Pág. 17 - 28
The most important messaging protocols proposed as the basis for the new generation of the Internet of Things (IOT) and, more specifically, industrial Internet applications (IIoT) are discussed in this article. Understanding the architecture and message ...
ver más
|
|
|
|
|
|
|
Pietro Battistoni, Andrea Antonio Cantone, Gerardo Martino, Valerio Passamano, Marco Romano, Monica Sebillo and Giuliana Vitiello
The increasing frequency and severity of forest fires necessitate early detection and rapid response to mitigate their impact. This project aims to design a cyber-physical system for early detection and rapid response to forest fires using advanced techn...
ver más
|
|
|
|
|
|
|
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence...
ver más
|
|
|
|
|
|
|
Changui Lee and Seojeong Lee
The maritime industry, which transports approximately 90% of the world?s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may compromise...
ver más
|
|
|
|
|
|
|
Agus Winarno and Riri Fitri Sari
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use...
ver más
|
|
|
|
|
|
|
Noon Hussein and Armstrong Nhlabatsi
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT de...
ver más
|
|
|
|
|
|
|
Andrew John Poulter and Simon J. Cox
This paper assesses the relative performance of the MQTT protocol in comparison to the Secure Remote Update Protocol (SRUP) in a number of simulated real-world conditions, and describes an experiment that has been conducted to measure the processing dela...
ver más
|
|
|
|
|
|
|
Andrew John Poulter and Simon J. Cox
Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This pap...
ver más
|
|
|
|
|
|
|
Andrew John Poulter, Steven J. Ossont and Simon J. Cox
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-c...
ver más
|
|
|
|
|
|
|
Jhonattan J. Barriga, Juan Sulca, José León, Alejandro Ulloa, Diego Portero, José García and Sang Guun Yoo
Finding a parking space in a city is one of the most common activities of a driver. This becomes more difficult when the city is unknown or has huge vehicular congestion. A solution to address this issue is called smart parking. Smart parking solutions r...
ver más
|
|
|
|
|
|
|
Lorenzo Invidia,Silvio Lucio Oliva,Andrea Palmieri,Luigi Patrono,Piercosimo Rametta
Pág. 138 - 149
The Internet of Things (IoT) is characterized by many technologies, standards, tools and devices for a wide range of application fields and often, for the end-users (makers and developers), is hard to orientate in an equally wide range of offers from var...
ver más
|
|
|
|
|
|
|
Samer Jaloudi
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation ...
ver más
|
|
|
|