نتایج جستجو برای: iot devices
تعداد نتایج: 214508 فیلتر نتایج به سال:
With the advent of numerous Internet of things(IoT) applications, the number of IoT devices increased drastically and we are moving towards Smart Home which utilizes these heterogeneous IoT devices to accomplish a task with less user intervention. On the other hand, making these IoT devices interact with each other and performing some processing on data gathered from different IoT devices, with...
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber de...
The problem of cooperative spectrum leasing to unlicensed Internet of Things (IoT) devices is studied to account for potential selfish behavior of these devices. A distributed game theoretic framework for spectrum leasing is proposed where the licensed users can willingly lease a portion of their spectrum access to unlicensed IoT devices, and in return the IoT devices provide cooperative servic...
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications....
Modern sensing devices play a pivotal role in achieving data acquisition, communication and dissemination for the Internet-of-Things (IoT). Naturally, IoT applications and intelligent sensing systems supported by sensing devices, such as wireless sensor networks (WSN), are closely coupled. Modern intelligent sensing systems generate huge volumes of sensing data, well beyond the processing capab...
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechan...
The increasing popularity of specialized Internetconnected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have always-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network obs...
Internet of Things (IoT) rises as a powerful domain where embedded devices and sensors can connect and exchange information over the Internet. The importance of IoT devices and data can be critical, so security constraints are required to keep IoT data safe from intruders; authentication is one of basic and important means to confirm data privacy and security. The nature of IoT devices as a res...
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices are extremely dependent on the reliability of their message transmission. Cyber attacks such as data injection, eavesdropping, and man-in-the-middle threats can lead to security challenges. Securing IoT devices agai...
The increasing popularity of specialized Internet-connected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have al ways-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید