A review on security problems and measures of Internet of Things

H Verma, K Chahal - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) plays a significant role as it includes traditional appliances as well as
everyday household objects. The security problems of IoT are related to spacious …

Analysis of different detection and mitigation algorithm of ddos attack in software-defined Internet of Things framework: A review

N Kumar, N Mittal, P Thakur, R Srivastava - Recent Trends and Advances …, 2020 - Springer
A decentralized type of network which senses the information from surrounding regions and
then forwards it to the base station is known as Internet of Things (IoT). With the increasing …

[PDF][PDF] Security-enhanced Search Engine Design in Internet of Things.

X Qian, X Che - J. Univers. Comput. Sci., 2012 - Citeseer
This paper elaborates the challenges in searching imposed by the burgeoning field of
Internet of Things (IoT). Firstly it overviews the evolution of the new field to its predecessors …

Dynamic framework to mining internet of things for multimedia services

Y Khamayseh, W Mardini, JW Atwood… - Expert …, 2020 - Wiley Online Library
The rapid and unprecedented technological advancements are currently dominated by two
technologies. At one hand, we witness the rise of the Internet of Things (IoT) as the next …

IOTWC: Analytic hierarchy process based Internet of Things workflow composition system

Y Li, DN Jha, GS Aujla, G Morgan… - … conference on cloud …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) allows the creation of virtually endless connections into a global
array of distributed intelligence. However, the design, development, and deployment of IoT …

Searching in internet of things using VCS

M Shah, A Sardana - Proceedings of the First International Conference …, 2012 - dl.acm.org
Due to proliferation of WSN applications in real world, we are having smart devices
everywhere. Our future will be full of these sensor objects. Internet of Things (IoT) is going to …

Understanding the Trustworthiness Management in the SIoT Network

S Sagar, A Mahmood, QZ Sheng - … Social IoT Sensors and Networks: A …, 2024 - Springer
This chapter presents a holistic review of trustworthiness management for SIoT. The
essence of trust in various disciplines has been discussed along with the Trust in SIoT …

Ada-MAC: An adaptive MAC protocol for real-time and reliable health monitoring

F Xia, L Wang, D Zhang, X Zhang… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
IEEE 802.15. 4 is regarded as one of the most suitable communication protocols for cyber-
physical applications of wireless sensor and actuator networks. This is because this protocol …

[PDF][PDF] 物联网服务中间件: 挑战与研究进展

陈海明, 石海龙, 李勐, 崔莉 - 计算机学报, 2017 - chenhaiming.cn
摘要目前提出的物联网应用系统构建方法主要基于面向服务的体系结构(SOA),
主要原理是将物端资源与云端资源提供的感知, 执行与数据处理等能力分别抽象为实体服务和云 …

Design and implement a sustainable wireless smart home based on iot

OKM Ali, BR Altamer, MS Alsoufi, RR Ali - AIP Conference …, 2024 - pubs.aip.org
Nowadays, the IoT (Internet of Things) plays a crucial role in many requirements of daily life,
where healthcare, safety, security, and energy management are considered some of the …