Efficient MQTT platform facilitating secure group communication
Abstract Message Queue Telemetry Transport (MQTT) has become one of the most popular
Internet-of-Things (IoT) communication protocols, owing to its high efficiency and simplicity …
Internet-of-Things (IoT) communication protocols, owing to its high efficiency and simplicity …
Smart hat: design and implementation of a wearable learning device for kids using AI and IoTs techniques
Abstract Internet of Things (IoT) and Artificial Intelligence (AI) have received much attention
in recent years. Embedded with sensors and connected to the Internet, the IoT device can …
in recent years. Embedded with sensors and connected to the Internet, the IoT device can …
An Application of Keystream Using Cellular Automata for Image Encryption in IoT
ST Wu - Journal of Internet Technology, 2023 - jit.ndhu.edu.tw
Recently, there have been some studies on security applications using cellular automata. A
cellular automaton (CA) is characterized by simplicity and high-speed computation, making …
cellular automaton (CA) is characterized by simplicity and high-speed computation, making …
A cost-aware method for tasks allocation on the internet of things by grouping the submitted tasks
R Dhanapal, T Akila, SS Hussain… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
Abstract Internet of Things (IoT) as a new paradigm is described the future in which physical
objects such as RFID tags, mobile phones, sensors, actuators, etc. are related to the Internet …
objects such as RFID tags, mobile phones, sensors, actuators, etc. are related to the Internet …
Detecting LDoS in NB-IoTs by using metaheuristic-based CNN
The number of IoT devices will grow explosively due to great potential of the NB-IoT so that
the IoT network environment will become a hotbed of botnets. Various IoT devices and …
the IoT network environment will become a hotbed of botnets. Various IoT devices and …
The development of an Internet of Things (IoT) network traffic dataset with simulated attack data
Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems,
researchers in the field of IoT network security complain about the rareness of real life-based …
researchers in the field of IoT network security complain about the rareness of real life-based …
Real‐Time Information Exchange Strategy for Large Data Volumes Based on IoT
J Du - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
In this paper, we study and analyse the real‐time information exchange strategy of big data
in the Internet of Things (IoT) and propose a primitive sensory data storage method (TSBPS) …
in the Internet of Things (IoT) and propose a primitive sensory data storage method (TSBPS) …
Hybrid FCSR Based Stream Cipher for Secure Communications in IoT
ST Wu - Journal of Internet Technology, 2023 - jit.ndhu.edu.tw
Abstract Linear Feedback Shift Register (LFSR) is the basic hardware of stream cipher, and
Feedback with Carry Shift Register (FCSR) is the nonlinear analogues of LFSR. FCSR is a …
Feedback with Carry Shift Register (FCSR) is the nonlinear analogues of LFSR. FCSR is a …
The prototype of the integration between low cost single private lora gateway and public ais nb-iot
E Boonchieng, A Saokaew… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
The prototype of the low cost single private LoRa gateway and LoRa node with GPS was
developed as the alternative communication channel for IOT work. The AIS NB-IOT was …
developed as the alternative communication channel for IOT work. The AIS NB-IOT was …
lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments
Abstract The Internet of Things (IoT) is vulnerable to a wide range of security risks, which can
be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive …
be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive …