Efficient MQTT platform facilitating secure group communication

HY Chien, PC Lin, ML Chiang - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Abstract Message Queue Telemetry Transport (MQTT) has become one of the most popular
Internet-of-Things (IoT) communication protocols, owing to its high efficiency and simplicity …

Smart hat: design and implementation of a wearable learning device for kids using AI and IoTs techniques

IH Chang, HC Keh, B Dande, DS Roy - Journal of Internet …, 2020 - jit.ndhu.edu.tw
Abstract Internet of Things (IoT) and Artificial Intelligence (AI) have received much attention
in recent years. Embedded with sensors and connected to the Internet, the IoT device can …

An Application of Keystream Using Cellular Automata for Image Encryption in IoT

ST Wu - Journal of Internet Technology, 2023 - jit.ndhu.edu.tw
Recently, there have been some studies on security applications using cellular automata. A
cellular automaton (CA) is characterized by simplicity and high-speed computation, making …

A cost-aware method for tasks allocation on the internet of things by grouping the submitted tasks

R Dhanapal, T Akila, SS Hussain… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
Abstract Internet of Things (IoT) as a new paradigm is described the future in which physical
objects such as RFID tags, mobile phones, sensors, actuators, etc. are related to the Internet …

Detecting LDoS in NB-IoTs by using metaheuristic-based CNN

CY Chen, HH Cho, MY Tsai… - … Journal of Ad Hoc …, 2021 - inderscienceonline.com
The number of IoT devices will grow explosively due to great potential of the NB-IoT so that
the IoT network environment will become a hotbed of botnets. Various IoT devices and …

The development of an Internet of Things (IoT) network traffic dataset with simulated attack data

D Stiawan, D Wahyudi, TW Septian, MY Idris… - Journal of Internet …, 2023 - jit.ndhu.edu.tw
Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems,
researchers in the field of IoT network security complain about the rareness of real life-based …

Real‐Time Information Exchange Strategy for Large Data Volumes Based on IoT

J Du - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
In this paper, we study and analyse the real‐time information exchange strategy of big data
in the Internet of Things (IoT) and propose a primitive sensory data storage method (TSBPS) …

Hybrid FCSR Based Stream Cipher for Secure Communications in IoT

ST Wu - Journal of Internet Technology, 2023 - jit.ndhu.edu.tw
Abstract Linear Feedback Shift Register (LFSR) is the basic hardware of stream cipher, and
Feedback with Carry Shift Register (FCSR) is the nonlinear analogues of LFSR. FCSR is a …

The prototype of the integration between low cost single private lora gateway and public ais nb-iot

E Boonchieng, A Saokaew… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
The prototype of the low cost single private LoRa gateway and LoRa node with GPS was
developed as the alternative communication channel for IOT work. The AIS NB-IOT was …

lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments

H Park, J Kim, S Lee, DG Duguma… - Journal of Internet …, 2021 - jit.ndhu.edu.tw
Abstract The Internet of Things (IoT) is vulnerable to a wide range of security risks, which can
be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive …