[HTML][HTML] Network optimizations in the Internet of Things: A review

NN Srinidhi, SMD Kumar, KR Venugopal - Engineering Science and …, 2019 - Elsevier
The Internet was initially used to transfer data packets between users and data sources with
a specific IP address. Due to advancements, the Internet is being used to share data among …

Intelligence in IoT-based 5G networks: Opportunities and challenges

N Javaid, A Sher, H Nasir… - IEEE Communications …, 2018 - ieeexplore.ieee.org
The requirement of high data rates, low latency, efficient use of spectrum, and coexistence of
different network technologies are major considerations in Internet of Things (IoT)-based fifth …

Interoperability in internet of things: Taxonomies and open challenges

M Noura, M Atiquzzaman, M Gaedke - Mobile networks and applications, 2019 - Springer
In the last few years, many smart objects found in the physical world are interconnected and
communicate through the existing internet infrastructure which creates a global network …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Secure and reliable wsn for internet of things: Challenges and enabling technologies

S Lata, S Mehfuz, S Urooj - IEEE Access, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …

A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

MD Alshehri, FK Hussain - Computing, 2019 - Springer
Recently, the Internet of things (IoT) has received a lot of attention from both industry and
academia. A reliable and secure IoT connection and communication is essential for the …

Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system

A Poniszewska-Maranda, D Kaczmarek, N Kryvinska… - Computing, 2019 - Springer
Abstract The Internet of Things (IoT) has emerged as a disruptive technology for the current
and future of computing and communication. IoT is characterized by a variety of …

Quality-aware and fine-grained incentive mechanisms for mobile crowdsensing

J Wang, J Tang, D Yang, E Wang… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Limited research efforts have been made for Mobile CrowdSensing (MCS) to address quality
of the recruited crowd, ie, quality of services/data each individual mobile user and the whole …

A multi-target approach to estimate software vulnerability characteristics and severity scores

G Spanos, L Angelis - Journal of Systems and Software, 2018 - Elsevier
Software vulnerabilities constitute a great risk for the IT community. The specification of the
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …

Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research

S Aldhaheri, D Alghazzawi, L Cheng, A Barnawi… - Journal of Network and …, 2020 - Elsevier
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …