A comprehensive review on energy harvesting integration in IoT systems from MAC layer perspective: Challenges and opportunities

G Famitafreshi, MS Afaqui, J Melià-Seguí - Sensors, 2021 - mdpi.com
The Internet of Things (IoT) is revolutionizing technology in a wide variety of areas, from
smart healthcare to smart transportation. Due to the increasing trend in the number of IoT …

[PDF][PDF] CLASSIFICATION OF SECURITY RISKS IN THE IOT ENVIRONMENT.

I Cvitić, M Vujić - Annals of DAAAM & Proceedings, 2015 - daaam.info
The concept of Internet of Things (IoT) is based on a layered architecture. Each of the layers
includes the application of a range of diverse technologies for the data transmission …

Internet of things (IOT), three-layer architecture, security issues and counter measures

B Paul - ICT analysis and applications, 2022 - Springer
Abstract Internet of Things (IoT) a tired framework necessitates the use of diverse
technologies, for capturing, processing, analyzing, and storing large unprocessed data in …

[PDF][PDF] Deployment of IoT based smart environment: key issues and challenges

D Sehrawat, NS Gill - International Journal of Engineering & …, 2018 - academia.edu
Abstract The Internet of Things (IoT) is viewed as a dynamic technological revolution
representing future communications and computing in several areas. It introduces physical …

Security enhancement technique in cognitive networks

N Saini, N Pandey, AP Singh - International Journal of Information …, 2020 - Springer
Networking provides the main infrastructure for different recent applications. These
applications are targets for various types of attacks. This research mainly focuses on …

RFID Clone Detection in Supply Chain Using Modified Count-Min and BASE Protocol.

MB Mustaffa, MM Singh… - International Journal of …, 2024 - search.ebscohost.com
Abstract Radio Frequency Identification (RFID) clone in supply chain system causes money,
and reputation loss. Existing algorithm detects the clone in RFID tag, never detect clone …

[PDF][PDF] Internet of Things (IoT) a study on security attacks and countermeasures

AA Mohsin - Al-Mansour Journal, 2019 - iasj.net
Internet of Things (IoT) applications represents a new revolution in information technology
field. Researchers have predicted that by 2020, the number of digitally connected devices …

On IoT Localization Architectures Comparison and Privacy Concerns in the Healthcare Sector

A Scarfò - … Conference on Computational Science and Its …, 2022 - Springer
Nowadays, localization is one of the most interesting and used application in IoT domain. It
promises to gain more and more relevance, especially in the healthcare market, thanks to …

Advanced research on data privacy in the ARES Project

G Navarro-Arribas, V Torra - Advanced research in data privacy, 2015 - Springer
Privacy has become an important concern in today's society. The advancement and
pervasiveness of information and communication technologies have a great positive impact …

" Early Buddhist Culture and Language Revival Movements

RP Ovhal - Multidisciplinary Research in Arts, Science & …, 2024 - books.google.com
The rapid evolution of payment systems is transforming the financial landscape, driven by
advancements in digital technology. Payment systems are evolving rapidly with the rise of …