IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions

M Tavana, V Hajipour, S Oveisi - Internet of Things, 2020 - Elsevier
In today's highly competitive markets, organizations can create a competitive advantage
through the successful implementation of Enterprise Resource Planning (ERP) systems …

Systematic review of internet of things security

A Amiruddin, AAP Ratna… - International Journal of …, 2019 - search.proquest.com
Abstract The Internet of Things has become a new paradigm of current communications
technology that requires a deeper overview to map its application domains, advantages, and …

[PDF][PDF] Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol.

WU Khan, SNK Marwat, S Ahmed - Computer Systems Science …, 2022 - cdn.techscience.cn
The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the
Internet which communicate and exchange data among each other. Applications of IoT can …

Security architecture for secure multicast coap applications

CS Park - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Multicast communication has been recently supported by the constrained application
protocol (CoAP), for the purpose of managing and controlling a group of homogeneous …

D4GW: DTLS for gateway multiplexed application to secure MQTT (SN)-based pub/sub architecture

B Imran, M Ahsan, AH Akbar, GA Shah - Internet of Things, 2024 - Elsevier
MQTT-SN a pub/sub application layer protocol is a well-established protocol in the Internet
of Things (IoT) paradigm. MQTT-SN gateway application is available as an open-source …

EnCoCo-RED: Enhanced congestion control mechanism for CoAP observe group communication

C Suwannapong, C Khunboa - Ad Hoc Networks, 2021 - Elsevier
Abstract As Internet of Things (IoT) applications have gained increasing popularity,
mechanisms to deal with congestion control owing to the large number of nodes have …

Congestion control in CoAP observe group communication

C Suwannapong, C Khunboa - Sensors, 2019 - mdpi.com
The Constrained Application Protocol (CoAP) is a simple and lightweight machine-to-
machine (M2M) protocol for constrained devices for use in lossy networks which offers a …

A group-oriented DTLS handshake for secure IoT applications

CS Park, WS Park - IEEE Transactions on Automation Science …, 2018 - ieeexplore.ieee.org
The datagram transport layer security (DTLS) is a de facto standard for the end-to-end
security of the constrained application protocol (CoAP) that defines the following three …

Securing multicast group communication in IoT-enabled systems

SS Basu, S Tripathy - IETE Technical Review, 2019 - Taylor & Francis
Current trend is being extended from the traditional Internet to the small, cheap, and low-
power Internet of Things (IoT) in which the objects are being equipped with a device having …

TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks

A Anand, M Conti, P Kaliyar, C Lal - Wireless Networks, 2020 - Springer
Abstract Internet of Things (IoT) employs a large number of sensors and actuators to collect
and act upon data for its smart functionalities. These devices are considered as a part of the …