Edge-computing-driven internet of things: A survey

L Kong, J Tan, J Huang, G Chen, S Wang, X Jin… - ACM Computing …, 2022 - dl.acm.org
The Internet of Things (IoT) is impacting the world's connectivity landscape. More and more
IoT devices are connected, bringing many benefits to our daily lives. However, the influx of …

Securing the Internet of Things: Challenges, threats and solutions

PIR Grammatikis, PG Sarigiannidis, ID Moscholios - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) is the next technological leap that will introduce
significant improvements to various aspects of the human environment, such as health …

Internet of Things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review

F Javed, MK Afzal, M Sharif… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a reality. As the IoT is now becoming a far more
common field, the demand for IoT technologies to manage the communication of devices …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges

B Afzal, M Umair, GA Shah, E Ahmed - Future Generation Computer …, 2019 - Elsevier
Abstract Social IoT (SIoT) is an emerging paradigm of IoT in which different IoT devices
interact and establish relationships with each other to achieve a common goal. In essence …

Robust detection of region-duplication forgery in digital image

W Luo, J Huang, G Qiu - 18th International Conference on …, 2006 - ieeexplore.ieee.org
Region duplication forgery, in which a part of a digital image is copied and then pasted to
another portion of the same image in order to conceal an important object in the scene, is …

A comprehensive survey on wireless sensor node hardware platforms

F Karray, MW Jmal, A Garcia-Ortiz, M Abid, AM Obeid - Computer Networks, 2018 - Elsevier
Wireless sensor nodes are the main components in wireless sensor networks. Such devices
affect the performance and the accuracy of the network. Countless commercial and research …

Hardware, software platforms, operating systems and routing protocols for Internet of Things applications

A Zrelli - Wireless Personal Communications, 2022 - Springer
In this paper, we introduce a survey of routing protocols for inter-net of things (IoT). We
provide an overview of hardware and software plat-forms for IoT applications. Therefore, we …

A generalization performance study using deep learning networks in embedded systems

J Gorospe, R Mulero, O Arbelaitz, J Muguerza… - Sensors, 2021 - mdpi.com
Deep learning techniques are being increasingly used in the scientific community as a
consequence of the high computational capacity of current systems and the increase in the …