Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study

BS Ahmed, M Bures, K Frajtak, T Cerny - IEEE Access, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging technology that has the promising power to change
our future. Due to the market pressure, IoT systems may be released without sufficient …

SDN based architecture for IoT and improvement of the security

O Flauzac, C González, A Hachani… - 2015 IEEE 29th …, 2015 - ieeexplore.ieee.org
With the exponential growth of devices connected to the Internet, security networks as one of
the hardest challenge for network managers. Maintaining and securing such large scale and …

New security architecture for IoT network

F Olivier, G Carlos, N Florent - Procedia Computer Science, 2015 - Elsevier
We explain the notion of security architecture for Internet of Things (IoT) based on software-
defined networking (SDN). In this context, the SDN-based architecture works with or without …

Real time performance analysis of secure IoT protocols for microgrid communication

A Kondoro, IB Dhaou, H Tenhunen, N Mvungi - Future Generation …, 2021 - Elsevier
Abstract Internet of Things (IoT) devices and technology are increasingly being integrated
into smart grids. These devices come with a lot of security vulnerabilities. To combat this, IoT …

Groundwork for neural network-based specific emitter identification authentication for IoT

JM McGinthy, LJ Wong… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Trust is a prominent concern with the continued expansion of the Internet of Things (IoT). As
new devices enter the market, device security must be a design pillar. In order to trust these …

Real time operating systems for the internet of things, vision, architecture and research directions

MHA Abdelsamea, M Zorkany… - 2016 World Symposium …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) is an environment in which everywhere and every device became
smart in a smart world. Internet of Things is growing vastly, it is implemented using smart …

Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol

A Abdulazeez, B Salim, D Zeebaree, D Doghramachi - 2020 - learntechlib.org
The key point of this paper is to assess and look over the top of the line network layer-based
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …

Formal specification, verification and evaluation of the MQTT protocol in the Internet of Things

M Houimli, L Kahloul, S Benaoun - … International conference on …, 2017 - ieeexplore.ieee.org
This paper presents the formal modeling and performance analysis of one of Internet of
Things (IoT) protocols. The Internet of Things is among the subjects best financed in the …

[HTML][HTML] Measuring security in IoT communications

C Bodei, S Chessa, L Galletta - Theoretical Computer Science, 2019 - Elsevier
More smart objects and more applications on the Internet of Things (IoT) mean more security
challenges. In IoT security is crucial but difficult to obtain. On the one hand the usual trade …

IoT-oriented waste management system based on new RFID-sensing devices and cloud technologies

L Catarinucci, R Colella, SI Consalvo… - … on Smart and …, 2019 - ieeexplore.ieee.org
Waste management is one of the basic and fundamental services provided by municipal
authorities and it is also one of the most expensive services. Although progress has been …