Sensory-based motion planning with global proofs

I Kamon, E Rivlin - IEEE transactions on Robotics and …, 1997 - ieeexplore.ieee.org
We present DistBug, a new navigation algorithm for mobile robots which exploits range data.
The algorithm belongs to the Bug family, which combines local planning with global …

A denial of service attack method for an iot system

L Liang, K Zheng, Q Sheng… - 2016 8th international …, 2016 - ieeexplore.ieee.org
In recent years, Internet of things (IoT) is widely used in various domains. However, the
security of the IoT system becomes a challenge. If the IoT system is attacked, a great …

A handshake protocol with unbalanced cost for wireless updating

J Cai, X Huang, J Zhang, J Zhao, Y Lei, D Liu… - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless updating is an essential method to update system files or fix bugs in Internet of
Things (IoT) devices. A significant and challenging problem in wireless updating is security …

OpenFunction for software defined IoT

N Xue, D Guo, J Zhang, J Xin, Z Li… - 2021 International …, 2021 - ieeexplore.ieee.org
The recent surge in the prosperity of the Internet of Things (IoT) has been attracting an
increasing number of researchers and experts with great attention due to its significant …

Applying docker swarm cluster into software defined internet of things

Y Gao, H Wang, X Huang - 2016 8th International Conference …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), cloud computing and integrated deployment are becoming central
topics in Internet development. In this paper, a cloud containerization solution, Docker, has …

Time-optimized management of IoT nodes

K Kolomvatsos - Ad Hoc Networks, 2018 - Elsevier
The vision of Internet of Things (IoT) aims to offer a vast infrastructure of numerous
interconnected devices usually called IoT nodes. The infrastructure consists of the basis of …

SFIOT: Software-Defined Function for the IoT

N Xue, J Zhang, Z Li, X Hong, H Tang… - 2022 IEEE 23rd …, 2022 - ieeexplore.ieee.org
Wireless reprogramming is a significant yet challenging issue in the Internet of Things (IoT).
Existing methods designed for wireless sensor networks (WSN) are inadequate for IoT …

Model checking of IoT system in microgrid

L Liang, K Zheng, Z Wei, Y Wang… - 2016 8th International …, 2016 - ieeexplore.ieee.org
Due to the serious air pollution, the renewable energy sources had attracted more and more
attention. In order to manage the renewable energy sources, the concept of microgrid is …

[图书][B] Authenticated Key Exchange Protocols with Unbalanced Computational Requirements

J Zhang - 2018 - search.proquest.com
Security is a significant problem for communications in many scenarios in Internet of Things
(IoT), such as military applications, electronic payment, wireless reprogramming of smart …

A Location-based Blockchain Evidence Preservation Wireless Communitication Scheme for HuaTaiYiMei v Tongdao Technology Development Case

B Chen, X Huang, F Liu, H Yin - 2021 4th International …, 2021 - ieeexplore.ieee.org
HuaTaiYiMei v Tongdao Technology Development case was heard by Hangzhou Internet
Court on March 15th, 2018. The court ruled in favour of HuaTai and awarded monetary …