Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey

S Benhamaid, A Bouabdallah, H Lakhlef - Journal of Network and …, 2022 - Elsevier
Abstract Internet-of-Things (IoT) refers to the massive network interconnection of objects
often equipped with ubiquitous intelligence employed to provide smart services to end …

Survey of testing methods and testbed development concerning Internet of Things

S Zhu, S Yang, X Gou, Y Xu, T Zhang… - Wireless Personal …, 2022 - Springer
The concept of Internet of Things (IoT) was designed to change everyday lives of people via
multiple forms of computing and easy deployment of applications. In recent years, the …

A quantitative study of DDoS and E-DDoS attacks on WiFi smart home devices

B Tushir, Y Dalal, B Dezfouli… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) has facilitated the prosperity of smart environments such as smart
homes. Meanwhile, WiFi is a broadly used technology for the wireless connectivity of IoT …

Smart energy optimization for massive IoT using artificial intelligence

M Raval, S Bhardwaj, A Aravelli, J Dofe, H Gohel - Internet of Things, 2021 - Elsevier
The concept of a connected world using Internet of Things (IoT) has already taken pace
during this decade. The efficient hardware and high throughput networks have made it …

Implementation and analysis of QUIC for MQTT

P Kumar, B Dezfouli - Computer Networks, 2019 - Elsevier
Transport and security protocols are essential to ensure reliable and secure communication
between two parties. For IoT applications, these protocols must be lightweight, since IoT …

Security and performance in IoT: A balancing act

LE Kane, JJ Chen, R Thomas, V Liu, M Mckague - IEEE access, 2020 - ieeexplore.ieee.org
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by
2022, performance of these low powered devices, as well as security is of utmost …

The impact of dos attacks onresource-constrained iot devices: A study on the mirai attack

B Tushir, H Sehgal, R Nair, B Dezfouli, Y Liu - arXiv preprint arXiv …, 2021 - arxiv.org
Mirai is a type of malware that creates a botnet of internet-connected devices, which can
later be used to infect other devices or servers. This paper aims to analyze and explain the …

Enhancing the energy-efficiency and timeliness of IoT communication in WiFi networks

J Sheth, B Dezfouli - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Increasing the number of Internet of Things (IoT) stations or regular stations escalates
downlink channel access contention and queuing delay, which in turn result in higher …

Image classification on IoT edge devices: profiling and modeling

S Abdel Magid, F Petrini, B Dezfouli - Cluster Computing, 2020 - Springer
With the advent of powerful, low-cost IoT systems, processing data closer to where the data
originates, known as edge computing, has become an increasingly viable option. In addition …

Power consumption profiling of a lightweight development board: Sensing with the INA219 and Teensy 4.0 microcontroller

J Lambert, R Monahan, K Casey - Electronics, 2021 - mdpi.com
At the heart of most technological advancements is a network of processors executing code
and consuming energy. Understanding those systems' energy consumption profiles …