Open Access
Issue |
ITM Web Conf.
Volume 52, 2023
International Conference on Connected Object and Artificial Intelligence (COCIA’2023)
|
|
---|---|---|
Article Number | 01010 | |
Number of page(s) | 8 | |
Section | Connected Objects and Systems | |
DOI | https://doi.org/10.1051/itmconf/20235201010 | |
Published online | 08 May 2023 |
- D. Vjose and A. Vijyalakshmi, “An Overview of Security in Internet of Things, ” Procedia Computer Science, vol. 143, pp. 744–748, 2018, doi: https://doi.org/10.1016/j.procs.2018.10.439. [CrossRef] [Google Scholar]
- J. Qian, H. Xu, and P. Li, “A Novel Secure Architecture for the Internet of Things, ” 2016. doi: 10.1109/INCoS.2016.36. [Google Scholar]
- ITU-T, “Overview of the Internet of things, ” 2012. [Google Scholar]
- C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context Aware Computing for The Internet of Things: A Survey, ” EEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–454, 2014, doi: 10.1109/SURV.2013.042313.00197. [CrossRef] [Google Scholar]
- D. Chen, G. Chang, L. Jin, X. Ren, J. L, and F. Li, “A Novel Secure Architecture for the Internet of Things, ” 2011. doi: 10.1109/ICGEC.2011.77. [Google Scholar]
- M. Addaa, J. Abdelazizb, H. Mcheickb, and R. Saad, “Toward an Access Control Model for IOTCollab, ” Procedia Computer Science, vol. 52, pp. 428–435, 2015, doi: https://doi.org/10.1016/j.procs.2015.05.009. [CrossRef] [Google Scholar]
- K. K. Patel and S. M. Patel, “Internet of Things-IOT : Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges, ” International Journal of Engineering Science and Computing, May 2, vol. 6, no. 5, p. 6122, 2016, doi: 10.4010/2016.1482. [Google Scholar]
- S. Rupali and Shanbhag Radha, “Architecture for Internet of Things to minimize human intervention, ” 2015. doi: 10.1109/ICACCI.2015.7275969. [Google Scholar]
- L. Pratap Verma and Mahesh Kumar, “An IoT based Congestion Control Algorithm, ” Internet of Things, vol. 9, 2020, doi: https://doi.org/10.1016/j.iot.2019.100157. [Google Scholar]
- Y. Chai, Q. Du, and P. Ren, “Partial time-frequency resource allocation for deviceto-device communications underlaying cellular networks, ” 2013. doi: 10.1109/ICC.2013.6655570. [Google Scholar]
- P. Gandotra and R. K. Jha, “Device-to-Device Communication in Cellular Networks: A Survey, ” Journal of Network and Computer Applications, vol. 77, pp. 99–117, 2016. [CrossRef] [Google Scholar]
- F. Samie, L. Bauer, and J. Henkel, “IoT technologies for embedded computing: A survey, ” 2016. doi: 10.1145/2968456.2974004. [Google Scholar]
- Q. V. Khanh, N. V. Hoai, L. D. Manh, A. N. Le, and J. Gwanggil, “Cyber-Physical Mobile Computing, Communications, and Sensing for Industrial Internet of Things and Industry 4.0 2021, ” Wireless Communications and Mobile Computing, vol. 2022, 2022, doi: https://doi.org/10.1155/2022/3229294. [CrossRef] [Google Scholar]
- M. Kuzlu, M. Pipattanasomporn, and S. Rahman, “Review of communication technologies for smart homes/building applications, ” 2015. doi: 10.1109/ISGTAsia.2015.7437036. [Google Scholar]
- K. K. Vaigandla, R. K. Karne, and Allanki Sanyasi Rao, “A Study on IoT Technologies, Standards and Protocols, ” IBMRD’s Journal of Management & Research, vol. 10, no. 2, 2021, doi: 10.17697/ibmrd/2021/v10i2/166798. [Google Scholar]
- K. K. S. Klangphukhiew, S. Kulchat, and R. Patramanon, “Smartphone-Based NFC Potentiostat for Wireless Electrochemical Sensing, ” Applied Sciences, vol. 11, no. 1, 2021, doi: https://doi.org/10.3390/app11010392. [Google Scholar]
- T. Kamaleshwar, Lakshminarayanan, R. Teekaraman, Y. Kuppusamy, and R. R. Arun, “Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN, ” Wireless Communications and Mobile Computing, vol. 2021, 2021, doi: https://doi.org/10.1155/2021/5143124. [CrossRef] [Google Scholar]
- K. Pahlavan and P. Krishnamurthy, “Evolution and Impact of Wi-Fi Technology and Applications: A Historical Perspective, ” International Journal of Wireless Information Networks, vol. 28, pp. 3–19, 2021, doi: https://doi.org/10.1007/s10776020-00501-8. [CrossRef] [Google Scholar]
- S. Ugwuanyi, G. Paul, and J. Irvine, “Survey of IoT for Developing Countries: Performance Analysis of LoRaWAN and Cellular NB-IoT Networks, ” Electronics, 2021, doi: https://doi.org/10.3390/electronics10182224. [Google Scholar]
- C. Corde, “Pourquoi le Nb-IoT peut être une alternative sérieuse?, ” 2022. https://blog.rtone.fr/nb-iot [Google Scholar]
- L. Militano, A. Orsino, G. Araniti, and A. Iera, “NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems, ” Future Internet, vol. 9, no. 3, 2017, doi: https://doi.org/10.3390/fi9030031. [CrossRef] [Google Scholar]
- A. J. Motarjemi and A. K. Khodadad, “Proposing a new protocol for using deviceto-device communications in narrowband IoT-based systems, ” 2021. doi: 10.1109/SGC54087.2021.9664195. [Google Scholar]
- S. Gollapudi, L. K. Pathak, T. Vrind, D. Sharma, and S. K. Mishra, “Indoor Positioning using cellular network and relay node for wearables, ” EAI Endorsed Transactions on Cloud Systems, 2018, doi: http://dx.doi.org/10.4108/eai.16-5-2018.156533. [Google Scholar]
- S. Ipopli, R. K. Jha, and Sanjeev Jain, “Adaptive Small Cell position algorithm (ASPA) for green farming using NB-IoT, ” Journal of Network and Computer Applications, vol. 173, 2021, doi: https://doi.org/10.1016/j.jnca.2020.102841. [Google Scholar]
- O. S. Althobaiti and M. Dohler, “Narrowband-Internet of Things Device-to-Device Simulation: An Open-Sourced Framework, ” Sensors, vol. 21, no. 5, 2021, doi: https://doi.org/10.3390/s21051824. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.