Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of IoT application layer protocols: Challenges and findings
G Nebbione, MC Calzarossa - Future Internet, 2020 - mdpi.com
IoT technologies are becoming pervasive in public and private sectors and represent
presently an integral part of our daily life. The advantages offered by these technologies are …
presently an integral part of our daily life. The advantages offered by these technologies are …
A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS
Industrial Internet of Things (IIoT) is present in many participants from the energy, health,
manufacturing, transport, and public sectors. Many factors catalyze IIoT, such as robotics …
manufacturing, transport, and public sectors. Many factors catalyze IIoT, such as robotics …
A survey on IoT platforms: Communication, security, and privacy perspectives
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …
are performed every day. The integration of sensors, lightweight computation, and the …
Survey of platforms for massive IoT
Internet of things (IoT) becomes a prominent technology in our world. It is enabling the
connection between the objects (the “things”) and the backend systems via the Internet …
connection between the objects (the “things”) and the backend systems via the Internet …
Securing the Internet of Things in a quantum world
Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs)
as basic building blocks to secure the communication in the IoT. However, public key …
as basic building blocks to secure the communication in the IoT. However, public key …
The IoT architectural framework, design issues and application domains
The challenge raised by the introduction of Internet of Things (IoT) concept will permanently
shape the networking and communications landscape and will therefore have a significant …
shape the networking and communications landscape and will therefore have a significant …
Security analysis of IoT protocols: A focus in CoAP
RA Rahman, B Shah - … 3rd MEC international conference on big …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products
or smart things connected to the internet. It is a new and fast develo** market which not …
or smart things connected to the internet. It is a new and fast develo** market which not …
BCTrust: A decentralized authentication blockchain-based mechanism
MT Hammi, P Bellot… - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
Internet of Things becomes a major part of our lives, billions of autonomous devices are
connected and communicate with each other. This revolutionary paradigm creates a new …
connected and communicate with each other. This revolutionary paradigm creates a new …
A survey on the challenges and opportunities of the Internet of Things (IoT)
Internet of Things (IoT) is a rapidly growing technology with a wide range of applications in
various fields. It has unified a plethora of devices and infrastructure under the same umbrella …
various fields. It has unified a plethora of devices and infrastructure under the same umbrella …
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …
compressed version of HTTP protocol that is used for communication between lightweight …