Internet of Things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review
The Internet of Things (IoT) has become a reality. As the IoT is now becoming a far more
common field, the demand for IoT technologies to manage the communication of devices …
common field, the demand for IoT technologies to manage the communication of devices …
Programming wireless sensor networks: Fundamental concepts and state of the art
Wireless sensor networks (WSNs) are attracting great interest in a number of application
domains concerned with monitoring and control of physical phenomena, as they enable …
domains concerned with monitoring and control of physical phenomena, as they enable …
Reputation-based framework for high integrity sensor networks
Sensor network technology promises a vast increase in automatic data collection
capabilities through efficient deployment of tiny sensing devices. The technology will allow …
capabilities through efficient deployment of tiny sensing devices. The technology will allow …
Semantics-aware malware detection
A malware detector is a system that attempts to determine whether a program has malicious
intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to …
intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to …
Multiprogramming a 64kb computer safely and efficiently
Low-power microcontrollers lack some of the hardware features and memory resources that
enable multiprogrammable systems. Accordingly, microcontroller-based operating systems …
enable multiprogrammable systems. Accordingly, microcontroller-based operating systems …
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
In this paper we propose Sancus, a security architecture for networked embedded devices.
Sancus supports extensibility in the form of remote (even third-party) software installation on …
Sancus supports extensibility in the form of remote (even third-party) software installation on …
Middleware: Middleware challenges and approaches for wireless sensor networks
S Hadim, N Mohamed - IEEE distributed systems online, 2006 - ieeexplore.ieee.org
Using middleware to bridge the gap between applications and low-level constructs is a
novel approach to resolving many wireless sensor network issues and enhancing …
novel approach to resolving many wireless sensor network issues and enhancing …
Algorithmic authority: The case of Bitcoin
In this paper, we propose a new concept for understanding the role of algorithms in daily life:
algorithmic authority. Algorithmic authority is the legitimate power of algorithms to direct …
algorithmic authority. Algorithmic authority is the legitimate power of algorithms to direct …
Sancus 2.0: A low-cost security architecture for iot devices
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …
the USENIX Security conference. It supports remote (even third-party) software installation …
[BOG][B] Green communications: theoretical fundamentals, algorithms and applications
Nowadays energy crisis and global warming problems are hanging over everyone's head,
urging much research work on energy saving. In the ICT industry, which is becoming a major …
urging much research work on energy saving. In the ICT industry, which is becoming a major …