Internet of things: Vision, applications and research challenges

D Miorandi, S Sicari, F De Pellegrini, I Chlamtac - Ad hoc networks, 2012 - Elsevier
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …

A survey on near field communication (NFC) technology

V Coskun, B Ozdenizci, K Ok - Wireless personal communications, 2013 - Springer
Abstract Near Field Communication (NFC) as a promising short range wireless
communication technology facilitates mobile phone usage of billions of people throughout …

Antennas and propagation in UHF RFID systems

PV Nikitin, KVS Rao - 2008 IEEE international conference on …, 2008 - ieeexplore.ieee.org
In this paper, we discuss antennas and propagation aspects in current passive UHF RFID
systems. We consider a" reader-tag-reader" link and concentrate on each part of it: reader …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …

Combining heterogeneous service technologies for building an Internet of Things middleware

K Gama, L Touseau, D Donsez - Computer Communications, 2012 - Elsevier
Radio-frequency identification (RFID) is a technology that allows ordinary objects to be
uniquely identified by “smart tags” which are also capable of storing small quantities of data …

From the internet of things to embedded intelligence

B Guo, D Zhang, Z Yu, Y Liang, Z Wang, X Zhou - World Wide Web, 2013 - Springer
Abstract The Internet of Things (IoT) represents the future technology trend of sensing,
computing, and communication. Under the Wisdom Web of Things (W2T) vision, the next …

TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks

X Wang, M Chen, Z Han, DO Wu… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
The ever increasing traffic demand becomes a serious concern of mobile network operators.
To solve this traffic explosion problem, there have been many efforts to offload the traffic from …

Ultra-low-power sub-photon-voltage high-efficiency light-emitting diodes

N Li, K Han, W Spratt, S Bedell, J Ott, M Hopstaken… - Nature …, 2019 - nature.com
Conventional light-emitting diodes (LEDs) face an efficiency droop at low current due to non-
radiative recombination overtaking radiative recombination at low carrier density. To …

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms

V Odelu, AK Das, A Goswami - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authentication protocol plays an important role in the short-range wireless communications
for the Near Field Communication (NFC) technology. Due to the shared nature of wireless …

A new methodology to support group decision-making for IoT-based emergency response systems

N Li, M Sun, Z Bi, Z Su, C Wang - Information systems frontiers, 2014 - Springer
An emergency response system (ERS) can assist a municipality or government in improving
its capabilities to respond urgent and severe events. The responsiveness and effectiveness …