Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects
S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …
numerous applications in our surrounding environment. The fundamental goal of an IoT …
Lightweight cryptography in IoT networks: A survey
With the advent of advanced technology, the IoT has made possible the connection of
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …
[HTML][HTML] SlowITe, a novel denial of service attack affecting MQTT
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
[HTML][HTML] Slowtt: A slow denial of service against iot networks
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
Current lightweight cryptography protocols in smart city IoT networks: A survey
M Rana, Q Mamun, R Islam - arxiv preprint arxiv:2010.00852, 2020 - arxiv.org
With the advent of advanced technology, IoT introduces a vast number of devices
connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT …
connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT …
The implementation of encryption algorithms in mqtt protocol for iot constrained devices
The Internet of Things (IoT) is a promising and emerging technology in which many devices
communicate, process, and exchange information with other devices, servers, or …
communicate, process, and exchange information with other devices, servers, or …
[PDF][PDF] DoS attacks detection in MQTT networks
D Dikii, S Arustamov… - Indonesian Journal of …, 2021 - pdfs.semanticscholar.org
The paper considers the problem of protecting the Internet of things infrastructure against
denial-of-service (DoS) attacks at the application level. The authors considered parameters …
denial-of-service (DoS) attacks at the application level. The authors considered parameters …
A precision cybersecurity workflow for cyber-physical systems: The iot healthcare use case
The IoT paradigm revolves around a tight interaction between the IT side (ie, the thing and
the software therein) and the human counterpart. From a security standpoint, both these …
the software therein) and the human counterpart. From a security standpoint, both these …
Internet of Things (IoT) applications security trends and challenges
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a
variety of technologies for capacity, preparation, and information transmission. With regard …
variety of technologies for capacity, preparation, and information transmission. With regard …
Traffic Analysis in V2X Application-Level Gateways
S Szancer - 2024 - reposit.haw-hamburg.de
Future cars will communicate with a variety of entities ranging from other vehicles and
infrastructure, such as traffic lights, to Internet-based services running on remote servers …
infrastructure, such as traffic lights, to Internet-based services running on remote servers …