Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Internet of Things IoT" wg kryterium: Temat


Wyświetlanie 1-3 z 3
Tytuł:
Intrusion Detection in Heterogeneous Networks of Resource-Limited Things
Autorzy:
Kozakiewicz, A.
Lasota, K.
Marks, M.
Powiązania:
https://bibliotekanauki.pl/articles/307880.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
client honeypot
internet of things (IoT)
intrusion detection
wireless sensor network
Opis:
The paper discusses the threats to networks of resource-limited things such as wireless sensors and the different mechanisms used to deal with them. A novel approach to threat detection is proposed. MOTHON is a movement-assisted threat detection system using mobility to enhance a global threat assessment and provide a separate physical secure channel to deliver collected information.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 4; 10-14
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID layer for Internet of Things based on Name-Oriented Networking
Autorzy:
Batalla, J. M.
Krawiec, P.
Gajewski, M.
Sienkiewicz, K.
Powiązania:
https://bibliotekanauki.pl/articles/308281.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Future Internet
ID-based routing
ID layer
internet of things (IoT)
Name-Oriented Networking
Opis:
Object and service identification is considered as one of the main challenges in the field of Internet of Things (IoT), which can be solved by the introduction of the so called ID (IDentifier) layer. The objective of this layer is to expose IoT objects and services offered by them, to users. Common approach for ID layer is to create it in overlay manner, on the top of existing network. This paper presents a novel architecture of the ID layer, which is characterized by embedding ID layer functionality into the network plane. Moreover, this approach takes advantage of the Name-Oriented Networking (NON) paradigm. To gain easy access to the IoT objects and services, as well as native support for multicast service, human readable ID-based unified addressing with hierarchical structure was exploited. Additionally, in-network caching of forwarded IoT data, inherited from the NON, helps to reduce total network load and supports applications during collaboration with energy-constrained sensors. Such sensors may enter sleep mode to save energy and then the network nodes can serve requests for sensing data, arrived from applications, by using data stored in nodes’ cache. The paper shows the concept of NON-based ID layer and describes functional architecture of network node paying attention on modules and mechanisms related with ID layer functionality. Primary ID layer processes, i.e., object/service registration, resolution and data forwarding are explained in detail. Moreover, the ID-aware network node was implemented on Linux-based platform and tested to check its forwarding characteristics. The tests showed the performance of the of ID network node in data plane operations, which are the more sensitive for scalability issues.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 2; 40-48
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Cross-layer Method for Scheduling and Routing Real-time Traffic Flow in Industrial IoT
Autorzy:
Azimian, Nikta
Mohammadi, Reza
Nassiri, Mohammad
Powiązania:
https://bibliotekanauki.pl/articles/24200758.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Internet of things
Industrial IoT
multi sink
TSCH standard
Opis:
In the Industrial Internet of Things, a wide variety of sensors are distributed all over the environment to monitor data collection, thereby allowing industrial processes to be monitored more efficiently. One of the fundamental goals of IIoT is to provide the highest level of reliability while simultaneously increasing network lifetime, reducing power consumption, and preventing delays. 6TiSCH is a popular communication standard relied upon in IIoT. The aim of the present study is to propose an inter-layer method that simultaneously considers network scheduling and routing processes based on TSCH and RPL approaches in multi-sink environments. The proposed method is intended to address the limitations of IIoT and meet the requirements of field-specific applications.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 3; 54--61
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies