期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Optimizing Resource Management for IoT Devices in Constrained Environments
1
作者 sadia islam nilima Md Khokan Bhuyan +3 位作者 Md Kamruzzaman Jahanara Akter Rakibul Hasan Fatema Tuz Johora 《Journal of Computer and Communications》 2024年第8期81-98,共18页
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but... Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations. 展开更多
关键词 Internet of Things Resource Constraint IPv6 Protocol IP-Based Network Management Network Management Protocol Network Configuration Protocol
下载PDF
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
2
作者 Nur Mohammad Rabeya Khatoon +3 位作者 sadia islam nilima Jahanara Akter Md Kamruzzaman Hasan Mahmud Sozib 《Journal of Computer and Communications》 2024年第8期257-277,共21页
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device... The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand. 展开更多
关键词 IoT Security Privacy Blockchain Technologies Layered Perspective
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部