期刊文献+
共找到2,694篇文章
< 1 2 135 >
每页显示 20 50 100
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
1
作者 Ayman Khallel Al-Ani Shams Ul Arfeen Laghari +2 位作者 Hariprasath Manoharan Shitharth Selvarajan Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第8期2261-2279,共19页
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha... In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions. 展开更多
关键词 transportation Artificial Intelligence(AI) DATA-DRIVEN internet of Things(IoT)
下载PDF
Traffic Control Based on Integrated Kalman Filtering and Adaptive Quantized Q-Learning Framework for Internet of Vehicles
2
作者 Othman S.Al-Heety Zahriladha Zakaria +4 位作者 Ahmed Abu-Khadrah Mahamod Ismail Sarmad Nozad Mahmood Mohammed Mudhafar Shakir Hussein Alsariera 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2103-2127,共25页
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled... Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data.The framework integrates Kalman filtering and Q-learning.Unlike smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error.Unlike traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction roads.For evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art approach.Hence,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system. 展开更多
关键词 Q-LEARNING intelligent transportation system(ITS) traffic control vehicular communication kalman filtering smart city internet of Things
下载PDF
Street Lamp Status Warning System Based on Internet of Things Technology
3
作者 Hanli Wang Yuanzhi Liu Yilin Wu 《Journal of Electronic Research and Application》 2024年第4期154-160,共7页
This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of ... This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction. 展开更多
关键词 internet of Things Early warning system Intelligent transportation
下载PDF
MADCR:Mobility Aware Dynamic Clustering-Based Routing Protocol in Internet of Vehicles 被引量:7
4
作者 Sankar Sennan Somula Ramasubbareddy +3 位作者 Sathiyabhama Balasubramaniyam Anand Nayyar Chaker Abdelaziz Kerrache Muhammad Bilal 《China Communications》 SCIE CSCD 2021年第7期69-85,共17页
Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly d... Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly dynamic.Clustering is one of the promising solutions to maintain the route stability in the dynamic network.However,existing algorithms consume a considerable amount of time in the cluster head(CH)selection process.Thus,this study proposes a mobility aware dynamic clustering-based routing(MADCR)protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles.The MADCR protocol consists of cluster formation and CH selection processes.A cluster is formed on the basis of Euclidean distance.The CH is then chosen using the mayfly optimization algorithm(MOA).The CH subsequently receives vehicle data and forwards such data to the Road Side Unit(RSU).The performance of the MADCR protocol is compared with that ofAnt Colony Optimization(ACO),Comprehensive Learning Particle Swarm Optimization(CLPSO),and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer(CAVDO).The proposed MADCR protocol decreases the end-toend delay by 5–80 ms and increases the packet delivery ratio by 5%–15%. 展开更多
关键词 clustering protocol internet of things internet of vehicles optimization algorithm Mayfly algorithm
下载PDF
Adaptation of Vehicular Ad hoc Network Clustering Protocol for Smart Transportation 被引量:2
5
作者 Masood Ahmad Abdul Hameed +5 位作者 Fasee Ullah Ishtiaq Wahid Atif Khan M.Irfan Uddin Shaq Ahmad Ahmed M.El-Sherbeeny 《Computers, Materials & Continua》 SCIE EI 2021年第5期1353-1368,共16页
Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks(VANETs)for smart transportation that results from dynamic topology,limited resources and noncentra... Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks(VANETs)for smart transportation that results from dynamic topology,limited resources and noncentralized architecture.The performance of a clustering algorithm varies with the underlying mobility model to address the topology maintenance overhead issue in VANETs for smart transportation.To design a robust clustering algorithm,careful attention must be paid to components like mobility models and performance objectives.A clustering algorithm may not perform well with every mobility pattern.Therefore,we propose a supervisory protocol(SP)that observes the mobility pattern of vehicles and identies the realistic Mobility model through microscopic features.An analytical model can be used to determine an efcient clustering algorithm for a specic mobility model(MM).SP selects the best clustering scheme according to the mobility model and guarantees a consistent performance throughout VANET operations.The simulation has performed in three parts that is the central part simulation for setting up the clustering environment,In the second part the clustering algorithms are tested for efciency in a constrained atmosphere for some time and the third part represents the proposed scheme.The simulation results show that the proposed scheme outperforms clustering algorithms such as honey bee algorithm-based clustering and memetic clustering in terms of cluster count,re-afliation rate,control overhead and cluster lifetime. 展开更多
关键词 CLUSTER VANET smart transportation supervisory protocol mobility models
下载PDF
Implementation of Machine-to-Machine Solutions Using MQTT Protocol in Internet of Things (IoT) Environment to Improve Automation Process for Electrical Distribution Substations in Colombia 被引量:2
6
作者 Hermes Eslava Luis Alejandro Rojas Ramón Pereira 《Journal of Power and Energy Engineering》 2015年第4期92-96,共5页
In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost e... In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost electrical fault location, which contributes to improving quality of service, particularly by shortening interruption time spans in mid-voltage grids. The implementation makes use of MQTT protocol with an intensive use of Internet of things (IoT) environment which guarantees the following properties within the automation process: Advanced reports and statistics, remote command execution on one or more units (groups of units), detailed monitoring of remote units and custom alarm mechanism and firmware upgrade on one or more units (groups of units). This kind of implementation is the first one in Colombia and it is able to automatically recover from an N-1 fault. 展开更多
关键词 MACHINE to MACHINE Quality of Service Distribution Grids MQTT protocol internet of THINGS (IoT) ENVIRONMENT ELECTRICAL Energy
下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
7
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol Security Virtual Private Network Video Conferencing Voice over internet protocol JITTER End to End Delay
下载PDF
Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems 被引量:1
8
作者 Weiwei Liu Yang Tang +3 位作者 Fei Yang Chennan Zhang Dun Cao Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2020年第12期2511-2527,共17页
Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulner... Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things(IoT).Previous research on vulnerability has no congestion effect on the peak time of urban road network.The cascading failure of links or nodes is presented by IoT monitoring system,which can collect data from a wireless sensor network in the transport environment.The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure(V2I)channels to simulate key segments and their failure probability.Finally,the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors.The two indices are standardized by calculating the relative change rate,and the comprehensive index of the consequence after road network unit is in a failure state.Therefore,by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state,the comprehensive vulnerability of road network can be evaluated by a risk calculation formula.In short,the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals. 展开更多
关键词 internet of Things Intelligent Transport Systems vulnerability assessment transport network
下载PDF
Research of Intelligent Transportation System Based on the Internet of Things Frame 被引量:1
9
作者 Yuqi Wang Hui Qi 《Wireless Engineering and Technology》 2012年第3期160-166,共7页
According to city public transit problem characteristic, the main body of a paper has been submitted and has worked out one kind of based on the Internet of things frame Intelligent transportation system. That system ... According to city public transit problem characteristic, the main body of a paper has been submitted and has worked out one kind of based on the Internet of things frame Intelligent transportation system. That system collects data by vehicle terminal and uploads data to the server through the network and makes data visible to the consumer passing an algorithm in the server. One aspect, the consumer may inquire about public transit vehicle information by Web. On another aspect, the consumer can know public transit vehicle information by station terminal. The experiments have tested that the Intelligent transportation system can offer public transit vehicle information to many consumers with convenient way thereby this system can solve the city mass transit problem. 展开更多
关键词 The internet of THING INTELLIGENT transportation System Data VISIBLE
下载PDF
Artificial Intelligence Based Clustering with Routing Protocol for Internet of Vehicles 被引量:1
10
作者 Manar Ahmed Hamza Haya Mesfer Alshahrani +3 位作者 Fahd NAl-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Hany Mahgoub 《Computers, Materials & Continua》 SCIE EI 2022年第3期5835-5853,共19页
With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportatio... With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportation service,mitigation of costs incurred,reduction in resource utilization,and improvement in traffic management capabilities.Many trafficrelated problems in future smart cities can be sorted out with the incorporation of IoV in transportation.IoV communication enables the collection and distribution of real-time essential data regarding road network condition.In this scenario,energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing.With this motivation,the current research article presents a new Artificial Intelligence-based Energy Efficient Clustering with Routing(AI-EECR)Protocol for IoV in urban computing.The proposed AI-EECR protocol operates under three stages namely,network initialization,Cluster Head(CH)selection,and routing protocol.The presented AI-EECR protocol determines the CHs from vehicles with the help of Quantum Chemical Reaction Optimization(QCRO)algorithm.QCROalgorithmderives a fitness function with the help of vehicle speed,trust level,and energy level of the vehicle.In order to make appropriate routing decisions,a set of relay nodeswas selected usingGroup Teaching Optimization Algorithm(GTOA).The performance of the presented AI-EECR model,in terms of energy efficiency,was validated against different aspects and a brief comparative analysis was conducted.The experimental outcomes established that AI-EECR model outperformed the existing methods under different measures. 展开更多
关键词 Vehicular communication internet of vehicles energy efficient smart transportation smart city urban computing
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
11
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
下载PDF
Testing and Analysis of VoIPv6 (Voice over Internet Protocol V6) Performance Using FreeBSD
12
作者 Asaad A. Abusin M. D. Jahangir Alam Junaidi Abdullah 《International Journal of Communications, Network and System Sciences》 2012年第5期298-302,共5页
This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current... This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes. 展开更多
关键词 VoIPv6 (Voice OVER internet protocol V6) PERFORMANCE VOICE OVER internet protocol V6 PERFORMANCE Testing VOICE OVER internet protocol V6 PERFORMANCE Analysis VoIPv6 Quality Testing in the Application Level
下载PDF
LOA-RPL:Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime
13
作者 Sankar Sennan Somula Ramasubbareddy +2 位作者 Anand Nayyar Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2021年第10期351-371,共21页
Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a c... Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a clustering protocol,the selection of a cluster head(CH)plays a key role in prolonging the lifetime of a network.However,most cluster-based protocols,including routing protocols for low-power and lossy networks(RPLs),have used fuzzy logic and probabilistic approaches to select the CH node.Consequently,early battery depletion is produced near the sink.To overcome this issue,a lion optimization algorithm(LOA)for selecting CH in RPL is proposed in this study.LOA-RPL comprises three processes:cluster formation,CH selection,and route establishment.A cluster is formed using the Euclidean distance.CH selection is performed using LOA.Route establishment is implemented using residual energy information.An extensive simulation is conducted in the network simulator ns-3 on various parameters,such as network lifetime,power consumption,packet delivery ratio(PDR),and throughput.The performance of LOA-RPL is also compared with those of RPL,fuzzy rule-based energyefficient clustering and immune-inspired routing(FEEC-IIR),and the routing scheme for IoT that uses shuffled frog-leaping optimization algorithm(RISARPL).The performance evaluation metrics used in this study are network lifetime,power consumption,PDR,and throughput.The proposed LOARPL increases network lifetime by 20%and PDR by 5%–10%compared with RPL,FEEC-IIR,and RISA-RPL.LOA-RPL is also highly energy-efficient compared with other similar routing protocols. 展开更多
关键词 internet of things cluster head clustering protocol optimization algorithm lion optimization algorithm network lifetime routing protocol wireless sensor networks energy consumption low-power and lossy networks
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
14
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
下载PDF
Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles
15
作者 Mohana Priya Pitchai Manikandan Ramachandran +1 位作者 Fadi Al-Turjman Leonardo Mostarda 《Computers, Materials & Continua》 SCIE EI 2021年第9期3947-3966,共20页
The Internet of Things plays a predominant role in automating all real-time applications.One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules.As vehicles ar... The Internet of Things plays a predominant role in automating all real-time applications.One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules.As vehicles are connected to the internet through wireless communication technologies,the Internet of Vehicles network infrastructure is susceptible to flooding attacks.Reconfiguring the network infrastructure is difficult as network customization is not possible.As Software Defined Network provide a flexible programming environment for network customization,detecting flooding attacks on the Internet of Vehicles is integrated on top of it.The basic methodology used is crypto-fuzzy rules,in which cryptographic standard is incorporated in the traditional fuzzy rules.In this research work,an intelligent framework for secure transportation is proposed with the basic ideas of security attacks on the Internet of Vehicles integrated with software-defined networking.The intelligent framework is proposed to apply for the smart city application.The proposed cognitive framework is integrated with traditional fuzzy,cryptofuzzy and Restricted Boltzmann Machine algorithm to detect malicious traffic flows in Software-Defined-Internet of Vehicles.It is inferred from the result interpretations that an intelligent framework for secure transportation system achieves better attack detection accuracy with less delay and also prevents buffer overflow attacks.The proposed intelligent framework for secure transportation system is not compared with existing methods;instead,it is tested with crypto and machine learning algorithms. 展开更多
关键词 internet of things smart cities software-defined network intelligent transportation system fuzzy inference system
下载PDF
A survey on communication protocols and performance evaluations for Internet of Things
16
作者 Cüneyt Bayılmış MAli Ebleme +2 位作者 ÜnalÇavuşoğlu Kerem Küçük Abdullah Sevin 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1094-1104,共11页
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I... The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT. 展开更多
关键词 internet of Things IoT application layer protocols IoT communicati on pr otocols Performance evaluation
下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
17
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 internet of Things IPv6 over low power wireless personal area networks Routing protocol for Low-Power and Lossy Networks internet protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
Optimized Tuning of LOADng Routing Protocol Parameters for IoT
18
作者 Divya Sharma Sanjay Jain Vivek Maik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1549-1561,共13页
Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things(IoT),making it possible to accomplish tasks with less human interaction.However,it faces many problems,incl... Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things(IoT),making it possible to accomplish tasks with less human interaction.However,it faces many problems,including lower capacity links,energy utilization,enhancement of resources and limited resources due to its openness,heterogeneity,limited resources and extensiveness.It is challenging to route packets in such a constrained environment.In an IoT network constrained by limited resources,minimal routing control overhead is required without packet loss.Such constrained environments can be improved through the optimal routing protocol.It is challenging to route packets in such a constrained environment.Thus,this work is motivated to present an efficient routing protocol for enhancing the lifetime of the IoT network.Lightweight On-demand Ad hoc Distance-vector Routing Protocol—Next Generation(LOADng)protocol is an extended version of the Ad Hoc On-Demand Distance Vector(AODV)protocol.Unlike AODV,LOADng is a lighter version that forbids the intermediate nodes on the route to send a route reply(RREP)for the route request(RREQ),which originated from the source.A resource-constrained IoT network demands minimal routing control overhead and faster packet delivery.So,in this paper,the parameters of the LOADng routing protocol are optimized using the black widow optimization(BWO)algorithm to reduce the control overhead and delay.Furthermore,the performance of the proposed model is analyzed with the default LOADng in terms of delay,delivery ratio and overhead.Obtained results show that the LOADng-BWO protocol outperforms the conventional LOADng protocol. 展开更多
关键词 internet of things optimization algorithm routing protocol LOADng
下载PDF
Internet Print Protocol——Internet也可共享打印机
19
作者 谢静 《在线》 2004年第3期49-51,共3页
在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是... 在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是否定的。 展开更多
关键词 internet PRINT protocol internet打印服务器 远程管理 客户端配置 服务器配置 IPP共享打印
下载PDF
Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol
20
作者 M.Ramya Devi I.Jasmine Selvakumari Jeya 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期31-45,共15页
Internet of Vehicles(IoV)is an intelligent vehicular technology that allows vehicles to communicate with each other via internet.Communications and the Internet of Things(IoT)enable cutting-edge technologies including... Internet of Vehicles(IoV)is an intelligent vehicular technology that allows vehicles to communicate with each other via internet.Communications and the Internet of Things(IoT)enable cutting-edge technologies including such self-driving cars.In the existing systems,there is a maximum communication delay while transmitting the messages.The proposed system uses hybrid Cooperative,Vehicular Communication Management Framework called CAMINO(CA).Further it uses,energy efficient fast message routing protocol with Common Vulnerability Scoring System(CVSS)methodology for improving the communication delay,throughput.It improves security while transmitting the messages through networks.In this research,we present a unique intelligent vehicular infrastructure communication management framework.This framework includes additional stability for both short and long-range mobile communications.It also includes built-in cooperative intelligent transport system(C-ITS)capabilities for experimental verification in real-world contexts.In addition,an energy efficient-fast message distribution routing protocol(EE-FMDRP)has been presented.This combines the benefits between both temporal and direction oriented routing methods.This has been suggested for distributing information from the origin ends to the predetermined objective in a quick,accurate,and effective manner in the event of an emergency.The critical value scale score(CVSS)employ ratings to measure the assault probability in Markov chains.Probabilities of chained transitions allow us to statistically evaluate the integrity of a group of IoVassets.Thus the proposed method helps to enhance the vehicular systems.The CAMINO with energy efficient fast protocol using CVSS(CA-EEFP-CVSS)method outperforms in terms of shortest transmission latency achieves 2.6 sec,highest throughput 11.6%,and lowest energy usage 17%and PDR 95.78%. 展开更多
关键词 Intelligent automation intelligent transport system vehicular networks markov chains internet of vehicles critical value scale score
下载PDF
上一页 1 2 135 下一页 到第
使用帮助 返回顶部