Open Access
Subscription Access
Open Access
Subscription Access
Internet of Things (IoT) with New Prespectives
Subscribe/Renew Journal
Internet of Things (IoT) is connected devices with interactions ie. Any service which allowed to interact with others. For example: any person, any device, any service, any place or any path can connect with IoT. IoT is used in various domains such as smart transport, health, business, etc,... and finally connected together in network.
Keywords
IoT Architecture, Technologies, IoT Cloud, Future of IoT.
User
Subscription
Login to verify subscription
Font Size
Information
- Z. Cai, Z. He, X. Guan, and Y. Li. Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Transactions on Dependable and Secure Computing, 2017.
- F. Chen, T. Xiang, X. Fu, and W. Yu. User differentiated verifiable file search on the cloud. IEEE Transactions on Services Computing, 2017.
- Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu. A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Research, 3:10–23, 2016.
- W. Gao, J. Nguyen, W. Yu, C. Lu, and D. Ku. Assessing performance of constrained application protocol (coap) in manet using emulation. In Proc. of ACM International Conference on Reliable & Convergent Systems (RACS), 2016.
- G. Kalnoor and J. Agarkhed. Qos based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In Proc. of 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), March 2016.
- S. Mallapuram, N. Ngwum, F. Yuan, C. Lu, and W. Yu. Smart city: The state of the art, datasets, and evaluation platforms. In Proc. of 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS), 2017.
- K. Sha, W. Wei, A. Yang, and W. Shi. Security in internet of things: Opportunities and challenges. In Proceedings of the International Conference on Identification, Information & Knowledge in the Internet of Things, October 2016.
- L. Zhang, Z. Cai, and X. Wang. Fakemask: A novel privacy preserving approach for smartphones. IEEE Transactions on Network and Service Management, 13(2):335–348, 2016.
- W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu. Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5):637–646, October 2016.
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Commun. Surv. Tutor., vol. 17, no. 4, pp. 2347–2376, 2015.
- N. Zhang, N. Cheng, A. T. Gamage, K. Zhang, J. W. Mark, and X. Shen, “Cloud assisted HetNets toward 5G wireless networks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 59–65, 2015.
- M. Natkaniec, K. Kosek-Szott, S. Szott, and G. Bianchi, “A survey of medium access mechanisms for providing QoS in ad-hoc networks,” IEEE Commun. Surv. Tutor., vol. 15, no. 2, pp. 592–620, 2013.
- A. Aijaz and A. H. Aghvami, “Cognitive machine-to-machine commu-nications for Internet-of-Things: A protocol stack perspective,” IEEE Internet Things J., vol. 2, no. 2, pp. 103–112, 2015.
- A. Rajandekar and B. Sikdar, “A survey of MAC layer issues and pro-tocols for machine-to-machine communications,” IEEE Internet Things J., vol. 2, no. 2, pp. 175–186, 2015.
- J. Ren, Y. Zhang, N. Zhang, D. Zhang, and X. Shen, “Dynamic channel access to improve energy efficiency in cognitive radio sensor networks,” IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3143–3156, 2016.
- D. Zhang, Z. Chen, J. Ren, N. Zhang, M. Awad, H. Zhou, and X. Shen, “Energy harvesting-aided spectrum sensing and data transmission in het-erogeneous cognitive radio sensor network,” IEEE Trans. Veh. Technol., vol. 66, no. 1, pp. 831–843, 2017.
- Q. Ye and W. Zhuang, “Distributed and adaptive medium access control for Internet-of-Things-enabled mobile networks,” IEEE Internet Things J., to appear. DOI: 10.1109/JIOT.2016.2566659.
- H. Ma, L. Liu, A. Zhou, and D. Zhao, “On networking of internet of things: Explorations and challenges,” IEEE Internet of Things Journal, vol. 3, no. 4, pp. 441–452, Aug 2016.
- E. C.-H. Ngai, M. B. Srivastava, and J. Liu, “Context-aware sensor data dissemination for mobile users in remote areas,” in Proc. of INFOCOM, 2012, pp. 2711–2715.
- L. Cheng, J. Niu, M. D. Francesco, S. K. Das, C. Luo, and Y. Gu, “Seamless streaming data delivery in cluster-based wireless sensor networks with mobile elements,” IEEE Systems Journal, vol. 10, no. 2, pp. 805–816, June 2016.
- A. Mehrabi and K. Kim, “Maximizing data collection throughput on a path in energy harvesting sensor networks using a mobile sink,” IEEE Transactions on Mobile Computing, vol. 15, no. 3, pp. 690–704, March 2016.
- S. Yang, U. Adeel, Y. Tahir, and J. A. McCann, “Practical opportunistic data collection in wireless sensor networks with mobile sinks,” IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1420–1433, May 2017.
- M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R.Guizzetti, “OSCAR: Object security architecture for the Internet of Things”, Ad Hoc Networks, 32, pp.3-16, 2015.
- S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, “IoT-OAS: an oauth-based authorization service architecture for secure services in IoT scenarios”, IEEE Sensors Journal, vol. 15, no. 2, pp.1224-1234, 2015.
Abstract Views: 256
PDF Views: 4