The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communication such as Wi-Fi and 2G/3G/4G cellular networks are insufficient for IoT networks because they are designed to serve appliances with immense processing capabilities such as laptops and PCs. Moreover, most of these technologies are centralized and use an existing infrastructure. Currently, new communication technologies such as Z-Wave, 6LowPAN, and Thread are dedicated to the IoT and have been developed to meet its requirements. These technologies can handle many factors such as range, data requirements, security, power demands, and battery life. Nevertheless, the security issues in IoT systems have major concerns and issues because vulnerabilities in such systems may result in fatal catastrophes. In this paper, an enhanced IoT security framework for authentication and authorization is proposed and implemented to protect the IoT protocols from different types of attacks such as man-in-the-middle attacks, reply attacks, and brute force attacks. The proposed framework combines an enhanced token authentication that has identity verification capabilities and a new sender verification mechanism on the IoT device side based on time stamps, which in turn can mitigate the need for local identity verification methods in IoT devices. The proposed IoT security framework was tested using security analysis with different types of attacks compared with previous related frameworks. The analysis shows the high capability of the proposed framework to protect IoT networks against many types of attacks compared with the currently available security frameworks. Finally, the proposed framework was developed using Windows applications to simulate the framework phases, check its validity through the real network, and calculate the payload time added.
Grounded in the technology–organization–environment (TOE) framework, we have developed an extended model to examine factors, particularly technological, organizational and environmental factors, which influence e-business adoption in Jordanian banks. For the purposes of our research some constructs were added to (TOE) framework such as IT/Business strategy alignment, adequacy of IT professionals, and availability of online revenues. Other factors were excluded such as the global scope since our research is at the national level in Jordanian banking sector. The independent variables are the (technology readiness or competence, bank size, financial resources commitment, IT/Business strategy alignment, adequacy of IT professionals, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e-business adoption and usage constitutes the dependent variable. Survey data from (140) employees in seven pioneered banks in the Jordanian banking sector were collected and used to test the theoretical model. Based on simple and multiple linear regressions, our empirical analysis demonstrates several key findings: (1) technology readiness is found to be the key determinant of e-business adoption among the banks. (2) Bank size, IT/Business strategy alignment, and availability of online revenues were found to have significant influence on the e-business adoption within banks, while financial resources commitment and adequacy of IT professionals do not contribute significantly to e-business adoption. (3) Both of the competition intensity and regulatory support environment contribute significantly to e-business adoption in banks. By providing insight into these important factors, this paper can help further understanding of their role in the adoption and usage of e-business and examines the impacts of e-business usage on banks’ performance in terms of sales-services-marketing, internal operations and coordination & communication. The theoretical and practical implications of these results are discussed. By extension, this could enable greater e-business usage in banks, which could improve the Jordanian overall economy.
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation, communication, and sensing abilities, in a battery-powered sensor network, energy and communication bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the application in order to minimize the resources consumed and extend the life of the network. In this paper, we introduce a comparative study in different routing algorithms that propose vital solutions to the most important issues that should be taken into account when designing wireless network which are reliability, lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will introduce their algorithms and discuss how did they propose to solve such of these challenges and finally we will do some evaluation to each approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.