2017
DOI: 10.17148/ijireeice.2017.5217
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Internet of Things - Protocols, Issues

Abstract: Abstract:The "Internet of Things" (IoT) concept is used to define or reference systems that rely on the autonomous communication of a group of physical objects. The applications areas of the IoT are numerous, including: smart homes, smart cities and industrial automation. IoT systems often provide great benefits to numerous industries and society as a whole. Many of the IoT systems and technologies are relatively novel. The aim of this paper is to provide the last and most innovative contributions concerning t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
(1 reference statement)
0
2
0
Order By: Relevance
“…As an example of implementation of calculus models inspired by nature can be the IoT (Internet of Things) technology [3]. The IoT concept is used to define systems based on autonomous communication of a set of physical objects (sensors, devices for storing and processing date and actuators), with auto-adaptation and auto-organization capacities.…”
Section: Introductionmentioning
confidence: 99%
“…As an example of implementation of calculus models inspired by nature can be the IoT (Internet of Things) technology [3]. The IoT concept is used to define systems based on autonomous communication of a set of physical objects (sensors, devices for storing and processing date and actuators), with auto-adaptation and auto-organization capacities.…”
Section: Introductionmentioning
confidence: 99%
“…On the subject of security of the IoT, there are many open problems such as the botnet, distributed denial-of-service (DDoS) attacks, cryptographic algorithms, access control, authentication protocols, and governance frameworks. Few studies have focused on issues on communication methods such as the wireless local area network (WLAN) or radio-frequency identification (RFID), comprehensive cryptographic mechanisms such as key management, and useful applications such as supply chain management and multimedia traffic [4].…”
Section: Introductionmentioning
confidence: 99%