Computer Science &Amp; Information Technology (CS &Amp; IT) 2017
DOI: 10.5121/csit.2017.71501
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things in Industry 4.0 Case Study : Fluid Distribution Monitoring System

Abstract: Internet of Things (IoT) is an emergent technology that provides a promising opportunity to

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 25 publications
(22 reference statements)
0
4
0
Order By: Relevance
“…A smart IoT module is supported with infrastructure mode, where a single device acts as both client and access point for data communication in wireless network authenticated by either WPA/WPA2 (wireless protected access) security standards. 8,28,29 WPA aims to offer maximum authentication by applying the TKIP (temporal key integrity protocol) encryption technique, which is more potent than the cyclic redundancy check (CRC), whereas WPA2 provides more secured communication than WPA by its AES (advanced encryption standard) encryption with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) protocol mainly involved in WiMax technology. 30 It provides 256-bit key for both encryption and decryption rather than 128-bit key in WAP to ensure better message integrity during data transmission in the 802.11 WLAN network.…”
Section: Authentication and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…A smart IoT module is supported with infrastructure mode, where a single device acts as both client and access point for data communication in wireless network authenticated by either WPA/WPA2 (wireless protected access) security standards. 8,28,29 WPA aims to offer maximum authentication by applying the TKIP (temporal key integrity protocol) encryption technique, which is more potent than the cyclic redundancy check (CRC), whereas WPA2 provides more secured communication than WPA by its AES (advanced encryption standard) encryption with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) protocol mainly involved in WiMax technology. 30 It provides 256-bit key for both encryption and decryption rather than 128-bit key in WAP to ensure better message integrity during data transmission in the 802.11 WLAN network.…”
Section: Authentication and Encryptionmentioning
confidence: 99%
“…A smart IoT module is supported with infrastructure mode, where a single device acts as both client and access point for data communication in wireless network authenticated by either WPA/WPA2 (wireless protected access) security standards 8,28,29 30 .…”
Section: Design and Fabrication Of Smart Iot Modulementioning
confidence: 99%
“…In this step, we survey IoT-based WDMS solutions 29 which permit authors to develop and deploy different monitoring techniques. A comparison is done by resuming their used equipment and monitoring architectures as illustrated in Tables 2 and 3 in order to understand and measure their investigations.…”
Section: Iot For Wdmsmentioning
confidence: 99%
“…Article [5] analyzed the advantages of applying Internet of Things for the efficient monitoring of oil and gas systems. Article [6] offers an oil wells control system based on the architecture of the Internet of Things (sensor, network and application layers).…”
Section: Related Workmentioning
confidence: 99%