2019
DOI: 10.1007/978-3-030-24643-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Decision Making Based IoT Framework for an Oil Pipeline Transportation System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…A smart IoT module is supported with infrastructure mode, where a single device acts as both client and access point for data communication in wireless network authenticated by either WPA/WPA2 (wireless protected access) security standards. 8,28,29 WPA aims to offer maximum authentication by applying the TKIP (temporal key integrity protocol) encryption technique, which is more potent than the cyclic redundancy check (CRC), whereas WPA2 provides more secured communication than WPA by its AES (advanced encryption standard) encryption with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) protocol mainly involved in WiMax technology. 30 It provides 256-bit key for both encryption and decryption rather than 128-bit key in WAP to ensure better message integrity during data transmission in the 802.11 WLAN network.…”
Section: Authentication and Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…A smart IoT module is supported with infrastructure mode, where a single device acts as both client and access point for data communication in wireless network authenticated by either WPA/WPA2 (wireless protected access) security standards. 8,28,29 WPA aims to offer maximum authentication by applying the TKIP (temporal key integrity protocol) encryption technique, which is more potent than the cyclic redundancy check (CRC), whereas WPA2 provides more secured communication than WPA by its AES (advanced encryption standard) encryption with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) protocol mainly involved in WiMax technology. 30 It provides 256-bit key for both encryption and decryption rather than 128-bit key in WAP to ensure better message integrity during data transmission in the 802.11 WLAN network.…”
Section: Authentication and Encryptionmentioning
confidence: 99%
“…In spite of being received regulated sensor data from oil field stations, its main emergency shutoff activation is included in this IoT monitoring and control window rather than activating through SCADA. 29,31 In IoT monitoring and control point of view, SCADA with a controller is considered as local intelligence. Hence, it is indicated as enabled state and emergency shutoff as in not activated state by default.…”
Section: Iot-based Monitoring and Control Web Interface Windowmentioning
confidence: 99%
See 1 more Smart Citation
“…Actual market conditions are compatible with small/medium batch manufacturing, due to strong competition and dynamic market behavior [10,11]. In these conditions, robotic production setups exhibit the best "cost per unit" performance if compared with manual work and hard automated setups is shown in Fig.1.…”
Section: Introductionmentioning
confidence: 97%
“…After analyzing various pre and post-treatment techniques with potassium permanganate can leads further to achieve the desired removal rate with minimal preparation standards [5]. The desulfurization process using flue gas as the main constituents methodology is the most effective technique to be implemented in many industrial problems to sort out the removing process of nitrogen compounds [6][7][8][9]. In the techniques, absorbents are considered as the solvent rather than the solid by pointing sodium chloride or hydrogen peroxide or potassium combined constituents [10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%