2022
DOI: 10.1007/978-3-030-99619-2_35
|View full text |Cite
|
Sign up to set email alerts
|

Security, Power Consumption and Simulations in IoT Device Networks: A Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Communication protocols utilized by IoT devices, such as Wi-Fi, Bluetooth, Zigbee, and LoRaWAN, also play a crucial role in determining power consumption [23]. The choice of communication protocol can influence power efficiency, with some protocols optimized for low power consumption and others designed for higher data rates [22].…”
Section: Power Requirements Of Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Communication protocols utilized by IoT devices, such as Wi-Fi, Bluetooth, Zigbee, and LoRaWAN, also play a crucial role in determining power consumption [23]. The choice of communication protocol can influence power efficiency, with some protocols optimized for low power consumption and others designed for higher data rates [22].…”
Section: Power Requirements Of Iot Devicesmentioning
confidence: 99%
“…Lastly, the operational environment, encompassing factors like temperature, humidity, and physical conditions, can affect the power requirements of IoT devices. Devices deployed in harsh or challenging environments may require additional power for protection, maintenance, and optimal performance [22].…”
Section: Power Requirements Of Iot Devicesmentioning
confidence: 99%
“…It considers 328 high-quality studies published during the last 30 years, which are classified according to their empirical maturity, the types of FM applied and railway specific aspects, identifying recent trends and the characteristics of the studies involving practitioners. Moreover, the work by Filho et al [196] is the first SLR on the use of FM to evaluate security and energy in IoT, including wireless sensor networks, which can be used as a guide for which FM and tools to use. It considers 38 high-quality studies from a period of 15 years and the findings include a clear predominance of the use of manual proof methods, Dolev-Yao-like attack models, and the AVISPA tool [197].…”
mentioning
confidence: 99%