Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (73)
  • Open Access

    ARTICLE

    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Abdullah M. Almuhaideb, Kawther S. Alqudaihi*

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088 - 30 December 2021

    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related… More >

  • Open Access

    ARTICLE

    A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration

    Denghui Zhang1,*, Guocai Yin2

    Journal on Internet of Things, Vol.3, No.4, pp. 149-157, 2021, DOI:10.32604/jiot.2021.016936 - 30 December 2021

    Abstract Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual More >

  • Open Access

    ARTICLE

    Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access

    J. V. Anand1, R. Praveena2,*, T. R. Ganesh Babu2

    Journal on Internet of Things, Vol.3, No.4, pp. 139-147, 2021, DOI:10.32604/jiot.2021.016747 - 30 December 2021

    Abstract The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink. Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access (UWSTAC-NOMA) protocol has been proposed. This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference. Successive Interference Cancellation has been used at the receiving sensor to decode the information sent. The network level performance of sensors and increasing the data rate improves the overall throughput. Simultaneously, connecting several sensors to sink based More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994 - 30 December 2021

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*

    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900 - 16 December 2021

    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency More >

  • Open Access

    ARTICLE

    New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* , Yan Zhao1

    Journal on Internet of Things, Vol.3, No.3, pp. 109-118, 2021, DOI:10.32604/jiot.2021.014980 - 16 December 2021

    Abstract As a new intelligent optimization method, brain storm optimization (BSO) algorithm has been widely concerned for its advantages in solving classical optimization problems. Recently, an evolutionary classification optimization model based on BSO algorithm has been proposed, which proves its effectiveness in solving the classification problem. However, BSO algorithm also has defects. For example, large-scale datasets make the structure of the model complex, which affects its classification performance. In addition, in the process of optimization, the information of the dominant solution cannot be well preserved in BSO, which leads to its limitations in classification performance. Moreover,… More >

  • Open Access

    ARTICLE

    Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture

    Mingxing Zhu, Yansong Wang, Ruyun Zhang, Tianning Zhang, Heyuan Li, Hanguang Luo, Shunbin Li*

    Journal on Internet of Things, Vol.3, No.3, pp. 99-107, 2021, DOI:10.32604/jiot.2021.014921 - 16 December 2021

    Abstract The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. More >

  • Open Access

    ARTICLE

    Definition and Development of a Control Concept Applied in Elements Distributed for Manage Them Using IoT

    Jesus Hamilton Ortiz1, Osamah Ibrahim Khalaf2, Fernando Velez Varela3,*, Nicolas Minotta Rodriguez3, Christian Andres Mosquera Gil3

    Journal on Internet of Things, Vol.3, No.3, pp. 87-97, 2021, DOI:10.32604/jiot.2021.014737 - 16 December 2021

    Abstract In recent years, the Internet has gradually developed into a mature tool, which can integrate technologies involved in different application scenarios. The Internet allows the integration of solutions to different problems, which benefits both users and companies. The Internet of Things is a further development of the Internet, which can further realize the interconnection of people, machines, and things. The work of this paper mainly focuses on the use of Internet of Things technology to achieve efficient management. A wireless device is designed in the paper, which can be integrated in a helmet. This helmet More >

  • Open Access

    ARTICLE

    Security and Privacy in 5G Internet of Vehicles (IoV) Environment

    Benjamin Kwapong Osibo1, Chengbo Zhang1, Changsen Xia1, Guanzhe Zhao2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 77-86, 2021, DOI:10.32604/jiot.2021.017943 - 15 July 2021

    Abstract Modern vehicles are equipped with sensors, communication, and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety. The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality. However, the demanding specifications such as high data rate, low latency, and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges. In the 5G IoV environment, various technologies and models are deployed, making the environment open More >

  • Open Access

    ARTICLE

    Fusion of Internal Similarity to Improve the Accuracy of Recommendation Algorithm

    Zejun Yang1, Denghui Xia1, Jin Liu1, Chao Zheng2, Yanzhen Qu1,3,4, Yadang Chen1, Chengjun Zhang1,2,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 65-76, 2021, DOI:10.32604/jiot.2021.015401 - 15 July 2021

    Abstract Collaborative filtering algorithms (CF) and mass diffusion (MD) algorithms have been successfully applied to recommender systems for years and can solve the problem of information overload. However, both algorithms suffer from data sparsity, and both tend to recommend popular products, which have poor diversity and are not suitable for real life. In this paper, we propose a user internal similarity-based recommendation algorithm (UISRC). UISRC first calculates the item-item similarity matrix and calculates the average similarity between items purchased by each user as the user’s internal similarity. The internal similarity of users is combined to modify More >

Displaying 31-40 on page 4 of 73. Per Page