Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    Lightweight Algorithm for MQTT Protocol to Enhance Power Consumption in Healthcare Environment

    Anwar D. Alhejaili*, Omar H. Alhazmi

    Journal on Internet of Things, Vol.4, No.1, pp. 21-33, 2022, DOI:10.32604/jiot.2022.019893

    Abstract Internet of things (IoT) is used in various fields such as smart cities, smart home, manufacturing industries, and healthcare. Its application in healthcare has many advantages and disadvantages. One of its most common protocols is Message Queue Telemetry Transport (MQTT). MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power. One of the drawbacks of MQTT is that it is easy to manipulate. The default security provided by MQTT during user authentication, through username and password, does not provide any type of data encryption, to ensure confidentiality or integrity. This paper focuses on the security… More >

  • Open Access

    ARTICLE

    FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images

    Yingchao Yu*, Shuitao Gan, Xiaojun Qin

    Journal on Internet of Things, Vol.4, No.1, pp. 1-20, 2022, DOI:10.32604/jiot.2022.019469

    Abstract In recent years, with the development of the natural language processing (NLP) technologies, security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity, achieved great progress. However, we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions. In this paper, we propose firmVulSeeker—a vulnerability search tool for embedded firmware images, based on BERT and Siamese network. It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context… More >

  • Open Access

    RETRACTION

    Retraction Notice to: New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* and Yan Zhao1

    Journal on Internet of Things, Vol.3, No.4, pp. 183-183, 2021, DOI:10.32604/jiot.2021.021063

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Abdullah M. Almuhaideb, Kawther S. Alqudaihi*

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088

    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy,… More >

  • Open Access

    ARTICLE

    A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration

    Denghui Zhang1,*, Guocai Yin2

    Journal on Internet of Things, Vol.3, No.4, pp. 149-157, 2021, DOI:10.32604/jiot.2021.016936

    Abstract Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual machine migration strategy that integrates… More >

  • Open Access

    ARTICLE

    Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access

    J. V. Anand1, R. Praveena2,*, T. R. Ganesh Babu2

    Journal on Internet of Things, Vol.3, No.4, pp. 139-147, 2021, DOI:10.32604/jiot.2021.016747

    Abstract The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink. Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access (UWSTAC-NOMA) protocol has been proposed. This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference. Successive Interference Cancellation has been used at the receiving sensor to decode the information sent. The network level performance of sensors and increasing the data rate improves the overall throughput. Simultaneously, connecting several sensors to sink based on its depth region of… More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any failure in the children health… More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*

    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900

    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by… More >

  • Open Access

    ARTICLE

    New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* , Yan Zhao1

    Journal on Internet of Things, Vol.3, No.3, pp. 109-118, 2021, DOI:10.32604/jiot.2021.014980

    Abstract As a new intelligent optimization method, brain storm optimization (BSO) algorithm has been widely concerned for its advantages in solving classical optimization problems. Recently, an evolutionary classification optimization model based on BSO algorithm has been proposed, which proves its effectiveness in solving the classification problem. However, BSO algorithm also has defects. For example, large-scale datasets make the structure of the model complex, which affects its classification performance. In addition, in the process of optimization, the information of the dominant solution cannot be well preserved in BSO, which leads to its limitations in classification performance. Moreover, its generation strategy is inefficient… More >

  • Open Access

    ARTICLE

    Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture

    Mingxing Zhu, Yansong Wang, Ruyun Zhang, Tianning Zhang, Heyuan Li, Hanguang Luo, Shunbin Li*

    Journal on Internet of Things, Vol.3, No.3, pp. 99-107, 2021, DOI:10.32604/jiot.2021.014921

    Abstract The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. More >

Displaying 21-30 on page 3 of 66. Per Page