This document provides a list of 57 references related to the Internet of Things (IoT). The references cover topics such as the evolution of wireless sensor networks towards IoT, future Internet and IoT, clustering techniques in wireless sensor networks for IoT scenarios, civil applications of wireless sensors, deployment algorithms for coverage and connectivity in wireless sensor networks, energy efficient routing techniques for wireless sensor networks, performance analysis of sensor motes used in wireless sensor networks, adding value to wireless sensor network simulations using experimental IoT platforms, overviews of IoT, data fusion and IoT for smart environments, challenges of waste management in IoT-enabled smart cities, enabling IoT technologies and protocols, IoT gateways, semantics for IoT,
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results found that blockchain could enable distributed, trusted resource management between competitive NPs, but throughput and latency depended on the consensus algorithm used.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results found that blockchain could enable distributed, trusted resource management between competitive NPs, but throughput and latency depended on the consensus algorithm used.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results showed that blockchain could enable distributed, trusted resource management between competitive NPs, but performance depends on the consensus algorithm used.
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
This document summarizes a research article titled "SECURITY & PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS". The article analyzes various security and privacy threats related to the Internet of Things (IoT). It discusses some common attacks on different layers of the IoT and existing as well as proposed countermeasures. The article references 31 other sources and provides an abstract and keywords for the summarized research paper.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document discusses the need for an open source IoT development environment and testbed to allow software developers to create IoT applications without requiring hardware expertise. It notes that existing IoT testbeds often use proprietary hardware and software, limiting interoperability. The proposed solution aims to provide virtual access to sensors and actuators through an API, as well as a microcontroller platform as a service. This would allow developers to write code without worrying about hardware integration and deployment details. The goal is to make IoT development and testing more accessible through an open testbed that addresses issues like sensor availability and cost.
The document discusses the design and implementation of an Internet of Things (IoT) testbed framework with an enhanced performance approach. It aims to create an open IoT testbed that is accessible locally and over the internet for developers to create and test IoT applications and for data engineers to perform analytics on generated data. The testbed will host a range of sensors and be able to interface with microcontrollers like Arduino and Raspberry Pi to account for heterogeneous devices. It seeks to address challenges with proprietary systems like vendor lock-in and provide solutions for insufficient control, lack of concurrency, and diminished reusability.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results showed that blockchain could enable distributed, trusted resource management between competitive NPs, but performance depends on the consensus algorithm used.
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
This document summarizes a research article titled "SECURITY & PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS". The article analyzes various security and privacy threats related to the Internet of Things (IoT). It discusses some common attacks on different layers of the IoT and existing as well as proposed countermeasures. The article references 31 other sources and provides an abstract and keywords for the summarized research paper.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document discusses the need for an open source IoT development environment and testbed to allow software developers to create IoT applications without requiring hardware expertise. It notes that existing IoT testbeds often use proprietary hardware and software, limiting interoperability. The proposed solution aims to provide virtual access to sensors and actuators through an API, as well as a microcontroller platform as a service. This would allow developers to write code without worrying about hardware integration and deployment details. The goal is to make IoT development and testing more accessible through an open testbed that addresses issues like sensor availability and cost.
The document discusses the design and implementation of an Internet of Things (IoT) testbed framework with an enhanced performance approach. It aims to create an open IoT testbed that is accessible locally and over the internet for developers to create and test IoT applications and for data engineers to perform analytics on generated data. The testbed will host a range of sensors and be able to interface with microcontrollers like Arduino and Raspberry Pi to account for heterogeneous devices. It seeks to address challenges with proprietary systems like vendor lock-in and provide solutions for insufficient control, lack of concurrency, and diminished reusability.
The document lists 57 references related to the Internet of Things (IoT). It covers topics such as the evolution of wireless sensor networks towards IoT, future directions for IoT, clustering techniques in wireless sensor networks, applications of wireless sensors, deployment algorithms for sensor networks, energy efficient routing protocols, performance of sensor network motes, adding value to sensor network simulations, overviews and definitions of IoT, enabling technologies and protocols for IoT, applications of IoT such as smart cities and healthcare, security and privacy issues in IoT, IoT testbeds and experimental platforms, middleware for IoT, and data analytics and management for large-scale IoT systems.
This document contains a list of 7 tables across 4 chapters. The tables summarize the differences between CoAP and MQTT protocols, propose a service mapping scheme, provide examples of data formats and sample sensor readings, perform a scenario-based comparison and measure service performance, reliability, and demand through various matrices and probability functions. The tables collectively analyze IoT service architectures, communication protocols, data generation and usage.
This document contains a list of 7 tables across 4 chapters. The tables summarize the differences between CoAP and MQTT protocols, propose a service mapping scheme, provide examples of data formats and sample sensor readings, perform a scenario-based comparison and analyze services feedback through various matrices to measure performance, reliability, and demand.
The document contains the declaration by Kayalvizhi Jayavel that the work presented in her thesis titled "DESIGN AND IMPLEMENTATION OF INTERNET OF THINGS TESTBED FRAMEWORK- A PERFORMANCE ENHANCED APPROACH" was carried out by her under the supervision of Dr. Revathi Venkataraman. She declares that the work has not been submitted for any other degree and that she has properly cited any works of other researchers that were referenced. Dr. Revathi Venkataraman certifies that the candidate's statements are correct and that a plagiarism check found the thesis contents to be free of plagiarism.
The document discusses providing actuator and sensor access as a service over the internet. It proposes an algorithm for resource requisition that creates locks on actuator instances to prevent multiple simultaneous requests. This ensures actuators can only respond to one command at a time. The algorithm also analyzes request volume to optimize traffic to unavailable resources. An API is developed to abstract away hardware details and provide platform-independent parameter retrieval and actuation. This allows developers to focus on application logic rather than hardware integration.
The document summarizes a research project that designed and implemented an open IoT testbed framework. The framework includes modules for sensor data, actuators, and APIs. It uses open source platforms to achieve interoperability, scalability, and reusability. Algorithms for code compilation and upload showed improved performance even with increased code size. Response times for remote sensors and actuators were only mildly increased compared to local access. A ranking model tested proved able to recommend the best services for different user types. The testbed was found to satisfactorily utilize resources based on user feedback. Future work could extend it to support mobile devices, include security software, test it with more users, and explore other statistical models.
This document contains the declaration by Kayalvizhi Jayavel that the work presented in her thesis titled "Design and Implementation of Internet of Things Testbed Framework- A Performance Enhanced Approach" was carried out by her under the supervision of Dr. Revathi Venkataraman. She declares that the work has not been submitted for any other degree and that she has properly cited all sources. Dr. Revathi Venkataraman certifies that the candidate's statements are correct and that a plagiarism check found the thesis contents to be within permissible limits.
This document contains a list of abbreviations and symbols used in the paper. It includes over 50 common abbreviations related to Internet of Things, wireless sensor networks, communication protocols, and more. It also defines several symbols used to represent concepts in the paper such as sensors, actuators, platforms, reliability, and various users.
The document discusses analyzing testbed utilization through a feedback-based ranking system. It proposes an algorithm that ranks services based on user feedback scores. Services are initially given a high score of 1, which gets replaced by the new user feedback score after each usage. The algorithm aims to enhance testbed utilization, performance, reliability and usability by allocating the highest ranked services to users. An analysis of 500 users' feedback on various services shows the testbed was reliable even when feedback scores were moderate, accurately predicting user satisfaction over 86% of the time. The most demanded services and combination of services and users are also identified to guide testbed scalability.
This document discusses providing sensor data as a service. It proposes an event collaboration model where sensor data is pushed to a database when it changes, rather than requiring polling. This would allow users to access up-to-date data through queries. The system would contain various sensors that store data in a database, and provide an interface for users to access visualizations and downloads of the sensor data in different formats like CSV and JSON.
The document contains a list of 15 figures referenced throughout a thesis on an IoT testbed architecture. Figure 1.1-1.6 describe common sensors and components used in IoT systems. Figures 3.1-3.9 illustrate the proposed testbed architecture and performance results. Figures 4.1-4.14 provide details on the sensor database design and experimental setup. Figures 5.1-5.16 demonstrate the actuator client, platform as a service prototype, APIs, and performance comparisons. Figures 6.1-6.5 analyze service allocation strategies and expected usage patterns by user types.
The document contains a list of 15 figures referenced throughout a thesis on an IoT testbed architecture. Figure 1.1-1.6 describe common sensors and components used in IoT systems. Figures 3.1-3.9 illustrate the proposed testbed architecture and performance results. Figures 4.1-4.14 provide details on the sensor database design and experimental setup. Figures 5.1-5.16 demonstrate the actuator client, platform as a service prototype, API functions and performance tests. Figures 6.1-6.5 analyze the resource allocation and usage patterns for different user types.
This document provides an introduction to Internet of Things (IoT) testbeds. It discusses that testbeds help validate research findings through real experimental setups, as opposed to simulations alone. IoT is described as an extension of wireless sensor networks, but with some prominent differences that demand exclusive IoT testbed models. The document outlines key IoT concepts like ingredients, features, and characteristics. It emphasizes the need for open source IoT testbeds to improve reusability, scalability, and utilization compared to existing proprietary testbeds primarily designed for wireless sensor networks. The goal of this research is to develop an open source heterogeneous IoT testbed framework with enhanced algorithms.
This document contains lists of abbreviations and symbols used throughout a paper on Internet of Things. There are over 50 abbreviations for concepts, protocols, and technologies related to IoT listed, such as IoT, WSN, MQTT, CoAP, HTTP, and more. There are also over 20 symbols defined for variables, parameters, and mathematical terms used in equations and formulas relating to reliability, performance, and probability distributions for IoT systems.
The document proposes a feedback-based ranking system to maximize utilization of a testbed. It develops an algorithm that initially assigns all platforms a high score of 1, then updates scores based on user feedback. A decision tree is used to select the highest-scoring available platform for the next user. Data from 500 users on service quality is analyzed to evaluate the testbed's reliability when user feedback scores differ from actual performance logs. Statistical analysis shows the testbed reliably performed at a moderate or high level even when user feedback scores were low or moderate, demonstrating high utilization.
The document summarizes a research project that designed and implemented an open IoT testbed framework. The framework includes modules for sensor data, actuators, and APIs. It uses open source platforms to achieve interoperability, scalability, and reusability. Algorithms for code compilation and upload showed improved performance even with increased code size. Response times for remote sensors and actuators were only mildly increased compared to local access. A ranking model tested proved able to recommend the best services for different user types. The testbed was found to satisfactorily utilize resources based on performance and reliability feedback. Future work could extend the framework to mobile devices, add security software, test with more users, and explore other statistical models.
This document discusses providing sensor data as a service. It proposes an event collaboration model where sensor data is pushed to a database when it changes, rather than requiring polling. This would allow users to access up-to-date data through queries. The system would contain various sensors that store data in a database, and provide an interface for users to access visualizations and downloads of the sensor data in different formats like CSV and JSON.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
Your VW's camshaft position sensor is crucial for engine performance. Signs of failure include engine misfires, difficulty starting, stalling at low speeds, reduced fuel efficiency, and the check engine light. Prompt inspection and replacement can prevent further damage and keep your VW running smoothly.
Learn why monitoring your Mercedes' Exhaust Back Pressure (EBP) sensor is crucial. Understand its role in engine performance and emission reduction. Discover five warning signs of EBP sensor failure, from loss of power to increased emissions. Take action promptly to avoid costly repairs and maintain your Mercedes' reliability and efficiency.
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...Import Motorworks
Learn how to respond when the red temperature light flashes in your VW with this presentation. From checking coolant levels to seeking professional help, follow these steps promptly to prevent engine damage and ensure safety on the road.
Ever been troubled by the blinking sign and didn’t know what to do?
Here’s a handy guide to dashboard symbols so that you’ll never be confused again!
Save them for later and save the trouble!
What Is Recruitment Processing Outsourcing (RPO) Services?Impeccable HR
Impeccable HR provides a wide range of RPO services for your bulk hiring needs within a stipulated period. They meticulously build RPO solutions to improve your recruitment process. RPO services are great for budget-conscious recruiters who want high-quality personnel.
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsSprinter Gurus
Unlock the secrets behind your Mercedes Sprinter's uphill power loss with our comprehensive presentation. From fuel filter blockages to turbocharger troubles, we uncover the culprits and empower you to reclaim your vehicle's peak performance. Conquer every ascent with confidence and ensure a thrilling journey every time.
Welcome to ASP Cranes, your trusted partner for crane solutions in Raipur, Chhattisgarh! With years of experience and a commitment to excellence, we offer a comprehensive range of crane services tailored to meet your lifting and material handling needs.
At ASP Cranes, we understand the importance of reliable and efficient crane operations in various industries, from construction and manufacturing to logistics and infrastructure development. That's why we strive to deliver top-notch solutions that enhance productivity, safety, and cost-effectiveness for our clients.
Our services include:
Crane Rental: Whether you need a crawler crane for heavy lifting or a hydraulic crane for versatile operations, we have a diverse fleet of well-maintained cranes available for rent. Our rental options are flexible and can be customized to suit your project requirements.
Crane Sales: Looking to invest in a crane for your business? We offer a wide selection of new and used cranes from leading manufacturers, ensuring you find the perfect equipment to match your needs and budget.
Crane Maintenance and Repair: To ensure optimal performance and safety, regular maintenance and timely repairs are essential for cranes. Our team of skilled technicians provides comprehensive maintenance and repair services to keep your equipment running smoothly and minimize downtime.
Crane Operator Training: Proper training is crucial for safe and efficient crane operation. We offer specialized training programs conducted by certified instructors to equip operators with the skills and knowledge they need to handle cranes effectively.
Custom Solutions: We understand that every project is unique, which is why we offer custom crane solutions tailored to your specific requirements. Whether you need modifications, attachments, or specialized equipment, we can design and implement solutions that meet your needs.
At ASP Cranes, customer satisfaction is our top priority. We are dedicated to delivering reliable, cost-effective, and innovative crane solutions that exceed expectations. Contact us today to learn more about our services and how we can support your project in Raipur, Chhattisgarh, and beyond. Let ASP Cranes be your trusted partner for all your crane needs!
How To Fix The Key Not Detected Issue In Mercedes CarsIntegrity Motorcar
Experiencing a "Key Not Detected" problem in your Mercedes? Don’t take it for granted. Go through this presentation to find out the exact nature of the issue you are dealing with. Have your vehicle checked by a certified professional if necessary.
How To Fix The Key Not Detected Issue In Mercedes Cars
list of references.docx
1. 110
LIST OF REFERENCES
[1] L. Mainetti, L. Patrono and A. Vilei, "Evolution of wireless sensor networks
towards the Internet of Things: A survey," In Proceedings of 19th International
Conference on Software, Telecommunication, Computer Networks (SoftCOM),
2011.
[2] L. Tan, and N. Wang, "Future Internet: The Internet of Things," In Proceedings
of 3rd International Conference on Advanced Computing Theory Engineering
(ICACTE), 2010.
[3] L. Xu, R. Collier and G. M. P. O’Hare, "A Survey of Clustering Techniques in
WSNs and Consideration of the Challenges of Applying Such to 5G IoT
Scenarios," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1229-1249, Oct
2017.
[4] M. Ayaz, M. Ammad-uddin, I. Baig and E. M. Aggoune, "Wireless Sensor’s Civil
Applications, Prototypes, and Future Integration Possibilities: A Review," IEEE
Sensors Journal, vol. 18, no. 1, pp. 4-13, 2018.
[5] K. Lorincz, "Sensor networks for emergency response: challenges and
opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, 2004.
[6] I. Khoufi, P. Minet, A. Laouiti and S. Mahfoudh, "Survey of deployment
algorithms in wireless sensor networks: coverage and connectivity issues and
challenges," International Journal of Autonomous and Adaptive Communications
Systems, vol. 10, no. 4, pp. 341-390, 2017.
[7] Akila and U. Maheswari, "A Survey on Recent Techniques for Energy Efficient
Routing in WSN," International Journal of Sensors and Sensor Networks, vol. 6,
no. 1, pp. 8-15, 2018.
[8] R. P. Narayanan, T. V. Sarath and V. V. Vineeth, "Survey on Motes Used in
Wireless Sensor Networks: Performance & Parametric Analysis," Wireless
Sensor Network, vol. 8, no. 4, pp. 51-60, 2016.
[9] G. Z. Papadopoulos, J. Beaudaux, A. Gallais, T. Noel and G. Schreiner, "Adding
value to WSN simulation using the IoT-LAB experimental platform.," In
2. 111
International Conference on Wireless and Mobile Computing, Networking and
Communications., Lyon, France, 2013.
[10] K. Rose, S. Eldridge and L. Chapin, "The Internet of Things (IoT): An
Overview," October 2015. [Online]. Available:
https://www.internetsociety.org/doc/iot-overview. [Accessed 16 July 2018].
[11] Wikipedia, "Internet of things," Wikipedia, [Online]. Available:
https://en.wikipedia.org/wiki/Internet_of_things. [Accessed 30 August 2017].
[12] IEEE, "Internet of things forecast of 50 billion devices by 2020 is outdated.,"
Spectrum, [Online]. Available: http://spectrum.ieee.org/tech-
talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-
by-2020-is-outdated. [Accessed 30 August 2017].
[13] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash,
"Internet of Things: A Survey on Enabling Technologies, Protocols, and
Applications," IEEE Communications Surveys & Tutorials, vol. 17 , no. 4, pp.
2347-2376, 2015.
[14] F. Alam, R. Mehmood, I. Katib, N. N. Albogami and A. Albeshri, "Data Fusion
and IoT for Smart Ubiquitous Environments: A Survey," IEEE Access, vol. 5, no.
5, pp. 9533-9554, 2017.
[15] T. Anagnostopoulos, "Challenges and Opportunities of Waste Management in
IoT-Enabled Smart Cities: A Survey," IEEE Transactions on Sustainable
Computing, vol. 2, no. 3, pp. 275-289, 2017.
[16] International Telecommunication Union, "ITU," 16 August 2017. [Online].
Available: http://www.itu.int/en/itu-t/jca/iot/Pages/default.aspx. [Accessed 22
Aug 2018].
[17] A. Mondal, P. Rao and S. K. Madria, "Mobile Computing, Internet of Things,
and Big Data for Urban Informatics," In 17th IEEE International Conference on
Mobile Data Management, Porto, Portugal, 2016.
3. 112
[18] S. Krishnan and K. Jayavel, "Distributed streaming big data analytics for internet
of things," in Handbook of Research on Big Data Storage and Visualization
Techniques, IGI Global, Chapter 12, pp. 303-334, 2018.
[19] H. Gupta, A. V. Dastjerdi, S. K. Ghosh and R. Buyya, "iFogSim: A toolkit for
modeling and simulation of resource management techniques in the Internet of
Things, Edge and Fog computing environments," Software: Practice and
Experience, vol. 47, no. 9, pp. 1275-1296, 2017.
[20] M. T. Khorshed, N. A. Sharma, K. Kumar, M. Prasad, A. B. M. S. Ali and Y.
Xiang, "Integrating internet-of-things with the power of cloud computing and the
intelligence of big Data analytics- a three layered approach," in Proceedings of
the Asia-Pacific Computer Science and Engineering 2015 World Congress,
IEEE, New Jersey, 2015.
[21] N. K. Saini, "Trust factor and reliability-over-a-period-of-time as key
differentiators in IoT enabled services," in International Conference on Internet
of Things and Applications (IOTA), 2016.
[22] Gartner, "Gartner," Jan 2017. [Online]. Available:
https://en.wikipedia.org/wiki/Gartner. [Accessed 14 Feb 2018].
[23] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal and Q. Z. Sheng, "IoT Middleware:
A Survey on Issues and Enabling Technologies," IEEE Internet of Things
Journal, vol. 4, no. 1, pp. 1-20, 2017.
[24] B. Kang, D. Kim and H. Choo, "Internet of Everything: A Large-Scale
Autonomic IoT Gateway," IEEE Transactions on Multi-Scale Computing
Systems, vol. 3,no. 3, pp. 206-214, 2017.
[25] P. Barnaghi, W. Wang, C. Henson and K. Taylor, "Semantics for the Internet of
Things: Early Progress and Back to the Future," International Journal on
Semantic Web and Information Systems, vol. 8, no. 1, pp. 1-21, 2012.
[26] A. Mathew, S. A. F. Amreen, H. N. Pooja and A. Verma, "Smart Disease
Surveillance Based on Internet of Things (IoT)," International Journal of
4. 113
Advanced Research in Computer and Communication Engineering, vol. 4, no. 5,
pp. 2319-5940, 2015.
[27] IBM, "Watson health," [Online]. Available:
https://www.ibm.com/watson/health/. [Accessed 30 August 2017].
[28] S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet
of Things for Health Care: A Comprehensive Survey," IEEE Access, vol. 3, no.
2 pp. 678-708, 2015.
[29] ComputerWorld, "IoT centred healthcare system," [Online]. Available:
http://www.computerworlduk.com/iot/iot-centred-healthcare-system-3643726/.
[Accessed 30 August 2017].
[30] Intel, "Transforming Healthcare with Telemedicine Solutions based on the
Internet of Things (IoT) - Solution Blueprint Internet of Things (IoT)," [Online].
Available:
https://www.intel.com/content/dam/www/program/embedded/internet-of-
things/blueprints/iot-dell-telemedicine-blueprint.pdf. [Accessed 30 August
2017].
[31] A. Khanna and P. Misra, "The Internet of Things for Medical Devices - Prospects,
Challenges and the Way Forward," TCS, [Online]. Available: http://www.smart-
action.eu/fileadmin/smart-action/publications/IoT_Success_Stories_2.pdf.
[Accessed 30 August 2017].
[32] ZDNet, "Samsung creates medical test bed to prove Internet of Things is worth
the effort," [Online]. Available: http://www.zdnet.com/article/samsung-creates-
medical-test-bed-to-prove-internet-of-things-is-worth-the-effort/. [Accessed 30
August 2017].
[33] J. Holler, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand and D. Boyle,
“From Machine-to-Machine to the Internet of Things: Introduction to a New Age
of Intelligence”, Amsterdam, The Netherlands: Elsevier, 2014.
5. 114
[34] J. Granjal, E. Monteiro and J. Sa Silva, "Security for the Internet of Things: A
Survey of Existing Protocols and Open Research Issues," IEEE Communications
Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.
[35] M. A. Iqbal and M. Bayoumi, "Wireless Sensors Integration into Internet of
Things and the Security Primitives," In Sixth International Conference on
Computer Science, Engineering & Applications, Lafayette, USA, 2016.
[36] K. N. Muralidhara, "Secured Smart Healthcare Monitoring System Based on
IoT," International Journal on Recent and Innovation Trends in Computing and
Communication, vol. 3, no. 7, pp. 4958 - 4961, 2015.
[37] A. Gluhak S. Krco M. Nati D. Pfisterer N. Mitton and T. Razafindralambo, "A
survey on facilities for experimental Internet of Things research," IEEE
Communication, vol. 49, no. 11, pp. 58-67, 2011.
[38] G. Z. Papadopoulos, A. Gallais, G. Schreiner, E. Jou and Thomas Noel.,
"Thorough IoT testbed characterization: from proof of concept to repeatable
experimentations," ACM Computer Networks: The International Journal of
Computer and Telecommunications Networking, vol. 119, no. 3, pp. 86-101,
2017.
[39] G. Z. Papadopoulos, A. Gallais, G. Schreiner, and T. Noel, " Importance of
Repeatable Setups for Reproducible Experimental Results in IoT," In
Proceedings of the 13th ACM Symposium on Performance Evaluation of Wireless
Ad Hoc, Sensor and Ubiquitous Networks, New York, USA, 2016.
[40] G. Yang, L. Xie, M. Mantysalo, X. Zhou and P. Zhibo, "A Health-IoT Platform
Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor and
Intelligent Mecidine Box," IEEE Transactions on Industrial Informatics, vol. 10,
no. 4, pp. 2180-2191, 2014.
[41] Industrial Internet Consortium, "Connected Care," [Online]. Available:
http://www.iiconsortium.org/index.htm. [Accessed 30 August 2017].
[42] S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama and N. Kato, "A Survey
on Network Methodologies for Real-Time Analytics of Massive IoT Data and
6. 115
Open Research Issues," IEEE Communications Surveys & Tutorials, vol. 19, no.
3, pp. 1457-1477, 2017.
[43] Grosky, I. William, A. Kansal, S. Nath, J. Liu and F. Zhao, "Senseweb: An
infrastructure for shared sensing," IEEE MultiMedia, vol. 14, no. 4, pp. 8-13,
2007.
[44] D. Yockelson, "blogs.gartner.com," Gartner, 1 Jan 2018. [Online]. Available:
https://blogs.gartner.com/david-yockelson/2016/03/22/iot-creating-data-service-
daas-opportunities/. [Accessed 16 Mar 2018].
[45] D. Yockelson, "IoT Will Drive the “Golden Rule” for Data as a Service," 22
March 2016. [Online]. Available: http://blogs.gartner.com/david-
yockelson/2016/03/22/iot-creating-data-service-daas-opportunities. [Accessed
22 Jun 2018].
[46] J. Zhang, B. Iannucci, M. Hennessy, K. Gopal, S. Xiao, S. Kumar and D. Pfeffer,
"Sensor data as a service--a federated platform for mobile data-centric service
development and sharing," In IEEE International conference on In Services
Computing, 2013.
[47] M. Saravanan, M. Aramudhan, S. S. Pandiyan, T. Avudaiappan, "Priority based
prediction mechanism for ranking providers in federated cloud architecture,"
Cluster Computing, vol. 5, no. 3, pp. 1-9, 2018.
[48] M. Chernyshev, Z. Baig, O. Bello and S. Zeadally, "Internet of Things (IoT):
Research, Simulators, and Testbeds," IEEE Internet of Things Journal, vol. 5, no.
3, pp. 1637-1647, 2018.
[49] A. Nayyar and R. Singh, "A comprehensive review of simulation tools for
wireless sensor networks (WSNs)," Journal of Wireless Networking and
Communications, vol. 5, no. 1, pp. 19-47, 2015.
[50] X. Zeng, S. K. Garg, P. Strazdins, P. P. Jayaraman, D. Georgakopoulos, and R.
Ranjan, "IOTSim: A simulator for analysing IoT applications," Journal of
Systems Architecture, vol. 72, no. 5, pp. 93-107, 2017.
7. 116
[51] P. Patel, J. Dave, S. Dalal, P. Patel and S. Chaudhary, "A Testbed for
Experimenting Internet of Things Applications," eprint arXiv:1705.07848,
Cornell University Library, 2017.
[52] P. B. Gibbons, B. Karp, Y. Ke, S. Nath and S. Seshan, " Irisnet: An architecture
for a worldwide sensor web," In IEEE pervasive computing, vol. 2, no. 4, pp. 22-
33, 2003.
[53] K. Chang, N. Yau, M. Hansen and Estrin, "Sensorbase.org-a centralized
repository to slog sensor network data," In Proceedings of the International Conf.
on Distributed Networks, National Science Foundation, Los Angels, 2006.
[54] A. Karl, M. Hauswirth and A. Salehi, "Infrastructure for data processing in large-
scale interconnected sensor networks," In International Conference on Mobile
Data Management, 2007.
[55] S. Amit, C. Henson and S. S. Sahoo, "Semantic sensor web," in IEEE Internet
computing, vol. 12, no. 4, pp. 78-83, 2008.
[56] D. Sakamuri and H. Zhang, " Elements of Sensornet Testbed Design," in
Handbook of Sensor Networks, World Scientific Publication, Chapter 35, pp. 1-
36, 2009.
[57] P. De, A. Raniwala, S. Sharma and T. C. Chiueh, "Design considerations for a
multihop wireless network testbed," IEEE Communications Magazine, vol. 43,
no. 10, pp. 102-109, 2005.
[58] V. Dyo, S. A. Ellwood, D. W. Macdonald, A. Markham, C. Mascolo, B. Pásztor,
S. Scellato, N. Trigoni, R. Wohlers and Kharsim Yousef, "Evolution and
sustainability of a wildlife monitoring sensor network," In Proceedings of the 8th
ACM Conference on Embedded Networked Sensor Systems, ACM, New York,
USA, 2010.
[59] M. Li and Y. Liu, "Underground structure monitoring with wireless sensor
networks," In Proceedings of the 6th international conference on Information
processing in sensor networks, New York, US, 2007.
8. 117
[60] O. Chipara, C. Lu, T. C. Bailey and R. Gruia-Catalin, "Reliable clinical
monitoring using wireless sensor networks: experiences in a step-down hospital
unit," In Proceedings of the 8th ACM Conference on Embedded Networked Sensor
Systems, New York, USA, 2010.
[61] S. C. Mukhopadhyay, "Wearable Sensors for Human Activity Monitoring: A
Review," Sensors Journal, IEEE, vol. 15, no. 3, pp. 1321-1330, 2015.
[62] K. Langendoen, A. Baggio and O. Visser, "Murphy loves potatoes: experiences
from a pilot sensor network deployment in precision agriculture," In Proceedings
of the 20th international conference on Parallel and distributed processing
(IPDPS'06), Washington, DC, USA.
[63] IEEE Standard for Low-Rate Wireless Networks," In IEEE Std 802.15.4-2015
(Revision of IEEE Std 802.15.4-2011), vol. 1, no. 1, pp.1-709, 2016.
[64] S. Silvia and D. Rauch, "Minos: A generic tool for sensor data acquisition and
storage," In Proceedings of 19th IEEE International Conference on Scientific and
Statistical Database Management, 2008.
[65] V. Kolias, I. Anagnostopoulos and E. Kayafas, "Remote experiments in
education: A survey over different platforms and application fields," In 11th
International Conference in Optimization of Electrical and Electronic
Equipment, 2008.
[66] P. D. Godoy, R. Cayssials and C. G. Garino, "A WSN Testbed for Teaching
Purposes," IEEE Latin America Transactions, vol. 14, no. 7, pp. 3351-3357,
2016.
[67] Sensor Data Service, "Sensor Data Service (Sensor Data Service) Defaults in
Windows 10," 2010. [Online]. Available: http://servicedefaults.com/10
/sensordataservice/. [Accessed 25 June 2018].
[68] M. Sridharan, W. Zeng and W. Leal, "Kanseigenie: Software Infrastructure for
Resource Management and Programmability of Wireless Sensor Network
Fabrics," In Next Generation Internet Architectures and Protocols, Cambridge
University Press, pp. 275-300, 2011.
9. 118
[69] M. Zorzi, A. Gluhak, S. Lange and A. Bassi, "From today's intranet of things to
a future internet of things: a wireless-and mobility-related view," IEEE Wireless
Communications, vol. 17, no. 6, 2010.
[70] J.P. Vasseur and A. Dunkels, Interconnecting Smart Objects with IP: The Next
Internet, Morgan Kaufmann, USA, 2010.
[71] G. Kortuem, F. Kawsar, D. Fitton and V. Sundramoorthy, "Smart objects as
building blocks for the Internet of Things," IEEE Internet Computation, vol. 14,
no. 1, pp. 44–51, 2010.
[72] C. B. D. Rosiers, G. Chelius, E. Fleury, A. Fraboulet and A. Gallais, "SensLAB
Very Large Scale Open Wireless Sensor Network Testbed," In Proceedings of
7th International ICST Conference on Testbeds and Research Infrastructures for
the Development, Shanghai, China, 2011.
[73] G. Coulson, B. Porter, I. Chatzigiannakis, C. Koninis, S. Fischer, D. Pfisterer, D.
Bimschas, T. Braun, P. Hurni, M. Anwander, G. Wagenknecht, S. P. Fekete, A.
Kroller and Baumgartner, "Flexible experimentation in wireless sensor
networks," Communications of the ACM, vol. 55, no. 3, pp. 82-90, 2012.
[74] M. Nati, A. Gluhak, H. Abangar and W. Headley, "Smartcampus: A user-centric
testbed for internet of things experimentation," In 16th International Symposium
in Wireless Personal Multimedia Communications, 2013.
[75] K. Romer, B. Ostermaier, F. Mattern, M. Fahrmair and W. Kellerer, "Real-time
search for real-world entities: A survey," Proceedings of IEEE, vol. 98, no. 11,
pp. 1887–1902, 2010.
[76] IPSO Alliance, "Control cube: Turning simple into smart," 2013. [Online].
Available: http://www.ipso-alliance.org/challenge/ipso-challenge-2013-
interviews/control-cube. [Accessed March 2018].
[77] A. S. Tonneau, N. Mitton and J. Vandaele, "A survey on (mobile) wireless sensor
network experimentation testbeds.," In IEEE International Conference on in
Distributed Computing in Sensor Systems, 2014.
10. 119
[78] Z. Sheng, S. Yang, Y. Yu, A. V. Vasilakos, J. A. Mccann and K. K. Leung, "A
survey on the ietf protocol suite for the internet of things: standards, challenges,
and opportunities," IEEE Wireless Communications, vol. 20, no. 6, pp. 91-98,
2013.
[79] L. Belli, "Design and Deployment of an IoT Application-Oriented Testbed,"
Computer, vol. 48, no. 9, pp. 32-40, 2015.
[80] D. Guinard, V. Trifa and E. Wilde, "A resource oriented architecture for the Web
of Things," 2010 Internet of Things (IOT), Tokyo, pp. 1-8, 2010.
[81] FIT consortium, "IoT-Lab," 2014. [Online]. Available: https://www.iot-
lab.info/what-is-iot-lab/. [Accessed 27 October 2018].
[82] C. Adjih, E. Baccelli, E. Fleury, G. Harter and N. Mitton, "FIT IoT-LAB: A large
scale open experimental IoT," In Proceedings of the 2nd IEEE World Forum on
Internet of Things, 2015.
[83] C. M. Angelopoulos, O. Evangelatos, S. Nikoletseas, T. P. Raptis, J. D. Rolim
and K. Veroutis, "A user-enabled testbed architecture with mobile crowdsensing
support for smart, green buildings," In 2015 IEEE International Conference in
Communications, 2015.
[84] Y. Masafumi, O. Tetsuya, M. Keita, B. Leonard, "Design of an IoT-Based E-
learning Testbed," In 30th International IEEE Conference on Advanced
Information Networking and Applications Workshops, 2016.
[85] A. I. Abdul-Rahman and C. A. Graves, "Internet of Things Application Using
Tethered MSP430 to Thingspeak Cloud," In 2016 IEEE Symposium on In
Service-Oriented System Engineering, 2016.
[86] The MathWorks, "ThingSpeak," 1994. [Online]. Available:
https://in.mathworks.com/help/thingspeak/. [Accessed 12 September 2018].
[87] G. A. M. Maureira, D. Oldenhof and L. Teernstra, "ThingSpeak–an API and Web
Service for the Internet of Things," mediatechnology.leiden.ed, 2015, January
2015. [Online]. Available:
11. 120
http://mediatechnology.leiden.edu/images/uploads/docs/wt2014_thingspeak.pdf.
[Accessed 12 April 2017].
[88] A. Jimenez-Gonzalez, J.R.M.D. Dios and A. Ollero, "An integrated testbed for
cooperative perception with heterogeneous mobile and static sensors," Sensors,
vol. 20, no. 11, pp. 11516-11543, 2011.
[89] J. R. M. Dios, A. Jimenez-Gonzalez, A. D. S. Bernabe and A. Ollero, Remote
Integrated Testbed for Cooperating Objects, SpringerBriefs in Cooperating
Objects, Springer, 2014.
[90] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim and Z. Han, "Data
Collection and Wireless Communication in Internet of Things (IoT) Using
Economic Analysis and Pricing Models: A Survey," IEEE Communications
Surveys & Tutorials, vol. 18, no. 4, pp. 2546-2590, 2016.
[91] A. S. Tonneau, N. Mitton, J. Vandaele, "How to choose an experimentation
platform for wireless sensor networks? A survey on static and mobile wireless
sensor network experimentation facilities," Ad Hoc Networks, vol. 30, no. 4, pp.
115-127, 2015.
[92] M. Sharif and A. Sadeghi-Niaraki, "Ubiquitous sensor network simulation and
emulation environments: A survey," Journal of Network and Computer
Applications, vol. 93, no. 4, pp. 150-181, 2017.
[93] S. Sotiriadis, N. Bessis, E. Asimakopoulou and N. Mustafee, "Towards
Simulating the Internet of Things," In 28th International Conference on Advanced
Information Networking and Applications Workshops, 2014.
[94] M. Nati, A. Gluhak, H. Abangar, S. Meissner and R. Tafazolli, "A Framework
for Resource Selection in Internet of Things Testbeds, Testbeds and Research
Infrastructure. Development of Networks and Communities," In Lecture Notes of
the Institute for Computer Sciences, Social Informatics and Telecommunications
Engineering, Springer, Berlin, Heidelberg, pp. 234-239, 2012.
[95] K. Hartke, "Observing Resources in CoAP," IETF Internet Draft, Universitaet
Bremen, 2014.
12. 121
[96] P. Fremantle, "A Reference Architecture for the Internet of Things," WSO2
White Paper, 2014.
[97] J. H. Huh, D. H. Kim and K. Jong-Deok, "NEWSBED: The Internet of Things
testbed platform," In 2017 International Conference on Information Networking,
pp. 492-494, Da Nang, 2017.
[98] World Congress, "IoT Solutions World Congress," [Online]. Available:
http://www.iotsworldcongress.com/testbeds/2016-testbeds/. [Accessed 30
August 2017].
[99] R. Lea, "HyperCat: An IoT Interoperability Specification Tech. report,"
Ecosystem Demonstrator Interoperability Group, 2014.
[100] "International Telecommunications Union," ITU, 1985. [Online]. Available:
https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx. [Accessed 14 Mar
2018].
[101] M. Banzi, M. Shiloh, Getting Started with Arduino: The Open Source Electronics
Prototyping Platform., Maker Media, Inc., 2014.
[102] "IEEE Standard for Ethernet," IEEE Std 802.3-2015 (Revision of IEEE Std 802.3-
2012), pp. 1-4017, 4 March 2016.
[103] "IEEE Standard for Information technology," IEEE Std 802.11-2016 (Revision of
IEEE Std 802.11-2012), pp. 1-3534, 4 December 2016.
[104] Bluetooth Technology, "Bluetooth Low Energy," [Online]. Available:
https://www.bluetooth.com/what-is-bluetooth-technology/how-it-works/low-
energy. [Accessed 16 April 2017].
[105] J. C. Mogul, J. Gettys, T. Berners-Lee and H. Frystyk, "Hypertext Transfer
Protocol--HTTP/1.1," IETF Tools, 1997.
[106] E. Rescorla, SSL and TLS: designing and building secure systems, Addison-
Wesley, 2001.
[107] J. Postel, and J. Reynolds, "File transfer protocol," ACM, 1985.
[108] J. Postel, "Telnet protocol specification," IETF Tools, 1980.
13. 122
[109] Z. Shelby, K. Hartke and C. Bormann, "The constrained application protocol
(CoAP)," 2014.
[110] A. Banks, R. Gupta, "OASIS Standard," 10 December 2015. [Online]. Available:
http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/errata01/os/mqtt-v3.1.1-errata01-os-
complete.html. [Accessed 30 September 2017].
[111] IBM, "Watson Internet of Things," [Online]. Available:
https://www.ibm.com/internet-of-things/. [Accessed 30 August 2017].
[112] M. Zorzi, A. Gluhak, S. Lange, A. Bassi, "From today's INTRAnet of things to a
future INTERnet of things: a wireless- and mobility-related view," IEEE Wireless
Communications, vol. 17, no. 6, pp. 44-51, 2010.
[113] C. Walker, S. Sivakumar and A.Al-Anbuky, "Data Flow and Management for an
IoT based WSN," in IEEE International Conference on Data Science and Data
Intensive Systems, Sydney, NSW, Australia, 2015.
[114] E. M. Silva and P. Malo, "IoT Testbed Business Model," Scientific Research, vol.
4, no. 4, pp. 37-45, 2014.
[115] S. N. Han, "DPWSim: A simulation toolkit for IoT applications using devices
profile for web services," In IEEE World Forum on Internet of Things, 2014.
[116] T. O. Takpor and A. A. Atayero, "Integrating Internet of Things and EHealth
Solutions for Students’ Healthcare," In World Congress on Engineering, London,
U.K, 2015.
[117] S. Nikoletseas, M. Rapti, T. P. Raptis and K. Veroutis, "Decentralizing and
adding portability to an iot test-bed through smartphones," In IEEE International
Conference on Distributed Computing in Sensor Systems, 2014.
[118] S. Ezdiani, I. S. Acharyya, S. Sivakumar and A. Al-Anbuky, "An IoT
Environment for WSN Adaptive QoS," in IEEE International Conference on
Data Science and Data Intensive Systems, 2015.
14. 123
[119] R. Morabito, I. Farris, A. Iera and T. Taleb, "Evaluating Performance of
Containerized IoT Services for Clustered Devices at the Network Edge," IEEE
Internet of Things Journal, vol. 4, no. 4, pp. 1019-1030, Aug 2017.
[120] R. Crepaldi, S. Friso, A. H. Iii and M. Mastrogiovanni, "The design, deployment,
and analysis of signetlab: A sensor network testbed and interactive management
tool," In IEEE Tridentcom, CiteSeerx, Lake Buena Vista, FL, USA, 2008.
[121] A. Paramanathan, P. Pahlevani, S. Thorsteinsson, M. Hundeboll, D. E. Lucani
and F. H. P. Fitzek, "Sharing the Pi: Testbed Description and Performance
Evaluation of Network Coding on the Raspberry Pi," In IEEE 79th Vehicular
Technology Conference (VTC Spring), seoul, 2014.
[122] N. H. Anh, T. Tamura and P. T. Giang, "Performance Evaluation of Wireless
Networks Based on Testbed," In Advances in Information and Communication
Technology: Proceedings of the International Conference, ICTA, Vietnam,
Springer, pp. 460-469, 2017.