This information is in fact key to the configuration and adaptation of data compression and in-network processing protocols and, in turn, is deemed a prime functionality for IoT networks. The point is that lossy compression can be often applied at the sources to save transmission energy, while ...
An Insight Review of Internet of Things (IoT) Protocols, Standards, Platforms, Applications and Security Issues Internet of Things is considered a promising and challenging system that needs modern types of protocols and architectures different from conventional netw... Q Ibrahim,S Lazim - 《Internati...
Using hash code in TCAM can reduce memory usage, power consumption, throughput, and the final cost of each memory cell [42]. Fig. 2 shows the status of memory usage in TCAM in different network protocols. These protocols include Ethernet, ICMP, Extended IP Using TCP-UDP, IGMP, and Other...
The non-semantic approach is used in the GSN [18], while the solutions proposed in large-scale EU funded projects such as the SENSEI [50] and the Internet of Things (IoT) [51,52] utilize semantics of data. The service-oriented architectures include simple and yet efficient non-semantic ...
protocols [38]. However, these surveys often fall short in providing a comprehensive understanding of data integrity strategies and their classification. A concise taxonomy of data integrity schemes was presented in a survey paper [39], which discussed a comparative analysis of existing data integrity...
Traffic classification in an OpenFlow switch will play an important role in large-scale networks along with the advent of IoT. Previous study has evaluated its performance based on actual experiments, however obtained results are not easily reproducible due to dependencies on the experimental conditions...
In addition, an ensemble method for crop monitoring system to identify plant diseases at the early stages using IoT enabled system has been presented with the best precision of 84.6%50. A dataset comprising five types of disorders of apple orchards has been developed, and the best accuracy is ...
Layer 4 solution – As the traffic of the upper layer is transmitted transparently, then the nginx server is used to server the proxy for transmission completely transparent into the above TCP and UDP protocols. Using the stream of nginx as an https traffic proxy at the layer of TCP will le...
Internet of Things: A survey on machine learning-based intrusion detection approaches 2019, Computer Networks Citation Excerpt : For the sake of clarification, Tables 1 and 2 summarized the works by the main purpose of the paper (PU), communication protocol (CP), application protocols (AP), dat...
In addition, this ever-growing access has resulted in a huge volume of data flow on the Internet. For example, the launch of the Internet of Things (IoT) requires both internet access and a high level of security to ensure privacy and functionality. Therefore, the need for more advanced ...