After reading the full version of every article, a significant number of articles were excluded because they did not directly consider user/humans’ role in-depth or were demo papers with incomplete contributions. Instead, these sources dealt mainly with improving efficiency or performance-related aspe...
These review papers are reviewed under four main topics as sensor layer, network layer, middleware layer, and application layer, which are related to the use of sensors, collecting and transmitting of data, and the process of storage of data in the field of agriculture. It discusses the ...
Several papers related to our topic of discussion were reviewed. However, in this section, we summarize some important articles that had major contributions to our work. We have classified the summary into various subsections to provide a better understanding of the same. 2.1. Surveys on Security...
We are inviting contributions in the following areas, as well as others that are related to software-definedcommunications(e.g., Software Defined Radios): IoT applications using Software Defined Network control and management Architectures for Software Defined IoT networks South-bound protocols for netwo...
We are inviting contributions in the following areas, as well as others that are related to software-defined communications (e.g., Software Defined Radios): IoT applications using Software Defined Network control and management Architectures for Software Defined IoT networks ...
4. Free and open-source IoT-related projects Apart from the IoT platforms described above, there exist also many other software projects that, although they are not IoT platforms, they provide important functionalities to be considered as building blocks for developing a custom IoT platform. Some ...
No related articles have been found We recommend A decade of research on patterns and architectures for IoT security Tanusan Rajmohan,Cybersecurity,2022 Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures Mehari Msgna,Journal of Surveillance, Security and Safety,2022 ...
However, more research is required to enhance the trust computation in terms of accuracy and resilience against trust related attacks. 2. Much research work and investigation are needed to enhance and develop the mechanisms of the trust management system. There is still a research gap in the ...
A literature review and research agenda 2019, Government Information Quarterly Citation Excerpt : In the next subsections, the main findings related to this framework are discussed such that academics and practitioners can apply the framework to investigate, reuse contributions, make strategies for the ...
This research provides panoramic knowledge support for researchers in related fields to understand the research status, future trends and hotspots in the field of smart health research based on IoT. Methods Data sources The data source for this study was Web of Science (WoS), which selected four...