Articles with "iot device" as a keyword



Photo by cbpsc1 from unsplash

A holistic IoT device classification approach through spatial & temporal behaviors modelling

Sign Up to like & get
recommendations!
Published in 2022 at "Telecommunication Systems"

DOI: 10.1007/s11235-021-00867-x

Abstract: Traffic management is becoming increasingly complex due to the increasing diversity of IoT platforms and protocols supported by heterogeneous devices. Recently, device fingerprinting techniques for automatic device recognition leveraging on domain knowledge in TCP/IP and… read more here.

Keywords: iot device; iot; traffic; classification ... See more keywords
Photo by averey from unsplash

A Novel Energy-conscious Access Point (eAP) System with Cross-layer Design in Wi-Fi Networks for Reliable IoT Services

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181304

Abstract: This paper proposes a novel energy-conscious access point (eAP) system with cross-layer design to increase the energy efficiency of IoT devices in IEEE 802.11 Wi-Fi networks for reliable IoT services. The proposed eAP system controls… read more here.

Keywords: system; iot device; energy; eap system ... See more keywords
Photo by kellysikkema from unsplash

Timely Status Update in Internet of Things Monitoring Systems: An Age-Energy Tradeoff

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2900528

Abstract: We consider an Internet of Things (IoT) monitoring system, in which an IoT device monitors a physical process and transmits randomly generated status updates to its associated access point (AP) as timely as possible. The… read more here.

Keywords: status; iot device; status update; internet things ... See more keywords
Photo by kellysikkema from unsplash

Adversarial Attacks Against IoT Identification Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3229906

Abstract: While machine learning (ML)-based solutions for Internet of Things (IoT) device identification are effective in identifying IoT devices connected to the network, they may be vulnerable to adversarial attacks. Conventional approaches for crafting adversarial attacks… read more here.

Keywords: adversarial attacks; device identification; identification; iot identification ... See more keywords
Photo by benkolde from unsplash

An Effective Machine Learning Based Algorithm for Inferring User Activities From IoT Device Events

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2022.3191123

Abstract: The rapid and ubiquitous deployment of Internet of Things (IoT) in smart homes has created unprecedented opportunities to automatically extract environmental knowledge, awareness, and intelligence. Many existing studies have adopted either machine learning approaches or… read more here.

Keywords: iot device; machine learning; device; inferring user ... See more keywords
Photo by kellysikkema from unsplash

IoT vs. Human: A Comparison of Mobility

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2020.3019988

Abstract: Internet of Thing (IoT) devices are rapidly becoming an indispensable part of our life with their increasing deployment in many promising areas, including tele-health, smart city, intelligent agriculture. Understanding the mobility of IoT devices is… read more here.

Keywords: mobility iot; iot device; iot devices; mobility ... See more keywords
Photo by iizanyar from unsplash

Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/7671967

Abstract: Automated malware detection is a prominent issue in the world of network security because of the rising number and complexity of malware threats. It is time-consuming and resource intensive to manually analyze all malware files… read more here.

Keywords: malware detection; malware; detection; iot device ... See more keywords