Internet of Things (IoT)

In this study, we developed a portable X/gamma-ray survey meter for large-scale distributed real-time monitoring of the ambient dose equivalent rate in the surrounding environment, using a silicon photomultiplier coupled with a CsI(Tl) scintillator. This innovation is integrated into an Internet of Things (IoT) network. The device realizes a wide range of dose rate measurements by switching the frequency of a pulse-frequency modulation (PFM) -type DC-DC power supply mode. The energy response is improved through Geant4 simulation and multicomparator design.

Categories:
30 Views

This dataset contains one month of the binary activity of the 4060 urban IoT nodes. Each record in the dataset presents the node ID, the time stamp, the location of the IoT node in latitude and longitude, and also the binary activity of the IoT node. The main purpose of this dataset is to be used as part of distributed denial of service (DDoS) attack research.

Categories:
422 Views

Anomaly detection is a well-known topic in cybersecurity. Its application to the Internet of Things can lead to suitable protection techniques against problems such as denial of service attacks.

Categories:
2630 Views

Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".

There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.

Categories:
4501 Views

The rise of the Internet of Things (IoT) has opened new research lines that focus on applying IoT applications to domains further beyond basic user-grade applications, such as Industry or Healthcare. These domains demand a very high Quality of Service (QoS), mainly a very short response time. In order to meet these demands, some works are evaluating how to modularize and deploy IoT applications in different nodes of the infrastructure (edge, fog, cloud), as well as how to place the network controllers, since these decisions affect the response time of the application.

Categories:
684 Views