internet of things
In this paper, we consider that the unmanned aerial vehicles (UAVs) with attached intelligent reflecting surfaces (IRSs) play the role of flying reflectors that reflect the signal of users to the destination, and utilize the power-domain non-orthogonal multiple access (PD-NOMA) scheme in the uplink. We investigate the benefits of the UAV-IRS on the internet of things (IoT) networks that improve the freshness of collected data of the IoT devices via optimizing power, sub-carrier, and trajectory variables, as well as, the phase shift matrix elements.
- Categories:
Abstract—In the 2021 and later we know that the technology
will have key participation of to help us in all kind of tasks
mainly using internet connection, due the new normality.
Industry 4.0 has been one of the most relevant field. IoT as part
of it. This Systematic Literature Review (SLR) we will cover
the South America countries and their development status,
addressing the development categories and the Hardware that
has been cited on papers on the last 5 years.
- Categories:
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.
- Categories:
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.
- Categories:
Performance of Wireless Sensor Networks (WSN) based on IEEE 802.15.4 and Time Slotted Channel Hopping (TSCH) has been shown to be mostly predictable in typical real-world operating conditions. This is especially true for performance indicators like reliability, power consumption, and latency. This article provides and describes a database (i.e., a set of data acquired with real devices deployed in a real environment) about measurements on OpenMote B devices, implementing the 6TiSCH protocol, made in different experimental configurations.
- Categories:
The ability of detecting human postures is particularly important in several fields like ambient intelligence, surveillance, elderly care, and human-machine interaction. Most of the earlier works in this area are based on computer vision. However, mostly these works are limited in providing real time solution for the detection activities. Therefore, we are currently working toward the Internet of Things (IoT) based solution for the human posture recognition.
- Categories:
The dataset contains:
1. We conducted a A 24-hour recording of ADS-B signals at DAB on 1090 MHz with USRP B210 (8 MHz sample rate). In total, we got the signals from more than 130 aircraft.
2. An enhanced gr-adsb, in which each message's digital baseband (I/Q) signals and metadata (flight information) are recorded simultaneously. The output file path can be specified in the property panel of the ADS-B decoder submodule.
3. Our GnuRadio flow for signal reception.
4. Matlab code of the paper, wireless device identification using the zero-bias neural network.
- Categories:
We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.
* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.
- Categories:
RSSI-Dataset
The RSSI-Dataset provides a comprehensive set of Received Signal Strength Indication (RSSI) readings from within two indoor office buildings. Four wireless technologies were used:
- Zigbee (IEEE 802.15.4),
- WiFi (IEEE 802. 11),
- Bluetooth Low Energy (BLE) and
- Long Range Area-Wide Network (LoRaWAN).
For experimentation Arduinos Raspberry Pi, XBees, Gimbal beacons Series 10 and Dragino LoRa Shield were also used.
- Categories: