Cargando…
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with te...
Autores principales: | Venčkauskas, Algimantas, Morkevicius, Nerijus, Jukavičius, Vaidas, Damaševičius, Robertas, Toldinas, Jevgenijus, Grigaliūnas, Šarūnas |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6721158/ https://www.ncbi.nlm.nih.gov/pubmed/31431005 http://dx.doi.org/10.3390/s19163612 |
Ejemplares similares
-
Distributed Agent-Based Orchestrator Model for Fog Computing
por: Liutkevičius, Agnius, et al.
Publicado: (2022) -
A Lightweight Protocol for Secure Video Streaming
por: Venčkauskas, Algimantas, et al.
Publicado: (2018) -
Multi-Objective Path Optimization in Fog Architectures Using the Particle Swarm Optimization Approach
por: Morkevičius, Nerijus, et al.
Publicado: (2023) -
Enhancing Microservices Security with Token-Based Access Control Method
por: Venčkauskas, Algimantas, et al.
Publicado: (2023) -
Fuzzy Logic Type-2 Based Wireless Indoor Localization System for Navigation of Visually Impaired People in Buildings
por: AL-Madani, Basem, et al.
Publicado: (2019)