An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized n...
Main Authors: | Algimantas Venčkauskas, Nerijus Morkevicius, Vaidas Jukavičius, Robertas Damaševičius, Jevgenijus Toldinas, Šarūnas Grigaliūnas |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/16/3612 |
Similar Items
-
Method for Dynamic Service Orchestration in Fog Computing
by: Nerijus Morkevicius, et al.
Published: (2021-07-01) -
Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection
by: Robertas Damaševičius, et al.
Published: (2021-02-01) -
The fog-unit : Evaluation of the fog-unit’s effect on network performance
by: Holm, Rasmus
Published: (2018) -
LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
by: Robertas Damasevicius, et al.
Published: (2020-05-01) -
Real-Time Primitives for CoAP: Extending the Use of IoT for Time Constraint Applications for Social Good
by: Gabriel M. Eggly, et al.
Published: (2018-10-01)