Home / Journals / JIOT / Vol.3, No.3, 2021
  • Open Access

    ARTICLE

    Definition and Development of a Control Concept Applied in Elements Distributed for Manage Them Using IoT

    Jesus Hamilton Ortiz1, Osamah Ibrahim Khalaf2, Fernando Velez Varela3,*, Nicolas Minotta Rodriguez3, Christian Andres Mosquera Gil3
    Journal on Internet of Things, Vol.3, No.3, pp. 87-97, 2021, DOI:10.32604/jiot.2021.014737
    Abstract In recent years, the Internet has gradually developed into a mature tool, which can integrate technologies involved in different application scenarios. The Internet allows the integration of solutions to different problems, which benefits both users and companies. The Internet of Things is a further development of the Internet, which can further realize the interconnection of people, machines, and things. The work of this paper mainly focuses on the use of Internet of Things technology to achieve efficient management. A wireless device is designed in the paper, which can be integrated in a helmet. This helmet can be used in some… More >

  • Open Access

    ARTICLE

    Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture

    Mingxing Zhu, Yansong Wang, Ruyun Zhang, Tianning Zhang, Heyuan Li, Hanguang Luo, Shunbin Li*
    Journal on Internet of Things, Vol.3, No.3, pp. 99-107, 2021, DOI:10.32604/jiot.2021.014921
    Abstract The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. More >

  • Open Access

    ARTICLE

    New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* , Yan Zhao1
    Journal on Internet of Things, Vol.3, No.3, pp. 109-118, 2021, DOI:10.32604/jiot.2021.014980
    Abstract As a new intelligent optimization method, brain storm optimization (BSO) algorithm has been widely concerned for its advantages in solving classical optimization problems. Recently, an evolutionary classification optimization model based on BSO algorithm has been proposed, which proves its effectiveness in solving the classification problem. However, BSO algorithm also has defects. For example, large-scale datasets make the structure of the model complex, which affects its classification performance. In addition, in the process of optimization, the information of the dominant solution cannot be well preserved in BSO, which leads to its limitations in classification performance. Moreover, its generation strategy is inefficient… More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*
    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900
    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by… More >

Share Link

WeChat scan