2022
DOI: 10.11591/eei.v11i1.3455
|View full text |Cite
|
Sign up to set email alerts
|

A java servlet based transaction broker for internet of things edge device communications

Abstract: Internet of things (IoT) technology is growing exponentially in almost every sphere of life. IoT offers several innovation capabilities and features, but they are also prone to security vulnerabilities and risks. These vulnerabilities must be studied to protect these technologies from being exploited by others. Cryptography techniques and approaches are commonly used to address and deal with security vulnerabilities. In general, the message queuing telemetry transport (MQTT) is an application layer protocol vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Because attacks that use viruses intelligently, a novel study of information security has been conducted [53]. Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…Because attacks that use viruses intelligently, a novel study of information security has been conducted [53]. Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…Before transmission, data must be filtered and compressed to an ideal size. 3) Edge IT data processing [67], [94], [100], [109], [122], [133], [140], [168]- [170], [216], [220]- [223] Before reaching the cloud center, the digitized and aggregated IoT data is processed further. Edge devices do sophisticated analytics and preprocessing, which may include machine learning and visual representation.…”
Section: Architecture Stagesmentioning
confidence: 99%
“…One way that IoT edge computing may be used to protect humans is to automatically shut down machines when someone enters a prohibited area at a factory. Autonomous cars require data in order to make critical real-time decisions that might mean the difference between life and death on the road [24], [26], [67], [100], [109], [133], [145], [184], [186], [216], [220], [221], [267], [268], [293], [297], [335].…”
Section: Edge Computing: Low Latency and Securitymentioning
confidence: 99%
“…Zainatul et al [8] used a lightweight and secure communication proxy to solve the security problem of the Internet of things (IoT) traffic. (IoT) devices have increased the quantity of information generated in various formats [9].…”
Section: Introductionmentioning
confidence: 99%