2020
DOI: 10.1109/comst.2019.2943087
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of IoT Management Protocols and Frameworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 106 publications
(57 citation statements)
references
References 53 publications
0
56
0
1
Order By: Relevance
“…However, its industrial implementation is slowly increasing in smart manufacturing methods [166]. As the number of devices in the network grows, the received data becomes complex and complicated, which requires more efficient approaches to be collected, sorted, and processed to achieve higher QoS values [167]. This has led researchers and developers to focus on designing various smart network protocols with self-organizing, self-management, and self-configure features, which can able full 3GPP standards and establish an uninterrupted network [168].…”
Section: Iot and Next Generation Protocolmentioning
confidence: 99%
“…However, its industrial implementation is slowly increasing in smart manufacturing methods [166]. As the number of devices in the network grows, the received data becomes complex and complicated, which requires more efficient approaches to be collected, sorted, and processed to achieve higher QoS values [167]. This has led researchers and developers to focus on designing various smart network protocols with self-organizing, self-management, and self-configure features, which can able full 3GPP standards and establish an uninterrupted network [168].…”
Section: Iot and Next Generation Protocolmentioning
confidence: 99%
“…Management solutions must show grounds for efficient control of IoT systems. Sinche et al [ 30 ] proposed a taxonomy related to IoT device management, and Perera et al [ 36 ] surveyed a wide selection of techniques, methods, models, and solutions related to context awareness in IoT. Some authors have proposed taxonomies for security approaches in the adoption of IoT technologies and applications [ 46 ].…”
Section: Related Workmentioning
confidence: 99%
“…Presentation refers to the physical aspects of sensors and actuators that interact with the physical world. The physical and virtual world can be merged by integrating computation and physical processes in one of the following ways: a) physical, b) cyber or virtual, and c) cyber-physical or logical [ 30 , 46 , 62 , 67 , 79 , 84 ].…”
Section: Proposed Ioe Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we consider a two-user power-domain NOMA setting in the framework because it provides the best intuitive view of the reliability and security performances of the users with priority difference. 1 Without loss of generality, the high-priority user (U 1 ) and low-priority user (U 2 ) are scheduled and paired in a group for the NOMA transmission.…”
Section: System Model Of the Proposed Schemesmentioning
confidence: 99%