Fig 2 - uploaded by Salim el Khediri
Content may be subject to copyright.
A Comparison of Cellular Networks Data Rate and Range[12].

A Comparison of Cellular Networks Data Rate and Range[12].

Source publication
Article
Full-text available
The Internet of Things (IoT) is a technological innovation that has revolutionized society. The IoT will forever change the way we use simple things that do very little things to smart, fully capable things. IoT devices can process and automate everyday household and workplace tasks through simple sensors. Yet despite the benefits of these devices,...

Contexts in source publication

Context 1
... Example of LPWAN is Long Range Wide Area Network (LoraWAN) which is a low-cost, long-range, lowpower wireless platform that can be used in many IoT applications. It uses the frequencies of 433, 868, and 915 megahertz with a bit rate of 3 to 5 kilobits per second. LoRaenabled devices can survive with a battery for years in sleep mode. In Fig. 2 we can see A comparison of Cellular networks in terms of data rate and ...
Context 2
... Example of LPWAN is Long Range Wide Area Network (LoraWAN) which is a low-cost, long-range, lowpower wireless platform that can be used in many IoT applications. It uses the frequencies of 433, 868, and 915 megahertz with a bit rate of 3 to 5 kilobits per second. LoRaenabled devices can survive with a battery for years in sleep mode. In Fig. 2 we can see A comparison of Cellular networks in terms of data rate and ...

Similar publications

Article
Full-text available
In this paper, we develop a support vector machine (SVM) based attack mitigation technique from the IoT network. The SVM aims to classify the features related to the attacks based on pre-processed and feature extracted information. The simulation is conducted in terms of accuracy, precision, recall and f-measure over KDD datasets. The results show...
Article
Full-text available
To achieve a secure interconnected Industrial Control System (ICS) architecture, security practitioners depend on accurate identification of network host behavior. However, accurate machine learning based host identification methods depends on the availability of significant quantities of network traffic data, which can be difficult to obtain due t...
Article
Full-text available
This article covers the issues of constructing tools for detecting network attacks targeting devices in IoT clouds. The detection is performed within the framework of cloud infrastructure, which receives data flows that are limited in size and content, and characterize the current network interaction of the analyzed IoT devices. The detection is ba...
Article
Full-text available
Due to the increasing use of networks at present, Internet systems have raised many security problems, and statistics indicate that the rate of attacks or intrusions has increased excessively annually, and in the event of any malicious attack on network vulnerabilities or information systems, it may lead to serious disasters, violating policies on...
Article
Full-text available
Network traffic classification that is widely applicable and highly accurate is valuable for many network security and management tasks. A flexible and easily configurable classification framework is ideal, as it can be customized for use in a wide variety of networks. In this paper, we propose a highly configurable and flexible machine learning tr...

Citations

... Intrusion detection is an important aspect of IoT security which involves identifying abnormal behavior patterns and potential security threats in real-time. IDS and cryptographic-based approaches complement each other to ensure maximum security features such as confidentiality, integrity, authenticity, and availability [7][8]. Network IDS can be classified into signaturebased and anomaly-based methods [9]. ...
... IoT security is an area of concern to protect smart devices in the IoT framework as this is still fairly new. So smart houses need a system that integrates as many devices as possible into smart houses, It must be taken into account that many devices contain limited spaces and weak capabilities, as they are one of the gaps that attackers exploit in penetrations, so the devices must be chosen carefully and from reliable companies [3]. An appropriate system that meets the security requirements (access control, authentication, confidentiality, safety, and non-repudiation) should be used [4]. ...
Conference Paper
Full-text available
The term smart houses have spread recently, and the smart house is a result of technological development and modern technologies. Internet of things (IoT) technology is a connection between all things and the Internet. IoT devices In various fields such as intelligent transportation, environmental protection, government work, public security, smart house, intelligent fire control, industrial monitoring, etc. A smart house is a group of connected IoT devices that can be controlled remotely using a smartphone or computer. In recent years, IoT devices have spread widely and with more development in all aspects of life, and with this development, new security challenges appear. This paper is focused on the security of the smart house and the privacy of the individuals who live in that house, is surveyed a set of previous studies including Analyze the security and risks faced by smart houses and identifying vulnerabilities that can be exploited to gain access to authorized information or refuse service, Analysis of some of the systems of Internet of Things devices that helped in the management and protection of these smart houses.