Advanced searches left 3/3

Protocol - Springer Nature

Summarized by Plex Scholar
Last Updated: 24 July 2022

* If you want to update the article please login/register

Protocol Adaptive Conversion Method of Power Transmission Internet of Things Terminal Based on Protocol Matching

The aim of this paper is to determine the protocol-adaptive conversion method of power transmission IoT terminals based on protocol matching. This paper also evaluates the techniques developed in the study, including the development of simulation software NS-2, and its simulation framework, and the use of adaptive devices, PCF mechanism, and DCF protocols to measure delay and packet loss rate for various services. The delay time of the conversion process under the PCF mechanism is expected to be less than half a second, according to simulation results; before the simulation time is 55 s, the conversion time is within 50 ms; the conversion service delay time is within 20 ms. The adaptive conversion procedure in this paper, as it is shown, provides higher QoS results than the traditional PCF and DCF mechanisms.

Source link: https://doi.org/10.1007/978-981-19-3632-6_47


Implementation of Generic Medical Device Software Integration with Multiple Protocol Support

Pathology lab testing is aiding in the diagnosis of virtually every disease in the medical industry these days. Advance laboratory testing equipment is assisting lab technicians and physicians in getting more accurate results every time using standard protocols and automation every time. Technicians record the results obtained from the testing machine and enter the final patient data in hospital or laboratory management applications. Using a centralized parser as per the protocols and policies set in every single machine system's configurations and requirements, the report generation software ensures the desired result.

Source link: https://doi.org/10.1007/978-981-19-0098-3_20


Comparative Analysis of a Secure Authentication Protocol for 5G-Enabled IoT Network Using Public and Shared Secret Key

Because of the latest technology used and the specific application scenario, 5G networks face security risks. The IoT devices must connect with an intermediate network that is often public and thus vulnerable to attacks in order to use the 5G network. In this paper, the introduction and results of a 5G-enabled secure authentication protocol using symmetric and asymmetric key are compared to determine the best method for privacy protection in a 5G-enabled IoT network.

Source link: https://doi.org/10.1007/978-981-16-9967-2_2


A Secure and Scalable IoT Consensus Protocol

Several consensus algorithms have been suggested as a means of resolving the Byzantine General problem with respect to the blockchain consensus process. However, some people experience with consistency and/or scalability issues when these consensus algorithms are applied to a distributed, asynchronous network, while others deal with liveness and/or safety problems. When determining the authenticity and legitimacy of an IoT request, this consensus protocol uses a combination of probabilistic randomness, an isomorphic balance authentication, error detection, and time constraints.

Source link: https://doi.org/10.1007/978-3-030-94285-4_5


Analyzing Performance of Wireless Network Based on the Industrial HART Protocol

The findings of the study show that a WirelessHART device with a low latency and a low error rate at certain distances can have a fruitful application in the industrial monitoring system. Application of technologies in wireless networks based on the industrial HART protocol can result in significant cost savings in manufacturing processes.

Source link: https://doi.org/10.1007/978-3-030-96314-9_7


What Times Should Be Used for fNIRS and EEG Protocol?

Brain function can be measured by both devices fNIRS and EEG. The purpose of this research is to give a report on the event timing applied individually to maximize both tools' use, as well as a commentary on how a research protocol should be developed for the seamless fNRIS-EEG recording. In addition, the synchronization of both technologies in the same format must be considered during the onset of convergence on the use of both technologies.

Source link: https://doi.org/10.1007/978-3-031-09382-1_19


A Model for Network Virtualization with OpenFlow Protocol in Software-Defined Network

The developed IPv6 experimental testbed was built using Mininet network simulation version 2. 2170321. The Mininet software was installed and configured on Ubuntu Linux version 14. 04. 4u2013server-i386 simulator operating system environment, with a u2013server-i386 simulator operating system environment. Within the Mininet network emulator, the flow-visor protocol was used to build the network slices in the topology, but the floodlight protocol was used to build the controller, virtual switches, and virtual hosts. According to the published version of IPv4, the percentage line rate for each network slice was 95. 7 percent, compared to the improved model of IPv6 with a line rate of 54. 5 percent.

Source link: https://doi.org/10.1007/978-981-19-1844-5_57


Session Key Agreement Protocol for Secure D2D Communication

However, a lack of encryption and authentication during device discovery, link establishment, and data exchange exposes the transmitted data to many security and privacy risks. For several of these problems, a session key agreement protocol is suggested in this paper. Simulation results showed that the current protocol has the lowest communication costs and average computation costs, as shown by simulation results. In addition, intelligence reports revealed that our protocol is robust against message replays, masquerade, identity theft, message forgery, and cloning threats.

Source link: https://doi.org/10.1007/978-3-030-94285-4_6


An Innovative Cryptosystem for Needham–Schroeder Authentication Protocols for Tertiary Industries

Needhamu2013Schroeder protocol An improved version of one of the main communication protocols designed for building resilience across the entire insecure network has been introduced. The primary uses of proposed N-S protocols in credit payment system and blockchain have been discussed in this paper.

Source link: https://doi.org/10.1007/978-981-19-0561-2_14


Real-Time Patient Monitoring System and Security Using Internet Protocols for Medical Industry

Patients are often referred to accessible medical services and are provided with personalized, safe, and cost-effective health care by the Internet of Things. Health monitoring is just one of many techniques that can use the IoT to improve the patient's quality of life. In particular, the PMS is dependent on new bus connectivity, in particular by using the TCP/IP protocol as an interior bus rather than on a standard configuration. At extremely low prices, the TCP/IP convention suite can be downloaded at a very low price and can be quickly accessed at extremely low prices. Vital physiological signs of the patient during individual care are continually examined by the PM. It's a bit difficult work for healthcare professionals to watch every patient for 24 hours. The importance of PMS in hospitals is high; therefore, the manufacturers of clinical devices have central patient tracking and reporting systems; In centralized patient monitoring centers, all patient screens are connected to a single server-based patient monitoring service.

Source link: https://doi.org/10.1007/978-981-19-0098-3_65

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions