Skip to Content
You are currently on the new version of our website. Access the old version .

948 Results Found

  • Article
  • Open Access
2,266 Views
15 Pages

21 July 2024

Over the years, there has been a significant surge in the popularity of instant messaging applications (IMAs). However, the message notification functionality in IMAs exhibits certain limitations. Some IMAs fail to alert users about new messages afte...

  • Article
  • Open Access
9 Citations
8,353 Views
20 Pages

A Lightweight Messaging Protocol for Internet of Things Devices

  • Justice Owusu Agyemang,
  • Jerry John Kponyo,
  • James Dzisi Gadze,
  • Henry Nunoo-Mensah and
  • Dantong Yu

The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT i...

  • Article
  • Open Access
1 Citations
3,470 Views
19 Pages

4 February 2021

Signal is the first application that applies the double ratchet for its end-to-end encryption protocol. The core of the double ratchet protocol is then applied in WhatsApp, the most popular messaging application around the world. Asynchronous Ratchet...

  • Article
  • Open Access
3 Citations
4,254 Views
28 Pages

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

  • Jintian Lu,
  • Lili Yao,
  • Xudong He,
  • Chintser Huang,
  • Dejun Wang and
  • Bo Meng

8 December 2018

Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstr...

  • Article
  • Open Access
13 Citations
4,775 Views
13 Pages

10 February 2019

Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things (IoT), and message clustering determines the effectiveness of PRE. However, the quality of services still lags behind the strict requirement of IoT applicati...

  • Article
  • Open Access
32 Citations
9,257 Views
32 Pages

Messaging Protocols for IoT Systems—A Pragmatic Comparison

  • Jacek Wytrębowicz,
  • Krzysztof Cabaj and
  • Jerzy Krawiec

18 October 2021

There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols,...

  • Article
  • Open Access
40 Citations
4,368 Views
20 Pages

PDMAC: A Priority-Based Enhanced TDMA Protocol for Warning Message Dissemination in VANETs

  • Ghulam Abbas,
  • Ziaul Haq Abbas,
  • Shahab Haider,
  • Thar Baker,
  • Saadi Boudjit and
  • Fazal Muhammad

19 December 2019

Vehicular ad hoc networks (VANETs) are the key enabling technology for intelligent transportation systems. Carrier-sense multiple access with collision avoidance (CSMA/CA) is the de facto media access standard for inter-vehicular communications, but...

  • Article
  • Open Access
21 Citations
3,022 Views
23 Pages

Optimal Path Routing Protocol for Warning Messages Dissemination for Highway VANET

  • Mumtaz Ali Shah,
  • Farrukh Zeeshan Khan,
  • Ghulam Abbas,
  • Ziaul Haq Abbas,
  • Jehad Ali,
  • Sumayh S. Aljameel,
  • Irfan Ullah Khan and
  • Nida Aslam

9 September 2022

In vehicular ad hoc networks (VANETs), helpful information dissemination establishes the foundation of communication. One of the significant difficulties in developing a successful dissemination system for VANETs is avoiding traffic fatalities. Anoth...

  • Article
  • Open Access
6 Citations
3,926 Views
27 Pages

25 December 2023

Unexpected traffic incidents cause safety concerns and intense traffic congestion on crowded urban road networks. Vehicular ad-hoc network (VANET)-aided Intelligent Transport Systems (ITS) aim to mitigate these risks through timely dissemination of a...

  • Article
  • Open Access
9 Citations
3,453 Views
14 Pages

Experimental Quantum Message Authentication with Single Qubit Unitary Operation

  • Min-Sung Kang,
  • Yong-Su Kim,
  • Ji-Woong Choi,
  • Hyung-Jin Yang and
  • Sang-Wook Han

16 March 2021

We have developed a quantum message authentication protocol that provides authentication and integrity of an original message using single qubit unitary operations. Our protocol mainly consists of two parts: quantum encryption and a correspondence ch...

  • Article
  • Open Access
65 Citations
6,837 Views
19 Pages

Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle

  • Pranav Gangwani,
  • Alexander Perez-Pons,
  • Tushar Bhardwaj,
  • Himanshu Upadhyay,
  • Santosh Joshi and
  • Leonel Lagos

6 December 2021

The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are consider...

  • Article
  • Open Access
3 Citations
2,307 Views
16 Pages

1 April 2024

With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors a...

  • Article
  • Open Access
53 Citations
11,881 Views
20 Pages

Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements

  • Biswajeeban Mishra,
  • Biswaranjan Mishra and
  • Attila Kertesz

14 September 2021

Presently, Internet of Things (IoT) protocols are at the heart of Machine-to-Machine (M2M) communication. Irrespective of the radio technologies used for deploying an IoT/M2M network, all independent data generated by IoT devices (sensors and actuato...

  • Article
  • Open Access
6 Citations
4,659 Views
16 Pages

SATFuzz: A Stateful Network Protocol Fuzzing Framework from a Novel Perspective

  • Zulie Pan,
  • Liqun Zhang,
  • Zhihao Hu,
  • Yang Li and
  • Yuanchao Chen

25 July 2022

Stateful network protocol fuzzing is one of the essential means for ensuring network communication security. However, the existing methods have problems, including frequent auxiliary message interaction, no in-depth state-space exploration, and high...

  • Article
  • Open Access
10 Citations
6,264 Views
13 Pages

Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

  • Hui-Ling Chang,
  • Cheng-Gang Wang,
  • Mong-Ting Wu,
  • Meng-Hsun Tsai and
  • Chia-Ying Lin

22 September 2016

Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanis...

  • Article
  • Open Access
9 Citations
4,709 Views
24 Pages

12 May 2019

“Vehicular Ad-hoc Networks” (VANETs): As an active research area in the field of wireless sensor networks, they ensure road safety by exchanging alert messages about unexpected events in a decentralized manner. One of the significant chal...

  • Article
  • Open Access
5 Citations
3,258 Views
22 Pages

20 January 2024

With the constant growth of software-defined radio (SDR) technologies in fields related to wireless communications, the need for efficient ways of testing and evaluating the physical-layer (PHY) protocols developed for these technologies in real-life...

  • Article
  • Open Access
17 Citations
1,061 Views
11 Pages

Anonymous Payment in a Kiosk Centric Model Using Digital Signature Scheme with Message Recovery and Low Computational Power Devices

  • Jesús Téllez Isaac,
  • José Sierra Camara,
  • Antonio Izquierdo Manzanares and
  • Joaquín Torres Márquez

In this paper we present an anonymous protocol for a mobile payment system based on a Kiosk Centric Case Mobile Scenario where the customer cannot communicate with the issuer due to absence of Internet access with her mobile device and the costs of i...

  • Article
  • Open Access
15 Citations
4,901 Views
23 Pages

9 June 2020

The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over tr...

  • Article
  • Open Access
61 Citations
6,754 Views
20 Pages

Virtual Power Plant Management in Smart Grids with XMPP Based IEC 61850 Communication

  • Furquan Nadeem,
  • Mohd Asim Aftab,
  • S.M. Suhail Hussain,
  • Ikbal Ali,
  • Prashant Kumar Tiwari,
  • Arup Kumar Goswami and
  • Taha Selim Ustun

21 June 2019

Communication plays a key role in the effective management of virtual power plants (VPPs). For effective and stable operation of VPPs, a reliable, secure, and standardized communication infrastructure is required. In the literature, efforts were made...

  • Article
  • Open Access
9 Citations
5,218 Views
19 Pages

The Light Node Communication Framework: A New Way to Communicate Inside Smart Homes

  • Valère Plantevin,
  • Abdenour Bouzouane and
  • Sebastien Gaboury

20 October 2017

The Internet of things has profoundly changed the way we imagine information science and architecture, and smart homes are an important part of this domain. Created a decade ago, the few existing prototypes use technologies of the day, forcing design...

  • Article
  • Open Access
3,795 Views
32 Pages

Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

  • Mikel Uriarte Itzazelaia,
  • Jasone Astorga,
  • Eduardo Jacob,
  • Maider Huarte and
  • Pedro Romaña

13 February 2018

Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, there...

  • Article
  • Open Access
11 Citations
6,606 Views
24 Pages

IoT-Based Medical Image Monitoring System Using HL7 in a Hospital Database

  • Md. Harun-Ar-Rashid,
  • Oindrila Chowdhury,
  • Muhammad Minoar Hossain,
  • Mohammad Motiur Rahman,
  • Ghulam Muhammad,
  • Salman A. AlQahtani,
  • Mubarak Alrashoud,
  • Abdulsalam Yassine and
  • M. Shamim Hossain

In recent years, the healthcare system, along with the technology that surrounds it, has become a sector in much need of development. It has already improved in a wide range of areas thanks to significant and continuous research into the practical im...

  • Article
  • Open Access
15 Citations
3,457 Views
14 Pages

Enhanced Message Replication Technique for DTN Routing Protocols

  • Siham Hasan,
  • Meisam Sharifi Sani,
  • Saeid Iranmanesh,
  • Ali H. Al-Bayatti,
  • Sarmadullah Khan and
  • Raad Raad

13 January 2023

Delay-tolerant networks (DTNs) are networks where there is no immediate connection between the source and the destination. Instead, nodes in these networks use a store–carry–forward method to route traffic. However, approaches that rely o...

  • Article
  • Open Access
5 Citations
3,204 Views
19 Pages

MSFuzz: Augmenting Protocol Fuzzing with Message Syntax Comprehension via Large Language Models

  • Mingjie Cheng,
  • Kailong Zhu,
  • Yuanchao Chen,
  • Guozheng Yang,
  • Yuliang Lu and
  • Canju Lu

Network protocol implementations, as integral components of information communication, are critically important for security. Due to its efficiency and automation, fuzzing has become a popular method for protocol security detection. However, the exis...

  • Article
  • Open Access
27 Citations
6,977 Views
17 Pages

25 December 2018

This paper proposes a distributed energy-efficient clustering protocol for wireless sensor networks (WSNs). Based on low-energy adaptive clustering hierarchy (LEACH) protocol, the proposed LEACH-eXtended Message-Passing (LEACH-XMP) substantially impr...

  • Article
  • Open Access
16 Citations
3,587 Views
20 Pages

Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

  • JoonYoung Lee,
  • SungJin Yu,
  • MyeongHyun Kim,
  • YoungHo Park,
  • SangWoo Lee and
  • BoHeung Chung

9 September 2020

With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as larg...

  • Article
  • Open Access
7,510 Views
8 Pages

Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

  • Martin Güthle,
  • Jochen Kögel,
  • Stefan Wahl,
  • Matthias Kaschub and
  • Christian M. Mueller

21 December 2010

Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector...

  • Article
  • Open Access
50 Citations
5,312 Views
16 Pages

Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing

  • Lewis Nkenyereye,
  • Bayu Adhi Tama,
  • Muhammad K. Shahzad and
  • Yoon-Ho Choi

25 December 2019

Basic safety message (BSM) are messages that contain core elements of a vehicle such as vehicle’s size, position, speed, acceleration and others. BSM are lightweight messages that can be regularly broadcast by the vehicles to enable a variety o...

  • Article
  • Open Access
3 Citations
4,331 Views
22 Pages

25 December 2017

Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the under...

  • Review
  • Open Access
1 Citations
1,618 Views
20 Pages

7 October 2025

Commit messages are vital for traceability, maintenance, and onboarding in modern software projects, yet their quality is frequently inconsistent. Recent large language models (LLMs) can transform code diffs into natural language summaries, offering...

  • Article
  • Open Access
7 Citations
9,299 Views
39 Pages

A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

  • Ahmad Mohamad Mezher,
  • Mónica Aguilar Igartua,
  • Luis J. De la Cruz Llopis,
  • Esteve Pallarès Segarra,
  • Carolina Tripp-Barba,
  • Luis Urquiza-Aguiar,
  • Jordi Forné and
  • Emilio Sanvicente Gargallo

17 April 2015

The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the...

  • Article
  • Open Access
1,474 Views
29 Pages

Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols

  • Yair Rivera Julio,
  • Angel Pinto Mangones,
  • Juan Torres Tovio,
  • María Clara Gómez-Álvarez and
  • Dixon Salcedo

14 April 2025

The rapid expansion of the IoT has led to increasing concerns about security, particularly in the early stages of communication where many IoT application-layer protocols, such as CoAP and MQTT, lack native support for secure key exchange. This absen...

  • Article
  • Open Access
5 Citations
1,913 Views
26 Pages

19 August 2024

Vehicular ad hoc networks (VANETs) can bolster road safety through the proactive dissemination of emergency messages (EMs) among vehicles, effectively reducing the occurrence of traffic-related accidents. It is difficult to transmit EMs quickly and r...

  • Article
  • Open Access
11 Citations
3,503 Views
28 Pages

An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds

  • Congcong Li,
  • Shouwen Ji,
  • Xi Zhang,
  • Haiping Wang,
  • Dongfeng Li and
  • Huiyong Liu

31 August 2018

Autonomous vehicular clouds, as the combination of cloud computing and conventional vehicular ad hoc networks, will provide abundant resources and services by sharing under-utilized resources of future high-end vehicles such as computing power, stora...

  • Article
  • Open Access
20 Citations
2,810 Views
20 Pages

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles

  • Vincent Omollo Nyangaresi,
  • Hend Muslim Jasim,
  • Keyan Abdul-Aziz Mutlaq,
  • Zaid Ameen Abduljabbar,
  • Junchao Ma,
  • Iman Qays Abduljaleel and
  • Dhafer G. Honi

31 August 2023

Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication proces...

  • Article
  • Open Access
43 Citations
4,361 Views
19 Pages

A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks

  • Edeh Michael Onyema,
  • M. Anand Kumar,
  • Sundaravadivazhagn Balasubaramanian,
  • Salil Bharany,
  • Ateeq Ur Rehman,
  • Elsayed Tag Eldin and
  • Muhammad Shafiq

22 September 2022

Owing to the latest advancements in networking devices and functionalities, there is a need to build future intelligent networks that provide intellectualization, activation, and customization. Software-defined networks (SDN) are one of the latest an...

  • Article
  • Open Access
5 Citations
2,019 Views
24 Pages

Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol

  • Mohammad Emran Hashimyar,
  • Mahdi Aiash,
  • Ali Khoshkholghi and
  • Giacomo Nalli

17 February 2025

The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, includi...

  • Protocol
  • Open Access
3 Citations
2,836 Views
14 Pages

The TTCYB Study Protocol: A Tailored Print Message Intervention to Improve Cardiovascular Patients’ Lifestyles

  • Marco D’Addario,
  • Erika Rosa Cappelletti,
  • Marcello Sarini,
  • Andrea Greco and
  • Patrizia Steca

This article describes the development of the “Time to Change Your Behavior” (TTCYB) study protocol, a theory-based, tailored print message intervention to improve compliance with the self-care regimen in patients with cardiovascular dise...

  • Protocol
  • Open Access
6 Citations
3,859 Views
15 Pages

Augmenting Mental Health Support for Patients Accessing Different Degrees of Formal Psychiatric Care through a Supportive Text Messaging Program: Protocol for a Randomized Controlled Trial

  • Raquel da Luz Dias,
  • Reham Shalaby,
  • Belinda Agyapong,
  • Gloria Obuobi-Donkor,
  • Medard K. Adu,
  • Ejemai Eboreime,
  • Samuel Obeng Nkrumah,
  • Sanjana Sridharan,
  • Patryk Simon and
  • Vincent Israel Opoku Agyapong
  • + 29 authors

13 February 2023

Patients feel more vulnerable when accessing community mental health programs for the first time or after being discharged from psychiatric inpatient units. Long wait times for follow-up appointments, shortage of mental health professionals, lack of...

  • Article
  • Open Access
10 Citations
5,664 Views
20 Pages

Delay and Energy Consumption of MQTT over QUIC: An Empirical Characterization Using Commercial-Off-The-Shelf Devices

  • Sidna Jeddou,
  • Fátima Fernández,
  • Luis Diez,
  • Amine Baina,
  • Najid Abdallah and
  • Ramón Agüero

12 May 2022

The QUIC protocol, which was originally proposed by Google, has recently gained a remarkable presence. Although it has been shown to outperform TCP over a wide range of scenarios, there exist some doubts on whether it might be an appropriate transpor...

  • Article
  • Open Access
24 Citations
7,928 Views
23 Pages

19 May 2023

IoT platforms for the transportation industry are portable with limited battery life and need real-time and long-term monitoring operations. Since MQTT and HTTP are widely used as the main communication protocols in the IoT, it is imperative to analy...

  • Article
  • Open Access
65 Citations
10,138 Views
22 Pages

An Indoor Positioning System Based on Wearables for Ambient-Assisted Living

  • Óscar Belmonte-Fernández,
  • Adrian Puertas-Cabedo,
  • Joaquín Torres-Sospedra,
  • Raúl Montoliu-Colás and
  • Sergi Trilles-Oliver

25 December 2016

The urban population is growing at such a rate that by 2050 it is estimated that 84% of the world’s population will live in cities, with flats being the most common living place. Moreover, WiFi technology is present in most developed country urban ar...

  • Article
  • Open Access
4 Citations
4,312 Views
14 Pages

19 October 2023

This study explores the important task of validating data exchange between a control box, a Programmable Logic Controller (PLC), and a robot in an industrial setting. To achieve this, we adopt a unique approach utilizing both a virtual PLC simulator...

  • Article
  • Open Access
8 Citations
9,099 Views
17 Pages

15 September 2020

In this age of electronic communication, checking the physical mailbox is still part of our daily life. Mailboxes are placed several meters away from the house, and sometimes across the opposite side of a street. It is annoying to walk to the mailbox...

  • Article
  • Open Access
18 Citations
22,092 Views
17 Pages

18 June 2021

Artificial intelligence (AI) has brought lots of excitement to our day-to-day lives. Some examples are spam email detection, language translation, etc. Baby monitoring devices are being used to send video data of the baby to the caregiver’s smartphon...

  • Article
  • Open Access
20 Citations
4,722 Views
16 Pages

This work aims to monitor air quality in places where humans spend most of their time, such as workplaces and homes. Radon gas is a naturally occurring, colourless, odourless and tasteless gas that accumulates in enclosed spaces. It is a radioactive...

  • Article
  • Open Access
12 Citations
5,516 Views
15 Pages

10 August 2018

Delay tolerant network (DTN) protocol was proposed for a network where connectivity is not available. In DTN, a message is delivered to a destination node via store-carry-forward approach while using opportunistic contacts. Probabilistic routing prot...

  • Article
  • Open Access
6 Citations
2,905 Views
10 Pages

29 January 2021

We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no dis...

  • Article
  • Open Access
3 Citations
3,547 Views
16 Pages

This paper introduces an effective communication-induced checkpointing protocol using message logging to enable the number of extra checkpoints to be far lower than the previous number. Even if a situation occurs in which it is decided that a process...

of 19