136
Views
8
CrossRef citations to date
0
Altmetric
Articles

WSN and IoT based smart city model using the MQTT protocol

, &

References

  • Krishna, P.G., Ravi, K.S., Kumar, V.S. and Kumar MS: Implementation of MQTT Protocol On Low Resourced Embedded Network, Int. J. Pure Appl. Math (IJPAM), 116, pp.161-166 (2017).
  • Isa Shemsi: Implementing Smart Home using Cisco Packet Tracer Simulato, International Journal of Engineering Science Invention Research & Development, Vol. iv, Issue vii, January (2018).
  • R. K. Kodali and S. Soratkal: MQTT based home automation system using ESP826, IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Agra, 2016, pp. 1-5,(2016)
  • T. Yokotani and Y. Sasaki: Comparison with HTTP and MQTT on required network resources for IoT,2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC),Bandung,2016,pp.1-6, (2016).
  • M Poongothai, A L Karupaiya and R Priya dharshini : Implementation of IoT based Smart Laboratory, International Journal of Computer Applications 182(15):31-34, September (2018) doi: 10.5120/ijca2018917853
  • J. Lohokare, R. Dani, S. Sontakke and R. Adhao : Scalable tracking system for public buses using IoT technologies , 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), Pune, 2017,pp.104-109, (2017)
  • P Gopi Krishna, K Sreenivasa Ravi, V.S.S Sailendra Kumar, M.V.S.N Sai Kumar: Implementation of MQTT protocol on low resourced embedded network”, International Journal of Pure and Applied Mathematics, pp 161-166,(2017)
  • R A Atmoko, R Riantini, M K Hasin : IoT real time data acquisition using MQTT protocol”, Journal of Physics Conference Series 853(1), May (2017)
  • F. Jerald, M. Anand, N. Deepika: Design of an Industrial IOT Architecture Based on MQTT Protocol for End Device to Cloud Communication, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-6S2, April (2019)
  • Ullas B S, Anush S, Roopa J: Machine to Machine Communication for Smart Systems using MQT, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 3, March 2014
  • Suvam Mohanty, Sagar Sharma, Vaibhav Vishal: MQTT – Messaging Queue Telemetry Transport IOT based Messaging Protocol, International Research Journal of Engineering and Technology, volume 03, issue 09, sep (2016)
  • Pallavi Sethi, Smruti R. Sarangi :Internet of Things: Architectures, Protocols, and Applications”, Hindawi Journal of Electrical and Computer Engineering, Volume 2017, Article ID 9324035, 25 pages https://doi.org/10.1155/2017/9324035, (2017)
  • Gayatri Sakya and Vidushi Sharma, “ADMC-MAC: Energy efficient adaptive MAC protocol for mission critical applications in WSN”, in Sustainable Computing: Informatics and Systems, Volume 23, 2019, Pages 21-28, ISSN 2210-5379.
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Abie, Habtamu, and Ilangko Balasingham. “Risk-based adaptive security for smart IoT in eHealth.” Proceedings of the 7th International Conference on Body Area Networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2012.
  • Nurse, Jason RC, Sadie Creese, and David De Roure. “Security risk assessment in Internet of Things systems.” IT Professional 19.5 (2017): 20-26. doi: 10.1109/MITP.2017.3680959
  • Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D. Security of the Internet of Things: perspectives and challenges. Wireless Networks. 2014 Nov 1;20(8):2481-501. doi: 10.1007/s11276-014-0761-7
  • Lingaraj, K., Rajashree V. Biradar, and V. C. Patil. “OMMIP: An optimized multiple mobile agents itinerary planning for wireless sensor networks.” Journal of Information and Optimization Sciences 38, no. 6 (2017): 1067-1076. doi: 10.1080/02522667.2017.1374740
  • Durugkar, Santosh, and Ramesh C. Poonia. “Optimum utilization of natural resources for home garden using wireless sensor networks.” Journal of Information and Optimization Sciences 38, no. 6 (2017): 1077–1085. doi: 10.1080/02522667.2017.1380391
  • Zhao, Bing, and Gaiwen Guo. “An encryption algorithm for user’s sensitive information resources in network database.” Journal of Interdisciplinary Mathematics 21, no. 5 (2018): 1255-1260. doi: 10.1080/09720502.2018.1495399
  • Wang, Xiao-Xia, Xi-Yuan Liu, and Zhan-Qiang Li. “A social collaborative urban distribution integration platform.” Journal of Interdisciplinary Mathematics 21, no. 5 (2018): 1109-1113. doi: 10.1080/09720502.2018.1493038
  • Malik, Vinita, and Sukhdip Singh. “Security risk management in IoT environment.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 697-709. doi: 10.1080/09720529.2019.1642628
  • Saad, George W. Helmy, and Magdy A. Ahmed. “Power saving by incorporating mobile agents and clustering approach in wireless sensor networks.” Journal of Discrete Mathematical Sciences and Cryptography 15, no. 2-3 (2012): 135-147. doi: 10.1080/09720529.2012.10698370
  • Kumar, Devender, Harsh Kumar Singh, and Chhahat Ahlawat. “A secure three-factor authentication scheme for wireless sensor networks using ECC.” Journal of Discrete Mathematical Sciences and Cryptography (2019): 1-22. doi: 10.1080/09720529.2019.1627072

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.