Author:
Gawade Aruna,Vinchhi Rushabh
Reference14 articles.
1. Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: Advances in energy engineering, ICAEE, pp 69–72
2. Ali ST, Sivaraman V, Ostry D (2014) Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring. Future Gener Comput Syst 35:80–90
3. Dlodlo N (2012) Adopting the Internet of Things technologies in environmental management in South Africa. In: Proceedings of the international conference on environment science and engineering, Singapore, vol 3, pp 45–55
4. Ning H, Liu H (2013) Cyberentity security in the internet of things computer. IEEE Comput Soc 46(4):46–53
5. Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):144–149