scispace - formally typeset
Search or ask a question
Topic

Internet appliance

About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This article presents the work being done in 6TiSCH, a newly-formed working group in the Internet Engineering Task Force, which is standardizing the mechanisms making the Industrial Internet of Things a reality.
Abstract: Industrial and IP-enabled low-power wireless networking technologies are converging, resulting in the Industrial Internet of Things. On the one hand, low-power wireless solutions are available today that answer the strict reliability and power consumption requirements of industrial applications. These solutions are based on Time- Synchronized Channel Hopping, a medium access control technique at the heart of industrial standards such as the WirelessHART and ISA100.11a, and layer 1 and 2 standards such as IEEE802.15.4e. On the other hand, a range of standards have been published to allow low-power wireless devices to communicate using the Internet Protocol (IP), thereby becoming true “fingers of the Internet,” and greatly simplifying their integration into existing networks. This article acknowledges the standardization effort to combine those capabilities. The networks resulting from this convergence exhibit reliability and power consumption performances compatible with demanding industrial applications, while being easy to integrate, and following the end-to-end paradigm of today's Internet. In particular, this article presents the work being done in 6TiSCH, a newly-formed working group in the Internet Engineering Task Force, which is standardizing the mechanisms making the Industrial Internet of Things a reality.

258 citations

Journal ArticleDOI
TL;DR: The results show that e-mail drives people's use of the Internet, and those who used e- mail more than they used the Web were also more likely to continue using the Internet over the course of a year.
Abstract: the Internet a superhighway to information or a high-tech extension of the home tele- phone? We address this question by operationalizing information acquisition and enter- tainment as the use of the World Wide Web and interpersonal communication as the use of electronic mail (e-mail), and examine how 229 members of 110 households used these services during their first year on the Internet. The results show that e-mail drives people's use of the Internet. Participants used e-mail in more Internet sessions and more consistently than they used the World Wide Web, and they used e-mail first in sessions where they used both. Participants used the Internet more after they had used e-mail heavily, but they used the Internet less after they had used the Web heavily. While participants' use of both e-mail and the Web declined with time, the decline in Web use was steeper. Those who used e-mail more than they used the Web were also more likely to continue using the Internet over the course of a year. Our findings have implications for engineering and policies for the Internet and, more generally, for studies of the social impact of new technology.

254 citations

Proceedings ArticleDOI
18 Jun 2012
TL;DR: This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Abstract: Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.

248 citations

Patent
10 Dec 1999
TL;DR: An Internet telecommunication system in accord with the invention combines the capabilities of the Advanced Intelligent Network (AIN) with those of the internetwork commonly known as the Internet as mentioned in this paper, is described in Table 1.
Abstract: An Internet telecommunication system in accord with the invention combines the capabilities of the Advanced Intelligent Network (AIN) with those of the internetwork commonly known as the Internet. Functions associated with the Internet Domain Name Server system are enhanced using AIN data and processing. Voice grade telephone calls from a fixed position Internet PC to a roaming wireless personal communication system are enabled. Home Location Register data from the control point of the AIN is forwarded into the Internet Domain Name Server for conditioning the IP lookup and addressing to determine the ultimate call routing. Internet calls may also be automatically completed by the system to addresses other than the ones entered by the caller.

248 citations

Proceedings Article
04 Jun 2013
TL;DR: This document provides a framework for measurement and analysis of the security implications inherent in an Internet that is dominated by non-user endpoints, content in the form of objects, and content that is generated by objects without direct user involvement.
Abstract: There are currently more objects connected to the Internet than there are people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet or become physical representations of data accessible via Internet systems. This trend toward greater independent object interaction in the Internet is collectively described as the Internet of Things (IoT). As with previous global technology trends, such as widespread mobile adoption and datacentre consolidation, the changing operating environment associated with the Internet of Things represents considerable impact to the attack surface and threat environment of the Internet and Internet-connected systems. The increase in Internet-connected systems and the accompanying, non-linear increase in Internet attack surface can be represented by several tiers of increased surface complexity. Users, or groups of users, are linked to a non-linear number of connected entities, which in turn are linked to a non-linear number of indirectly connected, trackable entities. At each tier of this model, the increasing population, complexity, heterogeneity, interoperability, mobility, and distribution of entities represents an expanding attack surface, measurable by additional channels, methods, and data items. Further, this expansion will necessarily increase the field of security stakeholders and introduce new manageability challenges. This document provides a framework for measurement and analysis of the security implications inherent in an Internet that is dominated by non-user endpoints, content in the form of objects, and content that is generated by objects without direct user involvement.

247 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
77% related
Information system
107.5K papers, 1.8M citations
76% related
Web page
50.3K papers, 975.1K citations
74% related
Mobile computing
51.3K papers, 1M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202215
20211
20202
201814
201770