![Sensors | Free Full-Text | Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources Sensors | Free Full-Text | Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources](https://www.mdpi.com/sensors/sensors-18-00917/article_deploy/html/images/sensors-18-00917-g005.png)
Sensors | Free Full-Text | Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources
![Verification of the MQTT IoT Protocol Using Property-Specific CTL Sweep-Line Algorithms | SpringerLink Verification of the MQTT IoT Protocol Using Property-Specific CTL Sweep-Line Algorithms | SpringerLink](https://media.springernature.com/lw685/springer-static/image/chp%3A10.1007%2F978-3-662-63079-2_8/MediaObjects/512000_1_En_8_Fig1_HTML.png)
Verification of the MQTT IoT Protocol Using Property-Specific CTL Sweep-Line Algorithms | SpringerLink
![Figure 4 from On Modelling and Validation of the MQTT IoT Protocol for M2M Communication | Semantic Scholar Figure 4 from On Modelling and Validation of the MQTT IoT Protocol for M2M Communication | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/8e994b047c2521f6393acc66023cf4d898eb9cba/8-Figure4-1.png)
Figure 4 from On Modelling and Validation of the MQTT IoT Protocol for M2M Communication | Semantic Scholar
![Figure 3 from Architectural design of token based authentication of MQTT protocol in constrained IoT device | Semantic Scholar Figure 3 from Architectural design of token based authentication of MQTT protocol in constrained IoT device | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/552cb456bf67e9add232aa8d879c926637de92ab/3-Figure3-1.png)
Figure 3 from Architectural design of token based authentication of MQTT protocol in constrained IoT device | Semantic Scholar
![Sequence diagram for accessing the protected Message Queue Telemetry... | Download Scientific Diagram Sequence diagram for accessing the protected Message Queue Telemetry... | Download Scientific Diagram](https://www.researchgate.net/publication/323916371/figure/fig4/AS:608116056023045@1521997574092/Sequence-diagram-for-accessing-the-protected-Message-Queue-Telemetry-Transport-MQTT.png)
Sequence diagram for accessing the protected Message Queue Telemetry... | Download Scientific Diagram
![Sequence Diagram of the Ping-Pong application, totally based on the... | Download Scientific Diagram Sequence Diagram of the Ping-Pong application, totally based on the... | Download Scientific Diagram](https://www.researchgate.net/publication/318129304/figure/fig3/AS:512336710832132@1499161999005/Sequence-Diagram-of-the-Ping-Pong-application-totally-based-on-the-MQTT-SN-protocol.png)
Sequence Diagram of the Ping-Pong application, totally based on the... | Download Scientific Diagram
![The sequence diagram of the data exchange in the MQTT service for the... | Download Scientific Diagram The sequence diagram of the data exchange in the MQTT service for the... | Download Scientific Diagram](https://www.researchgate.net/publication/344212603/figure/fig3/AS:974629187366912@1609381114426/The-sequence-diagram-of-the-data-exchange-in-the-MQTT-service-for-the-procedure-of.png)