Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network [PDF]
The Internet of Things (IoT) facilitates the integration of diverse devices, leading to the formation of networks such as Low-power Wireless Personal Area Networks (LoWPANs).
Thibaut Vandervelden +5 more
doaj +4 more sources
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme [PDF]
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it
Muhammad Tanveer +5 more
doaj +5 more sources
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. [PDF]
One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited.
Ghulam Abbas +5 more
doaj +3 more sources
Reinforcement-Learning-Based IDS for 6LoWPAN [PDF]
<p>The Routing Protocol for low power Lossy networks (RPL) is a critical operational component of low power wireless personal area networks using IPv6 (6LoWPANs). In this paper we propose a Reinforcement Learning (RL) based IDS to detect various attacks on RPL in 6LoWPANs, including several unaddressed by current research. The proposed scheme can
Aryan Mohammadi Pasikhani +2 more
openalex +2 more sources
Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation [PDF]
The Internet of things is a popular concept in the current digital revolution. Nowadays, devices worldwide can be connected to the Internet, enhancing their communication, capabilities, and intelligence. Low-Power Wireless Personal Area Network (6LoWPAN)
Sarah Alyami +2 more
doaj +2 more sources
Green content communications in 6LoWPAN [PDF]
As a low‐rate and low‐power network, IPv6 over low‐power wireless personal area network (6LoWPAN) wireless sensor network (WSN) suffers from considerable data communication latency and rapid energy depletion which data transmission mainly accounts for.
Yanli Li, Xiaonan Wang
openalex +2 more sources
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [PDF]
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy +5 more
doaj +2 more sources
Efficient Distributed Monitoring in 6LoWPAN Networks [PDF]
Monitoring constrained, low power and lossy networks is essential to many operations including troubleshooting, forensics, performance management. The main challenge for the monitoring plane in these networks is to efficiently cope with both frequently changing topologies and constrained resources.
Olivier Festor +2 more
openalex +4 more sources
Route-Over Forwarding Techniques in a 6LoWPAN [PDF]
6LoWPAN plays a major role within the protocol stack for the future Internet of Things. Its fragmentation mechanism enables transport of IPv6 datagrams with the required minimum MTU of 1280 bytes over 802.15.4-based networks.
Andreas Weigel +3 more
doaj +2 more sources
LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things. [PDF]
Bettoumi B, Bouallegue R.
europepmc +3 more sources

