Results 11 to 20 of about 7,114 (208)

Reinforcement-Learning-based IDS for 6LoWPAN [PDF]

open access: yes2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021
<p>The Routing Protocol for low power Lossy networks (RPL) is a critical operational component of low power wireless personal area networks using IPv6 (6LoWPANs). In this paper we propose a Reinforcement Learning (RL) based IDS to detect various attacks on RPL in 6LoWPANs, including several unaddressed by current research. The proposed scheme can
Prosanta Gope   +2 more
openaire   +1 more source

6LoWPAN Fragment Forwarding [PDF]

open access: yesIEEE Communications Standards Magazine, 2019
Low-power wireless technologies have been applied to industrial fields not only to monitor facilities but also to control them. There is a legitimate requirement to integrate low-power wireless networks with existing IP-enabled networks such as the Internet.
Tanaka, Yasuyuki   +2 more
openaire   +2 more sources

New Bit Pattern Based IPv6 Address Compression Techniques for 6LoWPAN Header Compression

open access: yesIEEE Access, 2022
Things in the world can be connected to the Internet through various technologies such as Wi-Fi, Bluetooth, IEEE 802.15.4 etc. Among all IPv6 over IEEE 802.15.4 looks promising for outdoor environments for connecting a very large number of resource ...
Geetha V., Archana Bhat, S. Thanmayee
doaj   +1 more source

Multi-Sensor Based healthcare monitoring system by LoWPAN-based architecture

open access: yesMeasurement: Sensors, 2023
The development of the Internet of Things (IoT) has recently revived interest in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). For the enormous IP-based detection technologies in the future IoT, 6LoWPAN mobile compatibility is still in ...
Madhu Kumar Vanteru   +5 more
doaj   +1 more source

Intrusion Prevention Scheme Against Rank Attacks for Software-Defined Low Power IoT Networks

open access: yesIEEE Access, 2022
The 6LoWPAN (IPv6 over low-power wireless personal area networks) standard enables resource-constrained devices to connect to the IPv6 network, blending an IPv6 header compression protocol.
Christian Miranda   +4 more
doaj   +1 more source

Design of 6LoWPAN border router based on multiple open source system

open access: yesDianzi Jishu Yingyong, 2018
Based on the open source system of OpenWrt,it develops application socket-support,and ports the 6LoWPAN/RPL border router(6LBR) to the OpenWrt. It Choses TL-WR703N SoC and CC1310DK as the core handware platforms, and relys on Contiki,6LBR and OpenWrt ...
Wu Mingbiao, Wu Guiqing, Chen Qinghua
doaj   +1 more source

IETF standardization in the field of the Internet of Things (IoT): a survey [PDF]

open access: yes, 2013
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David   +7 more
core   +2 more sources

Design of coal seam gas pressure monitoring system based on 6LoWPA

open access: yesGong-kuang zidonghua, 2018
In view of problems of low measurement accuracy, delayed data transmission and inconvenient equipment deployment existed in current coal seam gas pressure monitoring, a coal seam gas pressure monitoring system based on 6LoWPAN was designed. In the system,
LIU Shaofei   +3 more
doaj   +1 more source

Information Centric Networking in the IoT: Experiments with NDN in the Wild [PDF]

open access: yes, 2014
This paper explores the feasibility, advantages, and challenges of an ICN-based approach in the Internet of Things. We report on the first NDN experiments in a life-size IoT deployment, spread over tens of rooms on several floors of a building.
Baccelli, Emmanuel   +4 more
core   +5 more sources

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 216-234, December 2023., 2023
A mechanism to effectively handle sinkhole attacks in smart homes is presented, addressing existing IDS systems' shortcomings. A formulation for assigning weights to network nodes based on their resources is proposed and an IDS placement strategy to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack ...
Md. Shafiqul Islam   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy