Results 51 to 60 of about 8,077 (231)

Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand   +5 more
wiley   +1 more source

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]

open access: yes, 2013
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon   +6 more
core   +1 more source

ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things

open access: yes, 2018
RFID systems are among the major infrastructures of the Internet of Things, which follow ISO and EPC standards. In addition, ISO standard constitutes the main layers of supply chain, and many RFID systems benefit from ISO standard for different purposes.
Imani, Mehdi, Moghadam, Abolfazl Qiyasi
core   +1 more source

EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]

open access: yesActa Electrotechnica et Informatica, 2017
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO   +5 more
doaj   +1 more source

CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed   +5 more
wiley   +1 more source

SDN Architecture for 6LoWPAN Wireless Sensor Networks [PDF]

open access: yesSensors, 2018
Wireless sensor networks (WSN) are being increasingly used for data acquisition and control of remote devices. However, they present some constraints in critical and large-scale scenarios. The main limitations come from the nature of their components, such as lossy links, and devices with power supply limitations, poor processing power and limited ...
Marcio L. F. Miguel   +3 more
openaire   +3 more sources

Research on Wireless Sensor Adaptive Networking for Power Monitoring Based on Ultra Wide Band

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
A new network architecture is proposed to address the issue of limited sensor energy and computing power, which utilizes routing nodes to collect sensor data and network the routing nodes. However, the current mature wireless communication technology and networking protocols cannot meet the high reliability and flexibility transmission requirements of ...
Kaiyun Wen, Hongshan Zhao, Shice Zhao
wiley   +1 more source

Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid proliferation of Internet of Things (IoT) devices has revolutionized various industries by enabling smart grids, smart cities, and other applications that rely on seamless connectivity and real‐time data processing. However, this growth has also introduced significant security challenges due to the scale, heterogeneity, and resource ...
Ye Bai   +6 more
wiley   +1 more source

Information Centric Networking in the IoT: Experiments with NDN in the Wild [PDF]

open access: yes, 2014
This paper explores the feasibility, advantages, and challenges of an ICN-based approach in the Internet of Things. We report on the first NDN experiments in a life-size IoT deployment, spread over tens of rooms on several floors of a building.
Baccelli, Emmanuel   +4 more
core   +5 more sources

Minimizing IoT Energy Consumption Using BLE and Metaprotocol Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The Internet of Things is a very fast‐growing industry thanks to the increasing availability of cheap microcontrollers, which are its main component. However, the commonly used cloud technologies are not best suited for resource‐constrained devices, so energy optimization is needed to extend their battery life.
L. Milić   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy