ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things, which follow ISO and EPC standards. In addition, ISO standard constitutes the main layers of supply chain, and many RFID systems benefit from ISO standard for different purposes.
Imani, Mehdi, Moghadam, Abolfazl Qiyasi
core +1 more source
Old Wine in New Skins? Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices [PDF]
In this paper, we argue that existing concepts for the design and implementation of network stacks for constrained devices do not comply with the requirements of current and upcoming Internet of Things (IoT) use cases.
Baccelli, Emmanuel +4 more
core +4 more sources
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand +5 more
wiley +1 more source
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M. +2 more
core +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed +5 more
wiley +1 more source
Research on Wireless Sensor Adaptive Networking for Power Monitoring Based on Ultra Wide Band
A new network architecture is proposed to address the issue of limited sensor energy and computing power, which utilizes routing nodes to collect sensor data and network the routing nodes. However, the current mature wireless communication technology and networking protocols cannot meet the high reliability and flexibility transmission requirements of ...
Kaiyun Wen, Hongshan Zhao, Shice Zhao
wiley +1 more source
Real-time Monitoring System of Hazardous Chemicals Based on 6LoWPAN and WLAN
To ensure the safe storage and use of lab hazardous chemicals, this paper designs and develops a 6LoWPAN and WLAN-based hazardous chemicals monitoring system.
G.Q. Hu
doaj +1 more source
EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO +5 more
doaj +1 more source
Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection
The rapid proliferation of Internet of Things (IoT) devices has revolutionized various industries by enabling smart grids, smart cities, and other applications that rely on seamless connectivity and real‐time data processing. However, this growth has also introduced significant security challenges due to the scale, heterogeneity, and resource ...
Ye Bai +6 more
wiley +1 more source

