Results 71 to 80 of about 8,077 (231)

Gateway deployment algorithm based on 6LoWPAN multi-gateway system

open access: yesDianzi Jishu Yingyong, 2018
The addition of multi-gateway function and protocol in the Destination Oriented Directed Acyclic Graph (DODAG) network routing topology of 6LoWPAN is conducive to the improvement of the entire network capacity and the reduction of energy consumption and ...
He Aizhou, Zheng Lin, Qu Qiji
doaj   +1 more source

IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK

open access: yesIraqi Journal of Information & Communication Technology, 2021
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN.
Abdulkareem A. Kadhim, Sarah A. Rafea
doaj   +1 more source

Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults

open access: yesConcurrency and Computation: Practice and Experience, Volume 36, Issue 27, 10 December 2024.
Summary Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions.
Arash Heidari   +3 more
wiley   +1 more source

A Service Model for 6LoWPAN Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
This paper proposes a 6LoWPAN service model based on the IPv6-based k -Anycast communication model. This model is extended into 6LoWPAN service model so that the data-centric services of WSN can be achieved efficiently in the address-centric 6LoWPAN.
Xiaonan Wang, Haili Huang
doaj   +1 more source

Recent developments of demand‐side management towards flexible DER‐rich power systems: A systematic review

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 13, Page 2259-2300, July 2024.
Investigating the state of the art of power system flexibility. Abstract Recently, various distributed energy resources are significantly integrated into the modern power systems. This introduction of distributed energy resource‐rich systems can cause various power quality issues, due to their uncertainties and capacity variations.
Hossam H. H. Mousa   +2 more
wiley   +1 more source

A Test Bed for Evaluating the Performance of IoT Networks [PDF]

open access: yes, 2020
The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used.
Harvey, Hope
core   +1 more source

A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport

open access: yesExpert Systems, Volume 41, Issue 2, February 2024.
Abstract One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements.
Álvaro Michelena   +7 more
wiley   +1 more source

TCP over low-power and lossy networks: tuning the segment size to minimize energy consumption

open access: yes, 2010
Low-power and Lossy Networks (LLNs), like wireless networks based upon the IEEE 802.15.4 standard, have strong energy constraints, and are moreover subject to frequent transmission errors, not only due to congestion but also to collisions and to radio ...
Ayadi, Ahmed   +2 more
core   +3 more sources

A Network Access Control Framework for 6LoWPAN Networks [PDF]

open access: yesSensors, 2013
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge.
Luís Oliveira   +3 more
openaire   +5 more sources

A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information.
Khatereh Ahmadi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy