Results 71 to 80 of about 8,077 (231)
Gateway deployment algorithm based on 6LoWPAN multi-gateway system
The addition of multi-gateway function and protocol in the Destination Oriented Directed Acyclic Graph (DODAG) network routing topology of 6LoWPAN is conducive to the improvement of the entire network capacity and the reduction of energy consumption and ...
He Aizhou, Zheng Lin, Qu Qiji
doaj +1 more source
IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN.
Abdulkareem A. Kadhim, Sarah A. Rafea
doaj +1 more source
Summary Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions.
Arash Heidari +3 more
wiley +1 more source
A Service Model for 6LoWPAN Wireless Sensor Networks
This paper proposes a 6LoWPAN service model based on the IPv6-based k -Anycast communication model. This model is extended into 6LoWPAN service model so that the data-centric services of WSN can be achieved efficiently in the address-centric 6LoWPAN.
Xiaonan Wang, Haili Huang
doaj +1 more source
Investigating the state of the art of power system flexibility. Abstract Recently, various distributed energy resources are significantly integrated into the modern power systems. This introduction of distributed energy resource‐rich systems can cause various power quality issues, due to their uncertainties and capacity variations.
Hossam H. H. Mousa +2 more
wiley +1 more source
A Test Bed for Evaluating the Performance of IoT Networks [PDF]
The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used.
Harvey, Hope
core +1 more source
Abstract One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements.
Álvaro Michelena +7 more
wiley +1 more source
TCP over low-power and lossy networks: tuning the segment size to minimize energy consumption
Low-power and Lossy Networks (LLNs), like wireless networks based upon the IEEE 802.15.4 standard, have strong energy constraints, and are moreover subject to frequent transmission errors, not only due to congestion but also to collisions and to radio ...
Ayadi, Ahmed +2 more
core +3 more sources
A Network Access Control Framework for 6LoWPAN Networks [PDF]
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge.
Luís Oliveira +3 more
openaire +5 more sources
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information.
Khatereh Ahmadi +2 more
wiley +1 more source

