Results 71 to 80 of about 7,114 (208)

On Link Estimation in Dense RPL Deployments [PDF]

open access: yes, 2012
The Internet of Things vision foresees billions of devices to connect the physical world to the digital world. Sensing applications such as structural health monitoring, surveillance or smart buildings employ multi-hop wireless networks with high ...
7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications 2012   +3 more
core   +2 more sources

Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults

open access: yesConcurrency and Computation: Practice and Experience, Volume 36, Issue 27, 10 December 2024.
Summary Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions.
Arash Heidari   +3 more
wiley   +1 more source

Optimal Sink Node Placement and Routing Protocol Evaluation for 6LoWPAN Networks in IoT [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering
6LoWPAN is a significant innovation for low-power devices such as sensors and motes, enabling efficient communication in IoT networks. This paper examines the impact of topology and sink node placement on data delivery within these networks, focusing on ...
Mahendra Shridhar Naik   +2 more
doaj  

A Network Access Control Framework for 6LoWPAN Networks [PDF]

open access: yesSensors, 2013
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge.
Luís Oliveira   +3 more
openaire   +5 more sources

Design Considerations for Low Power Internet Protocols

open access: yes, 2020
Over the past 10 years, low-power wireless networks have transitioned to supporting IPv6 connectivity through 6LoWPAN, a set of standards which specify how to aggressively compress IPv6 packets over low-power wireless links such as 802.15.4.
Ayers, Hudson   +5 more
core   +1 more source

Evaluation of RPL’s Single Metric Objective Functions [PDF]

open access: yes, 2017
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa   +2 more
core   +1 more source

Recent developments of demand‐side management towards flexible DER‐rich power systems: A systematic review

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 13, Page 2259-2300, July 2024.
Investigating the state of the art of power system flexibility. Abstract Recently, various distributed energy resources are significantly integrated into the modern power systems. This introduction of distributed energy resource‐rich systems can cause various power quality issues, due to their uncertainties and capacity variations.
Hossam H. H. Mousa   +2 more
wiley   +1 more source

An Overview of Secure Communications for the Internet of Things [PDF]

open access: yesInternational Journal of Information and Communication Technology Research
As an emerging technology that combines both digital and physical realms, access to information technology has expanded (IoT) the Internet of Things. The Internet of Things, as it becomes more pervasive, will overshadow human life as much as possible ...
Seyed Ali Zoljalali Moghaddam   +1 more
doaj  

Securing communication in 6LoWPAN with compressed IPsec [PDF]

open access: yes2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN.
Raza, Shahid   +5 more
openaire   +3 more sources

A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport

open access: yesExpert Systems, Volume 41, Issue 2, February 2024.
Abstract One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements.
Álvaro Michelena   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy