Results 31 to 40 of about 189 (141)
Investigating the CoAP Congestion Control Strategies for 6TiSCH-Based IoT Networks
The Constrained Application Protocol (CoAP) is a RESTful protocol standardized by the IETF and widely used for IoT applications. CoAP includes a default congestion control algorithm to ensure efficient operation under high traffic conditions.
Francesca Righetti +3 more
doaj +1 more source
Simulation is a powerful tool for development of wireless networks. One key drawback of simulation‐based studies for wireless networking is the need to use a radio propagation model. In this paper, we propose trace‐based simulation for 6TiSCH (IPv6 over the TSCH mode of IEEE802.15.4e).
Tanaka, Yasuyuki +2 more
openaire +2 more sources
Predicting Wi‐Fi link quality through artificial neural networks
Artificial Neural Networks can be profitably used to predict the quality of a Wi‐Fi link in the near future. Results obtained on a real testbed show that this approach provides a better prediction accuracy than the techniques customarily employed in conventional adaptive solutions.
Stefano Scanzio +3 more
wiley +1 more source
Due to the explosive growth of the Internet of things (IoT) devices and the emergence of diverse new applications, network traffic volume is growing exponentially. The traditional centralized network architecture cannot fulfill IoT devices demand because of the heavy network traffic in industrial IoT.
Ahsan Rafiq +5 more
wiley +1 more source
We propose a zero‐day intrusion detection and response system (ZDRS) for responding to network security blind spots. An existing detection and response system for the analysis of zero‐day attacks uses a full‐packet storage method; thus, the longer the time required to recognize a zero‐day attack, the higher is the packet storage capacity and inspection
Won-Seok Choi +3 more
wiley +1 more source
Key Performance Indicators of the Reference 6TiSCH Implementation in Internet-of-Things Scenarios
Tens of thousands of wireless industrial monitoring deployments exist today, logging more than 18 billion operating hours. These solutions have been around for over a decade and are based on standards such as WirelessHART and ISA100.11a to provide ...
Malisa Vucinic +5 more
doaj +1 more source
RIOT and OpenWSN 6TiSCH: Happy Together [PDF]
Short development cycles, application-field diversity, and requirements on network size or reliability put an ever increasing strain on Internet of Things (IoT) application developers. Real-time embedded operating systems (RTOS) aim to provide a key set of features, abstractions and services that enable faster development.
Claeys, Timothy +4 more
openaire +2 more sources
A Survey of Data Aggregation Protocols for Energy Conservation in WSN and IoT
Conservation of energy has been a major concern for Wireless Sensor Networks (WSNs) and IoT applications. Several strategies were devised, aimed at optimizing energy consumption in these applications, based on: (a) use of low‐powered hardware devices, (b) deploying mobile/relay agents for data collection, (c) clustering, and (d) data aggregation ...
Beneyaz Ara Begum +2 more
wiley +1 more source
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is
Sita Rani +7 more
wiley +1 more source
Optimal Initial Synchronization Time in the Minimal 6TiSCH Configuration
6TiSCH is an emerging networking technology proposed by IETF for the Industrial Internet of Things. As a result of its standardization effort, IETF has proposed the so-called minimal 6TiSCH configuration, which sets the minimal requirements for building ...
Apostolos Karalis +2 more
doaj +1 more source

