Results 101 to 110 of about 13,790 (272)
Virtualizing LoRaWAN Nodes: a CoAP-based Approach [PDF]
In the near future, Internet of Things (IoT) will play a relevant role in people’s lives and one of the main challenges will be the integration of heterogeneous networks. Among widely adopted network technologies, the development of the so-called Low-Power Wide-Area Networks (LPWANs), in particular Long Range WAN (LoRaWAN) is attracting a significant ...
Cilfone, Antonio+2 more
openaire +3 more sources
The efficiency requirement of room air conditioner (RAC) has became stricter and stricter with the development of global environment consciousness.
Zhang Haifeng, Wu Jianhua, Li Yanzhong
doaj
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers ...
Dan Garcia-Carrillo+3 more
doaj +1 more source
Exploring the role of the Internet of Things in green buildings
Green building definition. Abstract The global energy crisis has been one of the significant challenges for decades, threatening the global economy, and the health of our environment. The government's efforts to enhance the welfare and lifestyle of citizens have been partially undermined by a significant rise in energy intensity, resulting in increased
Mona Masroor Fakhabi+2 more
wiley +1 more source
In this paper we present the design and implementation of the Constrained Application Protocol (CoAP) for TinyOS, which we refer to as TinyCoAP. CoAP seeks to apply the same application transfer paradigm and basic features of HTTP to constrained networks,
Anna Calveras+2 more
doaj +1 more source
The authors offer a systematic meta‐analysis of AI applications in network intrusion detection systems (NIDS) with a specific focus on deep learning (DL) and machine learning (ML) techniques within the domain of network security. Through a comprehensive meta‐analysis and rigorous evaluation of the effectiveness, dataset utilisation, attack detection ...
Ziadoon K. Maseer+4 more
wiley +1 more source
Analytical Model of Large Data Transactions in CoAP Networks
We propose a novel analytical model to study fragmentation methods in wireless sensor networks adopting the Constrained Application Protocol (CoAP) and the IEEE 802.15.4 standard for medium access control (MAC).
Alessandro Ludovici+3 more
doaj +1 more source
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning
Software‐defined networking is utilized with the OpenFlow protocol and Ryu control to optimize broadband and enhance attack detection using neural networks. The proposed system was evaluated using a 5G dataset, and the results demonstrated an accuracy of 99%, surpassing the results of four previous articles.
Mohammed Salah Abood+10 more
wiley +1 more source
Publish/subscribe protocol in wireless sensor networks: improved reliability and timeliness [PDF]
The rapidly-evolving demand of applications using wireless sensor networks in several areas such as building and industrial automation or smart cities, among other, makes it necessary to determine and provide QoS support mechanisms which can satisfy the ...
Calveras Augé, Anna M.+1 more
core +2 more sources
Data collection in IoT networks: Architecture, solutions, protocols and challenges
Current IoT data collection techniques are categorised and a comparative evaluation of these methods is performed based on the topics analysed and elaborated by the authors. In addition, a comprehensive analysis of recent advances in IoT data collection is provided, highlighting different data types and sources, transmission protocols from connected ...
Ado Adamou Abba Ari+6 more
wiley +1 more source