Results 61 to 70 of about 11,264 (216)
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
SAMOS Air‐Sea Fluxes: 2005–2024
The MarineFlux project created a dataset of air/sea turbulent fluxes for 2005–2024 using three bulk flux algorithms and input data from a collection of research vessels contributing to the Shipboard Automated Meteorological and Oceanographic Systems (SAMOS) initiative.
Marc Castells +3 more
wiley +1 more source
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar +2 more
wiley +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
A Review of the Internet of Things (IoT) Landscape: Technologies, Applications, and Open Challenges
The Internet of Things (IoT) has emerged as a large‐scale ecosystem that integrates sensing, communication, and computation across diverse application domains. Its deployment spans smart homes, wearable devices, industrial automation, and smart cities, where heterogeneous devices are required to operate under strict performance, reliability, and ...
Sidna Jeddou +5 more
wiley +1 more source
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi +4 more
doaj
IPv6 Multihoming Support in the Mobile Internet [PDF]
Fourth-generation mobile devices incorporate multiple interfaces with diverse access technologies. The current Mobile IPv6 protocol fails to support the enhanced fault tolerance capabilities that are enabled by the availability of multiple interfaces. In
Azcorra Saloña, Arturo +2 more
core +3 more sources
An IoT‐based monitoring system for open pit abandoned mines integrates an improved ant colony optimization algorithm to optimize sensor deployment and routing, reducing energy consumption by over 40% and extending network lifetime by more than 60%, providing robust real‐time data for ecological restoration decisions.
Gang Zhang +5 more
wiley +1 more source
ABSTRACT The internet of healthcare things (IoHT) has advanced considerably, improving healthcare operations and patient monitoring by continuously collecting data from health sensors attached to patients. Current congestion detection techniques are insufficient for early detection since senders often remain unaware of the size of the residual queue ...
Muhammad Zafarullah +5 more
wiley +1 more source
A Survey on Congestion Control Protocols for CoAP
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network
Sneha R. Deshmukh, Vijay T. Raisinghani
openaire +1 more source

