Results 61 to 70 of about 11,264 (216)

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

SAMOS Air‐Sea Fluxes: 2005–2024

open access: yesGeoscience Data Journal, Volume 13, Issue 1, January 2026.
The MarineFlux project created a dataset of air/sea turbulent fluxes for 2005–2024 using three bulk flux algorithms and input data from a collection of research vessels contributing to the Shipboard Automated Meteorological and Oceanographic Systems (SAMOS) initiative.
Marc Castells   +3 more
wiley   +1 more source

Deep Reinforcement Learning and IoT for Renewable Energy Optimization in Smart Buildings: A Comprehensive Review

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar   +2 more
wiley   +1 more source

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

A Review of the Internet of Things (IoT) Landscape: Technologies, Applications, and Open Challenges

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
The Internet of Things (IoT) has emerged as a large‐scale ecosystem that integrates sensing, communication, and computation across diverse application domains. Its deployment spans smart homes, wearable devices, industrial automation, and smart cities, where heterogeneous devices are required to operate under strict performance, reliability, and ...
Sidna Jeddou   +5 more
wiley   +1 more source

IoT Networks: Using Machine Learning Algorithm for Service Denial Detection in Constrained Application Protocol

open access: yesCovenant Journal of Engineering Technology, 2023
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi   +4 more
doaj  

IPv6 Multihoming Support in the Mobile Internet [PDF]

open access: yes, 2007
Fourth-generation mobile devices incorporate multiple interfaces with diverse access technologies. The current Mobile IPv6 protocol fails to support the enhanced fault tolerance capabilities that are enabled by the availability of multiple interfaces. In
Azcorra Saloña, Arturo   +2 more
core   +3 more sources

Ecological Environment Monitoring of Open Pit Abandoned Mines Combining Internet of Things and Improved Ant Colony Optimization

open access: yesEngineering Reports, Volume 7, Issue 11, November 2025.
An IoT‐based monitoring system for open pit abandoned mines integrates an improved ant colony optimization algorithm to optimize sensor deployment and routing, reducing energy consumption by over 40% and extending network lifetime by more than 60%, providing robust real‐time data for ecological restoration decisions.
Gang Zhang   +5 more
wiley   +1 more source

Queue‐Aware Congestion Avoidance in IoHT: Enabling Future Integration With Large Models for Transmission Optimization

open access: yesInternet Technology Letters, Volume 8, Issue 6, November/December 2025.
ABSTRACT The internet of healthcare things (IoHT) has advanced considerably, improving healthcare operations and patient monitoring by continuously collecting data from health sensors attached to patients. Current congestion detection techniques are insufficient for early detection since senders often remain unaware of the size of the residual queue ...
Muhammad Zafarullah   +5 more
wiley   +1 more source

A Survey on Congestion Control Protocols for CoAP

open access: yesInternational Journal of Communication Networks and Information Security (IJCNIS), 2022
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network
Sneha R. Deshmukh, Vijay T. Raisinghani
openaire   +1 more source

Home - About - Disclaimer - Privacy