Results 31 to 40 of about 4,569 (223)
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
CoAP congestion control for the Internet of Things [PDF]
“© © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Betzler, August +3 more
core +2 more sources
Dynamic forward error correction in wireless real‐time Internet of Things networks
Wireless sensor and actuator networks (WSAN) have greatly benefited from the latest development in real‐time Internet of Things standardisation efforts.
Rolando Herrero, Claude St‐Pierre
doaj +1 more source
IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN.
Abdulkareem A. Kadhim, Sarah A. Rafea
doaj +1 more source
Enhancing Block-Wise Transfer with Network Coding in CoAP
CoAP (Constrained Application Protocol) with block-wise transfer (BWT) option is a known protocol choice for large data transfer in general lossy IoT network environments.
Dizdarevic, Jasenka +2 more
core +1 more source
Virtual Replication of IoT Hubs in the Cloud: A Flexible Approach to Smart Object Management
In future years, the Internet of Things is expected to interconnect billions of highly heterogeneous devices, denoted as “smart objects”, enabling the development of innovative distributed applications.
Simone Cirani +3 more
doaj +1 more source
CoAP conformance testing based on TTCN-3
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU +2 more
doaj +2 more sources
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar +2 more
wiley +1 more source
During the last decade, the number of devices capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario where Internet connected devices are ubiquitous and even the smallest device has a connection to the ...
Höglund, Rikard
core +1 more source

