Results 1 to 10 of about 2,543 (182)

An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks [PDF]

open access: yesSensors, 2023
Currently, within the world, cybercrime is becoming increasingly rampant—often targeting civil infrastructure like power stations and other critical systems.
Patryk Przybocki   +1 more
doaj   +2 more sources

Towards Sustainable Distributed Sensor Networks: An Approach for Addressing Power Limitation Issues in WSNs [PDF]

open access: yesSensors, 2023
Distributed wireless sensor networks (WSNs) have been implemented in multiple applications. Those networks are intended to support the quality of operations and enhance applications’ productivity and safety.
Alaa Alaerjan
doaj   +2 more sources

The Contiki-NG open source operating system for next generation IoT devices

open access: yesSoftwareX, 2022
Contiki-NG (Next Generation) is an open source, cross-platform operating system for severely constrained wireless embedded devices. It focuses on dependable (reliable and secure) low-power communications and standardised protocols, such as 6LoWPAN, IPv6,
George Oikonomou   +5 more
doaj   +3 more sources

ITERL: A Wireless Adaptive System for Efficient Road Lighting. [PDF]

open access: yesSensors (Basel), 2019
This work presents the development and construction of an adaptive street lighting system that improves safety at intersections, which is the result of applying low-power Internet of Things (IoT) techniques to intelligent transportation systems.
García-Castellano M   +5 more
europepmc   +4 more sources

Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset [PDF]

open access: yesMethodsX
The Internet of Things (IoT) has radically reformed various sectors and industries, enabling unprecedented levels of connectivity and automation. However, the surge in the number of IoT devices has also widened the attack surface, rendering IoT networks ...
Vandana Choudhary   +3 more
doaj   +2 more sources

SIMULATION AND ANALYSIS OF RSSI BASED TRILATERATION ALGORITHM FOR LOCALIZATION IN CONTIKI-OS

open access: yesICTACT Journal on Communication Technology, 2016
The recent progress in Wireless sensor networks is contributed by improvisation in research activities in the domain of embedded system and radio communication.
R.Valli   +3 more
doaj   +2 more sources

A Named Data Networking Stack for Contiki NG OS

open access: yes2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), 2022
The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities, and industrial automation applications which are enabled by smart objects (constrained devices). These devices sense, gather and actuate information in their deployed environment. This concept is called as Internet of Things (IoT).
Bilgili, Sedat, Demir, Alper Kamil
openaire   +1 more source

Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks

open access: yesSensors, 2021
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry.
Ismael Essop   +5 more
doaj   +1 more source

An Investigation on Several Operating Systems for Internet of Things [PDF]

open access: yesEAI Endorsed Transactions on Creative Technologies, 2019
In the field of development, Internet of things (IoT) plays a crucial role in providing solution to various situations. A lot of research has been conducted recently to model IoT based operating systems as standard UNIX, Windows and current real time ...
Fawwad Jaskani   +4 more
doaj   +1 more source

A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks  [PDF]

open access: yesJournal of Universal Computer Science, 2023
The present work describes a new technique to mitigate the version number attack (VNA), which is classified as one among the known denial of service (DDoS) damaging attacks targeting RPL-based (Routing Protocol for Low Power and Lossy Networks) IoTs ...
Mehdi Rouissat   +5 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy