Results 11 to 20 of about 2,543 (182)

Coffee forensics — Reconstructing data in IoT devices running Contiki OS

open access: yesForensic Science International: Digital Investigation, 2021
Abstract The ability to examine evidence and reconstruct files from novel IoT operating systems, such as Contiki with its Coffee File System, is becoming vital in digital forensic investigations. Two main challenges for an investigator facing such devices are that (i) the forensic artifacts of the file system are not well documented, and (ii) there ...
Jens-Petter Sandvik   +3 more
openaire   +3 more sources

Quantifying data volatility for IoT forensics with examples from Contiki OS

open access: yesForensic Science International: Digital Investigation, 2022
Forensic investigations are often conducted under limited resource availability such as time, equipment, and people. As data acquisition is resource-demanding already, a higher emphasis needs to be put on prioritizing the investigative steps to optimize the probability of collecting the relevant evidence.
Sandvik, Jens-Petter   +3 more
openaire   +4 more sources

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 216-234, December 2023., 2023
A mechanism to effectively handle sinkhole attacks in smart homes is presented, addressing existing IDS systems' shortcomings. A formulation for assigning weights to network nodes based on their resources is proposed and an IDS placement strategy to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack ...
Md. Shafiqul Islam   +3 more
wiley   +1 more source

ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 235-246, December 2023., 2023
Expected transmission count remaining energy (ETXRE) is a new routing metric based on the combination of expected transmission count and the remaining energy routing metrics. ETXRE shows a great potential to save up on the consumed energy and lowering the delay, and gives exceptionally competitive results in the other areas (i.e. packet delivery ratio,
Aiman Nait Abbou, Jukka Manner
wiley   +1 more source

Congestion control in constrained Internet of Things networks

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 247-255, December 2023., 2023
Congestion Control in constrained IoT Networks is becoming a pressing issue, given the steep rise in IoT networks and devices. On the other hand, transmitting data from Internet‐constrained IoT devices effectively over the Internet using legacy network architecture, protocols, and communication technologies is challenging for such resource‐limited ...
Lotfi Mhamdi, Hussam Abdul Khalek
wiley   +1 more source

Machine‐as‐a‐Service: Blockchain‐based management and maintenance of industrial appliances

open access: yesEngineering Reports, Volume 5, Issue 7, July 2023., 2023
Machine‐as‐a‐Service, or MaaS, is a blockchain‐based solution that enables decentralized provisioning and management of industrial appliances. It enables an operating expenses model where an ecosystem of machine providers, customers, and maintainers interact using fair, transparent, and auditable operations based on smart contracts. Abstract Machine‐as‐
Viet Hoang Tran   +6 more
wiley   +1 more source

[Retracted] Transformation Path of Modern Media from the Perspective of Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The Internet of Things (IoT) is a new technology revolution that aims to link all ordinary physical items to the Internet, creating a massive worldwide network of uniquely connected things that can exchange information and fulfill planned activities, resulting in considerable advantages for consumers.
Yujie Zhang   +4 more
wiley   +1 more source

Enhanced DTLS Support for the Contiki-NG OS

open access: yes, 2021
Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols.
Kalnins, Rudolfs Arvids   +1 more
openaire   +2 more sources

Detection of Middlebox‐Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
The huge number of network traffic data, the abundance of available network features, and the diversity of cyber‐attack patterns mean that intrusion detection remains difficult even though many earlier efforts have succeeded in building the Internet of Healthcare Things (IoHT).
Abdulwahid Al Abdulwahid   +1 more
wiley   +1 more source

Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja

open access: yesEAI Endorsed Transactions on Internet of Things, 2022
Once hardware becomes "intelligent", it is vulnerable to threats. Therefore, IoT ecosystems are susceptible to a variety of attacks and are considered challenging due to heterogeneity and dynamic ecosystem.
Ali Hamid Farea, Kerem Küçük
doaj   +1 more source

Home - About - Disclaimer - Privacy