Results 61 to 70 of about 2,543 (182)

Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 1, 10 January 2024.
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal   +5 more
wiley   +1 more source

COLIDE: a collaborative intrusion detection framework for Internet of Things

open access: yesIET Networks, 2019
Internet of Things (IoT) represent a network of resource‐constrained sensor devices connected through the open Internet, susceptible to misuse by intruders.
Junaid Arshad   +4 more
doaj   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]

open access: yes, 2013
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon   +6 more
core   +1 more source

IETF standardization in the field of the Internet of Things (IoT): a survey [PDF]

open access: yes, 2013
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David   +7 more
core   +2 more sources

A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information.
Khatereh Ahmadi   +2 more
wiley   +1 more source

CRETA: Cross-layer RPL with Efficient Trickle and Adaptive Radio Duty Cycle Designed for Mobile IoT Application

open access: yesJournal of Communications Software and Systems
The literature on IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) makes it abundantly evident that there is a trade-off between convergence time and power usage.
Soumya Vastrad, Shobha K. R.
doaj   +1 more source

Design Considerations for Low Power Internet Protocols

open access: yes, 2020
Over the past 10 years, low-power wireless networks have transitioned to supporting IPv6 connectivity through 6LoWPAN, a set of standards which specify how to aggressively compress IPv6 packets over low-power wireless links such as 802.15.4.
Ayers, Hudson   +5 more
core   +1 more source

Let the Tree Bloom: Scalable Opportunistic Routing with ORPL [PDF]

open access: yes, 2013
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks.
Duquennoy, Simon   +2 more
core   +2 more sources

A beginner's guide to infrastructure‐less networking concepts

open access: yesIET Networks, Volume 13, Issue 1, Page 66-110, January 2024.
Infrastructure‐less networks connect communication devices end‐to‐end by managing links and routes independent on fixed networking facilities, relying on dedicated protocols running on end‐user devices. The authors describe the different networking concepts of infrastructure‐less networks by looking at the main properties, common applications, ongoing ...
Anna Förster   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy