Results 61 to 70 of about 2,543 (182)
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal +5 more
wiley +1 more source
COLIDE: a collaborative intrusion detection framework for Internet of Things
Internet of Things (IoT) represent a network of resource‐constrained sensor devices connected through the open Internet, susceptible to misuse by intruders.
Junaid Arshad +4 more
doaj +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon +6 more
core +1 more source
IETF standardization in the field of the Internet of Things (IoT): a survey [PDF]
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David +7 more
core +2 more sources
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information.
Khatereh Ahmadi +2 more
wiley +1 more source
The literature on IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) makes it abundantly evident that there is a trade-off between convergence time and power usage.
Soumya Vastrad, Shobha K. R.
doaj +1 more source
Design Considerations for Low Power Internet Protocols
Over the past 10 years, low-power wireless networks have transitioned to supporting IPv6 connectivity through 6LoWPAN, a set of standards which specify how to aggressively compress IPv6 packets over low-power wireless links such as 802.15.4.
Ayers, Hudson +5 more
core +1 more source
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL [PDF]
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks.
Duquennoy, Simon +2 more
core +2 more sources
A beginner's guide to infrastructure‐less networking concepts
Infrastructure‐less networks connect communication devices end‐to‐end by managing links and routes independent on fixed networking facilities, relying on dedicated protocols running on end‐user devices. The authors describe the different networking concepts of infrastructure‐less networks by looking at the main properties, common applications, ongoing ...
Anna Förster +7 more
wiley +1 more source

