Results 91 to 100 of about 3,585 (231)

Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions

open access: yesJournal of Communications Software and Systems, 2022
Establishing trust-based interactions in heterogeneously connected devices appears to be the prominent mechanism in addressing the prevailing concerns of confidence, reliability and privacy relevant in establishing secure interactions among connected ...
Vishwanath Garagad, Nalini Iyer
doaj   +1 more source

Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 1, 10 January 2024.
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal   +5 more
wiley   +1 more source

Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT? [PDF]

open access: yes, 2019
The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change.
Baddeley, Michael   +6 more
core   +4 more sources

A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information.
Khatereh Ahmadi   +2 more
wiley   +1 more source

Sensornet checkpointing: enabling repeatability in testbeds and realism in simulations [PDF]

open access: yes, 2009
When developing sensor network applications, the shift from simulation to testbed causes application failures, resulting in additional time-consuming iterations between simulation and testbed. We propose transferring sensor network checkpoints between
Dunkels, Adam   +5 more
core   +2 more sources

A beginner's guide to infrastructure‐less networking concepts

open access: yesIET Networks, Volume 13, Issue 1, Page 66-110, January 2024.
Infrastructure‐less networks connect communication devices end‐to‐end by managing links and routes independent on fixed networking facilities, relying on dedicated protocols running on end‐user devices. The authors describe the different networking concepts of infrastructure‐less networks by looking at the main properties, common applications, ongoing ...
Anna Förster   +7 more
wiley   +1 more source

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja

open access: green, 2021
In IoT ecosystems, the interaction of devices with each other creates a perfect environment but there are heterogeneous nodes that will supply a variety of services. In the intelligent environment, devices with various processing capacities may operate together and communicate transparently with one other and with users.
Ali Hamid Farea, Kerem Küçük
openalex   +2 more sources

Home - About - Disclaimer - Privacy