Results 111 to 120 of about 2,362 (202)
Simulating a CoAP Wireless Sensor Network using Cooja
Wireless Sensor Networks (WSN) have become, in the past few years, a fundamental part of the Digital Transformation of industries, cities, or agriculture, just to name a few. Their ability to autoconfigure without human intervention, and to wirelessly relay data within the WSN an to the Internet, make them very useful to exploit untapped sources of ...
openaire +2 more sources
Network Coding with Limited Overhearing [PDF]
The two key benefits of network coding are increased reliability and throughput. Most network coding approaches for wireless networks rely on overhearing neighboring transmissions. Overhearing in sensor networks, however, is not energy-efficient. In this
Mottola, Luca +3 more
core
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected
Linus Wallgren +2 more
doaj +1 more source
Energy-Efficient Message Bundling with Delay and Synchronization Constraints in Wireless Sensor Networks. [PDF]
Li S, Kim KS, Zhang L, Huan X, Smith J.
europepmc +1 more source
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. Block ciphers, which are fundamental cryptographic algorithms used for encrypting data,
Amal Hkiri +5 more
doaj +1 more source
Günümüzde pek çok alanda kullanılan düşük kaynağa sahip sensör düğümler, nesnelerin internetinin çok önemli bir parçasıdır. Özellikle kablosuz sensör ağların sanayi, tıp gibi birçok sektörde kullanılması, akıllı üretim tesislerinin kurulması, hastaların uzaktan izlenmesi gibi birçok önemli gelişmeye neden oldu. Bu cihazları fiziksel ortamda test etmek,
Karataş, İbrahim, Bayraklı, Selim
openaire +1 more source
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. [PDF]
Alansari Z +3 more
europepmc +1 more source
Localization, essential in WSN applications, enables sensor nodes to determine their physical positions by referencing anchor nodes. We evaluate broadcast and unicast packet transmissions at the data-link layer for their impact on localization ...
Ismail Hakki Turan +3 more
doaj +1 more source
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. [PDF]
Al-Amiedy TA +5 more
europepmc +1 more source
Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation. [PDF]
Alyami S, Alharbi R, Azzedin F.
europepmc +1 more source

