Results 21 to 30 of about 2,362 (202)

Energy harvesting effect on prolonging low-power lossy networks lifespan

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Low-power lossy networks performance relies heavily on the wireless node battery status. Furthermore, Routing Protocol for Low-Power and Lossy Network routing protocol was not optimally designed with sustainable energy consumption in mind to suit these ...
Mohamed Hadi Habaebi   +6 more
doaj   +1 more source

IGWO-SoE: Improved Grey Wolf Optimization Based Stack of Ensemble Learning Algorithm for Anomaly Detection in Internet of Things Edge Computing

open access: yesIEEE Access, 2023
With the tremendous growth and popularization of the Internet of Things (IoT), the number of attacks targeting such devices has also increased. Therefore, enhancing the anomaly detection model to maximize detection accuracy and mitigate cyber-attacks in ...
J. Manokaran, G. Vairavel
doaj   +1 more source

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 216-234, December 2023., 2023
A mechanism to effectively handle sinkhole attacks in smart homes is presented, addressing existing IDS systems' shortcomings. A formulation for assigning weights to network nodes based on their resources is proposed and an IDS placement strategy to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack ...
Md. Shafiqul Islam   +3 more
wiley   +1 more source

ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 235-246, December 2023., 2023
Expected transmission count remaining energy (ETXRE) is a new routing metric based on the combination of expected transmission count and the remaining energy routing metrics. ETXRE shows a great potential to save up on the consumed energy and lowering the delay, and gives exceptionally competitive results in the other areas (i.e. packet delivery ratio,
Aiman Nait Abbou, Jukka Manner
wiley   +1 more source

Congestion control in constrained Internet of Things networks

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 247-255, December 2023., 2023
Congestion Control in constrained IoT Networks is becoming a pressing issue, given the steep rise in IoT networks and devices. On the other hand, transmitting data from Internet‐constrained IoT devices effectively over the Internet using legacy network architecture, protocols, and communication technologies is challenging for such resource‐limited ...
Lotfi Mhamdi, Hussam Abdul Khalek
wiley   +1 more source

Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Security enhancement in wireless sensor networks (WSNs) is significant in different applications. The advancement of routing attack localization is a crucial security research scenario. Various routing attacks degrade the network performance by injecting malicious nodes into wireless sensor networks. Sybil attacks are the most prominent ones generating
Gebrekiros Gebreyesus Gebremariam   +3 more
wiley   +1 more source

Escalation of Security and Privacy in Internet of Things using Advanced IPv6 Based Security Mechanism

open access: yesWasit Journal of Computer and Mathematics Science, 2021
Kevin Ashton coined the phrase Internet of Things in 1999 with high performance implementation for corporate and social world. Thanks to the success of high-performing Internet of Things (IoT) whereby the tags and sensors are the foundation for IoT ...
Sundresan Perumal
doaj   +1 more source

[Retracted] Transformation Path of Modern Media from the Perspective of Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The Internet of Things (IoT) is a new technology revolution that aims to link all ordinary physical items to the Internet, creating a massive worldwide network of uniquely connected things that can exchange information and fulfill planned activities, resulting in considerable advantages for consumers.
Yujie Zhang   +4 more
wiley   +1 more source

Detection of Middlebox‐Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
The huge number of network traffic data, the abundance of available network features, and the diversity of cyber‐attack patterns mean that intrusion detection remains difficult even though many earlier efforts have succeeded in building the Internet of Healthcare Things (IoHT).
Abdulwahid Al Abdulwahid   +1 more
wiley   +1 more source

Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data.
Lucy Dash   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy