Results 51 to 60 of about 3,585 (231)
Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding [PDF]
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools.
Dunkels, Adam +4 more
core +2 more sources
A Review of Security and Privacy Concerns in the Internet of Things (IoT)
The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications’ connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code ...
Muhammad Aqeel +6 more
wiley +1 more source
Power consumption is one of the most important factors in wireless sensor network research, but most simulators do not provide support for visualizing the power consumption of an entire sensor network. This makes it hard to develop, debug, and understand mechanisms and protocols based on power-saving mechanisms.
Österlind, Fredrik +2 more
openaire +3 more sources
It is the expansion and use of the Industrial Internet of Things (IIoT) in various industrial sectors and applications that are referred to as the Industrial Internet of Things (IIoT). The Industrial Internet of Things includes industrial applications such as robots, medical devices, and software‐defined manufacturing processes.
Abolfazl Mehbodniya +7 more
wiley +1 more source
Today, with increasing information technology such as the Internet of Things (IoT) in human life, interconnection and routing protocols need to find optimal solution for safe data transformation with various smart devices. Therefore, it is necessary to provide an enhanced solution to address routing issues with respect to new interconnection ...
Jiangdong Lu +5 more
wiley +1 more source
Analysis of Efficient Routing Protocols for Constrained Application using COOJA Simulator
K L Meghana
openalex +2 more sources
Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks [PDF]
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN.
Joseph Kipongo +2 more
doaj +1 more source
A handheld diagnostic system for 6LoWPAN networks [PDF]
The successful deployment of low-power wireless sensor networks (WSNs) in real application environments is a much broader exercise than just the simple instrumentation of the intended monitoring site. Many problems, from node malfunctions to connectivity
core +2 more sources
RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols [PDF]
Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be
Roussel, Kévin +2 more
core +4 more sources
An Integrated Simulation Module for Cyber-Physical Automation Systems
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems.
Francesco Ferracuti +3 more
doaj +1 more source

