Results 91 to 100 of about 1,732 (206)

Using BIP to reinforce correctness of resource-constrained IoT applications [PDF]

open access: yes, 2015
International audienceIoT applications have either a sense-only or a sense-compute-actuate goal and they implement a capability to process and respond to multiple (external) events while performing computations.
Bozga, Marius   +4 more
core   +3 more sources

Deep Learning for Detection of Routing Attacks in the Internet of Things

open access: yesInternational Journal of Computational Intelligence Systems, 2018
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing attacks are especially hard to
Furkan Yusuf YAVUZ   +2 more
doaj   +1 more source

Sigma Routing Metric for RPL Protocol

open access: yesSensors, 2018
This paper presents the adaptation of a specific metric for the RPL protocol in the objective function MRHOF. Among the functions standardized by IETF, we find OF0, which is based on the minimum hop count, as well as MRHOF, which is based on the Expected
Paul Sanmartin   +5 more
doaj   +1 more source

Online Estimation of Battery Lifetime for Wireless Sensors Network [PDF]

open access: yes, 2012
Battery is a major hardware component of wireless sensor networks. Most of them have no power supply and are generally deployed for a long time. Researches have been done on battery physical model and their adaptation for sensors.
Festor, Olivier, Nataf, Emmanuel
core   +4 more sources

Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja

open access: yesInternational Journal of Computer Network and Information Security
The Internet of Things (IoT) is one of the promising technologies of the future. It offers many attractive features that we depend on nowadays with less effort and faster in real-time. However, it is still vulnerable to various threats and attacks due to the obstacles of its heterogeneous ecosystem, adaptive protocols, and self-configurations.
KÜÇÜK, KEREM, Farea, Ali H.
openaire   +2 more sources

Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework

open access: yesInternational Journal of Engineering & Technology, 2018
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-
Prateek Singhal   +2 more
openaire   +1 more source

In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes

open access: yesAlexandria Engineering Journal
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. Block ciphers, which are fundamental cryptographic algorithms used for encrypting data,
Amal Hkiri   +5 more
doaj   +1 more source

ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

open access: yesJournal of Sensor and Actuator Networks, 2017
The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs) make them very attractive in different domains like environmental, home automation or heath care applications.
Hamadoun Tall, Gérard Chalhoub
doaj   +1 more source

Electronically-switched Directional Antennas for Low-power Wireless Networks: A Prototype-driven Evaluation [PDF]

open access: yes, 2012
We study the benefits of electronically-switched directional antennas in low-power wireless networks. This antenna technology may improve energy efficiency by increasing the communication range and by alleviating contention in directions other than the ...
Mottola, Luca   +4 more
core   +1 more source

Analyzing the Impact of Transmission Strategies on Localization Performance in Wireless Sensor Networks

open access: yesIEEE Access
Localization, essential in WSN applications, enables sensor nodes to determine their physical positions by referencing anchor nodes. We evaluate broadcast and unicast packet transmissions at the data-link layer for their impact on localization ...
Ismail Hakki Turan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy