Results 91 to 100 of about 1,732 (206)
Using BIP to reinforce correctness of resource-constrained IoT applications [PDF]
International audienceIoT applications have either a sense-only or a sense-compute-actuate goal and they implement a capability to process and respond to multiple (external) events while performing computations.
Bozga, Marius +4 more
core +3 more sources
Deep Learning for Detection of Routing Attacks in the Internet of Things
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing attacks are especially hard to
Furkan Yusuf YAVUZ +2 more
doaj +1 more source
Sigma Routing Metric for RPL Protocol
This paper presents the adaptation of a specific metric for the RPL protocol in the objective function MRHOF. Among the functions standardized by IETF, we find OF0, which is based on the minimum hop count, as well as MRHOF, which is based on the Expected
Paul Sanmartin +5 more
doaj +1 more source
Online Estimation of Battery Lifetime for Wireless Sensors Network [PDF]
Battery is a major hardware component of wireless sensor networks. Most of them have no power supply and are generally deployed for a long time. Researches have been done on battery physical model and their adaptation for sensors.
Festor, Olivier, Nataf, Emmanuel
core +4 more sources
Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja
The Internet of Things (IoT) is one of the promising technologies of the future. It offers many attractive features that we depend on nowadays with less effort and faster in real-time. However, it is still vulnerable to various threats and attacks due to the obstacles of its heterogeneous ecosystem, adaptive protocols, and self-configurations.
KÜÇÜK, KEREM, Farea, Ali H.
openaire +2 more sources
Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-
Prateek Singhal +2 more
openaire +1 more source
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. Block ciphers, which are fundamental cryptographic algorithms used for encrypting data,
Amal Hkiri +5 more
doaj +1 more source
ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs
The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs) make them very attractive in different domains like environmental, home automation or heath care applications.
Hamadoun Tall, Gérard Chalhoub
doaj +1 more source
Electronically-switched Directional Antennas for Low-power Wireless Networks: A Prototype-driven Evaluation [PDF]
We study the benefits of electronically-switched directional antennas in low-power wireless networks. This antenna technology may improve energy efficiency by increasing the communication range and by alleviating contention in directions other than the ...
Mottola, Luca +4 more
core +1 more source
Localization, essential in WSN applications, enables sensor nodes to determine their physical positions by referencing anchor nodes. We evaluate broadcast and unicast packet transmissions at the data-link layer for their impact on localization ...
Ismail Hakki Turan +3 more
doaj +1 more source

