Results 101 to 110 of about 1,732 (206)

Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL

open access: yesIET Networks, 2018
In dynamic network conditions, most routing protocols periodically send additional control messages, which allow the network to quickly adjust itself to topological changes and keep the routing table up to date.
Ainaz Bahramlou, Reza Javidan
doaj   +1 more source

Routing Protocols for Lossy Wireless Networks [PDF]

open access: yes, 2012
Tato práce zkoumá vhodnost a požadavky návrhu simulací pro simulátor NS-3 pro případ bezdrátových sítí používaných v měřící infrastruktuře společnosti Kamstrup.
Kuder, Zenon
core  

Topology Construction in RPL Networks over Beacon-Enabled 802.15.4

open access: yes, 2014
In this paper, we propose a new scheme that allows coupling beacon-enabled IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with both standards. We provide a means for RPL to pass the routing information to Layer 2 before the 802.
Alphand, Olivier   +7 more
core   +4 more sources

IoT sensor data retrieval and analysis through cloud environment for effective power management

open access: yesMeasurement: Sensors
The Internet of Things (IoT) brings new products to everyone to improve daily life. Other newly created techniques, including Big Data, Cloud Services, and surveillance, can participate through these technological advances. In this study, the researchers
Srilakshmi Ch   +5 more
doaj   +1 more source

An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator

open access: yesInternational Journal of Engineering & Technology, 2018
In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any ...
Prateek Singhal   +2 more
openaire   +2 more sources

A context-aware tool-set for routing-targeted mutual configuration and optimization of LLNs through bridging virtual and physical worlds [PDF]

open access: yes, 2014
International audienceIn the history of the WSN, unexpected routing behaviors is always a main issue of the large scale WSN deployments. Considering the high cost of building a real deployment, network simulators are often used in this domain.
Chanet, Jean-Pierre   +3 more
core   +1 more source

Simulating a CoAP Wireless Sensor Network using Cooja

open access: yes, 2020
Wireless Sensor Networks (WSN) have become, in the past few years, a fundamental part of the Digital Transformation of industries, cities, or agriculture, just to name a few. Their ability to autoconfigure without human intervention, and to wirelessly relay data within the WSN an to the Internet, make them very useful to exploit untapped sources of ...
openaire   +2 more sources

Design and Implementation of an Antenna Model for the Cooja simulator

open access: yes, 2015
accepted for publication in International Conference on Electronics and Communication Systems (ICECS ...
openaire   +2 more sources

Poster Abstract: Network Coding with Limited Overhearing [PDF]

open access: yes, 2011
CONETGINSEN
Mottola, Luca   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy