Results 121 to 130 of about 1,732 (206)

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices

open access: yesIoT
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird   +4 more
doaj   +1 more source

An evaluation of link estimation algorithms for RPL in dynamic wireless sensor networks [PDF]

open access: yes, 2016
Carels, David   +4 more
core   +2 more sources

DLIIoT: A Deep Learning based Intelligent Attack Detection in IoT Networks using Cooja Simulator

open access: yesJournal of Scientific Research
Internet of things (IoT) has incredibly transformed the whole domain of communication process. The extensive dependency on these devices leads to various advanced cyber security threats. IoT devices fall easily into the ambit of malicious threats and are susceptible to vast range of attacks due to their limited computation capabilities and memory ...
H. Sharma, J. Manhas, V. Sharma
openaire   +1 more source

CRETA: Cross-layer RPL with Efficient Trickle and Adaptive Radio Duty Cycle Designed for Mobile IoT Application

open access: yesJournal of Communications Software and Systems
The literature on IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) makes it abundantly evident that there is a trade-off between convergence time and power usage.
Soumya Vastrad, Shobha K. R.
doaj   +1 more source

Contiki İşletim Sisteminde Cooja Simulatörü Kullanılarak Örnek Bir Nesnelerin İnterneti Uygulaması / An Application of Internet of Things Using Cooja Simulator in Contiki Operating System

open access: yes, 2020
Günümüzde pek çok alanda kullanılan düşük kaynağa sahip sensör düğümler, nesnelerin internetinin çok önemli bir parçasıdır. Özellikle kablosuz sensör ağların sanayi, tıp gibi birçok sektörde kullanılması, akıllı üretim tesislerinin kurulması, hastaların uzaktan izlenmesi gibi birçok önemli gelişmeye neden oldu. Bu cihazları fiziksel ortamda test etmek,
Karataş, İbrahim, Bayraklı, Selim
openaire   +1 more source

Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. [PDF]

open access: yesSensors (Basel), 2022
Muzammal SM   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy