Results 21 to 30 of about 1,732 (206)

Enhancing IoT Performance via Using Mobility Aware for Dynamic RPL Routing Protocol Technique (MA-RPL) [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations.
Ahmed R. Zarzoor
doaj   +1 more source

Congestion control in constrained Internet of Things networks

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 247-255, December 2023., 2023
Congestion Control in constrained IoT Networks is becoming a pressing issue, given the steep rise in IoT networks and devices. On the other hand, transmitting data from Internet‐constrained IoT devices effectively over the Internet using legacy network architecture, protocols, and communication technologies is challenging for such resource‐limited ...
Lotfi Mhamdi, Hussam Abdul Khalek
wiley   +1 more source

Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator

open access: yes2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2021
Wireless low-power, multi-hop networks are exposed to numerous attacks also due to their resource-constraints. While there has been a lot of work on intrusion detection systems for such networks, most of these studies have considered only a few topologies, scenarios and attacks.
Finne, Niclas   +6 more
openaire   +3 more sources

Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Security enhancement in wireless sensor networks (WSNs) is significant in different applications. The advancement of routing attack localization is a crucial security research scenario. Various routing attacks degrade the network performance by injecting malicious nodes into wireless sensor networks. Sybil attacks are the most prominent ones generating
Gebrekiros Gebreyesus Gebremariam   +3 more
wiley   +1 more source

[Retracted] Transformation Path of Modern Media from the Perspective of Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The Internet of Things (IoT) is a new technology revolution that aims to link all ordinary physical items to the Internet, creating a massive worldwide network of uniquely connected things that can exchange information and fulfill planned activities, resulting in considerable advantages for consumers.
Yujie Zhang   +4 more
wiley   +1 more source

Detection of Middlebox‐Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
The huge number of network traffic data, the abundance of available network features, and the diversity of cyber‐attack patterns mean that intrusion detection remains difficult even though many earlier efforts have succeeded in building the Internet of Healthcare Things (IoHT).
Abdulwahid Al Abdulwahid   +1 more
wiley   +1 more source

Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data.
Lucy Dash   +5 more
wiley   +1 more source

Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0

open access: yesCybernetics and Information Technologies, 2022
Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 algorithms.
Al-Qassas Raad S., Qasaimeh Malik
doaj   +1 more source

A Novel Energy‐Efficient, Static Scenario‐Oriented Routing Method of Wireless Sensor Network Based on Edge Computing

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
In wireless sensor network (WSN), the energy of sensor nodes is limited. Designing efficient routing method for reducing energy consumption and extending the WSN’s lifetime is important. This paper proposes a novel energy‐efficient, static scenario‐oriented routing method of WSN based on edge computing named the NEER, in which WSN is divided into ...
Gang Liu   +5 more
wiley   +1 more source

Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Sensor node location information is critical in many Wireless Sensor Network (WSN) applications with random sensor node deployment. In such applications, node localization using a faster area exploration mechanism is needed to initiate precise sensing ...
Shamanth Nagaraju   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy