Results 21 to 30 of about 1,732 (206)
Enhancing IoT Performance via Using Mobility Aware for Dynamic RPL Routing Protocol Technique (MA-RPL) [PDF]
Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations.
Ahmed R. Zarzoor
doaj +1 more source
Congestion control in constrained Internet of Things networks
Congestion Control in constrained IoT Networks is becoming a pressing issue, given the steep rise in IoT networks and devices. On the other hand, transmitting data from Internet‐constrained IoT devices effectively over the Internet using legacy network architecture, protocols, and communication technologies is challenging for such resource‐limited ...
Lotfi Mhamdi, Hussam Abdul Khalek
wiley +1 more source
Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator
Wireless low-power, multi-hop networks are exposed to numerous attacks also due to their resource-constraints. While there has been a lot of work on intrusion detection systems for such networks, most of these studies have considered only a few topologies, scenarios and attacks.
Finne, Niclas +6 more
openaire +3 more sources
Security enhancement in wireless sensor networks (WSNs) is significant in different applications. The advancement of routing attack localization is a crucial security research scenario. Various routing attacks degrade the network performance by injecting malicious nodes into wireless sensor networks. Sybil attacks are the most prominent ones generating
Gebrekiros Gebreyesus Gebremariam +3 more
wiley +1 more source
[Retracted] Transformation Path of Modern Media from the Perspective of Internet of Things
The Internet of Things (IoT) is a new technology revolution that aims to link all ordinary physical items to the Internet, creating a massive worldwide network of uniquely connected things that can exchange information and fulfill planned activities, resulting in considerable advantages for consumers.
Yujie Zhang +4 more
wiley +1 more source
The huge number of network traffic data, the abundance of available network features, and the diversity of cyber‐attack patterns mean that intrusion detection remains difficult even though many earlier efforts have succeeded in building the Internet of Healthcare Things (IoHT).
Abdulwahid Al Abdulwahid +1 more
wiley +1 more source
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data.
Lucy Dash +5 more
wiley +1 more source
Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0
Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 algorithms.
Al-Qassas Raad S., Qasaimeh Malik
doaj +1 more source
In wireless sensor network (WSN), the energy of sensor nodes is limited. Designing efficient routing method for reducing energy consumption and extending the WSN’s lifetime is important. This paper proposes a novel energy‐efficient, static scenario‐oriented routing method of WSN based on edge computing named the NEER, in which WSN is divided into ...
Gang Liu +5 more
wiley +1 more source
Sensor node location information is critical in many Wireless Sensor Network (WSN) applications with random sensor node deployment. In such applications, node localization using a faster area exploration mechanism is needed to initiate precise sensing ...
Shamanth Nagaraju +4 more
doaj +1 more source

