Results 41 to 50 of about 1,732 (206)

RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols [PDF]

open access: yes, 2015
Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be
Roussel, Kévin   +2 more
core   +4 more sources

EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]

open access: yesActa Electrotechnica et Informatica, 2017
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO   +5 more
doaj   +1 more source

Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things

open access: yesJournal of Telecommunications and Information Technology, 2019
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT).
Philokypros P. Ioulianou   +2 more
doaj   +1 more source

Energy Efficient Composite Metric Based Routing Protocol for Internet of Things [PDF]

open access: yesJournal of Universal Computer Science, 2020
The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process.
Sathishkumar Natesan, Rajakumar Krishnan
doaj   +3 more sources

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Green Internet of Things (IoT) with dynamic sleep wake-up approach for constrained things

open access: yesMeasurement: Sensors, 2023
Energy consumption has now become a big deal to ensure the dependability of the IoT. Therefore, minimization of energy consumption is the biggest challenge in IoT architecture. IoT devices are supported with constrained parameters like battery, memory as
B. Raut Nitin, N.M. Dhanya
doaj   +1 more source

Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja

open access: yesEAI Endorsed Transactions on Internet of Things, 2022
Once hardware becomes "intelligent", it is vulnerable to threats. Therefore, IoT ecosystems are susceptible to a variety of attacks and are considered challenging due to heterogeneity and dynamic ecosystem.
Ali Hamid Farea, Kerem Küçük
doaj   +1 more source

Demo: An Interoperability Development and Performance Diagnosis Environment [PDF]

open access: yes, 2011
Interoperability is key to widespread adoption of sensor network technology, but interoperable systems have traditionally been difficult to develop and test.
Culler, David   +8 more
core   +2 more sources

CERN Storage Systems for Large-Scale Wireless [PDF]

open access: yes, 2013
The project aims at evaluating the use of CERN computing infrastructure for next generation sensor networks data analysis. The proposed system allows the simulation of a large-scale sensor array for traffic analysis, streaming data to CERN storage ...
Azzarà, Andrea   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy