RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols [PDF]
Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be
Roussel, Kévin +2 more
core +4 more sources
EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO +5 more
doaj +1 more source
Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT).
Philokypros P. Ioulianou +2 more
doaj +1 more source
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things [PDF]
The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process.
Sathishkumar Natesan, Rajakumar Krishnan
doaj +3 more sources
CoReDac: Collision-Free Command-Response Data Collection [PDF]
Intenerg
Voigt, Thiemo, Österlind, Fredrik
core +2 more sources
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Green Internet of Things (IoT) with dynamic sleep wake-up approach for constrained things
Energy consumption has now become a big deal to ensure the dependability of the IoT. Therefore, minimization of energy consumption is the biggest challenge in IoT architecture. IoT devices are supported with constrained parameters like battery, memory as
B. Raut Nitin, N.M. Dhanya
doaj +1 more source
Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja
Once hardware becomes "intelligent", it is vulnerable to threats. Therefore, IoT ecosystems are susceptible to a variety of attacks and are considered challenging due to heterogeneity and dynamic ecosystem.
Ali Hamid Farea, Kerem Küçük
doaj +1 more source
Demo: An Interoperability Development and Performance Diagnosis Environment [PDF]
Interoperability is key to widespread adoption of sensor network technology, but interoperable systems have traditionally been difficult to develop and test.
Culler, David +8 more
core +2 more sources
CERN Storage Systems for Large-Scale Wireless [PDF]
The project aims at evaluating the use of CERN computing infrastructure for next generation sensor networks data analysis. The proposed system allows the simulation of a large-scale sensor array for traffic analysis, streaming data to CERN storage ...
Azzarà, Andrea +2 more
core +1 more source

