Results 61 to 70 of about 1,732 (206)
Evaluation of RPL’s Single Metric Objective Functions [PDF]
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa +2 more
core +1 more source
As the Internet of Things (IoT) ecosystem rapidly expands, the anticipated connection of over 75 billion devices highlights a critical demand for efficient and scalable connectivity solutions. Low‐power wide‐area network (LPWAN) technologies, notably Sigfox, Long Range (LoRa), and narrowband Internet of Things (NB‐IoT), are fundamental enablers driving
Aisyah Illani Sulaiman +3 more
wiley +1 more source
Efficient Anomaly Detection for Smart Hospital IoT Systems
In critical Internet of Things (IoT) application domains, such as the Defense Industry and Healthcare, false alerts have many negative effects, such as fear, disruption of emergency services, and waste of resources.
Abdel Mlak Said +2 more
doaj +1 more source
Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario
RPL, the routing protocol proposed by IETF for IPv6/6LoWPAN Low Power and Lossy Networks has significant complexity. Another protocol called LOADng, a lightweight variant of AODV, emerges as an alternative solution.
Duda, Andrzej +2 more
core +4 more sources
Sensornet checkpointing: enabling repeatability in testbeds and realism in simulations [PDF]
When developing sensor network applications, the shift from simulation to testbed causes application failures, resulting in additional time-consuming iterations between simulation and testbed. We propose transferring sensor network checkpoints between
Dunkels, Adam +5 more
core +2 more sources
The paper presents performance analysis of MAC protocol for vehicular sensor networks. The protocol FROG‐MAC takes a unique approach of fragmenting the lower priority data, so data of higher priority should be transmitted first, ensuring safety of people and infrastructure.
Anwar Ahmed Khan +2 more
wiley +1 more source
Native Process Migration in Wireless Sensor Networks
This paper presents a novel architecture for native process migration (PM) in wireless sensor networks (WSNs) without the use of virtual execution environment.
Syed Ishtiaq Hussain +4 more
doaj +1 more source
Threat analysis model to control IoT network routing attacks through deep learning approach
Most of the recent research has focused on the Internet of Things (IoT) and its applications. The open interface and network connectivity of the interconnected systems under the IoT network make them vulnerable to hackers.
K. Janani, S. Ramamoorthy
doaj +1 more source
Using Cooja for WSN Simulations: Some New Uses and Limits
The Cooja/MSPSim network simulation framework is widely used for developing and debugging, but also for performance evaluation of WSN projects.We show in this paper that Cooja is not limited only to the simulation of the Contiki OS based systems and networks, but can also be extended to perform simulation experiments of other OS based platforms ...
Roussel, Kévin +2 more
openaire +2 more sources
Evolving SDN for Low-Power IoT Networks [PDF]
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform.
Baddeley, Michael +4 more
core +3 more sources

