Results 21 to 30 of about 5,292 (225)

New Bit Pattern Based IPv6 Address Compression Techniques for 6LoWPAN Header Compression

open access: yesIEEE Access, 2022
Things in the world can be connected to the Internet through various technologies such as Wi-Fi, Bluetooth, IEEE 802.15.4 etc. Among all IPv6 over IEEE 802.15.4 looks promising for outdoor environments for connecting a very large number of resource ...
Geetha V., Archana Bhat, S. Thanmayee
doaj   +1 more source

A comparison of 802.11ah and 802.15.4 for IoT

open access: yesICT Express, 2016
The emerging IEEE 802.11ah is a promising communication standard that supports a massive number of heterogeneous devices in the Internet of Things (IoT).
N. Ahmed, H. Rahman, Md.I. Hussain
doaj   +1 more source

Modeling and Analysis of Additional Clear Channel Assessment to Improve Performance of IEEE 802.15.4-based MAC Protocol

open access: yesJournal of Telecommunications and Information Technology, 2020
Design of the MAC protocol is crucial in all wireless sensor networks (WSNs) due to its influence on the performance of the transceiver, i.e. the most energy-consuming component of each sensor node.
Manjunath G. Asuti   +1 more
doaj   +1 more source

A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz

open access: yesInternational Journal of Distributed Sensor Networks, 2014
IEEE 802.15.4 is the technology behind wireless sensor networks (WSNs) and ZigBee. Most of the IEEE 802.15.4 radios operate in the crowded 2.4 GHz frequency band, which is used by many technologies.
Sven Zacharias   +3 more
doaj   +1 more source

Coordinator Discovery and Association in Beacon-Enabled IEEE 802.15.4 Network

open access: yesInternational Journal of Distributed Sensor Networks, 2013
End devices in beacon-enabled IEEE 802.15.4 network rely on passive scan to find the coordinator for association. The latency of coordinator discovery depends on coordinator's beacon interval length.
Faisal Bashir Hussain, Jae-Young Pyun
doaj   +1 more source

Modeling IEEE 802.15.4 Networks Over Fading Channels [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2014
Although the performance of the medium access control (MAC) of the IEEE 802.15.4 has been investigated under the assumption of ideal wireless channel, the understanding of the cross-layer dynamics between MAC and physical layer is an open problem when the wireless channel exhibits path loss, multi-path fading, and shadowing.
Di Marco P   +3 more
openaire   +2 more sources

Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN under Error-Prone Channel Condition

open access: yesJournal of Applied Mathematics, 2013
6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4.
Tsung-Han Lee   +4 more
doaj   +1 more source

An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks

open access: yesSensors, 2015
The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet.
Jin-Woo Kim   +2 more
doaj   +1 more source

Impact of Beacon Order and Superframe Order on IEEE 802.15.4 for Nodes Association in WBAN

open access: yesEAI Endorsed Transactions on Energy Web, 2018
IEEE 802.15.4, Low data Rate low power Wireless Personal Area Network (LR-WPAN) standard uses fixed duty cycle of the superframe operation. Fixed duty cycle operation of the stated standard suffers from several network issues like Personal Area Network ...
Adil Sheraz   +6 more
doaj   +1 more source

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

open access: yesJournal of Electrical and Computer Engineering, 2016
The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance.
Yasmin M. Amin, Amr T. Abdel-Hamid
doaj   +1 more source

Home - About - Disclaimer - Privacy