Results 11 to 20 of about 90,307 (120)
TLS Protocol Analysis Using IoTST—An IoT Benchmark Based on Scheduler Traces
The Internet of Things (IoT) envisions billions of everyday objects sharing information. As new devices, applications and communication protocols are proposed for the IoT context, their evaluation, comparison, tuning and optimization become crucial and ...
Rafael Salles, Ricardo Farias
doaj +1 more source
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand+5 more
doaj +1 more source
Urban agriculture is receiving increased attention not only for food security and public health but for mitigating the impacts of urbanization and climate change. In cities, rooftop urban farms provide a solution for the limited space at the ground level.
Tamer Almaaitah+2 more
doaj +1 more source
Developing a Novel Hierarchical VPLS Architecture Using Q-in-Q Tunneling in Router and Switch Design
Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN).
Morteza Biabani+2 more
doaj +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet+4 more
core +1 more source
IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol version 4.
Amjed Sid Ahmed Mohamed Sid Ahmed+2 more
doaj +1 more source
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a ...
Zakwan AlArnaout+4 more
doaj +1 more source
Implementation of RSVP Protocol in Quagga Software
Multimedia applications are already most popular on the Internet, and they are much better served with bandwidth and delay guarantees. Providing support for multimedia applications over the Internet is a difficult task because they require more bandwidth
T. Komazec+3 more
doaj +1 more source
A communication protocol is a set of rules defined formally that describes the format of digital messages and the rules for exchanging those messages in or between computing systems.
Valentin Stanciu+3 more
doaj +1 more source
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life.
Hyo Jin Ban, Jaeduck Choi, Namhi Kang
doaj +1 more source