Results 21 to 30 of about 99,894 (242)

Real-Time IoT-Enabled Water Management for Rooftop Urban Agriculture Using Commercial Off-the-Shelf Products

open access: yesChemistry Proceedings, 2022
Urban agriculture is receiving increased attention not only for food security and public health but for mitigating the impacts of urbanization and climate change. In cities, rooftop urban farms provide a solution for the limited space at the ground level.
Tamer Almaaitah   +2 more
doaj   +1 more source

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

open access: yesIEEE Access, 2020
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand   +5 more
doaj   +1 more source

Developing a Novel Hierarchical VPLS Architecture Using Q-in-Q Tunneling in Router and Switch Design

open access: yesComputers, 2023
Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN).
Morteza Biabani   +2 more
doaj   +1 more source

Verification of A Security Adaptive Protocol Suite Using SPIN [PDF]

open access: yesInternational Journal of Engineering and Technology, vol. 5, no. 2, pp. 254-256, 2013, 2014
The advancement of mobile and wireless communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior.
arxiv   +1 more source

GOSPF: An energy efficient implementation of the OSPF routing protocol [PDF]

open access: yesJournal of Network and Computer Applications, Volume 75, 2016, Pages 110-127, ISSN 1084-8045, 2022
Energy saving is currently one of the most challenging issues for the Internet research community. Indeed, the exponential growth of applications and services induces a remarkable increase in power consumption and hence calls for novel solutions which are capable to preserve energy of the infrastructures, at the same time maintaining the required ...
arxiv   +1 more source

$A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones [PDF]

open access: yes, 2022
The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting and monitoring purposes. Although improving drones' monitoring and situational awareness, the RID rule also generates significant ...
arxiv   +1 more source

RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks

open access: yesSensors, 2022
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a ...
Zakwan AlArnaout   +4 more
doaj   +1 more source

IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey

open access: yesIEEE Access, 2017
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol version 4.
Amjed Sid Ahmed Mohamed Sid Ahmed   +2 more
doaj   +1 more source

Path Aware Transport Layer Solution for Mobile Networks

open access: yesIEEE Access, 2020
The revolutionary Fifth Generation (5G) network technology has already been deployed in many countries to provide end-to-end quality-of-service for a wide variety of services, applications, and users with extremely diverse requirements. To accomplish the
Shiva Souhith Gantha   +3 more
doaj   +1 more source

Implementation of RSVP Protocol in Quagga Software

open access: yesTelfor Journal, 2019
Multimedia applications are already most popular on the Internet, and they are much better served with bandwidth and delay guarantees. Providing support for multimedia applications over the Internet is a difficult task because they require more bandwidth
T. Komazec   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy