Results 61 to 70 of about 14,303 (202)

On the security of the Mobile IP protocol family [PDF]

open access: yes, 2007
The Internet Engineering Task Force (IETF) has worked on\ud network layer mobility for more than 10 years and a number\ud of RFCs are available by now. Although the IETF mobility\ud protocols are not present in the Internet infrastructure as of\ud today,
Karagiannis, Georgios   +2 more
core   +1 more source

Data collection in IoT networks: Architecture, solutions, protocols and challenges

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 4, Page 85-110, August 2024.
Current IoT data collection techniques are categorised and a comparative evaluation of these methods is performed based on the topics analysed and elaborated by the authors. In addition, a comprehensive analysis of recent advances in IoT data collection is provided, highlighting different data types and sources, transmission protocols from connected ...
Ado Adamou Abba Ari   +6 more
wiley   +1 more source

Mobile IP: state of the art report [PDF]

open access: yes, 1999
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core   +2 more sources

Mobile multi-layered IPsec [PDF]

open access: yesWireless Networks, 2005
To achieve high throughput in wireless networks, smart forwarding and processing of packets in access routers are critical for overcoming the effects of the wireless links. However, these services cannot be provided if data sessions are protected using end-to-end encryption as with IPsec, because the information needed by these algorithms resides ...
null Heesook Choi   +3 more
openaire   +1 more source

A novel energy optimization framework to enhance the performance of sensor nodes in Industry 4.0

open access: yesEnergy Science &Engineering, Volume 12, Issue 3, Page 835-859, March 2024.
Industrial energy optimization block diagram. Abstract Industry 4.0 is a term used to refer to the fourth industrial revolution, characterized by the introduction of new technologies, such as the Internet of Things, Big Data, and artificial intelligence (AI).
Sangeetha Sivakumar   +4 more
wiley   +1 more source

Sistema de votación electrónico con características de seguridad SSL/TLS e IPsec en Colombia

open access: yesRevista UIS Ingenierías, 2016
Colombia continúa debatiendo la implementación del voto electrónico evidenciando que existen temores en el acceso al sistema y en la transferencia de datos, esta investigación busca minimizar vulnerabilidades ante ataques informáticos por medio de un ...
Sonia Elizabeth Cardenas Urrea   +4 more
doaj   +1 more source

VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

open access: yesIET Networks, Volume 13, Issue 2, Page 129-146, March 2024.
VoWi‐Fi call service is a vital access solution in the B5G/6G network. The authors proposed a defence algorithm that enables future apps or device manufacturers to assess the safety of the calling environment. Abstract B5G/6G networks are facing challenges in the deployment of additional base stations.
Kuan‐Chu Lu   +3 more
wiley   +1 more source

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

The tactical Intranet IPSec security concept

open access: yesJournal of Telecommunications and Information Technology, 2003
The IPSec protocols architecture that can be applied in tactical Intranet based on the IPv6 protocol stack for wireless environment is the subject of the paper.
Jacek Jarmakiewicz   +2 more
doaj   +1 more source

Quantum Key Distribution for V2I communications with software‐defined networking

open access: yesIET Quantum Communication, Volume 5, Issue 1, Page 38-45, March 2024.
This paper proposes a method for the integration of QKD in 6G‐V2I networks to enable secure data communication. QKD is used in the end‐to‐end path of vehicle‐to‐infrastructure (V2I) networks. Furthermore, an overarching Software‐Defined Network (SDN), with integrated QKD, is introduced. Abstract The evolution of Connected and Autonomous Vehicles (CAVs)
Alexandros Stavdas   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy