Results 61 to 70 of about 14,303 (202)
On the security of the Mobile IP protocol family [PDF]
The Internet Engineering Task Force (IETF) has worked on\ud network layer mobility for more than 10 years and a number\ud of RFCs are available by now. Although the IETF mobility\ud protocols are not present in the Internet infrastructure as of\ud today,
Karagiannis, Georgios +2 more
core +1 more source
Data collection in IoT networks: Architecture, solutions, protocols and challenges
Current IoT data collection techniques are categorised and a comparative evaluation of these methods is performed based on the topics analysed and elaborated by the authors. In addition, a comprehensive analysis of recent advances in IoT data collection is provided, highlighting different data types and sources, transmission protocols from connected ...
Ado Adamou Abba Ari +6 more
wiley +1 more source
Mobile IP: state of the art report [PDF]
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core +2 more sources
Mobile multi-layered IPsec [PDF]
To achieve high throughput in wireless networks, smart forwarding and processing of packets in access routers are critical for overcoming the effects of the wireless links. However, these services cannot be provided if data sessions are protected using end-to-end encryption as with IPsec, because the information needed by these algorithms resides ...
null Heesook Choi +3 more
openaire +1 more source
A novel energy optimization framework to enhance the performance of sensor nodes in Industry 4.0
Industrial energy optimization block diagram. Abstract Industry 4.0 is a term used to refer to the fourth industrial revolution, characterized by the introduction of new technologies, such as the Internet of Things, Big Data, and artificial intelligence (AI).
Sangeetha Sivakumar +4 more
wiley +1 more source
Sistema de votación electrónico con características de seguridad SSL/TLS e IPsec en Colombia
Colombia continúa debatiendo la implementación del voto electrónico evidenciando que existen temores en el acceso al sistema y en la transferencia de datos, esta investigación busca minimizar vulnerabilidades ante ataques informáticos por medio de un ...
Sonia Elizabeth Cardenas Urrea +4 more
doaj +1 more source
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
VoWi‐Fi call service is a vital access solution in the B5G/6G network. The authors proposed a defence algorithm that enables future apps or device manufacturers to assess the safety of the calling environment. Abstract B5G/6G networks are facing challenges in the deployment of additional base stations.
Kuan‐Chu Lu +3 more
wiley +1 more source
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez +2 more
doaj
The tactical Intranet IPSec security concept
The IPSec protocols architecture that can be applied in tactical Intranet based on the IPv6 protocol stack for wireless environment is the subject of the paper.
Jacek Jarmakiewicz +2 more
doaj +1 more source
Quantum Key Distribution for V2I communications with software‐defined networking
This paper proposes a method for the integration of QKD in 6G‐V2I networks to enable secure data communication. QKD is used in the end‐to‐end path of vehicle‐to‐infrastructure (V2I) networks. Furthermore, an overarching Software‐Defined Network (SDN), with integrated QKD, is introduced. Abstract The evolution of Connected and Autonomous Vehicles (CAVs)
Alexandros Stavdas +9 more
wiley +1 more source

