Results 31 to 40 of about 54,472 (238)
Is it possible to extend IPv6?
Open Access via the Elsevier agreement The authors appreciate the valuable comments provided by Justin Iurman and Benoit Donnet and Bob Hinden. Elizabeth Boswell received funding from the University of Aberdeen to help analyse paths using Paris Traceroute.
Ana Custura +3 more
openaire +2 more sources
ALEX: Improving SIP Support in Systems with Multiple Network Addresses [PDF]
The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX)
Baldi, Mario +3 more
core +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan +4 more
doaj +1 more source
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources
MIPv6 Experimental Evaluation using Overlay Networks [PDF]
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming generation of wireless communications.
Baliosian, Javier +5 more
core +3 more sources
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy +5 more
doaj +1 more source
Filtering Network Traffic Based on Protocol Encapsulation Rules [PDF]
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each
Cerrato, Ivano +2 more
core +1 more source
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw +5 more
doaj +1 more source
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case [PDF]
One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by ...
Ernst, Thierry +4 more
core +5 more sources
Temporal and Spatial Classification of Active IPv6 Addresses
There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are ...
Berger, Arthur, Plonka, David
core +1 more source

