Results 31 to 40 of about 43,044 (189)

Filtering Network Traffic Based on Protocol Encapsulation Rules [PDF]

open access: yes, 2013
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each
Cerrato, Ivano   +2 more
core   +1 more source

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

open access: yesSensors, 2022
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy   +5 more
doaj   +1 more source

Network layer access control for context-aware IPv6 applications [PDF]

open access: yes, 2003
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith   +5 more
core   +2 more sources

MIPv6 Experimental Evaluation using Overlay Networks [PDF]

open access: yes, 2007
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming generation of wireless communications.
Baliosian, Javier   +5 more
core   +3 more sources

An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks

open access: yesCybernetics and Information Technologies, 2021
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M.   +3 more
doaj   +1 more source

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

open access: yesIEEE Access, 2023
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw   +5 more
doaj   +1 more source

On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case [PDF]

open access: yes, 2014
One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by ...
Ernst, Thierry   +4 more
core   +5 more sources

Temporal and Spatial Classification of Active IPv6 Addresses

open access: yes, 2015
There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are ...
Berger, Arthur, Plonka, David
core   +1 more source

Service quality measurements for IPv6 inter-networks [PDF]

open access: yes, 2004
Measurement-based performance evaluation of network traffic is becoming very important, especially for networks trying to provide differentiated levels of service quality to the different application flows.
Garcia, F.   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy