Results 31 to 40 of about 14,435 (215)

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

open access: yesSensors, 2022
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy   +5 more
doaj   +1 more source

IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation [PDF]

open access: yesThe KIPS Transactions:PartC, 2011
The objective of this paper is to analyze and characterize to simulate routing observations on end-to-end routing circuits and a ping experiment of a virtual network after modeling, such as IPv6 migration, an OSPFv3 routing experiment based on an IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 ...
openaire   +2 more sources

Context Aware Handover Algorithms For Mobile Positioning Systems

open access: yesComputer Science, 2014
: This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery.
Sazid Z. Khan   +4 more
doaj   +1 more source

An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks

open access: yesCybernetics and Information Technologies, 2021
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M.   +3 more
doaj   +1 more source

On Implementing IPTV Platform with IPv4 and IPv6 Devices

open access: yesJournal of Telecommunications and Information Technology, 2023
The end of IPv4 addresses is now a reality. Providers not updated to IPv6 will have to hurry up the IPv6 start in its own network. Introduction of IPv6 means not only change of main routers but also change of mentality in operators, applications ...
Jordi Mongay Batalla, Piotr Krawiec
doaj   +1 more source

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

open access: yesIEEE Access, 2023
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw   +5 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Overcoming obstacles to IPv6 on WLCG [PDF]

open access: yesEPJ Web of Conferences
The transition of the Worldwide Large Hadron Collider Computing Grid (WLCG) storage services to dual-stack IPv6/IPv4 is almost complete; all Tier-1 and 94% of Tier-2 storage are IPv6 enabled.
Babik Marian   +20 more
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Is it possible to extend IPv6?

open access: yesComputer Communications, 2023
Open Access via the Elsevier agreement The authors appreciate the valuable comments provided by Justin Iurman and Benoit Donnet and Bob Hinden. Elizabeth Boswell received funding from the University of Aberdeen to help analyse paths using Paris Traceroute.
Ana Custura   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy