Results 31 to 40 of about 43,044 (189)
Filtering Network Traffic Based on Protocol Encapsulation Rules [PDF]
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each
Cerrato, Ivano +2 more
core +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan +4 more
doaj +1 more source
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy +5 more
doaj +1 more source
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources
MIPv6 Experimental Evaluation using Overlay Networks [PDF]
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming generation of wireless communications.
Baliosian, Javier +5 more
core +3 more sources
An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M. +3 more
doaj +1 more source
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw +5 more
doaj +1 more source
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case [PDF]
One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by ...
Ernst, Thierry +4 more
core +5 more sources
Temporal and Spatial Classification of Active IPv6 Addresses
There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are ...
Berger, Arthur, Plonka, David
core +1 more source
Service quality measurements for IPv6 inter-networks [PDF]
Measurement-based performance evaluation of network traffic is becoming very important, especially for networks trying to provide differentiated levels of service quality to the different application flows.
Garcia, F. +4 more
core +2 more sources

