Results 41 to 50 of about 37,323 (253)

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

open access: yesSensors, 2022
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy   +5 more
doaj   +1 more source

Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm

open access: yesWireless Communications and Mobile Computing, 2021
With the rapid increase and complexity of IPv6 network traffic, the traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces the detection performance of IDS.
Yasser Alharbi   +4 more
semanticscholar   +1 more source

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

open access: yesIEEE Access, 2023
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw   +5 more
doaj   +1 more source

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists [PDF]

open access: yesACM/SIGCOMM Internet Measurement Conference, 2018
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6.
Oliver Gasser   +7 more
semanticscholar   +1 more source

Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites

open access: yesInf., 2021
IPv6 is the most recent version of the Internet Protocol (IP), which can solve the problem of IPv4 address exhaustion and allow the growth of the Internet (particularly in the era of the Internet of Things). IPv6 networks have been deployed for more than
Kwun-hung Li, K. Wong
semanticscholar   +1 more source

6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation [PDF]

open access: yesPacific-Asia Conference on Knowledge Discovery and Data Mining, 2020
IPv6 scanning has always been a challenge for researchers in the field of network measurement. Due to the considerable IPv6 address space, while recent network speed and computational power have been improved, using a brute-force approach to probe the ...
Tianyu Cui, Gaopeng Gou, G. Xiong
semanticscholar   +1 more source

Context Aware Handover Algorithms For Mobile Positioning Systems

open access: yesComputer Science, 2014
: This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery.
Sazid Z. Khan   +4 more
doaj   +1 more source

On Implementing IPTV Platform with IPv4 and IPv6 Devices

open access: yesJournal of Telecommunications and Information Technology, 2023
The end of IPv4 addresses is now a reality. Providers not updated to IPv6 will have to hurry up the IPv6 start in its own network. Introduction of IPv6 means not only change of main routers but also change of mentality in operators, applications ...
Jordi Mongay Batalla, Piotr Krawiec
doaj   +1 more source

OpenFlow Deployment and Concept Analysis

open access: yesAdvances in Electrical and Electronic Engineering, 2013
Terms such as SDN and OpenFlow (OF) are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that ...
Tomas Hegr   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy