Results 51 to 60 of about 14,618 (242)
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw+5 more
doaj +1 more source
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei+2 more
wiley +1 more source
I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING [PDF]
Voice over IP (VoIP) subscribers is growing vastly in the recent years due to the ever increase in smartphones, 3G, WiFi, etc. This growth leads the VoIP service providers to peer with each other through Session Initiation Protocol (SIP) peering for low ...
A. A. KHUDHER, S. RAMADASS
doaj
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks
Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and provide a wide range of entertainment facilities. Because of the nature of VANETs' open-access
Mahmood A. Al-Shareeda+4 more
doaj +1 more source
Scalable Balanced Pipelined IPv6 Lookup Algorithm
One of the most critical router’s functions is the IP lookup. For each incoming IP packet, IP lookup determines the output port to which the packet should be forwarded.
Zoran Cica
doaj +1 more source
Problems with IPv6 Implementation [PDF]
The aim of the article is to describe the current status of IPv6 implementation in the Czech Republic and in the world, including the comparison of the different IPv4 and IPv6 transition mechanisms and the outlook for the future. The article is based on extensive research of current sources related to this issue, available on the Internet.
openaire +2 more sources
An API for IPv6 Multihoming [PDF]
Publicado
Isaias Martinez-Yelmo+2 more
openaire +2 more sources
The Internet of Things (IoT) has become a transformative force across various sectors, including healthcare, offering new opportunities for automation and enhanced service delivery. The evolving architecture of the IoT presents significant challenges in establishing a comprehensive cyber‐physical framework. This paper reviews recent advancements in IoT‐
Attiq Ur Rehman+11 more
wiley +1 more source
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and ...
Arkan Hammoodi Hasan Kabla+4 more
doaj +1 more source
Summary Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions.
Arash Heidari+3 more
wiley +1 more source