Results 51 to 60 of about 14,618 (242)

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

open access: yesIEEE Access, 2023
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw   +5 more
doaj   +1 more source

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei   +2 more
wiley   +1 more source

I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
Voice over IP (VoIP) subscribers is growing vastly in the recent years due to the ever increase in smartphones, 3G, WiFi, etc. This growth leads the VoIP service providers to peer with each other through Session Initiation Protocol (SIP) peering for low ...
A. A. KHUDHER, S. RAMADASS
doaj  

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2020
Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and provide a wide range of entertainment facilities. Because of the nature of VANETs' open-access
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Scalable Balanced Pipelined IPv6 Lookup Algorithm

open access: yesElektronika ir Elektrotechnika, 2021
One of the most critical router’s functions is the IP lookup. For each incoming IP packet, IP lookup determines the output port to which the packet should be forwarded.
Zoran Cica
doaj   +1 more source

Problems with IPv6 Implementation [PDF]

open access: yesActa Informatica Pragensia, 2018
The aim of the article is to describe the current status of IPv6 implementation in the Czech Republic and in the world, including the comparison of the different IPv4 and IPv6 transition mechanisms and the outlook for the future. The article is based on extensive research of current sources related to this issue, available on the Internet.
openaire   +2 more sources

An API for IPv6 Multihoming [PDF]

open access: yes, 2006
Publicado
Isaias Martinez-Yelmo   +2 more
openaire   +2 more sources

Internet of Things in Healthcare Research: Trends, Innovations, Security Considerations, Challenges and Future Strategy

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) has become a transformative force across various sectors, including healthcare, offering new opportunities for automation and enhanced service delivery. The evolving architecture of the IoT presents significant challenges in establishing a comprehensive cyber‐physical framework. This paper reviews recent advancements in IoT‐
Attiq Ur Rehman   +11 more
wiley   +1 more source

Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

open access: yesEURASIP Journal on Information Security
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and ...
Arkan Hammoodi Hasan Kabla   +4 more
doaj   +1 more source

Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults

open access: yesConcurrency and Computation: Practice and Experience, Volume 36, Issue 27, 10 December 2024.
Summary Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions.
Arash Heidari   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy