Results 61 to 70 of about 53,372 (247)

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

An API for IPv6 Multihoming [PDF]

open access: yes, 2006
Publicado
Isaias Martinez-Yelmo   +2 more
openaire   +2 more sources

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

Preserving Established Communications in IPv6 Multi-homed Sites with MEX [PDF]

open access: yes, 2003
This research was supported by the SAM (Advanced Mobility Services) project, funded by the Spanish National R&D Programme under contract MCYT TIC2002-04531-C04-03.A proper support for multimedia communications transport has to provide fault tolerance ...
Azcorra, Arturo   +4 more
core   +3 more sources

Problems with IPv6 Implementation [PDF]

open access: yesActa Informatica Pragensia, 2018
The aim of the article is to describe the current status of IPv6 implementation in the Czech Republic and in the world, including the comparison of the different IPv4 and IPv6 transition mechanisms and the outlook for the future. The article is based on extensive research of current sources related to this issue, available on the Internet.
openaire   +2 more sources

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Segment Routing: a Comprehensive Survey of Research Activities, Standardization Efforts and Implementation Results

open access: yes, 2020
Fixed and mobile telecom operators, enterprise network operators and cloud providers strive to face the challenging demands coming from the evolution of IP networks (e.g.
Abdelsalam, Ahmed   +7 more
core   +1 more source

Evaluation of RPL’s Single Metric Objective Functions [PDF]

open access: yes, 2017
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa   +2 more
core   +1 more source

CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy