Results 61 to 70 of about 53,372 (247)
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Securing Internet of Things with Lightweight IPsec [PDF]
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony+5 more
core +1 more source
An API for IPv6 Multihoming [PDF]
Publicado
Isaias Martinez-Yelmo+2 more
openaire +2 more sources
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley +1 more source
Preserving Established Communications in IPv6 Multi-homed Sites with MEX [PDF]
This research was supported by the SAM (Advanced Mobility Services) project, funded by the Spanish National R&D Programme under contract MCYT TIC2002-04531-C04-03.A proper support for multimedia communications transport has to provide fault tolerance ...
Azcorra, Arturo+4 more
core +3 more sources
Problems with IPv6 Implementation [PDF]
The aim of the article is to describe the current status of IPv6 implementation in the Czech Republic and in the world, including the comparison of the different IPv4 and IPv6 transition mechanisms and the outlook for the future. The article is based on extensive research of current sources related to this issue, available on the Internet.
openaire +2 more sources
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary+3 more
wiley +1 more source
Fixed and mobile telecom operators, enterprise network operators and cloud providers strive to face the challenging demands coming from the evolution of IP networks (e.g.
Abdelsalam, Ahmed+7 more
core +1 more source
Evaluation of RPL’s Single Metric Objective Functions [PDF]
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa+2 more
core +1 more source
CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed+5 more
wiley +1 more source