Results 11 to 20 of about 6,552,120 (397)

A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks

open access: yesSensors, 2023
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj   +1 more source

5G Campus Networks: A First Measurement Study

open access: yesIEEE Access, 2021
A 5G campus network is a 5G network for the users affiliated with the campus organization, e.g., an industrial campus, covering a prescribed geographical area. A 5G campus network can operate as a so-called 5G non-standalone (NSA) network (which requires
Justus Rischke   +4 more
doaj   +1 more source

EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]

open access: yesActa Electrotechnica et Informatica, 2017
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO   +5 more
doaj   +1 more source

Subset Codes for Packet Networks [PDF]

open access: yesIEEE Communications Letters, 2013
In this paper, we present a coding-theoretic framework for message transmission over packet-switched networks. Network is modeled as a channel which can induce packet errors, deletions, insertions, and out of order delivery of packets. The proposed approach can be viewed as an extension of the one introduced by Koetter and Kschischang for networks ...
Mladen Kovacevic, Dejan Vukobratovic
openaire   +3 more sources

Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques

open access: yesIEEE Access, 2020
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries.
Lilian C. Mutalemwa, Seokjoo Shin
doaj   +1 more source

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

open access: yesSensors, 2021
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj   +1 more source

Packet reordering, high speed networks and transport protocol performance [PDF]

open access: yes, 2004
We performed end-to-end measurements of UDP/IP flows across an Internet backbone network. Using this data, we characterized the packet reordering processes seen in the network.
Gharai, L., Lehman, T., Perkins, C.S.
core   +3 more sources

A Protocol for Packet Network Intercommunication [PDF]

open access: yesIEEE Transactions on Communications, 1974
A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, end-to-end error checking, and the creation and destruction of logical process-to-process connections.
Robert E. Kahn, Vinton G. Cerf
openaire   +3 more sources

Network Virtual Machine (NetVM): A New Architecture for Efficient and Portable Packet Processing Applications [PDF]

open access: yes, 2005
A challenge facing network device designers, besides increasing the speed of network gear, is improving its programmability in order to simplify the implementation of new applications (see for example, active networks, content networking, etc).
Baldi, Mario   +5 more
core   +1 more source

Packet combining in sensor networks [PDF]

open access: yesProceedings of the 3rd international conference on Embedded networked sensor systems, 2005
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions of a packet have been received, a packet combining procedure attempts to recover the original packet from the corrupt copies.
Dubois-Ferrière, Henri   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy