Results 11 to 20 of about 6,552,120 (397)
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj +1 more source
5G Campus Networks: A First Measurement Study
A 5G campus network is a 5G network for the users affiliated with the campus organization, e.g., an industrial campus, covering a prescribed geographical area. A 5G campus network can operate as a so-called 5G non-standalone (NSA) network (which requires
Justus Rischke+4 more
doaj +1 more source
EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO+5 more
doaj +1 more source
Subset Codes for Packet Networks [PDF]
In this paper, we present a coding-theoretic framework for message transmission over packet-switched networks. Network is modeled as a channel which can induce packet errors, deletions, insertions, and out of order delivery of packets. The proposed approach can be viewed as an extension of the one introduced by Koetter and Kschischang for networks ...
Mladen Kovacevic, Dejan Vukobratovic
openaire +3 more sources
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries.
Lilian C. Mutalemwa, Seokjoo Shin
doaj +1 more source
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj +1 more source
Packet reordering, high speed networks and transport protocol performance [PDF]
We performed end-to-end measurements of UDP/IP flows across an Internet backbone network. Using this data, we characterized the packet reordering processes seen in the network.
Gharai, L., Lehman, T., Perkins, C.S.
core +3 more sources
A Protocol for Packet Network Intercommunication [PDF]
A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, end-to-end error checking, and the creation and destruction of logical process-to-process connections.
Robert E. Kahn, Vinton G. Cerf
openaire +3 more sources
Network Virtual Machine (NetVM): A New Architecture for Efficient and Portable Packet Processing Applications [PDF]
A challenge facing network device designers, besides increasing the speed of network gear, is improving its programmability in order to simplify the implementation of new applications (see for example, active networks, content networking, etc).
Baldi, Mario+5 more
core +1 more source
Packet combining in sensor networks [PDF]
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions of a packet have been received, a packet combining procedure attempts to recover the original packet from the corrupt copies.
Dubois-Ferrière, Henri+2 more
openaire +3 more sources