A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks

H Aydin, S Gormus, B Aydin - IEEE Access, 2024 - ieeexplore.ieee.org
Many Industrial Internet of Things (IIoT) applications require wireless networks with low
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …

Analysis of Ipv6 Adoption in the Last Seven Years: A Systematic Map**

DM Fuentes-Restrepo, SJ Trigos-Ramirez… - Colombian Conference …, 2024 - Springer
IPv6 is of great importance today because the exhaustion of IPv4 addresses is a problem
that the world faces; The study carried out focuses on carrying out a systematic map** …

Study on Parameters Affecting 6TiSCH Network Formation

M Remli, O Demigha, A Yachir - International Conference on Computing …, 2022 - Springer
IETF IPv6 over the TSCH mode of IEEE 802.15. 4e (6TiSCH) is an open communication
protocol stack designed specifically for low-power wireless networks and aimed at being a …