OSCAR: Object security architecture for the Internet of Things
In this paper, we propose OSCAR, an architecture for end-to-end security in the Internet of
Things. It is based on the concept of object security that relates security with the application …
Things. It is based on the concept of object security that relates security with the application …
Opportunistic transmission of control packets for faster formation of 6TiSCH network
Network bootstrap** is one of the initial tasks executed in any wireless network such as
Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource …
Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource …
Energy consumption and performance of IEEE 802.15. 4e TSCH and DSME
The recent IEEE 802.15. 4e standard has introduced two interesting modes of operation:
Time Slotted Channel Hop** (TSCH) and Deterministic and Synchronous Multi-channel …
Time Slotted Channel Hop** (TSCH) and Deterministic and Synchronous Multi-channel …
Energy-aware and load-balanced parent selection in RPL routing for wireless sensor networks
The IEEE 802.15. 4 and RPL standards are commonly used for MAC and routing in wireless
sensor networks, respectively. In single-hop networks, duty cycling is supported by the …
sensor networks, respectively. In single-hop networks, duty cycling is supported by the …
Multiple redundancy constants with trickle
T Coladon, M Vučinić… - 2015 IEEE 26th Annual …, 2015 - ieeexplore.ieee.org
Wireless sensor network protocols very often use the Trickle algorithm to govern information
dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and …
dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and …
Network formation for industrial IoT: evaluation, limits and recommendations
D Fanucchi, B Staehle, R Knorr - 2018 IEEE 23rd International …, 2018 - ieeexplore.ieee.org
An open standardized protocol stack proposed by IETF is nowadays emerging in industrial
wireless communication. Main building blocks are TSCH at MAC layer and RPL as routing …
wireless communication. Main building blocks are TSCH at MAC layer and RPL as routing …
Bounding degrees on RPL
RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP
smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy …
smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy …
Implementation and evaluation of an intrusion detection system for IoT: against routing attacks
M Khardioui, A Bamou, MD El Ouadghiri… - … Intelligent Systems for …, 2020 - Springer
The intensive growth of technology and devices connected to the Internet has made the
Internet of Things (IoT) an essential element in all sectors of activity. It can be found in our …
Internet of Things (IoT) an essential element in all sectors of activity. It can be found in our …
Energy cost of security in an energy-harvested IEEE 802.15. 4 Wireless Sensor Network
Wireless Sensor Networks (WSN) powered by energy harvesting from the environment
represent a sustainable direction towards the future Internet of Things. In this paper, we …
represent a sustainable direction towards the future Internet of Things. In this paper, we …
Utilising push and pull mechanism in wireless e-health environment
The emerging of wireless computing motivates radical changes of how information is
derived. Our paper concerns with develo** push and pull based application in wireless …
derived. Our paper concerns with develo** push and pull based application in wireless …