Ietf 6tisch: A tutorial
The IETF IPv6 over the TSCH mode of IEEE802. 15.4 e (6TiSCH) working group has
standardized a set of protocols to enable low power industrial-grade IPv6 networks. 6TiSCH …
standardized a set of protocols to enable low power industrial-grade IPv6 networks. 6TiSCH …
A comprehensive survey on wireless sensor node hardware platforms
Wireless sensor nodes are the main components in wireless sensor networks. Such devices
affect the performance and the accuracy of the network. Countless commercial and research …
affect the performance and the accuracy of the network. Countless commercial and research …
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …
wireless technology. These security issues are challenging because IoT protocols are …
Emerging wireless sensor networks and Internet of Things technologies—Foundations of smart healthcare
Future smart healthcare systems—often referred to as Internet of Medical Things (IoMT)–will
combine a plethora of wireless devices and applications that use wireless communication …
combine a plethora of wireless devices and applications that use wireless communication …
Low-power wireless for the internet of things: Standards and applications
The proliferation of embedded systems, wireless technologies, and Internet protocols have
enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world …
enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world …
The IoT architectural framework, design issues and application domains
G Gardašević, M Veletić, N Maletić, D Vasiljević… - Wireless personal …, 2017 - Springer
The challenge raised by the introduction of Internet of Things (IoT) concept will permanently
shape the networking and communications landscape and will therefore have a significant …
shape the networking and communications landscape and will therefore have a significant …
Simulating 6TiSCH networks
Abstract 6TiSCH is a working group at the IETF, which is standardizing how to combine
IEEE802. 15.4 time‐slotted channel hopping (TSCH) with IPv6. The result is a solution that …
IEEE802. 15.4 time‐slotted channel hopping (TSCH) with IPv6. The result is a solution that …
LiKe: Lightweight certificateless key agreement for secure IoT communications
P Tedeschi, S Sciancalepore, A Eliyan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …
the leakage of secret information stored on a trusted third party (TTP). These security …
A survey on machine learning software-defined wireless sensor networks (ml-SDWSNS): Current status and major challenges
FF Jurado-Lasso, L Marchegiani, JF Jurado… - IEEE …, 2022 - ieeexplore.ieee.org
Wireless Sensor Network (WSN), which are enablers of the Internet of Things (IoT)
technology, are typically used en-masse in widely physically distributed applications to …
technology, are typically used en-masse in widely physically distributed applications to …
Smart energy optimization for massive IoT using artificial intelligence
The concept of a connected world using Internet of Things (IoT) has already taken pace
during this decade. The efficient hardware and high throughput networks have made it …
during this decade. The efficient hardware and high throughput networks have made it …