OSCAR: Object security architecture for the Internet of Things

M Vučinić, B Tourancheau, F Rousseau, A Duda… - Ad Hoc Networks, 2015 - Elsevier
In this paper, we propose OSCAR, an architecture for end-to-end security in the Internet of
Things. It is based on the concept of object security that relates security with the application …

Opportunistic transmission of control packets for faster formation of 6TiSCH network

A Kalita, M Khatua - ACM Transactions on Internet of Things, 2021 - dl.acm.org
Network bootstrapping is one of the initial tasks executed in any wireless network such as
Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource …

Energy consumption and performance of IEEE 802.15. 4e TSCH and DSME

I Juc, O Alphand, R Guizzetti, M Favre… - 2016 IEEE Wireless …, 2016 - ieeexplore.ieee.org
The recent IEEE 802.15. 4e standard has introduced two interesting modes of operation:
Time Slotted Channel Hopping (TSCH) and Deterministic and Synchronous Multi-channel …

Energy-aware and load-balanced parent selection in RPL routing for wireless sensor networks

M Nassiri, M Boujari, SV Azhari - International Journal of …, 2015 - inderscienceonline.com
The IEEE 802.15. 4 and RPL standards are commonly used for MAC and routing in wireless
sensor networks, respectively. In single-hop networks, duty cycling is supported by the …

Multiple redundancy constants with trickle

T Coladon, M Vučinić… - 2015 IEEE 26th Annual …, 2015 - ieeexplore.ieee.org
Wireless sensor network protocols very often use the Trickle algorithm to govern information
dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and …

Bounding degrees on RPL

F Boubekeur, L Blin, R Leone… - Proceedings of the 11th …, 2015 - dl.acm.org
RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP
smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy …

Network formation for industrial IoT: evaluation, limits and recommendations

D Fanucchi, B Staehle, R Knorr - 2018 IEEE 23rd International …, 2018 - ieeexplore.ieee.org
An open standardized protocol stack proposed by IETF is nowadays emerging in industrial
wireless communication. Main building blocks are TSCH at MAC layer and RPL as routing …

Implementation and evaluation of an intrusion detection system for IoT: against routing attacks

M Khardioui, A Bamou, MD El Ouadghiri… - … Intelligent Systems for …, 2020 - Springer
The intensive growth of technology and devices connected to the Internet has made the
Internet of Things (IoT) an essential element in all sectors of activity. It can be found in our …

Energy cost of security in an energy-harvested IEEE 802.15. 4 Wireless Sensor Network

M Vučinić, B Tourancheau, F Rousseau… - 2014 3rd …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) powered by energy harvesting from the environment
represent a sustainable direction towards the future Internet of Things. In this paper, we …

Utilising push and pull mechanism in wireless e-health environment

AB Waluyo, R Hsieh, D Taniar… - … Conference on e …, 2004 - ieeexplore.ieee.org
The emerging of wireless computing motivates radical changes of how information is
derived. Our paper concerns with developing push and pull based application in wireless …