IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey

ASAMS Ahmed, R Hassan, NE Othman - IEEE access, 2017 - ieeexplore.ieee.org
… replace Address Resolution Protocol (ARP), router discovery and redirect functions in Internet
… Because of the huge number of addresses demanded, for the connected devices, IPv6 will …

Key agreement in peer-to-peer wireless networks

M Cagalj, S Capkun, JP Hubaux - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
… verify the proximity of two devices connected by a radio link; it requires devices with a high
(… protocol based on ultrasound and radio wireless communication (a similar technique was …

A secure publish/subscribe protocol for Internet of Things using identity-based cryptography

W Peng, S Liu, K Peng, J Wang… - … Science and Network …, 2016 - ieeexplore.ieee.org
… MQTT-S [9] is a publish/subscribe protocol based on MQTT … provide the function of gateway
address resolution. It can also … or device, the address and port number of the gateway/device

Security in Wireless LAN (WLAN) and WiMAX Systems

S Gupta, BB Gupta - Computer and Cyber Security, 2018 - taylorfrancis.com
… WLAN are Wireless Access Points (WAPs) and Wireless Clients… is Extensive Authentication
Protocol-based authentication (… : Address resolution protocol (ARP) is used to resolve IP …

Adaptive hop-by-hop cone vector-based forwarding protocol for underwater wireless sensor networks

IU Khan, M Islam, M Ismail, AB Qazi… - International …, 2020 - journals.sagepub.com
… It is crucial for underwater wireless sensor networks to mitigate all these limitations primarily
caused by the harsh underwater environment. To address some of the pertinent challenges, …

[图书][B] Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of …

M Muhammad - 2018 - search.proquest.com
resolve many issues associated with interference from different points within the network. …
area, research on the way directional antennas access the wireless medium specific to Ultra-…

MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
… , protocol-based attacks targeting Controller Area Network (CAN… buffer overflow, DoS and
Address Resolution Protocol (ARP) … and anti-spoofing mechanisms to the UAV access point. …

Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption

B Zhang, T Zhang, Z Xi, P Chen, J Wei, Y Liu - Electronics, 2024 - mdpi.com
device-to-device communication solution for the Internet of Things (IoT). By extracting the
wireless channel state information from IoT devices, … features for these devices and combined …

Pipeneta wireless sensor network for pipeline monitoring

I Stoianov, L Nachman, S Madden… - Proceedings of the 6th …, 2007 - dl.acm.org
… We developed an immersion apparatus to immerse and position the probe into the centre of
… To support continuous sampling, we implemented a reliable streaming protocol based on …

Quality of service in wireless sensor networks: a survey and related patents

J Balen, D Zagar, G Martinovic - Recent Patents on Computer …, 2011 - ingentaconnect.com
… In [27, 28], authors described a novel transport layer protocol based on the source prioritization
for QoS … Methods and apparatus for coverage verification in a wireless sensor network. …