IEEE 802.15. 4e: A survey

D De Guglielmo, S Brienza, G Anastasi - Computer Communications, 2016 - Elsevier
Several studies have highlighted that the IEEE 802.15. 4 standard presents a number of
limitations such as low reliability, unbounded packet delays and no protection against …

ALICE: Autonomous link-based cell scheduling for TSCH

S Kim, HS Kim, C Kim - Proceedings of the 18th international conference …, 2019 - dl.acm.org
Although low-power lossy network (LLN), at its early stage, commonly used asynchronous
link layer protocols for simple operation on resource-constrained nodes, development of …

Design and optimization of traffic-aware TSCH scheduling for mobile 6TiSCH networks

O Tavallaie, J Taheri, AY Zomaya - … on Internet-of-Things Design and …, 2021 - dl.acm.org
Time-Slotted Channel Hopping (TSCH) is a medium access control technology defined by
the IEEE 802.15. 4e standard to address reliability and timeliness requirements of low …

Evaluating and improving the scalability of RPL security in the Internet of Things

A Arena, P Perazzo, C Vallati, G Dini… - Computer …, 2020 - Elsevier
Abstract Wireless Sensor and Actuator Networks (WSANs) will represent a key building
block for the future Internet of Things, as a cheap and easily-deployable technology to …

Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids

M Wolkerstorfer, B Schweighofer, H Wegleiter… - Journal of Network and …, 2016 - Elsevier
High-data-rate narrowband Power Line Communication (PLC) is a prominent candidate for
smart grid communications in the low-voltage grid at low operational costs. However, the …

A real-time lora protocol using logical frame partitioning for periodic and aperiodic data transmission

QL Hoang, H Oh - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Owing to provision of a long-range and robust link, LoRa technology has drawn attention for
the use in industrial data collection networks. This article proposes a real-time LoRa protocol …

[图书][B] Security in Wireless Communication Networks

Y Qian, F Ye, HH Chen - 2021 - books.google.com
Receive comprehensive instruction on the fundamentals of wireless security from three
leading international voices in the field Security in Wireless Communication …

Handling reboots and mobility in 802.15. 4 security

KF Krentz, C Meinel - Proceedings of the 31st Annual Computer Security …, 2015 - dl.acm.org
To survive reboots, 802.15. 4 security normally requires an 802.15. 4 node to store both its
anti-replay data and its frame counter in non-volatile memory. However, the only non-volatile …

Impact of duty cycle protocols on security cost of IoT

S Alharby, N Harris, A Weddell… - 2018 9th international …, 2018 - ieeexplore.ieee.org
With the evolution of IoT embedded devices and their broad application, security has
become crucial. Security comes at a cost to these limited devices in terms of energy …

The cost of link layer security in iot embedded devices

S Alharby, A Weddell, J Reeve, N Harris - IFAC-PapersOnLine, 2018 - Elsevier
Abstract Security of Internet of Things (IoT) devices is important for the acceptance of IoT
applications. Several security mechanisms have been proposed, however, due to the limited …