Essays about: "Constrained Application Protocol"
Showing result 1 - 5 of 32 essays containing the words Constrained Application Protocol.
-
1. Evaluating Thread network performance, locating and strengthening weak radio links
University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakultetenAbstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE
-
2. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
3. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols
University essay from Uppsala universitet/DatalogiAbstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE
-
4. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. READ MORE
-
5. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE