Essays about: "Contiki-NG"
Showing result 1 - 5 of 6 essays containing the word Contiki-NG.
-
1. Low-Power Global Time Synchronization for the Contiki-NG Operating System
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Time synchronization is a well-known problem in low-power embedded wireless networks. While many synchronization protocols exist, usually they are not standard-compliant or do not provide synchronization of a global calendar time which is required by many applications, such as event correlation and certificate validation. READ MORE
-
2. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
3. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE
-
4. Enhanced DTLS Support for the Contiki-NG OS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. READ MORE
-
5. Analysis of DTLS Implementations Using State Fuzzing
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to its low latency. Hence, a means for protecting sensitive datasent over UDP is essential. The protocol most commonly used for this purpose is Datagram Transport Layer Security (DTLS). READ MORE