Essays about: "contiki"
Showing result 1 - 5 of 50 essays containing the word contiki.
-
1. Performance Evaluation of Different RPL Formation Strategies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The size of the IoT network is expanding due to advancements in the IoT field, leading to increased interest in the multi-sink mechanism. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a representative IoT protocol that focuses on the Low-Power and Lossy Networks. READ MORE
-
2. Low-Power Global Time Synchronization for the Contiki-NG Operating System
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Time synchronization is a well-known problem in low-power embedded wireless networks. While many synchronization protocols exist, usually they are not standard-compliant or do not provide synchronization of a global calendar time which is required by many applications, such as event correlation and certificate validation. READ MORE
-
3. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
4. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE
-
5. Smart Attack Detection for IoT Networks
University essay from KTH/Kommunikationssystem, CoSAbstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE