Essays about: "contiki"

Showing result 1 - 5 of 50 essays containing the word contiki.

  1. 1. Performance Evaluation of Different RPL Formation Strategies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyi Chang; [2023]
    Keywords : IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multiple Sinks; Packet Delivery Ratio PDR ; Internet of Things; IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multi-Sink; Packet Delivery Ratio PDR ; Sakernas Internet;

    Abstract : The size of the IoT network is expanding due to advancements in the IoT field, leading to increased interest in the multi-sink mechanism. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a representative IoT protocol that focuses on the Low-Power and Lossy Networks. READ MORE

  2. 2. Low-Power Global Time Synchronization for the Contiki-NG Operating System

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Arnis Gustins; [2023]
    Keywords : ;

    Abstract : Time synchronization is a well-known problem in low-power embedded wireless networks. While many synchronization protocols exist, usually they are not standard-compliant or do not provide synchronization of a global calendar time which is required by many applications, such as event correlation and certificate validation. READ MORE

  3. 3. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  4. 4. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  5. 5. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE