wireless personal area networks
Recently Published Documents


TOTAL DOCUMENTS

346
(FIVE YEARS 35)

H-INDEX

25
(FIVE YEARS 1)

Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7348
Author(s):  
Balkis Bettoumi ◽  
Ridha Bouallegue

The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity Protocol Diet EXchange (HIP DEX) is primarily designed to be suitable for constrained devices and designed to be resistant to Denial of Service (DoS) and man-in-the-middle (MITM) attacks. In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) communications based on the compression of the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) header for HIP DEX packets. We implement our solution in an IoT based-WSN over Constrained Application Protocol (CoAP) in the application layer and Routing Protocol for Low power and lossy networks (RPL) in the routing layer. We also propose a novel distribution model that minimizes the number of signaling messages. Both proposed compression and distribution models for HIP DEX combined with an original implementation of an opportunistic association establishment of the handshake, constitute an efficient security solution for IoT. We called our solution Lightweight Compressed HIP DEX in the IoT (LC-DEX).


2021 ◽  
Author(s):  
C. Gündoğan ◽  
T. Schmidt ◽  
M. Wählisch ◽  
C. Scherb ◽  
C. Marxer ◽  
...  

2021 ◽  
Author(s):  
Aryan Mohammadi Pasikhani ◽  
Andrew John Clark ◽  
Prosanta Gope

<p>The Routing Protocol for low power Lossy networks (RPL) is a critical operational component of low power wireless personal area networks using IPv6 (6LoWPANs). In this paper we propose a Reinforcement Learning (RL) based IDS to detect various attacks on RPL in 6LoWPANs, including several unaddressed by current research. The proposed scheme can also detect previously unseen attacks and the presence of mobile intruders. The scheme is well suited to the resource constrained environments of our target networks.</p><br>


2021 ◽  
Author(s):  
Aryan Mohammadi Pasikhani ◽  
Andrew John Clark ◽  
Prosanta Gope

<p>The Routing Protocol for low power Lossy networks (RPL) is a critical operational component of low power wireless personal area networks using IPv6 (6LoWPANs). In this paper we propose a Reinforcement Learning (RL) based IDS to detect various attacks on RPL in 6LoWPANs, including several unaddressed by current research. The proposed scheme can also detect previously unseen attacks and the presence of mobile intruders. The scheme is well suited to the resource constrained environments of our target networks.</p><br>


Author(s):  
M. Janardhan ◽  
◽  
S. Pallam Shetty ◽  
PVGD Prasad Reddy ◽  
◽  
...  

WPAN using IEEE 802.15.4 protcol operated in non beaconing mode an attempt has made to find out the most significant factor of defacto parameters of IEEE 802.15.4 to enhance the performance by minimizing energy consumption and to enhance the network lifetime of the Wireless Personal Area Networks(WPAN). The factors include Buffer size, Beacon Interval, Back-off-transmission has an ideal impact on QoS metrics in IEEE 802.15.4 protocol. A Design of experiments have been simulated to an optimum level using the taguchi approach. The experimental results from the taguchi approach reveales that Back-of-transmission as the most significant factor for IEEE 802.15.4 in minimizing the power consumption in the WPAN.


2021 ◽  
Author(s):  
Sukhvinder Singh Bamber ◽  
Naveen Dogra ◽  
Mohit Angurala

Abstract Different applications of Wireless Sensor Networks (WSNs) have different expectations from the working of Medium Access Control (MAC) protocols. Some value reliability more than delay incurred while some demand a fair trade-off for the factors like: Throughput, Bit Error Rate (BER) etc. This paper evaluates the performance of Wireless Personal Area Networks (WPANs) from 802.15.4 group for WSNs with modified algorithm which helps in reducing the Medium Access Delay and Delay in reaching of the packet from one end to another end. In this paper certain modifications to existing algorithm have been proposed for reducing the Medium Access Delay and to reduce the number of packets dropped. The result comparisons on the performance parameters like: network output load, generated acknowledged traffic, media access delay, battery consumed and delay in packet transmission from one end to another end that the back-off number & exponent values used for transmission play vital role for improving the performance of WSNs as they directly affect the number of packets dropped, successfully acknowledged and Medium Access Delay.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5127
Author(s):  
Fatima Salma Sadek ◽  
Khaled Belkadi ◽  
Abdelhafid Abouaissa ◽  
Pascal Lorenz

One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the standard uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The nature of connected objects with respect to various resource constraints makes them vulnerable to cyber attacks. One of the most aggressive DoS attacks is the greedy behaviour attack which aims to deprive legitimate nodes to access to the communication medium. The greedy or selfish node may violate the proper use of the CSMA/CA protocol, by tampering its parameters, in order to take as much bandwidth as possible on the network, and then monopolize access to the medium by depriving legitimate nodes of communication. Based on the analysis of the difference between parameters of greedy and legitimate nodes, we propose a method based on the threshold mechanism to identify greedy nodes. The simulation results show that the proposed mechanism provides a detection efficiency of 99.5%.


2021 ◽  
Author(s):  
Vida Azimi

Machine-to-Machine communication (M2M) refers to automated applications executing on smart devices or machines that communicate through a network with little or no human intervention at all. By enabling smart devices to communicate directly with one another, M2M communications technology has the potential to radically change the world around us and the way that we interact with objects. Many applications can benefit from M2M communications, such as transportation, health care, smart energy production, transmission, and distribution, logistics, city automation and manufacturing, security and safety, and others. This work describes an approach to implement M2M communications using the well-known IEEE 802.15.4 / ZigBee communications standard for low data rate wireless personal area networks. In order to achieve better performance for M2M traffic, we propose some improvements in the protocol. Our simulation results confirm the validity


2021 ◽  
Author(s):  
Vida Azimi

Machine-to-Machine communication (M2M) refers to automated applications executing on smart devices or machines that communicate through a network with little or no human intervention at all. By enabling smart devices to communicate directly with one another, M2M communications technology has the potential to radically change the world around us and the way that we interact with objects. Many applications can benefit from M2M communications, such as transportation, health care, smart energy production, transmission, and distribution, logistics, city automation and manufacturing, security and safety, and others. This work describes an approach to implement M2M communications using the well-known IEEE 802.15.4 / ZigBee communications standard for low data rate wireless personal area networks. In order to achieve better performance for M2M traffic, we propose some improvements in the protocol. Our simulation results confirm the validity


Sign in / Sign up

Export Citation Format

Share Document