The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a novel, analytic framework for modeling security attacks in Internet of Things (IoT) infrastructures. The devised model is quite generic, and as such, it could flexibly be adapted to various IoT architectures. Its flexibility lies in the underlying theory; it is based on a dynamic G-network, where the positive arrivals denote the data streams that originated from the various...
Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical...
Due to the limited transmit power and other constraints, the transmission of data between two nodes in a Wireless Sensor Network (WSN) may have to be accomplished with the help of one or multiple relay nodes. Game theory has been proven very useful for accurately modeling the underlying strategic interactions between the sensor nodes and for providing the relays with incentives to forward the other...
Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. These routing protocols are designed taking for granted that all nodes are cooperative and willing to forward control and data packets from and to other nodes. However, when selfish nodes exist in the network, the network performance may degrade significantly. In previous research, selfish nodes...
In order to ensure a reliable and efficient end-to-end communication among the network nodes in a Mobile Ad Hoc Network (MANET), an appropriate routing protocol is needed. In this paper, we present an extensive simulation-based comparison of three well-known MANET routing protocols (AODV, DSDV and OLSR) evaluating their performance in three real-life scenarios. Considering various performance metrics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.