The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main task of most deployed wireless sensor networks is data collection. While a number of solutions have been designed for static networks, there are currently no widely used data collection algorithms for mobile sensor networks. In this paper, we concentrate on scenarios where many nodes, both data sources and sinks, move along a certain track in one direction, a scenario that is common in sports...
We consider the problem of detecting clones in wireless mobile ad-hoc networks. We assume that one of the devices of the network has been cloned. Everything, including saved passwords, certificates and secret keys. We propose a solution in networks of mobile devices carried by individuals -- composedby nodes that can communicate by short-range technology like bluetooth or Wi-Fi, and links appear and...
Real deployments of the IoT require security. CoAP is being standardized as an application layer protocol for the Internet of Things (IoT). CoAP proposes to use DTLS to provide end-to-end security to protect the IoT. DTLS is a heavyweight protocol and its headers are too long to fit in a single IEEE802.15.4 MTU. 6LoWPAN provides header compression mechanisms to reduce the size of upper layer headers...
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low power and lossy networks. The fuzzing process is build upon the Scapy packets manipulation library. It provides different mutation algorithms to be applied on 6LoWPAN protocol messages to...
In this paper, we describe the implementation of a real time visualization and feedback system for Wireless Sensor Network algorithms. The system is based on a fixed hardware test bed, which is deployed on a vertical flat surface and a feedback loop system that takes information about the current state of the network and projects this state, in a visual way, on the surface itself using a video projector...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.