Internet Protocol ≈ Internet Protocol
View article
Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks Open
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of th…
View article
Multipath QUIC Open
Quick UDP Internet Connection (QUIC) is a recent protocol initiated by Google that combines the functions of HTTP/2, TLS, and TCP directly over UDP, with the goal to reduce the latency of client-server communication. It can replace the tra…
View article
RPL: The Routing Standard for the Internet of Things... Or Is It? Open
RPL, the IPv6 Routing Protocol for low-power and lossy networks, is considered the de facto routing protocol for the Internet of Things (IoT). Since its standardization, RPL has contributed to the advancement of communications in the world…
View article
Taking MQTT and NodeMcu to IOT: Communication in Internet of Things Open
Internet of Things (IoT) allow connection among devices using internet with the ability to gather and exchange data. These devices are usually attached with micro-controllers like Arduino, sensors, actuators and internet connectivity. In t…
View article
A Security Framework for the Internet of Things in the Future Internet Architecture Open
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security…
View article
Trusted 5G Vehicular Networks: Blockchains and Content-Centric Networking Open
[EN] Vehicular communications, though a reality, must continue to evolve to support higher throughput and, above all, ultralow latency to accommodate new use cases, such as the fully autonomous vehicle. Cybersecurity must be assured since …
View article
New enhanced authentication protocol for Internet of Things Open
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many …
View article
Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking Open
The Software-Defined Network (SDN) is a new network paradigm that promises more dynamic and efficiently manageable network architecture for new-generation networks. With its programmable central controller approach, network operators can e…
View article
A Reliable Communication Framework and Its Use in Internet of Things (IoT) Open
Peoples are naturally communicators but devices are not. In the Internet of Things (IoT) architecture, the smart devices (SDs), sensors, programs and association of smart objects are connected together to transfer information among them. T…
View article
Network anomaly detection using deep learning techniques Open
Convolutional neural networks (CNNs) are the specific architecture of feed‐forward artificial neural networks. It is the de‐facto standard for various operations in machine learning and computer vision. To transform this performance toward…
View article
Smart IoT Devices in the Home: Security and Privacy Implications Open
Internet of Things (IoT) devices possess network capabilities and contain at least a part of the application logic, i.e., they have the ability to perform Transmission Control Protocol/Internet Protocol (TCP/IP) communications on their own…
View article
A Reliable Framework for Communication in Internet of Smart Devices using IEEE 802.15.4 Open
Peoples are naturally communicators but devices are not.In the Internet of Things (IoT) architecture, the smart devices (SDs), sensors, programs and association of smart objects are connected together to transfer information among them.The…
View article
A Lightweight Continuous Authentication Protocol for the Internet of Things Open
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and con…
View article
Impact of CoAP and MQTT on NB-IoT System Performance Open
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmissi…
View article
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges Open
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inh…
View article
”A Novel MQTT Security framework In Generic IoT Model” Open
Internet of Things(IoT) emerges as a revolutionary technology since the last double decade. Internet of things has changed many aspects of the human. IoT has changed leaving styles and health care with the help of smart health care technol…
View article
MQTT Security: A Novel Fuzzing Approach Open
The Internet of Things is a concept that is increasingly present in our lives. The emergence of intelligent devices has led to a paradigm shift in the way technology interacts with the environment, leading society to a smarter planet. Cons…
View article
Inferring BGP blackholing activity in the internet Open
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reachability to …
View article
RPKI is Coming of Age Open
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To addr…
View article
IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey Open
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol versio…
View article
Network Hygiene, Incentives, and Regulation Open
The Spoofer project has collected data on the deployment and characteristics of IP source address validation on the Internet since 2005. Data from the project comes from participants who install an active probing client that runs in the ba…
View article
A cognitive network management system to improve QoE in stereoscopic IPTV service Open
Summary New Internet Protocol Television (IPTV) services are including new technologies such as Stereoscopic TV and three‐dimensions (3D) HDTV. As well, increased ubiquitous networking and promoting in smart devices have led to high demand…
View article
Visualize Your IP-Over-Optical Network in Realtime: A P4-Based Flexible Multilayer In-Band Network Telemetry (ML-INT) System Open
Nowadays, with the fast development of backbone networks, performance monitoring and troubleshooting on IP-over-optical networks have become increasingly important. However, a real-time monitoring scheme, which is programmable to reveal th…
View article
A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks Open
The recent trend of implementing Internet of Things (IoT) applications is to transmit sensing data to a powerful data center and try to discover the valuable knowledge behind “Big Data”by various intelligent but resource-consuming algorith…
View article
Physical Internet: First results and next challenges Open
International audience
View article
A Survey on Future Internet Security Architectures Open
Current host-centric Internet Protocol (IP) networks are facing unprecedented challenges, such as network attacks and the exhaustion of IP addresses. Motivated by emerging demands for security, mobility, and distributed networking, many re…
View article
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Open
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These network…
View article
Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications Open
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or Industry 4.0), various industrial machines are present in the market and manufacturing companies. As standardized protocols have become incre…
View article
RECV‐MAC: a novel reliable and efficient cooperative MAC protocol for VANETs Open
In vehicular ad hoc networks (VANETs), mobility among vehicles can result in rapid topology changes with frequent link breakage and unstable communications, which cause collision and packet loss. Conversely, cooperative transmission can im…
View article
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things Open
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way. As familie…