Search results for "IPv6"

showing 10 items of 11 documents

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Proxy Mobile IPv6-Based Seamless Handover

2013

A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…

Access networkHandoverWireless networkMobile IPbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCore networkbusinessProxy Mobile IPv6Mobility managementIPv6Computer network
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A Survey on Proxy Mobile IPv6 Handover

2016

[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…

Fast localized Proxy Mobile IPv6 (PMIPv6) handover (HO) procedureEngineeringMobility modelComputer Networks and CommunicationsReactive mode0211 other engineering and technologiesMobile computing02 engineering and technologyPMIPv6 with partial bicastingPMIPv60202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringProxy Mobile IPv6Mobility management021103 operations researchbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPredictive modeHO in PMIPv6020206 networking & telecommunicationsINGENIERIA TELEMATICAComputer Science ApplicationsHandoverControl and Systems EngineeringMobile IPRoamingbusinessTelecommunicationsInformation SystemsComputer networkIEEE Systems Journal
researchProduct

Gatherer: an environmental monitoring application based on IPv6 using wireless sensor networks

2013

In this paper, we present an environmental monitoring application based on IPv6 using wireless sensor networks. We show the guidelines to connect this network to internet using the 6LowPAN standard with a real prototype in the evolution of the Internet of Things. We assign a unique IPv6 address to the different nodes motes of the network. Gatherer is based on TinyOS using IPv6 and UDP protocols and allows the data gathering of temperature and relative humidity from the different motes, requesting specific data from individual motes when required, increasing the accuracy of the measures. We compare the performance of our IPv6-based proposed application against others and show the benefits of…

IPv6 addressComputer Networks and Communicationsbusiness.industryWireless networkComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSIPv6Key distribution in wireless sensor networksHardware and ArchitectureComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSThe Internetbusiness6LoWPANWireless sensor networkSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

A new Scheme for RPL to handle Mobility in Wireless Sensor Networks

2017

Mobile wireless sensor networks (WSNs) are characterised by dynamic changes in the network topology leading to route breaks and disconnections. The IPv6 routing protocol for low power and lossy networks (RPL), which has become a standard, uses the Trickle timer algorithm to handle changes in the network topology. However, neither RPL nor Trickle timer are well adapted to mobility. This paper investigates the problem of supporting mobility when using RPL. It enhances RPL to fit with sensors' mobility by studying two cases. Firstly, it proposes to modify RPL in order to fit with a dynamic and hybrid topology in the context of medical applications. Secondly, it investigates a more general case…

Routing protocol020203 distributed computingComputer Networks and CommunicationsComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsContext (language use)02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networksHardware and Architecture0202 electrical engineering electronic engineering information engineeringTimerbusinessWireless sensor networkSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

An adaptive timer for RPL to handle mobility in wireless sensor networks

2016

This paper focuses on the performance of wireless sensor networks characterized by a hybrid topology composed of mobile and static sensor nodes. The Routing Protocol for Low power and lossy networks (RPL), which is standardized as an IPv6 routing protocol for low power and lossy networks, uses the trickle timer algorithm to handle changes in the network topology. However, this algorithm is not well adapted to dynamic environments. This paper enhances the trickle timer in order to fit with mobility requirements. Most of previous works have improved this algorithm without considering the random movement of nodes. In this work, the proposed timer algorithm takes into consideration the random t…

Routing protocolbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computing020206 networking & telecommunications02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network020201 artificial intelligence & image processingTimerbusinessWireless sensor networkComputer network2016 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Collecte des données Véhicule/Environnement et remontée avec réseau Cellulaire et réseau Véhiculaire

2019

Vertical handover is one of the key technologies that will facilitate the connected and autonomous vehicles deployment. Today, the emergence of Vehicular Ad hoc Networks (VANETs): Vehicle-to-Vehicle (V2V) communications, Vehicle-to-Infrastructure (V2I) and Vehicle-to-Everything (V2X) has enabled new applications such as Cooperative Intelligent Transport Systems (C-ITS), real-time applications (for example, autonomous driving), road traffic management applications and comfort applications. However, these networks are characterized by a high level of mobility and dynamic change in the topology, which generates scattered networks and requires handover mechanisms for maintaining ongoing session…

Transfert Intercellulaire VerticalRéseaux CellulairesMIVHDistributed Mobility ManagementRéseaux VéhiculairesCellular NetworksPMIPv6[INFO]Computer Science [cs]Gestion Distribuée de MobilitéVANETsVertical Handover[INFO] Computer Science [cs]C-V2X
researchProduct

Network interface management in mobile and multihomed nodes

2010

langaton tiedonsiirtoInternetmobiililaitteetmobile computinglangaton viestintämobile networkMobile IPv6tietoliikenneverkotIP mobility
researchProduct