DSpace logo

Search


Start a new search
Add filters:

Use filters to refine the search results.


Results 4181-4190 of 14528 (Search time: 0.009 seconds).
Item hits:
Issue DateTitleAuthor(s)
2021-04A hybrid trust management framework for a multi-service social IoT networkNarang, Nishit
2020An Analysis on the Effectiveness of Utilizing Facebook Graph Structure for Trust Management in a Social Iot NetworkNarang, Nishit
1998Efficient algorithms for delay-bounded minimum cost path problem in communication networksNarang, Nishit
2020-01A Neighborhood Overlap Based Approach for Service Provider Prioritization in a Directed Social IoT Service NetworkNarang, Nishit
2018-10Privacy enabled disjoint and dynamic address auto-configuration protocol for 6LowpanMavani, Monali
2017Modeling and analyses of IP spoofing attack in 6LoWPAN networkMavani, Monali
1999Efficient Algorithms for Delay-bounded Multicast Tree Generation for Multimedia ApplicationsNarang, Nishit
2021-06Your Tribe Decides Your Vibe: Analyzing Local Popularity in the US Patent Citation NetworkNarang, Nishit
2018Utilizing Social Networks Data for Trust Management in a Social Internet of Things NetworkNarang, Nishit
2018-10In unsecured 6LoWPANs, the nodes can be easily identified by their IPv6 as well as MAC addresses. An adversary can snoop (and later, spoof) these addresses, thereby posing a major threat against the node’s identity and communication integrity. Such threats necessitate enabling privacy by obscuring the node’s addresses. This study proposes a protocol for dynamic, auto-configuring and conflict-free IPv6 addressing scheme that attempts to ensure privacy of nodes. In the proposed protocol, each node obtains a three-level hierarchical IPv6 address space which is dynamically generated on basis of congruence classes. Use of congruence classes, along with hierarchical addressing, facilitates generation of inter-leaved (and hence, disjoint) and non-fragmented address space for each node, resulting in conflict free address auto-generation. Nodes auto-configure their address sets independently with congruence seeds shared by routers, potentially reducing router complexity. To ensure the MAC address privacy, MAC address also changes when IPv6 address changes and it is derived from the interface identification (IID) part of the IPv6 address. The proposed protocol runs on Contiki operating system, simulated in Cooja. Simulated results highlight lower latency and optimal communication costs when compared with existing protocols.Mavani, Monali