Sökning: "Contiki-NG"
Visar resultat 1 - 5 av 6 uppsatser innehållade ordet Contiki-NG.
1. Low-Power Global Time Synchronization for the Contiki-NG Operating System
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Time synchronization is a well-known problem in low-power embedded wireless networks. While many synchronization protocols exist, usually they are not standard-compliant or do not provide synchronization of a global calendar time which is required by many applications, such as event correlation and certificate validation. LÄS MER
2. Securing LwM2M with Mbed TLS in Contiki-NG
Magister-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. LÄS MER
3. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. LÄS MER
4. Enhanced DTLS Support for the Contiki-NG OS
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. LÄS MER
5. Analysis of DTLS Implementations Using State Fuzzing
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to its low latency. Hence, a means for protecting sensitive datasent over UDP is essential. The protocol most commonly used for this purpose is Datagram Transport Layer Security (DTLS). LÄS MER