Skip to content
  • Homepage
  • Blog
    • Python Programming
      • Export Tables from Access to PostgreSQL
    • My Thesis
      • Preliminary Information
      • Introductory
      • General Information
        • IoT Protocol Stack
          • 6LoWPAN and RPL
          • Other Protocols
        • Attacks on the RPL Protocol
      • Excecution
        • Simulation and Raw Data
          • Contiki and Cooja
          • D’Hondt’s RPL Framework
          • Obtaining Nodes
          • Simulation and Raw Data
        • Making Raw Data Meaningful
        • Machine Learning Algorithms Used in Attack Detection
        • Experiments and Experiment Results
        • Statistical Analysis
        • Interpretation of the Values
      • Conclusion
  • Contact
  • Türkçe
  • Homepage
  • Blog
    • Python Programming
      • Export Tables from Access to PostgreSQL
    • My Thesis
      • Preliminary Information
      • Introductory
      • General Information
        • IoT Protocol Stack
          • 6LoWPAN and RPL
          • Other Protocols
        • Attacks on the RPL Protocol
      • Excecution
        • Simulation and Raw Data
          • Contiki and Cooja
          • D’Hondt’s RPL Framework
          • Obtaining Nodes
          • Simulation and Raw Data
        • Making Raw Data Meaningful
        • Machine Learning Algorithms Used in Attack Detection
        • Experiments and Experiment Results
        • Statistical Analysis
        • Interpretation of the Values
      • Conclusion
  • Contact
  • Türkçe
  • mukiraz@mukiraz.com

Day: April 29, 2022

IoT Protocol Stack

This section provides brief information about IoT Protocol stack.

SOCIAL MEDIA

Github Twitter Youtube Linkedin-in Instagram

Subscribe to my newsletter