scispace - formally typeset
Search or ask a question

Showing papers in "Wireless Networks in 2021"


Journal ArticleDOI
TL;DR: This study proposes an offloading model for a multi-user MEC system with multi-task, and an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states.
Abstract: Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitation and reduce the communication latency for mobile devices Thereby, in this study, we proposed an offloading model for a multi-user MEC system with multi-task In addition, a new caching concept is introduced for the computation tasks, where the application program and related code for the completed tasks are cached at the edge server Furthermore, an efficient model of task offloading and caching integration is formulated as a nonlinear problem whose goal is to reduce the total overhead of time and energy However, solving these types of problems is computationally prohibitive, especially for large-scale of mobile users Thus, an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states Afterwards, two effective Q-learning and Deep-Q-Network-based algorithms are proposed to derive the near-optimal solution for this problem Finally, experimental evaluations verify that our proposed model can substantially minimize the mobile devices’ overhead by deploying computation offloading and task caching strategy reasonably

115 citations


Journal ArticleDOI
TL;DR: This paper presents a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aims to shape a coherent picture of the current state-of-the-art efforts in this direction.
Abstract: The Internet of Things (IoTs) enables coupling of digital and physical objects using worthy communication technologies and introduces a future vision where computing systems, users and objects cooperate for convenience and economic benefits. Such a vision requires seamless security, data privacy, authentication and robustness against attacks. These attributes can be introduced by blockchain, a distributed ledger that maintains an immutable log of network transactions. In this paper, we present a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aim to shape a coherent picture of the current state-of-the-art efforts in this direction. After describing the basic characteristics and requirements of IoT, evolution of blockchain is presented. In this regard, we start with the fundamental working principles of blockchain and how such systems achieve auditability, security and decentralization. Further, we describe the most relevant BIoT applications, its architecture design and security aspects. From there, we build our narrative on the centralized IoT challenges followed by recent advances towards solving them. Finally, some future directions are enumerated with the aim to guide future BIoT researchers on challenges that needs to be considered ahead of deploying the next generation of BIoT applications.

99 citations


Journal ArticleDOI
TL;DR: This paper focuses on the IoT based healthcare system for cancer care services and business analytics/cloud services and proposes the adoption and implementation of IoT/WSN technology to augment the existing treatment options to deliver healthcare solution.
Abstract: The emergence of the internet of things (IoT) has drastically influenced and shaped the world of technology in the contexts of connectivity, interconnectivity, and interoperability with smart connected sensors, objects, devices, data, and applications. In fact, IoT has brought notable impacts on the global economy and human experience that span from industry to industry in a variety of application domains, including healthcare. With IoT, it is expected to facilitate a seamless interaction and communication of objects (devices) with humans in the environment. Therefore, it is imperative to embrace the potentials and benefits of IoT technology in healthcare delivery to ensure saving lives and to improve the quality of life using smart connected devices. In this paper, we focus on the IoT based healthcare system for cancer care services and business analytics/cloud services and also propose the adoption and implementation of IoT/WSN technology to augment the existing treatment options to deliver healthcare solution. Here, the business analytics/cloud services constitute the enablers for actionable insights, decision making, data transmission and reporting for enhancing cancer treatments. Furthermore, we propose a variety of frameworks and architectures to illustrate and support the functional IoT-based solution that is being considered or utilized in our proposed smart healthcare solution for cancer care services. Finally, it will be important to understand and discuss some security issues and operational challenges that have characterized the IoT-enabled healthcare system.

71 citations


Journal ArticleDOI
TL;DR: A novel approach for detection of DDoS traffic generated by IoT devices in a form of conceptual network anomaly detection model based on device classes which are dependent on individual device traffic characteristics is proposed.
Abstract: The problem of detecting anomalies in network traffic caused by the distributed denial of service (DDoS) attack so far has mainly been investigated in terms of detection of illegitimate DDoS traffic generated by conventional terminal devices (PCs, laptops, mobile devices, tablets, servers). Technological development has resulted in the emergence of the Internet of Things (IoT) concept, whose implementation implies numerous terminal devices with a low level of implemented protection. The large growth and prediction of future growth is noticeable in the environment of a smart home and smart office. IoT devices in such environments are increasingly being used as a platform for generating DDoS traffic due to its numeracy and low level of protection. The aim of this research is to propose a novel approach for detection of DDoS traffic generated by IoT devices in a form of conceptual network anomaly detection model. Proposed conceptual model is based on device classes which are dependent on individual device traffic characteristics.

62 citations


Journal ArticleDOI
TL;DR: The proposed µGA-LEACH protocol, strengthen the cluster head (CH) selection and also reduce the energy consumption of the network when compared to existing protocols, which is a combination of Micro Genetic algorithm with LEACH protocol.
Abstract: This article presents the design, analyses and implementation of the novel routing protocol for energy optimization based on LEACH for WSN. Network Lifetime is the major problem in various routing protocols used in WSN. In order to overcome that problem, our proposed routing protocol is developed, which is a combination of Micro Genetic algorithm with LEACH protocol. Our proposed µGA-LEACH protocol, strengthen the cluster head (CH) selection and also reduce the energy consumption of the network when compared to existing protocols. This paper shows the improvement of network lifetime and energy consumption with the optimal CH selection based on a micro genetic algorithm and also compared the results with an existing hierarchical routing protocol like LEACH, LEACH-C, LEACH GA and GADA LEACH routing protocol with various packet sizes, and initial energy.

48 citations


Journal ArticleDOI
TL;DR: The proposed metamaterial superstrate microstrip antenna design with PIN diodes can become a building block for C/X/Ku-band wireless network devices and show multiband and high gain behavior for metamMaterial superstrate designs.
Abstract: We present a metamaterial superstrate based microstrip patch antenna with PIN diode switches applicable for wireless network applications. Metamaterials in the form of square array and circle array are used as superstrate based on microstrip antenna. The superstrate layers are also working as radome and provide strength to the overall structure and improve different antenna parameters like gain and bandwidth. The design results in the form of reflection coefficient (S11), gain, and bandwidth are compared for different metamaterial superstrate. The reconfiguration in frequency is also achieved by adding PIN diode switches in the metamaterial superstrate. The design results show multiband and high gain behavior for metamaterial superstrate designs. We have also analyzed the effect of using liquid metamaterial superstrate on microstrip antenna design. The design results of liquid metamaterial superstrate design are also compared with copper material superstrate design and simple microstrip patch antenna design. The proposed metamaterial superstrate microstrip antenna design with PIN diodes can become a building block for C/X/Ku-band wireless network devices.

47 citations


Journal ArticleDOI
TL;DR: In this paper, a review of security issues present on the Internet of Medical Things (IoMT) is presented and the solution of various security issues presented in the exiting works is reviewed.
Abstract: The area of computer science and electronics have merged into one of the most notable technologies called the internet of things (IoT). A wide range of applications offered by IoT, including smart agricultural, smart transportation, smart home, and healthcare. In recent times, the market for IoT in healthcare service has increased exponentially. At the same time, security issues in the system also increase this situation threatening the health and safety of patients. Medical device usage in the hospital like Implantable Medical Devices, Radio Frequency Identification tags, and wearable devices are prone to a severe security vulnerability. This scenario is emphasizing the importance of providing privacy and confidentiality of a patient’s medical information. Therefore, this paper attempts to review security issues present on the Internet of Medical Things (IoMT). Also, this work reviews the solution of various security issues presented in the exiting works. Accordingly, the review revealed that the solution of device-level security issues is desirable. At the same time, moderate level focus only happened in communication level security. In this work, various security issues presented in IoMTs analyzed and different risk factors of security attacks on IoMTs identified. The empirical result shows DDoS in IoMTs dangerous compare with other security issues with 95.00% risk factor and authentication issue in wireless insulin pump 55.00% risk factor. The proposed risk assessment helps to identify the highest impact, causing security attacks in various IoMTs.

46 citations


Journal ArticleDOI
TL;DR: An efficient affine cipher-based encryption technique is proposed in this paper to offer a high level of confidentiality with smaller key size compared to existing encryption techniques to ensure that it provides better security.
Abstract: Wireless body area network (WBAN) is utilized in various healthcare applications due to its ability to provide suitable medical services by exchanging the biological data between the patient and doctor through a network of implantable or wearable medical sensors connected in the patients’ body. The collected data are communicated to the medical personals through open wireless channels. Nevertheless, due to the open wireless nature of communication channels, WBAN is susceptible to security attacks by malicious users. For that reason, secure anonymous authentication and confidentiality preservation schemes are essential in WBAN. Authentication and confidentiality play a significant role while transfers, medical images securely across the network. Since medical images contain highly sensitive information, those images should be transferred securely from the patients to the doctor and vice versa. The proposed anonymous authentication technique helps to ensure the legitimacy of the patient and doctors without disclosing their privacy. Even though various cryptographic encryption techniques such as AES and DES are available to provide confidentiality, the key size and the key sharing are the main problems to provide a worthy level of security. Hence, an efficient affine cipher-based encryption technique is proposed in this paper to offer a high level of confidentiality with smaller key size compared to existing encryption techniques. The security strength of the proposed work against various harmful security attacks is proven in security analysis section to ensure that it provides better security. The storage cost, communication cost and computational cost of the proposed scheme are demonstrated in the performance analysis section elaborately. In connection to this, the computational complexity of the proposed scheme is reduced around 29% compared to the existing scheme.

42 citations


Journal ArticleDOI
TL;DR: Security analysis shows that the proposed Peer-to-Peer Electricity Blockchain Trading system based on the current charging and discharging schemes for electric vehicles in the smart grid is able to manage a potential protection against up to a number of attacks.
Abstract: Nowadays, people trade electricity through centralized companies or organizations which is vulnerable to cyber attacks and incapable of coping with increasing demands from stakeholders. In this paper, we propose a new Peer-to-Peer Electricity Blockchain Trading (P2PEBT) system based on the current charging and discharging schemes for electric vehicles (EV) in the smart grid to enable users to participate in the trading process. In order to cope with the current situation of the high volume of EV integration, the proof-of-Benefit (PoB) consensus primitives are proposed for P2PEBT to achieve demand response by providing incentives to balance local electricity demand in the novel blockchain system. PoB is implemented by executing the smart contracts on the Ethereum platform, and the process of achieving the maximal benefits is completed by submitting the transaction in the decentralized network. Security analysis shows that the P2PEBT system is able to manage a potential protection against up to a number of attacks. We demonstrate that the proposed system using the PoB consensus mechanism can achieve lower power fluctuation without requiring a third-party intermediary.

39 citations


Journal ArticleDOI
TL;DR: The aim of the research is to develop the concept of creating temporary Cyber Industry Networks based on e-business platforms that integrate dispersed enterprise resources through mobile devices and mobile software, creating a temporary network in the situation of emerging business opportunities.
Abstract: The fourth industrial (r)evolution called Industry 4.0 transfers production to a different dimension of productivity, flexibility and also mobility. Enterprises using advanced technologies such as Mobile Technologies, Big Data Analytics, Cloud Computing, Internet of Things, etc. and using intelligent resources (e.g. mobile devices, mechatronic machines, means of transport) communicating with each other via the Internet in real time can produce customized products quickly and at low cost. On the one hand the Industry 4.0 concept creates great benefits for the client, and on the other hand raises challenges for industrial enterprises. There is a need to improve existing and create new business models that will combine the potential of many enterprises and together create innovative, very modern production networks based on mobile technologies and the Internet of Things. The article presents the results of research about the creation of innovative production networks operating in the environment of advanced technologies within the Industry 4.0. The aim of the research is to develop the concept of creating temporary Cyber Industry Networks based on e-business platforms that integrate dispersed enterprise resources through mobile devices and mobile software, creating a temporary network in the situation of emerging business opportunities. The main benefit of such networks is the ability to manufacture products through geographically dispersed corporate resources. The Cyber Industry Network allows business processes through the integration of mobile technologies in real time to be managed, and enables to reduce costs, improve flexibility, and as a result increase the competitiveness of manufacturing enterprises.

38 citations


Journal ArticleDOI
TL;DR: Using four heuristics, including one novel heuristic, to identify abnormal energy consumption behaviour from data collected from fifty smart meters deployed inside hostels of IIIT-Delhi was investigated and demonstrated that the proposedHeuristics successfully found abnormalEnergy consumption behaviour.
Abstract: Energy consumption is dependent on temperature, humidity, occupancy, occupant type, building area etc. All these factors collectively define the context of an energy meter. Once the context is known, the meters within the same context can be grouped and their behaviour can be analyzed together. This paper presents four heuristics, including one novel heuristic, to identify abnormal energy consumption. Using these heuristics, data collected from fifty smart meters deployed inside hostels of IIIT-Delhi was investigated for abnormal energy consumption detection. The anomalies and possible causes were discussed with IIIT-Delhi campus administrator. Energy consumption per occupant for one of the meters was found four times when compared to rest of the meters. The results demonstrated that the proposed heuristics successfully found abnormal energy consumption behaviour.

Journal ArticleDOI
TL;DR: The main purpose of this research consists on presenting a proposed methodology, based on the study conducted, to enable to further assist either academia or industry to develop new tools, techniques and approaches for integrated process planning in networked manufacturing environments.
Abstract: Integrated process planning and scheduling in networked manufacturing systems plays a crucial role nowadays and in the forthcoming context of Industry 4.0 to enable effective and efficient decisions, and to improve the business market, based on collaboration, along with computer-based distributed manufacturing and management functions. In this paper some insights regarding a literature review carried out about this main subjects analysed are presented and discussed. Moreover, a framework for integrated process planning and scheduling in networked manufacturing systems is proposed and briefly described, along with some main underlying issues, which are further discussed. Thus, the main purpose of this research consists on presenting a proposed methodology, based on the study conducted, to enable to further assist either academia or industry to develop new tools, techniques and approaches for integrated process planning in networked manufacturing environments. The findings and contributions of this research can help in the implementation and improvement in distributed manufacturing environments, to be linked with small and medium enterprises, to further expand their potentialities through well suited integrated process planning and scheduling decision making processes.

Journal ArticleDOI
TL;DR: In this paper, a new algorithm of clustering AODV based on edge computing strategy is proposed, considering the vehicle node energy and speed, the routing protocol based on the minimum hop number is optimized, which divided the communication mode into vehicle to vehicle and vehicle to road (V2R) mode.
Abstract: In the vehicular ad hoc network (VANET), due to the particularity of high-speed movement of vehicle nodes, there are higher challenges in link stability and network topology control overhead. In this paper, a new algorithm of clustering AODV based on edge computing strategy is proposed. Considering the vehicle node energy and speed, the AODV routing protocol based on the minimum hop number is optimized, which divided the communication mode into vehicle to vehicle (V2V) and vehicle to road (V2R) mode. Adding edge server in the road side unit (RSU) and using the idea of clustering, that is, the nodes in the cluster use V2V communication mode, and the nodes between clusters use V2V and V2R combined communication mode to select routes. The algorithm improves the routing efficiency in the high-speed mobile. Experiments show that the algorithm is feasible, reducing the network topology control overhead, lowering the end-to-end delay and improving the packet delivery rate comparing with others in different environment.

Journal ArticleDOI
TL;DR: The mathematical approach for determining the coordinates of contact points between the workpiece and the locating and clamping elements fixtures in the coordinate system is developed and successfully applied for such parts as levers, connecting rods, flat parts.
Abstract: Fixtures play a significant role in ensuring the quality of products in manufacturing engineering. The paper considers fork-type parts that have a complex spatial configuration and needs to be machined by drilling-milling-boring equipment in one setup. In fixture design, it is necessary to provide wide tool accessibility, and therefore the choice of locating surfaces of the workpiece is an important step. The mathematical approach for determining the coordinates of contact points between the workpiece and the locating and clamping elements fixtures in the coordinate system is developed in this paper. The geometric parameters of the workpiece are taken into account in determining the coordinates. It allows to apply the proposed approach for parts of another standard size, but the same design and technological features. The technology of augmented reality is an effective tool at the design stage of fixtures and allows to visualize the developed fixture configurations. This approach has been successfully applied for such parts as levers, connecting rods, flat parts.

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-Based Industrial Internet of Things (LAPTAS) in which registered users can use their security smartcard to communicate with sensors and access their data.
Abstract: Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data collection in many industrial environments. Industrial environments are usually huge. The distances between the devices located in them can be vast; in this case, the Industrial Internet of Things (IIoT) leads to greater productivity and efficiency of industries. Furthermore, the sensor devices in IIoT have limited memory and constrained processing power, and using gateway nodes is inevitable to cover these vast areas and manage communications between industrial sensors. Security threats such as compromised devices, denial of service, and leakage of confidential information can incur hefty expenses and irreparable damage to industrial systems. Hence, in the IIoT hierarchical architecture, anonymous and mutual authentication between users, gateway nodes, and sensor nodes is essential to protect users and the system’s security and privacy. In this article, we propose a lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-Based IIoT (LAPTAS). In LAPTAS, registered users can use their security smartcard to communicate with sensors and access their data. Moreover, the proposed scheme supports sensor node dynamic registration, password and biometric change, and revocation phase. Additionally, we evaluate and verify our scheme’s security formally using the Real-or-Random model and informally with the automatic cryptographic Protocol Verifier tool(ProVerif). Finally, our scheme is simulated by the OPNET network simulator and compared with other similar schemes to ensure that the LAPTAS meets all security and performance requirements.

Journal ArticleDOI
TL;DR: A new framework of localization for displaced sensor nodes is proposed using DV-Hop localization methods using particle swarm optimization (PSO) and radio irregularity model is considered to show the applicability of proposed algorithm in anisotropic network.
Abstract: Localization of sensor nodes is one of the major challenge in wireless sensor networks. It helps in identifying the geographically area where an event occurred. Most of the cases it is one time process wherein nodes are localized once in network life time. However, in real time scenario nodes may get dislocated within the network due to land slide or any event occurrence. In such events, localization of these sensor nodes is required. In this paper, we have proposed a new framework of localization for displaced sensor nodes. The proposed framework consider DV-Hop localization methods using particle swarm optimization (PSO). Radio irregularity model is also considered to show the applicability of proposed algorithm in anisotropic network. Simulation results show that our proposed localization framework effectively minimizes the elapsed time, localization error and energy consumption as compared to traditional framework of PSO DV-Hop.

Journal ArticleDOI
TL;DR: In this paper, the authors investigate the security of the Internet of Things (IoT) and compare the performance of symmetric, asymmetric and hybrid encryption algorithms for IoT security.
Abstract: Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of interconnected objects. Thus, the security of IoT is highly important. Scalable applications and services are vulnerable to various attacks and information leakage, demanding greater levels of security and privacy. For instance, hacking personal information is a challenge in this regard. The present study is an investigation of symmetric, asymmetric and hybrid encryption algorithms for IoT security. Asymmetric key encryption to ensure secure communication between multiple users and thereby avoiding distributing key on an insecure channel. All algorithms are compared based on security factors. Results indicate that Elliptic Curve Cryptography (ECC) has a better performance than other algorithms in the study. ECC to generate smaller, faster and reliable cryptography keys. Also, ECC decreases the memory requirements and the execution encryption/decryption time. This study helps to understand the importance of several security factors in IoT and advancements in cryptography algorithms.

Journal ArticleDOI
TL;DR: In this article, the authors present the state-of-the-art communication technologies that can meet the communication requirements of the smart grid CPS (SG-CPS) applications.
Abstract: The recent developments in embedded system design and communication technologies popularized the adaption of the cyber-physical system (CPS) for practical applications. A CPS is an amalgamation of a physical system, a cyber system, and their communication network. The cyber system performs extensive computational operations on the data received from the physical devices, interprets the data, and initiates effective control actions in real-time. One such CPS is the smart grid CPS (SG-CPS) consisting of physical devices with diverse communication requirements, and intermediate communication networks. Thus, reliable communication networks are paramount for the effective operation of the SG-CPS. This paper is an elaborate survey on the communication networks from the perspective of the SG-CPS. This paper presents the state-of-art communication technologies that can meet the communication requirements of the various SG-CPS applications. The communications standards and communication protocols are also comprehensively discussed. A systematic mapping among communication technologies, standards, and protocols for various SG-CPS applications has been presented based on an extensive literature survey in this paper. Furthermore, several challenges, such as security, safety, reliability and resilience, etc., have been addressed from SG-CPS’s perspective. This work also identifies the research gaps in the various domains of the SG-CPS that can be of immense benefit to the research community.

Journal ArticleDOI
TL;DR: This work builds a network of smart nodes where each node comprises a Radio-Frequency Identification (RFID) tag, reduced function RFID reader (RFRR), and sensors, and two levels of security algorithms, including an AES 128 bit with hashing, have been implemented.
Abstract: COVID-19 surprised the whole world by its quick and sudden spread. Coronavirus pushes all community sectors: government, industry, academia, and nonprofit organizations to take forward steps to stop and control this pandemic. It is evident that IT-based solutions are urgent. This study is a small step in this direction, where health information is monitored and collected continuously. In this work, we build a network of smart nodes where each node comprises a Radio-Frequency Identification (RFID) tag, reduced function RFID reader (RFRR), and sensors. The smart nodes are grouped in clusters, which are constructed periodically. The RFRR reader of the clusterhead collects data from its members, and once it is close to the primary reader, it conveys its data and so on. This approach reduces the primary RFID reader’s burden by receiving data from the clusterheads only instead of reading every tag when they pass by its vicinity. Besides, this mechanism reduces the channel access congestion; thus, it reduces the interference significantly. Furthermore, to protect the exchanged data from potential attacks, two levels of security algorithms, including an AES 128 bit with hashing, have been implemented. The proposed scheme has been validated via mathematical modeling using Integer programming, simulation, and prototype experimentation. The proposed technique shows low data delivery losses and a significant drop in transmission delay compared to contemporary approaches.

Journal ArticleDOI
TL;DR: In this article, a computation offloading algorithm based on Deep Deterministic Policy Gradient (DDPG) in reinforcement learning (RL) was proposed to minimize the maximum processing delay by jointly optimizing user scheduling, task offloading ratio, UAV flight angle and flight speed.
Abstract: Unmanned Aerial Vehicle (UAV) can play an important role in wireless systems as it can be deployed flexibly to help improve coverage and quality of communication. In this paper, we consider a UAV-assisted Mobile Edge Computing (MEC) system, in which a UAV equipped with computing resources can provide offloading services to nearby user equipments (UEs). The UE offloads a portion of the computing tasks to the UAV, while the remaining tasks are locally executed at this UE. Subject to constraints on discrete variables and energy consumption, we aim to minimize the maximum processing delay by jointly optimizing user scheduling, task offloading ratio, UAV flight angle and flight speed. Considering the non-convexity of this problem, the high-dimensional state space and the continuous action space, we propose a computation offloading algorithm based on Deep Deterministic Policy Gradient (DDPG) in Reinforcement Learning (RL). With this algorithm, we can obtain the optimal computation offloading policy in an uncontrollable dynamic environment. Extensive experiments have been conducted, and the results show that the proposed DDPG-based algorithm can quickly converge to the optimum. Meanwhile, our algorithm can achieve a significant improvement in processing delay as compared with baseline algorithms, e.g., Deep Q Network (DQN).

Journal ArticleDOI
TL;DR: An adaptive flower pollination algorithm (AFPA) with enhanced exploration and exploitation capabilities of conventional FPA for the localization of sensor nodes in WSN is proposed and results show that proposed AFPA outperforms in terms of convergence speed and provides better results for most of the benchmark functions.
Abstract: Localization in wireless sensor networks (WSNs) is required to examine the coordinates of the sensor nodes deployed in the sensing field. It is the process that determines the location of the target nodes relative to the location of deployed anchor nodes. The anchor nodes positions are known as the nodes that have GPS unit incorporated with them. All sensor nodes are generally not configured with GPS as it is not suitable for indoor environments and/or underwater areas. A network becomes more expensive and utilizes more energy if all nodes are equipped with GPS that is a major drawback of WSNs. Various localization schemes have been proposed in literature, while most research proposals deal with the study of 2D applications. However, in the 3D applications, the area under observation may have a complexity in the sensing environment. An optimized algorithm is required for the determination of node location in 3D environment. In this paper, we propose an adaptive flower pollination algorithm (AFPA) with enhanced exploration and exploitation capabilities of conventional FPA for the localization of sensor nodes in WSN. To test the performance of AFPA, benchmark functions (CEC 2019) are used to compare it with other meta-heuristics. The results show that proposed AFPA outperforms in terms of convergence speed and provides better results for most of the benchmark functions. Also, the proposed AFPA is tested on WSN Localization problem, it provides least localization error in comparison to other techniques applied in 3D WSN environments.

Journal ArticleDOI
TL;DR: A comprehensive view is provided upon various aspects of RRM, its challenges, existing solutions and directions for research to find and develop smarter and more adaptive schemes for future.
Abstract: Radio resource and its management is one of the key areas of research where technologies, infrastructure and challenges are rapidly changing as 5G system architecture demands a paradigm shift. The previous generation communication technologies require customizations and upgrades as 5G will remain inclusive for significantly long duration. Radio resource management (RRM) schemes that are evolved during LTE/LTE-A network environment period will remain relevant for 5G, however, these schemes must become more intelligent and adaptive for future as features and requirements of network and users will be diverse and highly demanding. In this paper, a comprehensive view is provided upon various aspects of RRM, its challenges and existing schemes. The existing RRM schemes are presented with their respective architecture which has significant impact on the approaches. The problem of RRM is multi-dimensional and different dimensions are presented with their respective solutions such as interference or energy management. In this paper study of legacy and state of the art RRM schemes is presented with their features and inefficiencies in the modern telecommunication era of heterogeneous, ultra-dense, very low latency and highly reliable mobile network. In addition to this various comparison among approaches and schemes are presented for analyzing the solutions. The need of RRM solution is critical and this paper aim is to outline the challenges, existing solutions and directions for research to find and develop smarter and more adaptive schemes for future.

Journal ArticleDOI
TL;DR: Simulation outcomes indicate that the proposed Cuckoo search optimization algorithm using a fuzzy type-2 logic-based clustering strategy outperforms other communication techniques in the context of the successful elimination of malicious nodes along with energy consumption, stability period, and network lifetime.
Abstract: With the advancement of communication and sensor technologies, it has become possible to develop low-cost circuitry to sense and transmit the state of surroundings Wireless networks of such circuitry, namely wireless sensor networks (WSNs), can be used in a multitude of applications like healthcare, intelligent sectors, environmental sensing, and military defense The crucial problem of WSN is the reliable exchange of data between different sensors and efficient communication with the data collection center Clustering is the most appropriate approach to prolong the performance parameters of WSN To overcome the limitations in clustering algorithms such as reduced cluster head (CH) lifetime; an effective CH selection algorithm, optimized routing protocol, and trust management are required to design an effective WSN solution In this paper, a Cuckoo search optimization algorithm using a fuzzy type-2 logic-based clustering strategy is suggested to extend the level of confidence and hence network lifespan In intra-cluster communication, a threshold-based data transmission algorithm is used and a multi-hop routing scheme for inter-cluster communication is employed to decrease dissipated energy from CHs far away from BS Simulation outcomes indicate that the proposed strategy outperforms other communication techniques in the context of the successful elimination of malicious nodes along with energy consumption, stability period, and network lifetime

Journal ArticleDOI
TL;DR: A novel branch-line coupler using meandered line compact microstrip resonant cell (MLCMRC) and bended lines is proposed, with good specifications, and can eliminate 3rd and 5th harmonic with high suppression level and reduce the size of the circuit more than 64% compared to the conventional branch- line coupler.
Abstract: In this paper, a novel branch-line coupler using meandered line compact microstrip resonant cell (MLCMRC) and bended lines is proposed. The presented coupler works at 0.9 GHz, with good specifications. The measured values of S12 and S13 at 0.9 GHz are 3.2 dB and 3.3 dB, respectively, which show better than 0.3 dB insertion loss in the pass band. The measured value of S14 is better than 36 dB and S11 is better than 31 dB. The proposed design can eliminate 3rd and 5th harmonic with high suppression level (more than 40 dB) and reduce the size of the circuit more than 64% compared to the conventional branch-line coupler. The presented coupler has a very simple structure, which can be used in modern communication applications.

Journal ArticleDOI
TL;DR: In this paper, the suitability of wireless body area networks (WBANs) to medical applications is discussed by presenting their methodologies, the adopted wireless technologies and the used sensors.
Abstract: Interest and need for Wireless Body Area Networks (WBANs) have significantly increased recently. WBAN consists of miniaturized sensors designed to collect and transmit data through wireless network, enabling medical specialists to monitor patients during their normal daily life and providing real time opinions for medical diagnosis. Many wireless technologies have proved themselves in WBAN applications, while others are still under investigations. The choice of the technology to adopt may depend on the disease to monitor and the performance requirements, i.e. reliability, latency and data rate. In addition, the suitable sensor is essential when seeking to extract the data related to a medical measure. This paper aims at surveying the wireless technologies used in WBAN systems. In addition to a detailed survey on the existing technologies, the use of the emerging Low Power Wide Area Network (LPWAN) technologies, and the future 5G, B5G and 6G is investigated, where the suitability of these technologies to WBAN applications is studied from several perspectives. Furthermore, medical applications of WBAN are discussed by presenting their methodologies, the adopted wireless technologies and the used sensors. Given that each medical application requires the appropriate sensor to extract the data, we highlight a wide range of the sensors used in the market for medical systems. Recent and future challenges in WBAN systems are given related to the power consumption, the emergence of the Internet of Things (IoT) technologies in WBAN and others.

Journal ArticleDOI
TL;DR: A Mercedes-Benz logo antenna with a metal plate located at an optimized distance from the proposed antenna is introduced as a wearable antenna to operate in the industrial, scientific, and medical band with center frequency of 2.45 GHz.
Abstract: In this paper, a Mercedes-Benz logo antenna with a metal plate located at an optimized distance from the proposed antenna is introduced as a wearable antenna to operate in the industrial, scientific, and medical band with center frequency of 2.45 GHz. The metal plate is integrated with the antenna as an isolator and a reflector to improve the radiation performance of the proposed design, reduce the back radiation and reduce the specific absorption rate, when loaded on the human body. The front-to-back ratio improves by 18.2 dB, by adding a metal plate to the structure. The proposed antenna with coplanar waveguide-fed with dimensions of 35 mm × 35 mm × 0.508 mm is printed on a Rogers 4003C substrate, and has an impedance bandwidth from 2.20 to 2.56 GHz, the gain of 7.3 dBi at 2.45 GHz, and SAR levels is less than the criteria set by the FCC and ICNIRP. Nowadays, attention to health as product quality assurance factor along with other technical specifications is the requirements of industrial productions, especially in competition with superior brands. Based on comparisons made with similar works, the proposed wearable antenna structure can be used for wireless body area network.

Journal ArticleDOI
TL;DR: A distributed multi-hop cluster-based routing algorithm that takes advantage of the PSO and the Lightening Search Algorithm is developed and achieves energy efficiency, as demonstrated by the experimental results.
Abstract: The Internet of Things (IoT) is a collection of various sensors connected to the internet that share information. In a large-scale IoT network, data is collected through the wireless sensor network (WSN), and the aggregated data is sent from the sink to the next level of IoT for processing. Clustering is utilized to cut down on energy use, network redundancy, interference, and collision in WSN and improve network lifetime, scalability, and data aggregation. In addition, multi-hop communication is more effective for networks with sensors that cover a broad region. The Multi-Hop Low Energy Adaptive Clustering Hierarchy brings about a reduction to the transmission distance and prolongs the network lifetime. This particle swarm optimization (PSO) technique is effective for determining the most effective solutions for a particular problem. The particles in the PSO embody the candidate solutions tend to move through their solutions space (in several directions) in different velocities. A distributed multi-hop cluster-based routing algorithm that takes advantage of the PSO and the Lightening Search Algorithm is developed in this work. The proposed method optimizes the clustering process and achieves energy efficiency, as demonstrated by the experimental results. Reduced end-to-end delay and lower packet loss rate whereas the lifespan network and cluster count are improved.

Journal ArticleDOI
TL;DR: A novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) has been proposed for providing energy efficient and secured dissemination of data and reduces the energy consumption as well as delay in data dissemination.
Abstract: Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossiping makes the network to transmit the same data item multiple times by multiple sensor nodes to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called a Redundant Broadcast Storm Problem (RBSP). Moreover, the RBSP results in too many senders’ problem and also leads to the consumption of more energy in the network. In data dissemination, providing energy efficiency and security are the two major challenging issues. In such a scenario, the attackers may make use of the weakness in security provisions available in the network and they can perform unauthorized activities to disrupt the process of data dissemination. Hence, it is necessary to address the issues of RBSP, energy consumption, security and too many senders problem in order to enhance the reliability and security of communication in WSN for data dissemination. In this paper, a novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) has been proposed for providing energy efficient and secured dissemination of data. The proposed protocol is a distributed protocol which considers the route discovery process, cluster formation, cluster head selection, cluster based routing and security through the design of a new digital signature based authentication algorithm, trust based security enhancement and encryption techniques for effective key management. The major contributions of the proposed work include the proposal of cryptography based public key and private key generation algorithms, techniques for trust score computation and malicious node identification and finally the effective prevention of malicious activities for enhancing the security of the network. Moreover, this work considers node identification techniques for effective clustering of nodes and performs optimal route discovery and secured transmission of packets. This work is novel with respect to multicast based data dissemination protocol, proposal of combined signature generation and verification schemes, encryption based key management and distributed data collection and communication techniques. In addition, an Intelligent Fuzzy based Unequal Clustering algorithm is used to perform effective clustering process and the traffic analyzer to identify the intruders by monitoring the node’s behaviors and their trust values. The proposed protocol has been extensively tested with realistic simulation parameters using NS2 simulator. The simulation results obtained from this work have proved that the proposed protocol improves the level of security through the proposal of a time efficient encryption and decryption algorithm with increase in packet delivery ratio and network throughput and at the same time it reduces the energy consumption as well as delay in data dissemination.

Journal ArticleDOI
TL;DR: A new virtual machine (VM) consolidation technique called Nature-inspired Meta-heuristic Threshold based firefly optimized lottery scheduling (NMT-FOLS) Technique is proposed, which gets better task scheduling performance to balance normal, timely and bursty workloads in CS with lesser time.
Abstract: Scheduling is a considerable problem in cloud to increase the quality of service provisioning with higher resource efficiency. The conventional task scheduling algorithms designed for balancing load in a cloud environment. But, minimizing the Service level agreement (SLA) violation, resource wastage and the energy consumption during the task scheduling process was not solved effectively. In order to resolve these limitations, a new virtual machine (VM) consolidation technique called Nature-inspired Meta-heuristic Threshold based firefly optimized lottery scheduling (NMT-FOLS) Technique is proposed. Initially, user requests are transmitted to the cloud server (CS). Next, NMT-FOLS Technique utilizes Adaptive Regressive Holt–Winters Workload Predictor to discover the workload state as normal or timely or bursty. Using the workload predictor result, NMT-FOLS Technique exploits task scheduler to allocate user requested tasks to optimal VMs. NMT-FOLS Technique applies multi-objective firefly optimization based task scheduling algorithm in normal workload state and multi-objective firefly optimized lottery scheduling algorithm in timely and bursty workload situations. At last, the selected scheduling algorithm in NMT-FOLS Technique assigns the user requested task to best VMs in CS to perform the demanded services. Hence, NMT-FOLS Technique gets better task scheduling performance to balance normal, timely and bursty workloads in CS with lesser time. NMT-FOLS Technique decreases the SLA violation in cloud through scheduling of user tasks to optimal VM. NMT-FOLS performs an experimental process using metrics such as SLA violation, task scheduling efficiency (TSE), makespan, energy utilization and memory usage with number of user-requested tasks over the considered Amazon dataset. From the experimental result, the NMT-FOLS technique improves scheduling efficiency up to 94.6% and reduces the SLA violations and energy utilization from different test cases on an average to 78%, and 63% compared to state-of-the-art works.

Journal ArticleDOI
TL;DR: In this paper, a compact FR-4-based 4-element MIMO antenna is proposed for three sub-6 GHz 5G bands, where the single element is symmetrically arranged along the horizontal direction and in mirrored fashion along the vertical and diagonal direction.
Abstract: A compact 4 element MIMO antenna operating in three Sub-6 GHz 5G bands is proposed. The single element antenna consists of a square-shaped patch where circular and rectangular-shaped slot cuts are incorporated. The single element is symmetrically arranged along the horizontal direction and in mirrored fashion along the vertical and diagonal direction. The 4 element MIMO antenna achieves a symmetric structure on top with the connected ground at back. With no extra isolation element, the proposed FR-4 based design achieves compact size of 0.39λ02 (f0 = 3.72 GHz) operating in three frequency bands ranging from (2.65%) 3.72–3.82 GHz, (2.33%) 4.65–4.76 GHz and (4.75%) 6.16–6.46 GHz. The satisfactory isolation amongst inter-elements (≥ 16 dB) with directional radiation pattern and an average gain of 2.5 dBi is attained for proposed bands. Furthermore, the antenna meets the MIMO diversity criteria by achieving DG > 9.7, ECC < 0.1, TARC < -10 dB, the ratio of MEG ≈ 1, and lastly channel capacity loss < 0.5 bits/s/Hz making it commercially viable for its use in wireless 5G devices using Sub-6 GHz bands.