scispace - formally typeset
Search or ask a question

Showing papers in "Wireless Networks in 2021"


Journal ArticleDOI

[...]

TL;DR: A novel approach for detection of DDoS traffic generated by IoT devices in a form of conceptual network anomaly detection model based on device classes which are dependent on individual device traffic characteristics is proposed.
Abstract: The problem of detecting anomalies in network traffic caused by the distributed denial of service (DDoS) attack so far has mainly been investigated in terms of detection of illegitimate DDoS traffic generated by conventional terminal devices (PCs, laptops, mobile devices, tablets, servers). Technological development has resulted in the emergence of the Internet of Things (IoT) concept, whose implementation implies numerous terminal devices with a low level of implemented protection. The large growth and prediction of future growth is noticeable in the environment of a smart home and smart office. IoT devices in such environments are increasingly being used as a platform for generating DDoS traffic due to its numeracy and low level of protection. The aim of this research is to propose a novel approach for detection of DDoS traffic generated by IoT devices in a form of conceptual network anomaly detection model. Proposed conceptual model is based on device classes which are dependent on individual device traffic characteristics.

25 citations


Journal ArticleDOI

[...]

TL;DR: This paper focuses on the IoT based healthcare system for cancer care services and business analytics/cloud services and proposes the adoption and implementation of IoT/WSN technology to augment the existing treatment options to deliver healthcare solution.
Abstract: The emergence of the internet of things (IoT) has drastically influenced and shaped the world of technology in the contexts of connectivity, interconnectivity, and interoperability with smart connected sensors, objects, devices, data, and applications. In fact, IoT has brought notable impacts on the global economy and human experience that span from industry to industry in a variety of application domains, including healthcare. With IoT, it is expected to facilitate a seamless interaction and communication of objects (devices) with humans in the environment. Therefore, it is imperative to embrace the potentials and benefits of IoT technology in healthcare delivery to ensure saving lives and to improve the quality of life using smart connected devices. In this paper, we focus on the IoT based healthcare system for cancer care services and business analytics/cloud services and also propose the adoption and implementation of IoT/WSN technology to augment the existing treatment options to deliver healthcare solution. Here, the business analytics/cloud services constitute the enablers for actionable insights, decision making, data transmission and reporting for enhancing cancer treatments. Furthermore, we propose a variety of frameworks and architectures to illustrate and support the functional IoT-based solution that is being considered or utilized in our proposed smart healthcare solution for cancer care services. Finally, it will be important to understand and discuss some security issues and operational challenges that have characterized the IoT-enabled healthcare system.

24 citations


Journal ArticleDOI

[...]

TL;DR: Security analysis shows that the proposed Peer-to-Peer Electricity Blockchain Trading system based on the current charging and discharging schemes for electric vehicles in the smart grid is able to manage a potential protection against up to a number of attacks.
Abstract: Nowadays, people trade electricity through centralized companies or organizations which is vulnerable to cyber attacks and incapable of coping with increasing demands from stakeholders. In this paper, we propose a new Peer-to-Peer Electricity Blockchain Trading (P2PEBT) system based on the current charging and discharging schemes for electric vehicles (EV) in the smart grid to enable users to participate in the trading process. In order to cope with the current situation of the high volume of EV integration, the proof-of-Benefit (PoB) consensus primitives are proposed for P2PEBT to achieve demand response by providing incentives to balance local electricity demand in the novel blockchain system. PoB is implemented by executing the smart contracts on the Ethereum platform, and the process of achieving the maximal benefits is completed by submitting the transaction in the decentralized network. Security analysis shows that the P2PEBT system is able to manage a potential protection against up to a number of attacks. We demonstrate that the proposed system using the PoB consensus mechanism can achieve lower power fluctuation without requiring a third-party intermediary.

23 citations


Journal ArticleDOI

[...]

TL;DR: The aim of the research is to develop the concept of creating temporary Cyber Industry Networks based on e-business platforms that integrate dispersed enterprise resources through mobile devices and mobile software, creating a temporary network in the situation of emerging business opportunities.
Abstract: The fourth industrial (r)evolution called Industry 4.0 transfers production to a different dimension of productivity, flexibility and also mobility. Enterprises using advanced technologies such as Mobile Technologies, Big Data Analytics, Cloud Computing, Internet of Things, etc. and using intelligent resources (e.g. mobile devices, mechatronic machines, means of transport) communicating with each other via the Internet in real time can produce customized products quickly and at low cost. On the one hand the Industry 4.0 concept creates great benefits for the client, and on the other hand raises challenges for industrial enterprises. There is a need to improve existing and create new business models that will combine the potential of many enterprises and together create innovative, very modern production networks based on mobile technologies and the Internet of Things. The article presents the results of research about the creation of innovative production networks operating in the environment of advanced technologies within the Industry 4.0. The aim of the research is to develop the concept of creating temporary Cyber Industry Networks based on e-business platforms that integrate dispersed enterprise resources through mobile devices and mobile software, creating a temporary network in the situation of emerging business opportunities. The main benefit of such networks is the ability to manufacture products through geographically dispersed corporate resources. The Cyber Industry Network allows business processes through the integration of mobile technologies in real time to be managed, and enables to reduce costs, improve flexibility, and as a result increase the competitiveness of manufacturing enterprises.

23 citations


Journal ArticleDOI

[...]

TL;DR: The mathematical approach for determining the coordinates of contact points between the workpiece and the locating and clamping elements fixtures in the coordinate system is developed and successfully applied for such parts as levers, connecting rods, flat parts.
Abstract: Fixtures play a significant role in ensuring the quality of products in manufacturing engineering. The paper considers fork-type parts that have a complex spatial configuration and needs to be machined by drilling-milling-boring equipment in one setup. In fixture design, it is necessary to provide wide tool accessibility, and therefore the choice of locating surfaces of the workpiece is an important step. The mathematical approach for determining the coordinates of contact points between the workpiece and the locating and clamping elements fixtures in the coordinate system is developed in this paper. The geometric parameters of the workpiece are taken into account in determining the coordinates. It allows to apply the proposed approach for parts of another standard size, but the same design and technological features. The technology of augmented reality is an effective tool at the design stage of fixtures and allows to visualize the developed fixture configurations. This approach has been successfully applied for such parts as levers, connecting rods, flat parts.

22 citations


Journal ArticleDOI

[...]

TL;DR: This paper presents a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aims to shape a coherent picture of the current state-of-the-art efforts in this direction.
Abstract: The Internet of Things (IoTs) enables coupling of digital and physical objects using worthy communication technologies and introduces a future vision where computing systems, users and objects cooperate for convenience and economic benefits. Such a vision requires seamless security, data privacy, authentication and robustness against attacks. These attributes can be introduced by blockchain, a distributed ledger that maintains an immutable log of network transactions. In this paper, we present a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aim to shape a coherent picture of the current state-of-the-art efforts in this direction. After describing the basic characteristics and requirements of IoT, evolution of blockchain is presented. In this regard, we start with the fundamental working principles of blockchain and how such systems achieve auditability, security and decentralization. Further, we describe the most relevant BIoT applications, its architecture design and security aspects. From there, we build our narrative on the centralized IoT challenges followed by recent advances towards solving them. Finally, some future directions are enumerated with the aim to guide future BIoT researchers on challenges that needs to be considered ahead of deploying the next generation of BIoT applications.

22 citations


Journal ArticleDOI

[...]

TL;DR: Using four heuristics, including one novel heuristic, to identify abnormal energy consumption behaviour from data collected from fifty smart meters deployed inside hostels of IIIT-Delhi was investigated and demonstrated that the proposedHeuristics successfully found abnormalEnergy consumption behaviour.
Abstract: Energy consumption is dependent on temperature, humidity, occupancy, occupant type, building area etc. All these factors collectively define the context of an energy meter. Once the context is known, the meters within the same context can be grouped and their behaviour can be analyzed together. This paper presents four heuristics, including one novel heuristic, to identify abnormal energy consumption. Using these heuristics, data collected from fifty smart meters deployed inside hostels of IIIT-Delhi was investigated for abnormal energy consumption detection. The anomalies and possible causes were discussed with IIIT-Delhi campus administrator. Energy consumption per occupant for one of the meters was found four times when compared to rest of the meters. The results demonstrated that the proposed heuristics successfully found abnormal energy consumption behaviour.

19 citations


Journal ArticleDOI

[...]

TL;DR: This study proposes an offloading model for a multi-user MEC system with multi-task, and an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states.
Abstract: Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitation and reduce the communication latency for mobile devices Thereby, in this study, we proposed an offloading model for a multi-user MEC system with multi-task In addition, a new caching concept is introduced for the computation tasks, where the application program and related code for the completed tasks are cached at the edge server Furthermore, an efficient model of task offloading and caching integration is formulated as a nonlinear problem whose goal is to reduce the total overhead of time and energy However, solving these types of problems is computationally prohibitive, especially for large-scale of mobile users Thus, an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states Afterwards, two effective Q-learning and Deep-Q-Network-based algorithms are proposed to derive the near-optimal solution for this problem Finally, experimental evaluations verify that our proposed model can substantially minimize the mobile devices’ overhead by deploying computation offloading and task caching strategy reasonably

17 citations


Journal ArticleDOI

[...]

TL;DR: The proposed architecture is best deployed using low-cost constrained edge devices where a combination of IoT-based paradigm, efficient MQTT communication, and low resources consumption makes the system cost-effective and scalable.
Abstract: This paper presents a novel IoT-based architecture that utilizes IoT hardware, software, and communication technologies to enable real-time monitoring and management of solar photovoltaic systems at large scales. The system enables stakeholders to remotely control and monitor the photovoltaic systems and evaluate the effect of various environmental factors such as weather, air quality, and soiling. The system was implemented and evaluated in terms of network delay and resource consumption. Message Queueing Telemetry Transport (MQTT) was used to facilitate wide-scale real-time communication. The average network delay was found to be less than 1 s, proving the architecture to be ideal for solar and smart grid monitoring systems. As for resource consumption, the evaluation showed the hardware to consume about 3% of the panel’s output, while the application also utilized a very small percentage of the CPU. This led to the conclusion that the proposed architecture is best deployed using low-cost constrained edge devices where a combination of IoT-based paradigm, efficient MQTT communication, and low resources consumption makes the system cost-effective and scalable.

14 citations


Journal ArticleDOI

[...]

TL;DR: In this paper, a review of security issues present on the Internet of Medical Things (IoMT) is presented and the solution of various security issues presented in the exiting works is reviewed.
Abstract: The area of computer science and electronics have merged into one of the most notable technologies called the internet of things (IoT). A wide range of applications offered by IoT, including smart agricultural, smart transportation, smart home, and healthcare. In recent times, the market for IoT in healthcare service has increased exponentially. At the same time, security issues in the system also increase this situation threatening the health and safety of patients. Medical device usage in the hospital like Implantable Medical Devices, Radio Frequency Identification tags, and wearable devices are prone to a severe security vulnerability. This scenario is emphasizing the importance of providing privacy and confidentiality of a patient’s medical information. Therefore, this paper attempts to review security issues present on the Internet of Medical Things (IoMT). Also, this work reviews the solution of various security issues presented in the exiting works. Accordingly, the review revealed that the solution of device-level security issues is desirable. At the same time, moderate level focus only happened in communication level security. In this work, various security issues presented in IoMTs analyzed and different risk factors of security attacks on IoMTs identified. The empirical result shows DDoS in IoMTs dangerous compare with other security issues with 95.00% risk factor and authentication issue in wireless insulin pump 55.00% risk factor. The proposed risk assessment helps to identify the highest impact, causing security attacks in various IoMTs.

13 citations


Journal ArticleDOI

[...]

TL;DR: The main purpose of this research consists on presenting a proposed methodology, based on the study conducted, to enable to further assist either academia or industry to develop new tools, techniques and approaches for integrated process planning in networked manufacturing environments.
Abstract: Integrated process planning and scheduling in networked manufacturing systems plays a crucial role nowadays and in the forthcoming context of Industry 4.0 to enable effective and efficient decisions, and to improve the business market, based on collaboration, along with computer-based distributed manufacturing and management functions. In this paper some insights regarding a literature review carried out about this main subjects analysed are presented and discussed. Moreover, a framework for integrated process planning and scheduling in networked manufacturing systems is proposed and briefly described, along with some main underlying issues, which are further discussed. Thus, the main purpose of this research consists on presenting a proposed methodology, based on the study conducted, to enable to further assist either academia or industry to develop new tools, techniques and approaches for integrated process planning in networked manufacturing environments. The findings and contributions of this research can help in the implementation and improvement in distributed manufacturing environments, to be linked with small and medium enterprises, to further expand their potentialities through well suited integrated process planning and scheduling decision making processes.

Journal ArticleDOI

[...]

TL;DR: A new virtual machine (VM) consolidation technique called Nature-inspired Meta-heuristic Threshold based firefly optimized lottery scheduling (NMT-FOLS) Technique is proposed, which gets better task scheduling performance to balance normal, timely and bursty workloads in CS with lesser time.
Abstract: Scheduling is a considerable problem in cloud to increase the quality of service provisioning with higher resource efficiency. The conventional task scheduling algorithms designed for balancing load in a cloud environment. But, minimizing the Service level agreement (SLA) violation, resource wastage and the energy consumption during the task scheduling process was not solved effectively. In order to resolve these limitations, a new virtual machine (VM) consolidation technique called Nature-inspired Meta-heuristic Threshold based firefly optimized lottery scheduling (NMT-FOLS) Technique is proposed. Initially, user requests are transmitted to the cloud server (CS). Next, NMT-FOLS Technique utilizes Adaptive Regressive Holt–Winters Workload Predictor to discover the workload state as normal or timely or bursty. Using the workload predictor result, NMT-FOLS Technique exploits task scheduler to allocate user requested tasks to optimal VMs. NMT-FOLS Technique applies multi-objective firefly optimization based task scheduling algorithm in normal workload state and multi-objective firefly optimized lottery scheduling algorithm in timely and bursty workload situations. At last, the selected scheduling algorithm in NMT-FOLS Technique assigns the user requested task to best VMs in CS to perform the demanded services. Hence, NMT-FOLS Technique gets better task scheduling performance to balance normal, timely and bursty workloads in CS with lesser time. NMT-FOLS Technique decreases the SLA violation in cloud through scheduling of user tasks to optimal VM. NMT-FOLS performs an experimental process using metrics such as SLA violation, task scheduling efficiency (TSE), makespan, energy utilization and memory usage with number of user-requested tasks over the considered Amazon dataset. From the experimental result, the NMT-FOLS technique improves scheduling efficiency up to 94.6% and reduces the SLA violations and energy utilization from different test cases on an average to 78%, and 63% compared to state-of-the-art works.

Journal ArticleDOI

[...]

TL;DR: The proposed µGA-LEACH protocol, strengthen the cluster head (CH) selection and also reduce the energy consumption of the network when compared to existing protocols, which is a combination of Micro Genetic algorithm with LEACH protocol.
Abstract: This article presents the design, analyses and implementation of the novel routing protocol for energy optimization based on LEACH for WSN. Network Lifetime is the major problem in various routing protocols used in WSN. In order to overcome that problem, our proposed routing protocol is developed, which is a combination of Micro Genetic algorithm with LEACH protocol. Our proposed µGA-LEACH protocol, strengthen the cluster head (CH) selection and also reduce the energy consumption of the network when compared to existing protocols. This paper shows the improvement of network lifetime and energy consumption with the optimal CH selection based on a micro genetic algorithm and also compared the results with an existing hierarchical routing protocol like LEACH, LEACH-C, LEACH GA and GADA LEACH routing protocol with various packet sizes, and initial energy.

Journal ArticleDOI

[...]

TL;DR: This paper describes an accurate and efficient way confirmed by simulation to calculate the probability of collision rate and packet loss in LPWANs under various circumstances and proposes a distance spreading factor algorithm according to the distance of the end nodes from the gateway to reduce the probabilities of collision.
Abstract: The massive increase in the Internet of Things (IoT) has brought a diverse long-range, low-power, and low bit-rate wireless network technologies. The LoRa a low-power wide area network (LPWAN) gained popularity as radio technology for the realization of many IoT applications. LoRa is typically employed together with LoRaWAN MAC protocol and operates in the license-free ISM bands. LoRa networks have an issue with scalability when the number of end nodes connected to one network is larger than the shared number of channels, that causes a collision and packets loss through receiving a wide range of different message sizes from various application. In this paper, we describe an accurate and efficient way confirmed by simulation to calculate the probability of collision rate and packet loss in LPWANs under various circumstances. Moreover, based on the LoRaWAN specification, we consider a dense network deployment of IoT devices. In the event of collisions, our proposed algorithms is classified to two approaches. Firstly a time scheduling algorithm is proposed for LoRaWAN networks that consist of devices supporting LoRaWAN class C mode for synchronization in the beginning between the gateway and the end nodes. Afterwards these devices switch to class A to significantly decrease the collision and to enhance scalability by assigning a Guard Time to each end node. Gateway acknowledgment (ACK) messages to the end nodes are used through class C. Secondly, we also propose a distance spreading factor algorithm according to the distance of the end nodes from the gateway to reduce the probability of collision. Furthermore, many of these devices are battery powered, therefore low power consumption is required.

Journal ArticleDOI

[...]

TL;DR: The compact slotted antenna having offset feed radiating in the multi-frequency bands is proposed, having omnidirectional and bidirectional radiation patterns, hence, making it suitable for various wireless applications.
Abstract: The compact slotted antenna having offset feed radiating in the multi-frequency bands is proposed. The antenna geometry comprises of a vertical and horizontally coupled slotted structure at the top with a complete ground plane at the bottom to achieve the proposed application bands. The patch is patterned on the FR4 substrate having a dielectric constant of 4.4 and loss tangent of 0.008. The antenna has an overall dimension of 0.18λ × 0.15λ mm2 (f = 1.52 GHz) with offset fed which is optimized to achieve 50 Ω impedance matching. The proposed compact antenna resonates in pentaband frequency bands which includes 1.52–1.60 GHz for GPS (ISM band in India), 2.97–3.02 GHz for Radio frequency identification and detection, mobile communication, logistics, manufacturing, transportation and healthcare, 3.73–3.84 GHz for Amateur Fixed Mobile except aeronautical mobile (R), 4.42–4.52 GHz for radio communications, TransferJet USB Adapter (Toshiba Corporation), and 4.83–4.96 GHz for Aviation Private Land Mobile applications. The proposed antenna has demonstrated a decent gain ranging from 1.07 to 3.92 dBi having omnidirectional and bidirectional radiation patterns, hence, making it suitable for various wireless applications.

Journal ArticleDOI

[...]

TL;DR: The Analytic Hierarchy Process as a tool of exact decision-making methods increases the objectivity of decision in general as well as the quality of suitable handling equipment selection in a particular industrial enterprise.
Abstract: The paper deals with handling equipment that can be used to transport/handle the final products in a selected industrial enterprise. The suitable handling equipment listed in the short-listwereselected by the authors of the paper based on the entry requirements and conditions of the enterprise and trends in material/final product handling towards increasing automation, enhancing productivity and maximizing safety. The Analytic Hierarchy Process method was used to support decision making on the appropriate handling equipment and specific calculations were carried out in the Expert Choice program. The Analytic Hierarchy Process as a tool of exact decision-making methods increases the objectivity of decision in general as well as the quality of suitable handling equipment selection in a particular industrial enterprise. One of the conditions of the enterprise for the equipment selection was the use of Intelligent/Smart solutions in the process of finished goods handling from the manufacturing area to warehouse.

Journal ArticleDOI

[...]

TL;DR: The contributions of the study are to identify the extant electricity market designs and architectures as centralized and pseudo-decentralized while proposing a fully decentralized architecture enabled by the blockchain, and introduces the value configuration/architecture approach for the energy market and business model domains.
Abstract: Enabling and empowering the diverse energy resources to have active yet efficient participation in the smart grid and energy market is an unrivaled challenge for the energy industry. This research expands the four dominant archetypes of business models in the energy and electricity market, creating a fifth archetype, the “blockchain marketplace”. The contributions of the study are to identify the extant electricity market designs and architectures as centralized and pseudo-decentralized while proposing a fully decentralized architecture enabled by the blockchain. The research contributes to the literature of smart grids and demand-side management and introduces the value configuration/architecture approach for the energy market and business model domains.

Journal ArticleDOI

[...]

TL;DR: A new framework of localization for displaced sensor nodes is proposed using DV-Hop localization methods using particle swarm optimization (PSO) and radio irregularity model is considered to show the applicability of proposed algorithm in anisotropic network.
Abstract: Localization of sensor nodes is one of the major challenge in wireless sensor networks. It helps in identifying the geographically area where an event occurred. Most of the cases it is one time process wherein nodes are localized once in network life time. However, in real time scenario nodes may get dislocated within the network due to land slide or any event occurrence. In such events, localization of these sensor nodes is required. In this paper, we have proposed a new framework of localization for displaced sensor nodes. The proposed framework consider DV-Hop localization methods using particle swarm optimization (PSO). Radio irregularity model is also considered to show the applicability of proposed algorithm in anisotropic network. Simulation results show that our proposed localization framework effectively minimizes the elapsed time, localization error and energy consumption as compared to traditional framework of PSO DV-Hop.

Journal ArticleDOI

[...]

TL;DR: A support vector machine based multi-class classifier is adopted, the parameter tunning and cross-validation are designed, and an admission control algorithm that could get rid off the domino effect of the EDF is given.
Abstract: Mobile edge computing (MEC) is an emerging technology recognized as an effective solution to guarantee the Quality of Service for computation-intensive and latency-critical traffics. In MEC system, the mobile computing, network control and storage functions are deployed by the servers at the network edges (e.g., base station and access points). One of the key issue in designing the MEC system is how to allocate finite computational resources to multi-users. In contrast with previous works, in this paper we solve this issue by combining the real-time traffic classification and CPU scheduling. Specifically, a support vector machine based multi-class classifier is adopted, the parameter tunning and cross-validation are designed in the first place. Since the traffic of same class has similar delay budget and characteristics (e.g. inter-arrival time, packet length), the CPU scheduler could efficiently scheduling the traffic based on the classification results. In the second place, with the consideration of both traffic delay budget and signal baseband processing cost, a preemptive earliest deadline first (EDF) algorithm is deployed for the CPU scheduling. Furthermore, an admission control algorithm that could get rid off the domino effect of the EDF is also given. The simulation results show that, by our proposed scheduling algorithm, the classification accuracy for specific traffic class could be over 82 percent, meanwhile the throughput is much higher than the existing scheduling algorithms.

Journal ArticleDOI

[...]

TL;DR: An efficient affine cipher-based encryption technique is proposed in this paper to offer a high level of confidentiality with smaller key size compared to existing encryption techniques to ensure that it provides better security.
Abstract: Wireless body area network (WBAN) is utilized in various healthcare applications due to its ability to provide suitable medical services by exchanging the biological data between the patient and doctor through a network of implantable or wearable medical sensors connected in the patients’ body. The collected data are communicated to the medical personals through open wireless channels. Nevertheless, due to the open wireless nature of communication channels, WBAN is susceptible to security attacks by malicious users. For that reason, secure anonymous authentication and confidentiality preservation schemes are essential in WBAN. Authentication and confidentiality play a significant role while transfers, medical images securely across the network. Since medical images contain highly sensitive information, those images should be transferred securely from the patients to the doctor and vice versa. The proposed anonymous authentication technique helps to ensure the legitimacy of the patient and doctors without disclosing their privacy. Even though various cryptographic encryption techniques such as AES and DES are available to provide confidentiality, the key size and the key sharing are the main problems to provide a worthy level of security. Hence, an efficient affine cipher-based encryption technique is proposed in this paper to offer a high level of confidentiality with smaller key size compared to existing encryption techniques. The security strength of the proposed work against various harmful security attacks is proven in security analysis section to ensure that it provides better security. The storage cost, communication cost and computational cost of the proposed scheme are demonstrated in the performance analysis section elaborately. In connection to this, the computational complexity of the proposed scheme is reduced around 29% compared to the existing scheme.

Journal ArticleDOI

[...]

TL;DR: The implementation results shows that the proposed A-EEBLR approach outperforms the existing A-ESR approach when evaluated by varying the number of packets, number of nodes and node mobility.
Abstract: Ant colony optimization, a swarm intelligence technique, inspired by the foraging behavior of ants in colonies was used in the past research works to compute the optimal path. The existing works of routing using ant colony optimization of MANETS face challenges in load balancing and energy efficiency. The proposed A-EEBLR approach chooses the next hop node based on metrics like delay, energy drain rate, congestion, link quality. Based on these metrics the probability of choosing next hop node as neighbor node is determined. The next hop probability determines the forward and backward ant agents to establish multiple paths among which the most optimal path is selected for transmission. The implementation results shows that the proposed A-EEBLR approach outperforms the existing A-ESR approach when evaluated by varying the number of packets, number of nodes and node mobility.

Journal ArticleDOI

[...]

TL;DR: A comprehensive view is provided upon various aspects of RRM, its challenges, existing solutions and directions for research to find and develop smarter and more adaptive schemes for future.
Abstract: Radio resource and its management is one of the key areas of research where technologies, infrastructure and challenges are rapidly changing as 5G system architecture demands a paradigm shift. The previous generation communication technologies require customizations and upgrades as 5G will remain inclusive for significantly long duration. Radio resource management (RRM) schemes that are evolved during LTE/LTE-A network environment period will remain relevant for 5G, however, these schemes must become more intelligent and adaptive for future as features and requirements of network and users will be diverse and highly demanding. In this paper, a comprehensive view is provided upon various aspects of RRM, its challenges and existing schemes. The existing RRM schemes are presented with their respective architecture which has significant impact on the approaches. The problem of RRM is multi-dimensional and different dimensions are presented with their respective solutions such as interference or energy management. In this paper study of legacy and state of the art RRM schemes is presented with their features and inefficiencies in the modern telecommunication era of heterogeneous, ultra-dense, very low latency and highly reliable mobile network. In addition to this various comparison among approaches and schemes are presented for analyzing the solutions. The need of RRM solution is critical and this paper aim is to outline the challenges, existing solutions and directions for research to find and develop smarter and more adaptive schemes for future.

Journal ArticleDOI

[...]

TL;DR: The proposed protocol is extremely effective to secure the sensing information of the device node wherever they are moving and additionally, it is accustomed to offer secure data transmission between the node and web client.
Abstract: Today, Wireless Sensor Network (WSN) is widely used for general purposes. With the propagation of the Internet of Things (IoT), security issues arise wherever the healthcare devices are used exclusively for data transfer protocols. These network protocols are easily susceptible to attack. Although it is problematic to save sensing information from the body sensors, the loss of signal messages will often occur in an IoT environment. Thus security is a supreme requirement in health care applications, especially in the case of patient privacy. In this paper, an IoT health care communication system is designed to implement the integration using CoAP based Secure-aware Mobility Management Protocol (CoSMP) in Wireless Body Area Network (WBAN) based IoT environment. The proposed protocol is extremely effective to secure the sensing information of the device node wherever they are moving and additionally, it is accustomed to offer secure data transmission between the node and web client. Our protocol establishes a pairwise key between the networks according to an exact algorithm, namely Advanced Encryption Standard Cipher Feedback Message Authentication Code (AES-CFMAC) algorithm, and handover operation could be authenticated by Elliptic Curve Digital Signature Algorithm (ECDSA). Numerical analysis and performance result imposes the proposed scheme is simulated in terms of network delay and handover delay. Experimental results depict that the proposed protocol has been compared with the previous protocol in terms of security and mobility management. Hence, the numerical result would be evaluated based on the measures of Total Transmission Delay (TTD) on the variation of wireless link delay, sensor node delay, link failure probability delay, hop count between the gateway and WMMS in the network delay with the low delay of 303.55, 1.6, 700 and 80 in ms respectively and also performance measures of Handover Delay (HD) achieves 1212.5, 1.212, 49.46 and 1453.8 in ms respectively. The percentage in terms of using performance measures of TTD and HD is compared between proposed and existing schemes resulted in (COMP = 0.3632%, COMP-G = 0.2712 % and COSMP = 0.2532%) and (COMP = 0.3188%, COMP-G = 0.2421 % and COSMP = 0.2133%) respectively.

Journal ArticleDOI

[...]

TL;DR: This work builds a network of smart nodes where each node comprises a Radio-Frequency Identification (RFID) tag, reduced function RFID reader (RFRR), and sensors, and two levels of security algorithms, including an AES 128 bit with hashing, have been implemented.
Abstract: COVID-19 surprised the whole world by its quick and sudden spread. Coronavirus pushes all community sectors: government, industry, academia, and nonprofit organizations to take forward steps to stop and control this pandemic. It is evident that IT-based solutions are urgent. This study is a small step in this direction, where health information is monitored and collected continuously. In this work, we build a network of smart nodes where each node comprises a Radio-Frequency Identification (RFID) tag, reduced function RFID reader (RFRR), and sensors. The smart nodes are grouped in clusters, which are constructed periodically. The RFRR reader of the clusterhead collects data from its members, and once it is close to the primary reader, it conveys its data and so on. This approach reduces the primary RFID reader’s burden by receiving data from the clusterheads only instead of reading every tag when they pass by its vicinity. Besides, this mechanism reduces the channel access congestion; thus, it reduces the interference significantly. Furthermore, to protect the exchanged data from potential attacks, two levels of security algorithms, including an AES 128 bit with hashing, have been implemented. The proposed scheme has been validated via mathematical modeling using Integer programming, simulation, and prototype experimentation. The proposed technique shows low data delivery losses and a significant drop in transmission delay compared to contemporary approaches.

Journal ArticleDOI

[...]

TL;DR: An adaptive flower pollination algorithm (AFPA) with enhanced exploration and exploitation capabilities of conventional FPA for the localization of sensor nodes in WSN is proposed and results show that proposed AFPA outperforms in terms of convergence speed and provides better results for most of the benchmark functions.
Abstract: Localization in wireless sensor networks (WSNs) is required to examine the coordinates of the sensor nodes deployed in the sensing field. It is the process that determines the location of the target nodes relative to the location of deployed anchor nodes. The anchor nodes positions are known as the nodes that have GPS unit incorporated with them. All sensor nodes are generally not configured with GPS as it is not suitable for indoor environments and/or underwater areas. A network becomes more expensive and utilizes more energy if all nodes are equipped with GPS that is a major drawback of WSNs. Various localization schemes have been proposed in literature, while most research proposals deal with the study of 2D applications. However, in the 3D applications, the area under observation may have a complexity in the sensing environment. An optimized algorithm is required for the determination of node location in 3D environment. In this paper, we propose an adaptive flower pollination algorithm (AFPA) with enhanced exploration and exploitation capabilities of conventional FPA for the localization of sensor nodes in WSN. To test the performance of AFPA, benchmark functions (CEC 2019) are used to compare it with other meta-heuristics. The results show that proposed AFPA outperforms in terms of convergence speed and provides better results for most of the benchmark functions. Also, the proposed AFPA is tested on WSN Localization problem, it provides least localization error in comparison to other techniques applied in 3D WSN environments.

Journal ArticleDOI

[...]

TL;DR: The proposed metamaterial superstrate microstrip antenna design with PIN diodes can become a building block for C/X/Ku-band wireless network devices and show multiband and high gain behavior for metamMaterial superstrate designs.
Abstract: We present a metamaterial superstrate based microstrip patch antenna with PIN diode switches applicable for wireless network applications. Metamaterials in the form of square array and circle array are used as superstrate based on microstrip antenna. The superstrate layers are also working as radome and provide strength to the overall structure and improve different antenna parameters like gain and bandwidth. The design results in the form of reflection coefficient (S11), gain, and bandwidth are compared for different metamaterial superstrate. The reconfiguration in frequency is also achieved by adding PIN diode switches in the metamaterial superstrate. The design results show multiband and high gain behavior for metamaterial superstrate designs. We have also analyzed the effect of using liquid metamaterial superstrate on microstrip antenna design. The design results of liquid metamaterial superstrate design are also compared with copper material superstrate design and simple microstrip patch antenna design. The proposed metamaterial superstrate microstrip antenna design with PIN diodes can become a building block for C/X/Ku-band wireless network devices.

Journal ArticleDOI

[...]

TL;DR: A Mercedes-Benz logo antenna with a metal plate located at an optimized distance from the proposed antenna is introduced as a wearable antenna to operate in the industrial, scientific, and medical band with center frequency of 2.45 GHz.
Abstract: In this paper, a Mercedes-Benz logo antenna with a metal plate located at an optimized distance from the proposed antenna is introduced as a wearable antenna to operate in the industrial, scientific, and medical band with center frequency of 2.45 GHz. The metal plate is integrated with the antenna as an isolator and a reflector to improve the radiation performance of the proposed design, reduce the back radiation and reduce the specific absorption rate, when loaded on the human body. The front-to-back ratio improves by 18.2 dB, by adding a metal plate to the structure. The proposed antenna with coplanar waveguide-fed with dimensions of 35 mm × 35 mm × 0.508 mm is printed on a Rogers 4003C substrate, and has an impedance bandwidth from 2.20 to 2.56 GHz, the gain of 7.3 dBi at 2.45 GHz, and SAR levels is less than the criteria set by the FCC and ICNIRP. Nowadays, attention to health as product quality assurance factor along with other technical specifications is the requirements of industrial productions, especially in competition with superior brands. Based on comparisons made with similar works, the proposed wearable antenna structure can be used for wireless body area network.

Journal ArticleDOI

[...]

TL;DR: Main objective of research was set as confirmation of hypotheses, that enterprise information system has impact on selected key performance indicators like cost and profit in construction project management.
Abstract: Business results and enterprise performance depends on various factors. First of all, there are primarily human resources and their knowledge, skills and competencies. Managerial decisions supported by progressive technology are other important factor. These decisions are often done based on reports and analyses with help of enterprise information systems. The proper complementation of new technology and management system can be achieved a significant impact on key performance indicators and results of enterprises and projects. Implementation of new technology such as enterprise information system should be an asset for the enterprise. Cost and profit are one of the elementary key performance indicators. Measurement of its impact on business results are very important for construction project management. There is assumption, that exploitation of enterprise information system has effects on cost and profit in construction project management. Research discusses issue of enterprise information system impact on key performance indicators in construction project management. Research sample included results of construction projects in Slovak construction industry. Main objective of research was set as confirmation of hypotheses, that enterprise information system has impact on selected key performance indicators like cost and profit.


Journal ArticleDOI

[...]

TL;DR: In this article, the authors present the state-of-the-art communication technologies that can meet the communication requirements of the smart grid CPS (SG-CPS) applications.
Abstract: The recent developments in embedded system design and communication technologies popularized the adaption of the cyber-physical system (CPS) for practical applications. A CPS is an amalgamation of a physical system, a cyber system, and their communication network. The cyber system performs extensive computational operations on the data received from the physical devices, interprets the data, and initiates effective control actions in real-time. One such CPS is the smart grid CPS (SG-CPS) consisting of physical devices with diverse communication requirements, and intermediate communication networks. Thus, reliable communication networks are paramount for the effective operation of the SG-CPS. This paper is an elaborate survey on the communication networks from the perspective of the SG-CPS. This paper presents the state-of-art communication technologies that can meet the communication requirements of the various SG-CPS applications. The communications standards and communication protocols are also comprehensively discussed. A systematic mapping among communication technologies, standards, and protocols for various SG-CPS applications has been presented based on an extensive literature survey in this paper. Furthermore, several challenges, such as security, safety, reliability and resilience, etc., have been addressed from SG-CPS’s perspective. This work also identifies the research gaps in the various domains of the SG-CPS that can be of immense benefit to the research community.