Fog computing (FC) is an evolving computing technology that operates in a distributed environment. FC aims to bring cloud computing features close to edge devices. The approach is expected to fulfill ...the minimum latency requirement for healthcare Internet-of-Things (IoT) devices. Healthcare IoT devices generate various volumes of healthcare data. This large volume of data results in high data traffic that causes network congestion and high latency. An increase in round-trip time delay owing to large data transmission and large hop counts between IoTs and cloud servers render healthcare data meaningless and inadequate for end-users. Time-sensitive healthcare applications require real-time data. Traditional cloud servers cannot fulfill the minimum latency demands of healthcare IoT devices and end-users. Therefore, communication latency, computation latency, and network latency must be reduced for IoT data transmission. FC affords the storage, processing, and analysis of data from cloud computing to a network edge to reduce high latency. A novel solution for the abovementioned problem is proposed herein. It includes an analytical model and a hybrid fuzzy-based reinforcement learning algorithm in an FC environment. The aim is to reduce high latency among healthcare IoTs, end-users, and cloud servers. The proposed intelligent FC analytical model and algorithm use a fuzzy inference system combined with reinforcement learning and neural network evolution strategies for data packet allocation and selection in an IoT-FC environment. The approach is tested on simulators iFogSim (Net-Beans) and Spyder (Python). The obtained results indicated the better performance of the proposed approach compared with existing methods.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Vehicular ad-hoc networks (VANETs) play an important role in intelligent transportation systems for improving security and efficiency. However, due to dynamic characteristics of the vehicular ...environment, routing remains a significant challenge in the VANETs. While single-layer routing protocols based on the traditional layered open systems interconnection (OSI) model are readily available, they often do not make use of important parameters at the lower three layers of the OSI model when making routing decision. Hence, for making optimal routing decision to gain superior network performance, there is a need to design cross-layer routing that allows information exchange between layers. In this article, a survey of the existing single-layer and cross-layer routing techniques in VANETs is presented, emphasizing on cross-layer routing protocols that utilize information at the physical, medium access control and network layers as routing parameters. An overview and challenges of routing are given, followed by a brief discussion of single-layer routing with more focus on geographic routing. Cross-layer routing protocols are then discussed in detail. The article then elaborates on some advantages and disadvantages of the existing routing approaches, cross-layer routing parameter selection and cross-layer design issues. Finally, some open research challenges in developing efficient routing protocols in the VANETs are highlighted.
Internet of Things (IoT) is the paramount virtual network that enables remote users to access connected multimedia devices. It has dragged the attention of the community because it encompasses ...real-world scenarios with implicit environs. Despite several beneficial aspects, IoT is surrounded by provocations for successful implementation, as data travels in different layers. One of the critical challenges is the security of the data in these layers. Researchers conducted numerous studies focusing on the level of security at a single technique, creating loopholes to address the entire scenario of securing an IoT network. This study aims to comprehensively review current security issues, wireless communication techniques, and technologies for securing IoT. This work's utmost significance is addressing all the security perspectives at a glance. For this purpose, research contributions from the previous years are investigated for better understanding. Some countermeasures and snags from security perspectives have also been analyzed in detail concerning the current industry trends. Blockchain, machine learning, fog, and edge computing are possible solutions to secure IoT. After studying these techniques and their immunity to attacks, machine learning can become a hope if incorporated with end-to-end security. This comprehensive review will provide adequate understanding and knowledge in defining security lines of action for the successful implementation of IoT.
Receiver-based routing protocols are well suited for the Vehicular Ad-hoc Networks (VANETs) due to their ability that can make a routing decision on the fly. Forwarding zone is one of the key ...features in the receiver-based routing protocols in which a forwarding angle associated with a forwarding zone has a significant impact on the routing performance. However, the existing studies in this area have not focused much on the impact of a forwarding angle to the performance of the receiver-based routing protocols. This article presents a receiver-based routing protocol called Content-Based Beaconless Forwarding (CBBF) that utilizes the content in the header of a data packet while performing the routing operation. Specifically, CBBF uses location information to set a forwarding zone and the waiting time criterion. At the same time, other fields of the data packet's header are utilized to facilitate various mechanisms involved in the operation of CBBF. The impact of varying forwarding angles on the performance of CBBF is then studied and analyzed via simulations using QualNet. The simulations are carried out by varying the source transmission rate, node density and node velocity. The performance is evaluated in terms of packet delivery ratio (PDR), average end-to-end (ETE) delay and packet redundancy coefficient (PRC). From the simulation results, the CBBF with a forwarding angle of 60° offers the best trade-off between reliability, latency and unicast efficiency.
Remote monitoring applications in urban vehicular ad-hoc networks (VANETs) enable authorities to monitor data related to various activities of a moving vehicle from a static infrastructure. However, ...urban environment constraints along with various characteristics of remote monitoring applications give rise to significant hurdles while developing routing solutions in urban VANETs. Since the urban environment comprises several road intersections, using their geographic information can greatly assist in achieving efficient and reliable routing. With an aim to leverage this information, this article presents a receiver-based data forwarding protocol, termed Intersection-based Link-adaptive Beaconless Forwarding for City scenarios (ILBFC). ILBFC uses the position information of road intersections to effectively limit the duration for which a relay vehicle can stay as a default forwarder. In addition, a winner relay management scheme is employed to consider the drastic speed decay in vehicles. Furthermore, ILBFC is simulated in realistic urban traffic conditions, and its performance is compared with other existing state-of-the-art routing protocols in terms of packet delivery ratio, average end-to-end delay and packet redundancy coefficient. In particular, the results highlight the superior performance of ILBFC, thereby offering an efficient and reliable routing solution for remote monitoring applications.
A wireless sensor network (WSN) deploys hundreds or thousands of nodes that may introduce large-scale data over time. Dealing with such an amount of collected data is a real challenge for ...energy-constraint sensor nodes. Therefore, numerous research works have been carried out to design efficient data clustering techniques in WSNs to eliminate the amount of redundant data before transmitting them to the sink while preserving their fundamental properties. This paper develops a new error-aware data clustering (EDC) technique at the cluster-heads (CHs) for in-network data reduction. The proposed EDC consists of three adaptive modules that allow users to choose the module that suits their requirements and the quality of the data. The histogram-based data clustering (HDC) module groups temporal correlated data into clusters and eliminates correlated data from each cluster. Recursive outlier detection and smoothing (RODS) with HDC module provides error-aware data clustering, which detects random outliers using temporal correlation of data to maintain data reduction errors within a predefined threshold. Verification of RODS (V-RODS) with HDC module detects not only random outliers but also frequent outliers simultaneously based on both the temporal and spatial correlations of the data. The simulation results show that the proposed EDC is computationally cheap, able to reduce a significant amount of redundant data with minimum error, and provides efficient error-aware data clustering solutions for remote monitoring environmental applications.
The optimal performance of a wireless mesh network (WMN) can be greatly improved by strategically placing wireless mesh routers. As a result, it is crucial to optimally locate the WMN routers for ...better coverage and connectivity. Besides the optimal placement, the network congestion due to overlaying routers has to be taken into consideration. These issues have become a motivation for researchers to identify a variety of approaches to optimize WMN performance. Multiple metaheuristic algorithms have been employed for identifying the trade-offs between coverage and connectivity in WMN. Consequently, a novel hybrid Harris Hawks optimization with the sine cosine algorithm (HHOSCA) is presented in this work to tackle the aforementioned WMN optimization problems. The proposed HHOSCA seeks optimal router placement that leads to significantly increased network coverage and achieves full connectivity between the mesh routers. In addition, the proposed HHOSCA produces a cost-effective WMN by reducing the congestion in the network to the minimum number of routers whilst ensuring maximum coverage and connectivity. The superiority of the proposed HHOSCA in comparison to the other algorithm was validated by using 33 benchmark functions. It was compared against four well-known algorithms including Sine Cosine Algorithm (SCA), Harris Hawks optimization (HHO), Gray Wolf Optimization (GWO), and Particle Swarm Optimization (PSO). These algorithms are statistically analyzed and compared to the simulated results of the proposed method. In addition, the performance of HHOSCA is compared to the state-of-the-art to highlight the efficacy of the proposed algorithm. The statistical analyses and simulation findings confirm that the HHOSCA outperforms the other algorithms in terms of network connectivity, coverage, network reduction, and convergence. The experimental results reveal that the proposed HHOSCA method achieves favourable optimization results compared with other relevant methods.
Communication in industrial wireless networks necessitates reliability and precision. Besides, the existence of interference or traffic in the network must not affect the estimated network ...properties. Therefore, data packets have to be sent within a certain time frame and over a reliable connection. However, the working scenarios and the characteristics of the network itself make it vulnerable to node or link faults, which impact the transmission reliability and overall performance. This article aims to introduce a developed multipath routing model, which leads to cost-effective planning, low latency and high reliability of industrial wireless mesh networks, such as the WirelessHART networks. The multipath routing model has three primary paths, and each path has a backup node. The backup node stores the data transmitted by the parent node to grant communication continuity when primary nodes fail. The multipath routing model is developed based on optimal network planning and deployment algorithm. Simulations were conducted on a WirelessHART simulator using Network Simulator (NS2). The performance of the developed model is compared with the state-of-the-art. The obtained results reveal a significant reduction in the average network latency, low power consumption, better improvement in expected network lifetime, and enhanced packet delivery ratio which improve network reliability.
Evaporation ducts (ED), which are caused by a rapid decrease in the refractive index of the lower atmosphere, are known to trap radio waves between the evaporation duct layer and the sea surface. ...Although signal propagation and refractivity estimation in evaporation ducts have been well studied, the fading characteristics of ED must be accurately established to help determine fade margin, required for a reliable wireless communication link. In this paper, based on the percentage of occurrences of evaporation ducts, that have been measured and reported in the literature, the statistical distribution of path loss in the South China Sea is calculated for varying distances. These path loss distributions are weather-dependent and time-varying and define several slow time-varying fading characteristics. These slow fading characteristics are, what can be termed as log-lognormal in nature. Propagation in ED, being non-line-of-sight, also has a fast-fading component that is Rayleigh in nature. Once, the complete fading characteristics are known, the overall fade margin due in part; to both slow fading and fast fading can be obtained. For a distance of 100 km, approximately 99% availability can be obtained with an 88-dB fade margin while for a shorter distance of 50 km, the required total margin for 99% availability is only 50-dB.
Internet of Health Things (IoHT) involves intelligent, low-powered, and miniaturized sensors nodes that measure physiological signals and report them to sink nodes over wireless links. IoHTs have a ...myriad of applications in e-health and personal health monitoring. Because of the data's sensitivity measured by the nodes and power-constraints of the sensor nodes, reliability and energy-efficiency play a critical role in communication in IoHT. Reliability is degraded by the increase in packets' loss due to inefficient MAC, routing protocols, environmental interference, and body shadowing. Simultaneously, inefficient node selection for routing may cause the depletion of critical nodes' energy resources. Recent advancements in cross-layer protocol optimizations have proven their efficiency for packet-based Internet. In this article, we propose a MAC/Routing-based Cross-layer protocol for reliable communication while preserving the sensor nodes' energy resource in IoHT. The proposed mechanism employs a timer-based strategy for relay node selection. The timer-based approach incorporates the metrics for residual energy and received signal strength indicator to preserve the vital underlying resources of critical sensors in IoHT. The proposed approach is also extended for multiple sensor networks, where sensor in vicinity are coordinating and cooperating for data forwarding. The performance of the proposed technique is evaluated for metrics like Packet Loss Probability, End-To-End delay, and energy used per data packet. Extensive simulation results show that the proposed technique improves the reliability and energy-efficiency compared to the Simple Opportunistic Routing protocol.