105 research outputs found

    A Game Theoretic Optimization of RPL for Mobile Internet of Things Applications

    Get PDF
    The presence of mobile nodes in any wireless network can affect the performance of the network, leading to higher packet loss and increased energy consumption. However, many recent applications require the support of mobility and an efficient approach to handle mobile nodes is essential. In this paper, a game scenario is formulated where nodes compete for network resources in a selfish manner, to send their data packets to the sink node. Each node counts as a player in the noncooperative game. The optimal solution for the game is found using the unique Nash equilibrium (NE) where a node cannot improve its pay-off function while other players use their current strategy. The proposed solution aims to present a strategy to control different parameters of mobile nodes (or static nodes in a mobile environment) including transmission rate, timers and operation mode in order to optimize the performance of RPL under mobility in terms of packet delivery ratio (PDR), throughput, energy consumption and end-to-end-delay. The proposed solution monitors the mobility of nodes based on received signal strength indication (RSSI) readings, it also takes into account the priorities of different nodes and the current level of noise in order to select the preferred transmission rate. An optimized protocol called game-theory based mobile RPL (GTM-RPL) is implemented and tested in multiple scenarios with different network requirements for Internet of Things applications. Simulation results show that in the presence of mobility, GTM-RPL provides a flexible and adaptable solution that improves throughput whilst maintaining lower energy consumption showing more than 10% improvement compared to related work. For applications with high throughput requirements, GTM-RPL shows a significant advantage with more than 16% improvement in throughput and 20% improvement in energy consumption

    Data Routing for Mobile Internet of Things Applications

    Get PDF
    The Internet of things (IoT) represents a new era of networking, it envisions the Internet of the future where objects or “Things” are seamlessly connected to the Internet providing various services to the community. Countless applications can benefit from these new services and some of them have already come to life especially in healthcare and smart environments. The full realization of the IoT can only be achieved by having relevant standards that enable the integration of these new services with the Internet. The IEEE 802.15.4, 6LoWPAN and IPv6 standards define the framework for wireless sensor networks (WSN) to run using limited resources but still connect to the Internet and use IP addresses. The Internet engineering task force (IETF) developed a routing protocol for low-power and lossy networks (LLN) to provide bidirectional connectivity throughout the network, this routing protocol for LLNs (RPL) was standardized in RFC6550 in 2012 making it the standard routing protocol for IoT. With all the bright features and new services that come with the futuristic IoT applications, new challenges present themselves calling for the need to address them and provide efficient approaches to manage them. One of the most crucial challenges that faces data routing is the presence of mobile nodes, it affects energy consumption, end-to-end delay, throughput, latency and packet delivery ratio (PDR). This thesis addresses mobility issues from the data routing point of view, and presents a number of enhancements to the existing protocols in both mesh-under and route-over routing approaches, along with an introduction to relevant standards and protocols, and a literature review of the state of the art in research. A dynamic cluster head election protocol (DCHEP) is proposed to improve network availability and energy efficiency for mobile WSNs under the beacon-enabled IEEE 802.15.4 standard. The proposed protocol is developed and simulated using CASTALIA/OMNET++ with a realistic radio model and node behaviour. DCHEP improves the network availability and lifetime and maintains cluster hierarchy in a proactive manner even in a mobile WSN where all the nodes including cluster heads (CHs) are mobile, this is done by dynamically switching CHs allowing nodes to act as multiple backup cluster heads (BCHs) with different priorities based on their residual energy and connectivity to other clusters. DCHEP is a flexible and scalable solution targeted for dense WSNs with random mobility. The proposed protocol achieves an average of 33% and 26% improvement to the availability and energy efficiency respectively compared with the original standard. Moving to network routing, an investigation of the use of RPL in dynamic networks is presented to provide an enhanced RPL for different applications with dynamic mobility and diverse network requirements. This implementation of RPL is designed with a new dynamic objective-function (D-OF) to improve the PDR, end-to-end delay and energy consumption while maintaining low packet overhead and loop-avoidance. A controlled reverse-trickle timer is proposed based on received signal strength identification (RSSI) readings to maintain high responsiveness with minimum overhead, and consult the objective function when a movement or inconsistency is detected to help nodes make an informed decision. Simulations are done using Cooja with different mobility scenarios for healthcare and animal tracking applications considering multi-hop routing. The results show that the proposed dynamic RPL (D-RPL) adapts to different mobility scenarios and has a higher PDR, slightly lower end-to-end delay and reasonable energy consumption compared to related existing protocols. Many recent applications require the support of mobility and an optimised approach to efficiently handle mobile nodes is essential. A game scenario is formulated where nodes compete for network resources in a selfish manner, to send their data packets to the sink node. Each node counts as a player in the noncooperative game. The optimal solution for the game is found using the unique Nash equilibrium (NE) where a node cannot improve its pay-off function while other players use their current strategy. The proposed solution aims to present a strategy to control different parameters of mobile nodes (or static nodes in a mobile environment) including transmission rate, timers and operation mode in order to optimize the performance of RPL under mobility in terms of PDR, throughput, energy consumption and end-to-end-delay. The proposed solution monitors the mobility of nodes based on RSSI readings, it also takes into account the priorities of different nodes and the current level of noise in order to select the preferred transmission rate. An optimised protocol called game-theory based mobile RPL (GTM-RPL) is implemented and tested in multiple scenarios with different network requirements for Internet of Things applications. Simulation results show that in the presence of mobility, GTM-RPL provides a flexible and adaptable solution that improves throughput whilst maintaining lower energy consumption showing more than 10% improvement compared to related work. For applications with high throughput requirements, GTM-RPL shows a significant advantage with more than 16% improvement in throughput and 20% improvement in energy consumption. Since the standardization of RPL, the volume of RPL-related research has increased exponentially and many enhancements and studies were introduced to evaluate and improve this protocol. However, most of these studies focus on simulation and have little interest in practical evaluation. Currently, six years after the standardization of RPL, it is time to put it to a practical test in real IoT applications and evaluate the feasibility of deploying and using RPL at its current state. A hands-on practical testing of RPL in different scenarios and under different conditions is presented to evaluate its efficiency in terms of packet delivery ratio (PDR), throughput, latency and energy consumption. In order to look at the current-state of routing in IoT applications, a discussion of the main aspects of RPL and the advantages and disadvantages of using it in different IoT applications is presented. In addition to that, a review of the available research related to RPL is conducted in a systematic manner, based on the enhancement area and the service type. Finally, a comparison of related RPL-based protocols in terms of energy efficiency, reliability, flexibility, robustness and security is presented along with conclusions and a discussion of the possible future directions of RPL and its applicability in the Internet of the future

    Congestion Control for 6LoWPAN Wireless Sensor Networks: Toward the Internet of Things

    Get PDF
    The Internet of Things (IoT) is the next big challenge for the research community. The IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is considered a key part of the IoT. Due to power, bandwidth, memory and processing resources limitation, heavy network traffic in 6LoWPAN networks causes congestion which significantly degrades network performance and impacts on the quality of service (QoS) aspects. This thesis addresses the congestion control issue in 6LoWPAN networks. In addition, the related literature is examined to define the set of current issues and to define the set of objectives based upon this. An analytical model of congestion for 6LoWPAN networks is proposed using Markov chain and queuing theory. The derived model calculates the buffer loss probability and the number of received packets at the final destination in the presence of congestion. Simulation results show that the analytical modelling of congestion has a good agreement with simulation. Next, the impact of congestion on 6LoWPAN networks is explored through simulations and real experiments where an extensive analysis is carried out with different scenarios and parameters. Analysis results show that when congestion occurs, the majority of packets are lost due to buffer overflow as compared to channel loss. Therefore, it is important to consider buffer occupancy in protocol design to improve network performance. Based on the analysis conclusion, a new IPv6 Routing Protocol for Low-Power and Lossy Network (RPL) routing metric called Buffer Occupancy is proposed that reduces the number of lost packets due to buffer overflow when congestion occurs. Also, a new RPL objective function called Congestion-Aware Objective Function (CA-OF) is presented. The proposed objective function works efficiently and improves the network performance by selecting less congested paths. However, sometimes the non-congested paths are not available and adapting the sending rates of source nodes is important to mitigate the congestion. Accordingly, the congestion problem is formulated as a non-cooperative game framework where the nodes (players) behave uncooperatively and demand high data rate in a selfish way. Based on this framework, a novel and simple congestion control mechanism called Game Theory based Congestion Control Framework (GTCCF) is proposed to adapt the sending rates of nodes and therefore, congestion can be solved. The existence and uniqueness of Nash equilibrium in the designed game is proved and the optimal game solution is computed by using Lagrange multipliers and Karush-Kuhn-Tucker (KKT) conditions. GTCCF is aware of node priorities and application priorities to support the IoT application requirements. On the other hand, combining and utilizing the resource control strategy (i.e. finding non-congested paths) and the traffic control strategy (i.e. adapting sending rate of nodes) into a hybrid scheme is important to efficiently utilize the network resources. Based on this, a novel congestion control algorithm called Optimization based Hybrid Congestion Alleviation (OHCA) is proposed. The proposed algorithm combines traffic control and resource control strategies into a hybrid solution by using the Network Utility Maximization (NUM) framework and a multi-attribute optimization methodology respectively. Also, the proposed algorithm is aware of node priorities and application priorities to support the IoT application requirements

    RPL-Based Routing Protocols in IoT Applications: A Review

    Get PDF
    In the last few years, the Internet of Things (IoT) has proved to be an interesting and promising paradigm that aims to contribute to countless applications by connecting more physical 'things' to the Internet. Although it emerged as a major enabler for many next-generation applications, it also introduced new challenges to already saturated networks. The IoT is already coming to life especially in healthcare and smart environment applications adding a large number of low-powered sensors and actuators to improve lifestyle and introduce new services to the community. The Internet Engineering Task Force (IETF) developed RPL as the routing protocol for low-power and lossy networks (LLNs) and standardized it in RFC6550 in 2012. RPL quickly gained interest, and many research papers were introduced to evaluate and improve its performance in different applications. In this paper, we present a discussion of the main aspects of RPL and the advantages and disadvantages of using it in different IoT applications. We also review the available research related to RPL in a systematic manner based on the enhancement area and the service type. In addition to that, we compare related RPL-based protocols in terms of energy efficiency, reliability, flexibility, robustness, and security. Finally, we present our conclusions and discuss the possible future directions of RPL and its applicability in the Internet of the future

    Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification

    Get PDF
    Wireless sensor network has large number of low-cost tiny nodes with sensing capability.  These provide low cost solutions to many real world problems such as such as defence, Internet of things, healthcare, environment monitoring and so on. The sensor nodes of these networks are placed in vulnerable environment. Hence, the security of these networks is very important. Intrusion Detection System (IDS) plays an important role in providing a security to such type of networks. The sensor nodes of the network have limited power and, traditional security mechanisms such as key-management, encryption decryption and authentication techniques cannot be installed on the nodes. Hence, there is a need of special security mechanism to handle the intrusions. In this paper, intrusion detection system is designed and implemented using game theory and machine learning to identify multiple attacks. Game theory is designed and used to apply the IDS optimally in WSN. The game model is designed by defining the players and the corresponding strategies. Quantal Response Equilibrium (QRE) concept of game theory is used to select the strategies in optimal way for the intrusion’s detection. Further, these intrusions are classified as denial of service attack, rank attack or selective forwarding attacks using supervised machine learning technique based on different parameters and rules. Results show that all the attacks are detected with good detection rate and the proposed approach provides optimal usage of IDS

    State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System

    Get PDF
    Transaction-based energy (TE) management and control has become an increasingly relevant topic, attracting considerable attention from industry and the research community alike. As a result, new techniques are emerging for its development and actualization. This paper presents a comprehensive review of TE involving peer-to-peer (P2P) energy trading and also covering the concept, enabling technologies, frameworks, active research efforts and the prospects of TE. The formulation of a common approach for TE management modelling is challenging given the diversity of circumstances of prosumers in terms of capacity, profiles and objectives. This has resulted in divergent opinions in the literature. The idea of this paper is therefore to explore these viewpoints and provide some perspectives on this burgeoning topic on P2P TE systems. This study identified that most of the techniques in the literature exclusively formulate energy trade problems as a game, an optimization problem or a variational inequality problem. It was also observed that none of the existing works has considered a unified messaging framework. This is a potential area for further investigation

    Game theory for cooperation in multi-access edge computing

    Get PDF
    Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.info:eu-repo/semantics/acceptedVersio

    QCOF: New RPL Extension for QoS and Congestion-Aware in Low Power and Lossy Network

    Get PDF
    Low power and lossy networks (LLNs) require a routing protocol under real-time and energy constraints, congestion aware and packet priority. Thus, Routing Protocol for Low power and lossy network (RPL) is recommended by Internet Engineering Task force (IETF) for LLN applications. In RPL, nodes select their optimal paths towards their preferred parents after meeting routing metrics that are injected in the objective function (OF). However, RPL did not impose any routing metric and left it open for implementation. In this paper, we propose a new RPL objective function which is based on the quality of service (QoS) and congestion-aware. In the case paths fail, we define new RPL control messages for enriching the network by adding more routing nodes. Extensive simulations show that QCOF achieves significant improvement in comparison with the existing objective functions, and appropriately satisfies real-time applications under QoS and network congestion.info:eu-repo/semantics/publishedVersio

    A survey on intelligent computation offloading and pricing strategy in UAV-Enabled MEC network: Challenges and research directions

    Get PDF
    The lack of resource constraints for edge servers makes it difficult to simultaneously perform a large number of Mobile Devices’ (MDs) requests. The Mobile Network Operator (MNO) must then select how to delegate MD queries to its Mobile Edge Computing (MEC) server in order to maximize the overall benefit of admitted requests with varying latency needs. Unmanned Aerial Vehicles (UAVs) and Artificial Intelligent (AI) can increase MNO performance because of their flexibility in deployment, high mobility of UAV, and efficiency of AI algorithms. There is a trade-off between the cost incurred by the MD and the profit received by the MNO. Intelligent computing offloading to UAV-enabled MEC, on the other hand, is a promising way to bridge the gap between MDs' limited processing resources, as well as the intelligent algorithms that are utilized for computation offloading in the UAV-MEC network and the high computing demands of upcoming applications. This study looks at some of the research on the benefits of computation offloading process in the UAV-MEC network, as well as the intelligent models that are utilized for computation offloading in the UAV-MEC network. In addition, this article examines several intelligent pricing techniques in different structures in the UAV-MEC network. Finally, this work highlights some important open research issues and future research directions of Artificial Intelligent (AI) in computation offloading and applying intelligent pricing strategies in the UAV-MEC network

    Overlay virtualized wireless sensor networks for application in industrial internet of things : a review

    Get PDF
    Abstract: In recent times, Wireless Sensor Networks (WSNs) are broadly applied in the Industrial Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and prospective manufacturing industries. In particular, an area of interest that concerns the use of WSNs in IIoT is the concept of sensor network virtualization and overlay networks. Both network virtualization and overlay networks are considered contemporary because they provide the capacity to create services and applications at the edge of existing virtual networks without changing the underlying infrastructure. This capability makes both network virtualization and overlay network services highly beneficial, particularly for the dynamic needs of IIoT based applications such as in smart industry applications, smart city, and smart home applications. Consequently, the study of both WSN virtualization and overlay networks has become highly patronized in the literature, leading to the growth and maturity of the research area. In line with this growth, this paper provides a review of the development made thus far concerning virtualized sensor networks, with emphasis on the application of overlay networks in IIoT. Principally, the process of virtualization in WSN is discussed along with its importance in IIoT applications. Different challenges in WSN are also presented along with possible solutions given by the use of virtualized WSNs. Further details are also presented concerning the use of overlay networks as the next step to supporting virtualization in shared sensor networks. Our discussion closes with an exposition of the existing challenges in the use of virtualized WSN for IIoT applications. In general, because overlay networks will be contributory to the future development and advancement of smart industrial and smart city applications, this review may be considered by researchers as a reference point for those particularly interested in the study of this growing field
    • …
    corecore