1,092 research outputs found
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V
An Overview on Application of Machine Learning Techniques in Optical Networks
Today's telecommunication networks have become sources of enormous amounts of
widely heterogeneous data. This information can be retrieved from network
traffic traces, network alarms, signal quality indicators, users' behavioral
data, etc. Advanced mathematical tools are required to extract meaningful
information from these data and take decisions pertaining to the proper
functioning of the networks from the network-generated data. Among these
mathematical tools, Machine Learning (ML) is regarded as one of the most
promising methodological approaches to perform network-data analysis and enable
automated network self-configuration and fault management. The adoption of ML
techniques in the field of optical communication networks is motivated by the
unprecedented growth of network complexity faced by optical networks in the
last few years. Such complexity increase is due to the introduction of a huge
number of adjustable and interdependent system parameters (e.g., routing
configurations, modulation format, symbol rate, coding schemes, etc.) that are
enabled by the usage of coherent transmission/reception technologies, advanced
digital signal processing and compensation of nonlinear effects in optical
fiber propagation. In this paper we provide an overview of the application of
ML to optical communications and networking. We classify and survey relevant
literature dealing with the topic, and we also provide an introductory tutorial
on ML for researchers and practitioners interested in this field. Although a
good number of research papers have recently appeared, the application of ML to
optical networks is still in its infancy: to stimulate further work in this
area, we conclude the paper proposing new possible research directions
Secure and Energy Aware Cluster based Routing using Trust Centric – Multiobjective Black Widow Optimization for large scale WSN
Wireless Sensor Network (WSN) is a promising approach that is developed for a wide range of applications due to its low installation cost. However, the nodes in the WSN are susceptible to different security threats, because these nodes are located in hostile or harsh environments. Moreover, an inappropriate selection of routing path affects the data delivery of the WSN. The important goal of this paper is to obtain secure data transmission while minimizing energy consumption. In this paper, Trust Centric - Multiobjective Black Widow Optimization (TC-MBWO) is proposed for selection of Secure Cluster Head (SCH) from the large-scale WSN. Moreover, the secure routing path is generated by using the TC-MBWO, in which the factors considered for the cost function are: residual energy, distance, trust and node degree. Therefore, the secured clustering and routing achieved by using TC-MBWO, provides the resistance against malicious nodes and simultaneously the energy consumption is also minimized by identifying the shortest path. The proposed TC-MBWO method is analyzed in terms of alive nodes, dead nodes, energy consumption, throughput, and network lifetime. Here, the TC-MBWO method is compared with different existing methods such as Low Energy Adaptive Clustering Hierarchy (LEACH), Particle Swarm Optimization - Grey Wolf Optimizer (PSO-GWO), Particle-Water Wave Optimization (P-WWO) and Particle-based Spider Monkey Optimization (P-SMO). The alive nodes of the TC-MBWO are 70 for 2800 rounds which are higher in number when compared to the PSO-GWO, P-WWO and P-SMO
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i) most DA techniques need network clustering. Clustering itself is a time and energy consuming procedure. (ii) DA techniques often do not have ability to detect intrusions. Studying to design a new DA technique without using clustering and with ability of nding intrusion is valuable. This paper proposes an energy-intrusion aware DA Technique (named EIDA) that does not need clustering. EIDA is designed to support on demand requests of mobile sinks in WSNs. It uses learning automata for aggregating data and a simple and effective algorithm for intrusion detection. Finally, we simulat
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
- …