89 research outputs found

    Generalized Neuron Based Secure Media Access Control Protocol for Wireless Sensor Networks

    Get PDF
    Security plays a pivotal role in most applications of wireless sensor networks. It is common to find inadequately secure networks confined only to controlled environments. The issue of security in wireless sensor networks is a hot research topic for over a decade. This paper presents a compact generalized neuron (GN) based medium access protocol that renders a CSMA/CD network secure against denial-of-service attacks launched by adversaries. The GN enhances the security by constantly monitoring multiple parameters that reflect the possibility that an attack is launched by an adversary. Particle swarm optimization, a popular bio-inspired evolutionary-like optimization algorithm is used for training the GN. The wireless sensor network is simulated using Vanderbilt Prowler, a probabilistic wireless network simulator. Simulation results show that the choice of threshold suspicion parameter impacts on the tradeoff between network effectiveness and lifetime

    SCALABLE AND EFFICIENT VERTICAL HANDOVER DECISION ALGORITHMS IN VEHICULAR NETWORK CONTEXTS

    Full text link
    A finales de los años noventa, y al comienzo del nuevo milenio, las redes inalámbricas han evolucionado bastante, pasando de ser sólo una tecnología prometedora para convertirse en un requisito para las actividades cotidianas en las sociedades desarrolladas. La infraestructura de transporte también ha evolucionado, ofreciendo comunicación a bordo para mejorar la seguridad vial y el acceso a contenidos de información y entretenimiento. Los requisitos de los usuarios finales se han hecho dependientes de la tecnología, lo que significa que sus necesidades de conectividad han aumentado debido a los diversos requisitos de las aplicaciones que se ejecutan en sus dispositivos móviles, tales como tabletas, teléfonos inteligentes, ordenadores portátiles o incluso ordenadores de abordo (On-Board Units (OBUs)) dentro de los vehículos. Para cumplir con dichos requisitos de conectividad, y teniendo en cuenta las diferentes redes inalámbricas disponibles, es necesario adoptar técnicas de Vertical Handover (VHO) para cambiar de red de forma transparente y sin necesidad de intervención del usuario. El objetivo de esta tesis es desarrollar algoritmos de decisión (Vertical Handover Decision Algorithms (VHDAs)) eficientes y escalables, optimizados para el contexto de las redes vehiculares. En ese sentido se ha propuesto, desarrollado y probado diferentes algoritmos de decisión basados en la infraestructura disponible en las actuales, y probablemente en las futuras, redes inalámbricas y redes vehiculares. Para ello se han combinado diferentes técnicas, métodos computacionales y modelos matemáticos, con el fin de garantizar una conectividad apropiada, y realizando el handover hacia las redes más adecuadas de manera a cumplir tanto con los requisitos de los usuarios como los requisitos de las aplicaciones. Con el fin de evaluar el contexto, se han utilizado diferentes herramientas para obtener información variada, como la disponibilidad de la red, el estado de la red, la geolocalizaciónMárquez Barja, JM. (2012). SCALABLE AND EFFICIENT VERTICAL HANDOVER DECISION ALGORITHMS IN VEHICULAR NETWORK CONTEXTS [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/17869Palanci

    TFUZZY-OF: a new method for routing protocol for low-power and lossy networks load balancing using multi-criteria decision-making

    Get PDF
    The internet of things (IoT) based on a network layer perspective includes low-power and lossy networks (LLN) that are limited in terms of power consumption, memory, and energy usage. The routing protocol used in these networks is called routing over low-power and lossy networks (RPL). Therefore, the IoT networks include smart objects that need multiple routing for their interconnections which makes traffic load balancing techniques indispensable to RPL routing protocol. In this paper, we propose a method based on fuzzy logic and the technique for the order of prioritization by similarity to the ideal solution (TOPSIS) as a well-known multi-criteria decision-making method to solve the load balancing problem by routing metrics composition. For this purpose, a combination of both link and node routing metrics namely hop count, expected transmission count, and received signal strength indicator is used. The results of simulations show that this method can increase the quality of services in terms of packet delivery ratio and average end-to-end delay

    Energy-Efficient Routing Protocol for Selecting Relay Nodes in Underwater Sensor Networks Based on Fuzzy Analytical Hierarchy Process

    Get PDF
    The use of underwater sensor networks (UWSNs) offers great advantages in many automatic observation services such as water monitoring (ocean, sea, etc.) and registering of geological events (landslides, earthquakes). However, UWSNs have many more limitations than terrestrial sensor networks (smaller bandwidth, higher delays, etc.) with new requirements such as low power consumption by nodes or being able to select appropriate routes in a dynamic topology due to water currents and movements. To cope with these problems, the use of a routing protocol is very important. In this paper we propose a routing technique that adapts to changes in the network topology, avoiding multiple retransmissions that would affect its overall performance. This protocol is energy-efficient and is implemented using a fuzzy analytical hierarchical process (FAHP) under multi-criteria decision making (MCDM) to make an intelligent routing decision based on objectives, criteria and alternatives. To select the next node on the route, several comparison matrices are used: number of hops, distances to the sink node, and number of neighbors. The results show that the proposed setup behaves similarly to other existing underwater sensor network routing schemes using fuzzy schemes such as SPRINT.This research was funded in part by the Spanish Ministry of Science and Innovation through the project “NAUTILUS: Swarms of underwater autonomous vehicles guided by artificial intelligence: its time has come” (Grant: PID2020-112502RB/AEI/10.13039/501100011033). Partial funding for open access charge: Universidad de Málag

    Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

    Get PDF
    This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an impact on the performance of the network layer are captured and transformed into fuzzy sets. Second, the fuzzy sets are characterized by Fuzzy Membership Functions(FMF) which are interpolated based on the data collected from massive experimental simulations. Third, the Analytical Hierarchy Process(AHP) is exploited to identify the relationships among the criteria. Fourth, multiple fuzzy rules are determined and, the TSK inference system is employed to infer and aggregate the final forwarding decision. Through integrating techniques of MCDM, FMF, AHP, and TSK, we designed a distributed and opportunistic data routing protocol, namely, VEFR (Vehicular Environment Fuzzy Router) which targets V2V (vehicle-to-vehicle) communication and runs in two main processes, Road Segment Selection(RSS) and Relay Vehicle Selection(RVS). RSS is intended to select multiple successive junctions through which the packets should travel from the source to the destination, while RVS process is intended to select relay vehicles within the selected road segment. The experimental results showed that our protocol performs and scales well with both network size and density, considering the combined problem of end-to-end packet delivery ratio and end-to-end latency

    Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks

    Get PDF
    The design of next generation networks in various technologies under the “Anywhere, Anytime” paradigm offers seamless connectivity across different coverage. A conventional algorithm such as RSSThreshold algorithm, that only uses the received strength signal (RSS) as a metric, will decrease handover performance regarding handover latency, delay, packet loss, and handover failure probability. Moreover, the RSS-based algorithm is only suitable for horizontal handover decision to examine the quality of service (QoS) compared to the vertical handover decision in advanced technologies. In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). The study uses network simulator 2.29 (NS 2.29) along with the mobility traffic network and generator to implement simulation scenarios and topologies. This helps the simulation to achieve a realistic VANET mobility scenario. The required analysis on the performance of QoS in the vertical handover can thus be conducted. The proposed Fuzzy Logic algorithm shows improvement over the conventional algorithm (RSSThreshold) in the average percentage of handover QoS whereby it achieves 20%, 21% and 13% improvement on handover latency, delay, and packet loss respectively. This is achieved through triggering a process in layer two and three that enhances the handover performance

    Survey Paper: Mobility Management in Heterogeneous Wireless Networks

    Get PDF
    AbstractEver increasing user demands and development of modern communication technologies have led to the evolution of communication networks from 1st Generation (1G) network to 4G heterogeneous networks. Further, 4G with heterogeneous network environment will provide features such as, “Always Best Connected”, “Anytime Anywhere” and seamless communication. Due to diverse characteristics of heterogeneous networks such as bandwidth, latency, cost, coverage and Quality of Service (QoS) etc., there are several open and unsolved issues namely mobility management, network administration, security etc. Hence, Designing proficient mobility management to seamlessly integrate heterogeneous wireless networks with all-IP is the most challenging issue in 4G networks. Mobile IPv6 (MIPv6) developed by Internet Engineering Task Force (IETF) has mobility management for the packet-switched devices of homogeneous wireless networks. Further, mobility management of homogeneous networks depends on network related parameter i.e., Received Signal Strength (RSS). However the mobility management of heterogeneous networks, not only depends on network related parameters, but also on terminal-velocity, battery power, location information, user-user profile & preferences and service-service capabilities & QoS etc. Designing mobility management with all-IP, while, considering issues such as context of networks, terminal, user and services is the main concern of industry and researchers in the current era

    Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks

    Get PDF
    This book presents collective works published in the recent Special Issue (SI) entitled "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks”. These works expose the readership to the latest solutions and techniques for MANETs and VANETs. They cover interesting topics such as power-aware optimization solutions for MANETs, data dissemination in VANETs, adaptive multi-hop broadcast schemes for VANETs, multi-metric routing protocols for VANETs, and incentive mechanisms to encourage the distribution of information in VANETs. The book demonstrates pioneering work in these fields, investigates novel solutions and methods, and discusses future trends in these field

    Metaheuristics Techniques for Cluster Head Selection in WSN: A Survey

    Get PDF
    In recent years, Wireless sensor communication is growing expeditiously on the capability to gather information, communicate and transmit data effectively. Clustering is the main objective of improving the network lifespan in Wireless sensor network. It includes selecting the cluster head for each cluster in addition to grouping the nodes into clusters. The cluster head gathers data from the normal nodes in the cluster, and the gathered information is then transmitted to the base station. However, there are many reasons in effect opposing unsteady cluster head selection and dead nodes. The technique for selecting a cluster head takes into factors to consider including residual energy, neighbors’ nodes, and the distance between the base station to the regular nodes. In this study, we thoroughly investigated by number of methods of selecting a cluster head and constructing a cluster. Additionally, a quick performance assessment of the techniques' performance is given together with the methods' criteria, advantages, and future directions

    Machine Learning Prediction Approach to Enhance Congestion Control in 5G IoT Environment

    Full text link
    [EN] The 5G network is a next-generation wireless form of communication and the latest mobile technology. In practice, 5G utilizes the Internet of Things (IoT) to work in high-tra_ c networks with multiple nodes/ sensors in an attempt to transmit their packets to a destination simultaneously, which is a characteristic of IoT applications. Due to this, 5G o_ ers vast bandwidth, low delay, and extremely high data transfer speed. Thus, 5G presents opportunities and motivations for utilizing next-generation protocols, especially the stream control transmission protocol (SCTP). However, the congestion control mechanisms of the conventional SCTP negatively influence overall performance. Moreover, existing mechanisms contribute to reduce 5G and IoT performance. Thus, a new machine learning model based on a decision tree (DT) algorithm is proposed in this study to predict optimal enhancement of congestion control in the wireless sensors of 5G IoT networks. The model was implemented on a training dataset to determine the optimal parametric setting in a 5G environment. The dataset was used to train the machine learning model and enable the prediction of optimal alternatives that can enhance the performance of the congestion control approach. The DT approach can be used for other functions, especially prediction and classification. DT algorithms provide graphs that can be used by any user to understand the prediction approach. The DT C4.5 provided promising results, with more than 92% precision and recall.Najm, IA.; Hamoud, AK.; Lloret, J.; Bosch Roig, I. (2019). Machine Learning Prediction Approach to Enhance Congestion Control in 5G IoT Environment. Electronics. 8(6):1-23. https://doi.org/10.3390/electronics8060607S12386Rahem, A. A. T., Ismail, M., Najm, I. A., & Balfaqih, M. (2017). Topology sense and graph-based TSG: efficient wireless ad hoc routing protocol for WANET. Telecommunication Systems, 65(4), 739-754. doi:10.1007/s11235-016-0242-7Aalsalem, M. Y., Khan, W. Z., Gharibi, W., Khan, M. K., & Arshad, Q. (2018). Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. Journal of Network and Computer Applications, 113, 87-97. doi:10.1016/j.jnca.2018.04.004Sunny, A., Panchal, S., Vidhani, N., Krishnasamy, S., Anand, S. V. R., Hegde, M., … Kumar, A. (2017). A generic controller for managing TCP transfers in IEEE 802.11 infrastructure WLANs. Journal of Network and Computer Applications, 93, 13-26. doi:10.1016/j.jnca.2017.05.006Jain, R. (1990). Congestion control in computer networks: issues and trends. IEEE Network, 4(3), 24-30. doi:10.1109/65.56532Kafi, M. A., Djenouri, D., Ben-Othman, J., & Badache, N. (2014). Congestion Control Protocols in Wireless Sensor Networks: A Survey. IEEE Communications Surveys & Tutorials, 16(3), 1369-1390. doi:10.1109/surv.2014.021714.00123Floyd, S. (2000). Congestion Control Principles. doi:10.17487/rfc2914Qazi, I. A., & Znati, T. (2011). On the design of load factor based congestion control protocols for next-generation networks. Computer Networks, 55(1), 45-60. doi:10.1016/j.comnet.2010.07.010Katabi, D., Handley, M., & Rohrs, C. (2002). Congestion control for high bandwidth-delay product networks. ACM SIGCOMM Computer Communication Review, 32(4), 89-102. doi:10.1145/964725.633035Wang, Y., Rozhnova, N., Narayanan, A., Oran, D., & Rhee, I. (2013). An improved hop-by-hop interest shaper for congestion control in named data networking. ACM SIGCOMM Computer Communication Review, 43(4), 55-60. doi:10.1145/2534169.2491233Mirza, M., Sommers, J., Barford, P., & Zhu, X. (2010). A Machine Learning Approach to TCP Throughput Prediction. IEEE/ACM Transactions on Networking, 18(4), 1026-1039. doi:10.1109/tnet.2009.2037812Taherkhani, N., & Pierre, S. (2016). Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm. IEEE Transactions on Intelligent Transportation Systems, 17(11), 3275-3285. doi:10.1109/tits.2016.2546555Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., & Mizutani, K. (2017). State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems. IEEE Communications Surveys & Tutorials, 19(4), 2432-2455. doi:10.1109/comst.2017.2707140Gonzalez-Landero, F., Garcia-Magarino, I., Lacuesta, R., & Lloret, J. (2018). PriorityNet App: A Mobile Application for Establishing Priorities in the Context of 5G Ultra-Dense Networks. IEEE Access, 6, 14141-14150. doi:10.1109/access.2018.2811900Lloret, J., Parra, L., Taha, M., & Tomás, J. (2017). An architecture and protocol for smart continuous eHealth monitoring using 5G. Computer Networks, 129, 340-351. doi:10.1016/j.comnet.2017.05.018Khan, I., Zafar, M., Jan, M., Lloret, J., Basheri, M., & Singh, D. (2018). Spectral and Energy Efficient Low-Overhead Uplink and Downlink Channel Estimation for 5G Massive MIMO Systems. Entropy, 20(2), 92. doi:10.3390/e20020092Elappila, M., Chinara, S., & Parhi, D. R. (2018). Survivable Path Routing in WSN for IoT applications. Pervasive and Mobile Computing, 43, 49-63. doi:10.1016/j.pmcj.2017.11.004Singh, K., Singh, K., Son, L. H., & Aziz, A. (2018). Congestion control in wireless sensor networks by hybrid multi-objective optimization algorithm. Computer Networks, 138, 90-107. doi:10.1016/j.comnet.2018.03.023Shelke, M., Malhotra, A., & Mahalle, P. N. (2017). Congestion-Aware Opportunistic Routing Protocol in Wireless Sensor Networks. Smart Innovation, Systems and Technologies, 63-72. doi:10.1007/978-981-10-5544-7_7Godoy, P. D., Cayssials, R. L., & García Garino, C. G. (2018). Communication channel occupation and congestion in wireless sensor networks. Computers & Electrical Engineering, 72, 846-858. doi:10.1016/j.compeleceng.2017.12.049Najm, I. A., Ismail, M., Lloret, J., Ghafoor, K. Z., Zaidan, B. B., & Rahem, A. A. T. (2015). Improvement of SCTP congestion control in the LTE-A network. Journal of Network and Computer Applications, 58, 119-129. doi:10.1016/j.jnca.2015.09.003Najm, I. A., Ismail, M., & Abed, G. A. (2014). High-Performance Mobile Technology LTE-A using the Stream Control Transmission Protocol: A Systematic Review and Hands-on Analysis. Journal of Applied Sciences, 14(19), 2194-2218. doi:10.3923/jas.2014.2194.2218Katuwal, R., Suganthan, P. N., & Zhang, L. (2018). An ensemble of decision trees with random vector functional link networks for multi-class classification. Applied Soft Computing, 70, 1146-1153. doi:10.1016/j.asoc.2017.09.020Gómez, S. E., Martínez, B. C., Sánchez-Esguevillas, A. J., & Hernández Callejo, L. (2017). Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal. Computer Networks, 127, 68-80. doi:10.1016/j.comnet.2017.07.018Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: issues and approaches. IEEE Communications Magazine, 51(6), 86-93. doi:10.1109/mcom.2013.6525600Liang, D., Zhang, Z., & Peng, M. (2015). Access Point Reselection and Adaptive Cluster Splitting-Based Indoor Localization in Wireless Local Area Networks. IEEE Internet of Things Journal, 2(6), 573-585. doi:10.1109/jiot.2015.2453419Park, H., Haghani, A., Samuel, S., & Knodler, M. A. (2018). Real-time prediction and avoidance of secondary crashes under unexpected traffic congestion. Accident Analysis & Prevention, 112, 39-49. doi:10.1016/j.aap.2017.11.025Shu, J., Liu, S., Liu, L., Zhan, L., & Hu, G. (2017). Research on Link Quality Estimation Mechanism for Wireless Sensor Networks Based on Support Vector Machine. Chinese Journal of Electronics, 26(2), 377-384. doi:10.1049/cje.2017.01.013Riekstin, A. C., Januário, G. C., Rodrigues, B. B., Nascimento, V. T., Carvalho, T. C. M. B., & Meirosu, C. (2016). Orchestration of energy efficiency capabilities in networks. Journal of Network and Computer Applications, 59, 74-87. doi:10.1016/j.jnca.2015.06.015Adi, E., Baig, Z., & Hingston, P. (2017). Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services. Journal of Network and Computer Applications, 91, 1-13. doi:10.1016/j.jnca.2017.04.015Stimpfling, T., Bélanger, N., Cherkaoui, O., Béliveau, A., Béliveau, L., & Savaria, Y. (2017). Extensions to decision-tree based packet classification algorithms to address new classification paradigms. Computer Networks, 122, 83-95. doi:10.1016/j.comnet.2017.04.021Singh, D., Nigam, S. P., Agrawal, V. P., & Kumar, M. (2016). Vehicular traffic noise prediction using soft computing approach. Journal of Environmental Management, 183, 59-66. doi:10.1016/j.jenvman.2016.08.053Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., & Xiang, Y. (2017). Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks. IEEE Transactions on Intelligent Transportation Systems, 18(10), 2629-2641. doi:10.1109/tits.2017.2653103Tariq, F., & Baig, S. (2017). Machine Learning Based Botnet Detection in Software Defined Networks. International Journal of Security and Its Applications, 11(11), 1-12. doi:10.14257/ijsia.2017.11.11.01Wu, T., Petrangeli, S., Huysegems, R., Bostoen, T., & De Turck, F. (2017). Network-based video freeze detection and prediction in HTTP adaptive streaming. Computer Communications, 99, 37-47. doi:10.1016/j.comcom.2016.08.005Pham, T. N. D., & Yeo, C. K. (2018). Adaptive trust and privacy management framework for vehicular networks. Vehicular Communications, 13, 1-12. doi:10.1016/j.vehcom.2018.04.006Mohamed, M. F., Shabayek, A. E.-R., El-Gayyar, M., & Nassar, H. (2019). An adaptive framework for real-time data reduction in AMI. Journal of King Saud University - Computer and Information Sciences, 31(3), 392-402. doi:10.1016/j.jksuci.2018.02.012Louvieris, P., Clewley, N., & Liu, X. (2013). Effects-based feature identification for network intrusion detection. Neurocomputing, 121, 265-273. doi:10.1016/j.neucom.2013.04.038Verma, P. K., Verma, R., Prakash, A., Agrawal, A., Naik, K., Tripathi, R., … Abogharaf, A. (2016). Machine-to-Machine (M2M) communications: A survey. Journal of Network and Computer Applications, 66, 83-105. doi:10.1016/j.jnca.2016.02.016Hamoud, A. K., Hashim, A. S., & Awadh, W. A. (2018). Predicting Student Performance in Higher Education Institutions Using Decision Tree Analysis. International Journal of Interactive Multimedia and Artificial Intelligence, 5(2), 26. doi:10.9781/ijimai.2018.02.004Lavanya, D. (2012). Ensemble Decision Tree Classifier For Breast Cancer Data. International Journal of Information Technology Convergence and Services, 2(1), 17-24. doi:10.5121/ijitcs.2012.2103Polat, K., & Güneş, S. (2007). Classification of epileptiform EEG using a hybrid system based on decision tree classifier and fast Fourier transform. Applied Mathematics and Computation, 187(2), 1017-1026. doi:10.1016/j.amc.2006.09.022Cayirci, E., Tezcan, H., Dogan, Y., & Coskun, V. (2006). Wireless sensor networks for underwater survelliance systems. Ad Hoc Networks, 4(4), 431-446. doi:10.1016/j.adhoc.2004.10.008Mezzavilla, M., Zhang, M., Polese, M., Ford, R., Dutta, S., Rangan, S., & Zorzi, M. (2018). End-to-End Simulation of 5G mmWave Networks. IEEE Communications Surveys & Tutorials, 20(3), 2237-2263. doi:10.1109/comst.2018.282888
    corecore