26,193 research outputs found

    Optimizing resource allocation in eh-enabled internet of things

    Get PDF
    Internet of Things (IoT) aims to bridge everyday physical objects via the Internet. Traditional energy-constrained wireless devices are powered by fixed energy sources like batteries, but they may require frequent battery replacements or recharging. Wireless Energy Harvesting (EH), as a promising solution, can potentially eliminate the need of recharging or replacing the batteries. Unlike other types of green energy sources, wireless EH does not depend on nature and is thus a reliable source of energy for charging devices. Meanwhile, the rapid growth of IoT devices and wireless applications is likely to demand for more operating frequency bands. Although the frequency spectrum is currently scarce, owing to inefficient conventional regulatory policies, a considerable amount of the radio spectrum is greatly underutilized. Cognitive radio (CR) can be exploited to mitigate the spectrum scarcity problem of IoT applications by leveraging the spectrum holes. Therefore, transforming the IoT network into a cognitive based IoT network is essential to utilizing the available spectrum opportunistically. To address the two aforementioned issues, a novel model is proposed to leverage wireless EH and CR for IoT. In particular, the sum rate of users is maximized for a CR-based IoT network enabled with wireless EH. Users operate in a time switching fashion, and each time slot is partitioned into three non-overlapping parts devoted for EH, spectrum sensing and data transmission. There is a trade-off among the lengths of these three operations and thus the time slot structure is to be optimized. The general problem of joint resource allocation and EH optimization is formulated as a mixed integer nonlinear programming task which is NP-hard and intractable. Therefore, a sub-channel allocation scheme is first proposed to approximately satisfy users rate requirements and remove the integer constraints. In the second step, the general optimization problem is reduced to a convex optimization task. Another optimization framework is also designed to capture a fundamental tradeoff between energy efficiency (EE) and spectral efficiency for an EH-enabled IoT network. In particular, an EE maximization problem is formulated by taking into consideration of user buffer occupancy, data rate fairness, energy causality constraints and interference constraints. Then, a low complexity heuristic algorithm is proposed to solve the resource allocation and EE optimization problem. The proposed algorithm is shown to be capable of achieving a near optimal solution with polynomial complexity. To support Machine Type Communications (MTC) in next generation mobile networks, NarrowBand-IoT (NB-IoT) has emerged as a promising solution to provide extended coverage and low energy consumption for low cost MTC devices. However, the existing orthogonal multiple access scheme in NB-IoT cannot provide connectivity for a massive number of MTC devices. In parallel with the development of NB-IoT, Non-Orthogonal Multiple Access (NOMA), introduced for the fifth generation wireless networks, is deemed to significantly improve the network capacity by providing massive connectivity through sharing the same spectral resources. To leverage NOMA in the context of NB-IoT, a power domain NOMA scheme is proposed with user clustering for an NB-IoT system. In particular, the MTC devices are assigned to different ranks within the NOMA clusters where they transmit over the same frequency resources. Then, an optimization problem is formulated to maximize the total throughput of the network by optimizing the resource allocation of MTC devices and NOMA clustering while satisfying the transmission power and quality of service requirements. Furthermore, an efficient heuristic algorithm is designed to solve the proposed optimization problem by jointly optimizing NOMA clustering and resource allocation of MTC devices

    Green compressive sampling reconstruction in IoT networks

    Get PDF
    In this paper, we address the problem of green Compressed Sensing (CS) reconstruction within Internet of Things (IoT) networks, both in terms of computing architecture and reconstruction algorithms. The approach is novel since, unlike most of the literature dealing with energy efficient gathering of the CS measurements, we focus on the energy efficiency of the signal reconstruction stage given the CS measurements. As a first novel contribution, we present an analysis of the energy consumption within the IoT network under two computing architectures. In the first one, reconstruction takes place within the IoT network and the reconstructed data are encoded and transmitted out of the IoT network; in the second one, all the CS measurements are forwarded to off-network devices for reconstruction and storage, i.e., reconstruction is off-loaded. Our analysis shows that the two architectures significantly differ in terms of consumed energy, and it outlines a theoretically motivated criterion to select a green CS reconstruction computing architecture. Specifically, we present a suitable decision function to determine which architecture outperforms the other in terms of energy efficiency. The presented decision function depends on a few IoT network features, such as the network size, the sink connectivity, and other systems’ parameters. As a second novel contribution, we show how to overcome classical performance comparison of different CS reconstruction algorithms usually carried out w.r.t. the achieved accuracy. Specifically, we consider the consumed energy and analyze the energy vs. accuracy trade-off. The herein presented approach, jointly considering signal processing and IoT network issues, is a relevant contribution for designing green compressive sampling architectures in IoT networks

    Mobile Edge Computing Empowers Internet of Things

    Full text link
    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges

    Get PDF
    open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture
    • …
    corecore