10 research outputs found

    Energy-Efficient Routing Protocol for Selecting Relay Nodes in Underwater Sensor Networks Based on Fuzzy Analytical Hierarchy Process

    Get PDF
    The use of underwater sensor networks (UWSNs) offers great advantages in many automatic observation services such as water monitoring (ocean, sea, etc.) and registering of geological events (landslides, earthquakes). However, UWSNs have many more limitations than terrestrial sensor networks (smaller bandwidth, higher delays, etc.) with new requirements such as low power consumption by nodes or being able to select appropriate routes in a dynamic topology due to water currents and movements. To cope with these problems, the use of a routing protocol is very important. In this paper we propose a routing technique that adapts to changes in the network topology, avoiding multiple retransmissions that would affect its overall performance. This protocol is energy-efficient and is implemented using a fuzzy analytical hierarchical process (FAHP) under multi-criteria decision making (MCDM) to make an intelligent routing decision based on objectives, criteria and alternatives. To select the next node on the route, several comparison matrices are used: number of hops, distances to the sink node, and number of neighbors. The results show that the proposed setup behaves similarly to other existing underwater sensor network routing schemes using fuzzy schemes such as SPRINT.This research was funded in part by the Spanish Ministry of Science and Innovation through the project “NAUTILUS: Swarms of underwater autonomous vehicles guided by artificial intelligence: its time has come” (Grant: PID2020-112502RB/AEI/10.13039/501100011033). Partial funding for open access charge: Universidad de Málag

    FLORA: Fuzzy based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs

    Get PDF
    Existing Opportunistic routing (OR) schemes work well with asynchronous duty-cycled wireless sensor networks (WSNs), which effectively reduces the sender waiting time by broadcasting packets to a set of forwarders instead of a predetermined forwarder. However, these protocols seriously suffer from the multiple receivers problem which distinctly shortens the network lifetime. Many opportunistic routing protocols view each node as equal importance, neglecting the fact that the nodes close to the sink undertake more duties than the rest of network nodes. Therefore, the nodes located in different positions should play different roles during the routing process. Unlike existing solutions, this paper presents a novel fuzzy logic-driven routing protocol, which consists of three parts. Firstly, each node defines a Routing Zone (RZ) to address the problem resulting from the randomness of node deployment. Secondly, the nodes within RZ are prioritized based on competency value obtained through the fuzzy-logic model. Finally, one of forwarders is selected as the final relay node after forwarders coordination. Through extensive experimental simulations, it is confirmed that FLORA achieves better performance compared to its counterparts in terms of energy consumption, overhead packets, waiting times, packet delivery ratio and network lifetime

    FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs

    Get PDF
    Existing Opportunistic routing (OR) schemes work well with asynchronous duty-cycled wireless sensor networks (WSNs), which effectively reduces the sender waiting time by broadcasting packets to a set of forwarders instead of a predetermined forwarder. However, these protocols seriously suffer from the multiple receivers problem which distinctly shortens the network lifetime. Many opportunistic routing protocols view each node as equal importance, neglecting the fact that the nodes close to the sink undertake more duties than the rest of network nodes. Therefore, the nodes located in different positions should play different roles during the routing process. Unlike existing solutions, this paper presents a novel fuzzy logic-driven routing protocol, which consists of three parts. Firstly, each node defines a Routing Zone (RZ) to address the problem resulting from the randomness of node deployment. Secondly, the nodes within RZ are prioritized based on competency value obtained through the fuzzy-logic model. Finally, one of forwarders is selected as the final relay node after forwarders coordination. Through extensive experimental simulations, it is confirmed that FLORA achieves better performance compared to its counterparts in terms of energy consumption, overhead packets, waiting times, packet delivery ratio and network lifetime

    Comparison of vertical handover decision-based techniques in heterogeneous networks

    Get PDF
    Industry leaders are currently setting out standards for 5G Networks projected for 2020 or even sooner. Future generation networks will be heterogeneous in nature because no single network type is capable of optimally meeting all the rapid changes in customer demands. Heterogeneous networks are typically characterized by some network architecture, base stations of varying transmission power, transmission solutions and the deployment of a mix of technologies (multiple radio access technologies). In heterogeneous networks, the processes involved when a mobile node successfully switches from one radio access technology to the other for the purpose of quality of service continuity is termed vertical handover or vertical handoff. Active calls that get dropped, or cases where there is discontinuity of service experienced by mobile users can be attributed to the phenomenon of delayed handover or an outright case of an unsuccessful handover procedure. This dissertation analyses the performance of a fuzzy-based VHO algorithm scheme in a Wi-Fi, WiMAX, UMTS and LTE integrated network using the OMNeT++ discrete event simulator. The loose coupling type network architecture is adopted and results of the simulation are analysed and compared for the two major categories of handover basis; multiple and single criteria based handover methods. The key performance indices from the simulations showed better overall throughput, better call dropped rate and shorter handover time duration for the multiple criteria based decision method compared to the single criteria based technique. This work also touches on current trends, challenges in area of seamless handover and initiatives for future Networks (Next Generation Heterogeneous Networks)

    Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

    Get PDF
    This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an impact on the performance of the network layer are captured and transformed into fuzzy sets. Second, the fuzzy sets are characterized by Fuzzy Membership Functions(FMF) which are interpolated based on the data collected from massive experimental simulations. Third, the Analytical Hierarchy Process(AHP) is exploited to identify the relationships among the criteria. Fourth, multiple fuzzy rules are determined and, the TSK inference system is employed to infer and aggregate the final forwarding decision. Through integrating techniques of MCDM, FMF, AHP, and TSK, we designed a distributed and opportunistic data routing protocol, namely, VEFR (Vehicular Environment Fuzzy Router) which targets V2V (vehicle-to-vehicle) communication and runs in two main processes, Road Segment Selection(RSS) and Relay Vehicle Selection(RVS). RSS is intended to select multiple successive junctions through which the packets should travel from the source to the destination, while RVS process is intended to select relay vehicles within the selected road segment. The experimental results showed that our protocol performs and scales well with both network size and density, considering the combined problem of end-to-end packet delivery ratio and end-to-end latency

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    A patient agent controlled customized blockchain based framework for internet of things

    Get PDF
    Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph

    Advances in Information Security and Privacy

    Get PDF
    With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue

    Performance analysis for wireless G (IEEE 802.11G) and wireless N (IEEE 802.11N) in outdoor environment

    Get PDF
    This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. The comparison consider on coverage area (mobility), throughput and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g

    Performance Analysis For Wireless G (IEEE 802.11 G) And Wireless N (IEEE 802.11 N) In Outdoor Environment

    Get PDF
    This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. the comparison consider on coverage area (mobility), through put and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g
    corecore