873 research outputs found

    Fuzzy Switching Controller for the Security in 802.11 Networks

    Get PDF

    A Solution Based on Bluetooth Low Energy for Smart Home Energy Management

    Get PDF
    The research and the implementation of home automation are getting more popular because the Internet of Things holds promise for making homes smarter through wireless technologies. The installation of systems based on wireless networks can play a key role also in the extension of the smart grid towards smart homes, that can be deemed as one of the most important components of smart grids. This paper proposes a fuzzy-based solution for smart energy management in a home automation wireless network. The approach, by using Bluetooth Low Energy (BLE), introduces a Fuzzy Logic Controller (FLC) in order to improve a Home Energy Management (HEM) scheme, addressing the power load of standby appliances and their loads in different hours of the day. Since the consumer is involved in the choice of switching on/off of home appliances, the approach introduced in this work proposes a fuzzy-based solution in order to manage the consumer feedbacks. Simulation results show that the proposed solution is efficient in terms of reducing peak load demand, electricity consumption charges with an increase comfort level of consumers. The performance of the proposed BLE-based wireless network scenario are validated in terms of packet delivery ratio, delay, and jitter and are compared to IEEE 802.15.4 technology

    Energy-efficient vertical handover parameters, classification and solutions over wireless heterogeneous networks: a comprehensive survey

    Get PDF
    In the last few decades, the popularity of wireless networks has been growing dramatically for both home and business networking. Nowadays, smart mobile devices equipped with various wireless networking interfaces are used to access the Internet, communicate, socialize and handle short or long-term businesses. As these devices rely on their limited batteries, energy-efficiency has become one of the major issues in both academia and industry. Due to terminal mobility, the variety of radio access technologies and the necessity of connecting to the Internet anytime and anywhere, energy-efficient handover process within the wireless heterogeneous networks has sparked remarkable attention in recent years. In this context, this paper first addresses the impact of specific information (local, network-assisted, QoS-related, user preferences, etc.) received remotely or locally on the energy efficiency as well as the impact of vertical handover phases, and methods. It presents energy-centric state-of-the-art vertical handover approaches and their impact on energy efficiency. The paper also discusses the recommendations on possible energy gains at different stages of the vertical handover process

    Energy-efficient vertical handover parameters, classification and solutions over wireless heterogeneous networks: a comprehensive survey

    Get PDF
    In the last few decades, the popularity of wireless networks has been growing dramatically for both home and business networking. Nowadays, smart mobile devices equipped with various wireless networking interfaces are used to access the Internet, communicate, socialize and handle short or long-term businesses. As these devices rely on their limited batteries, energy-efficiency has become one of the major issues in both academia and industry. Due to terminal mobility, the variety of radio access technologies and the necessity of connecting to the Internet anytime and anywhere, energy-efficient handover process within the wireless heterogeneous networks has sparked remarkable attention in recent years. In this context, this paper first addresses the impact of specific information (local, network-assisted, QoS-related, user preferences, etc.) received remotely or locally on the energy efficiency as well as the impact of vertical handover phases, and methods. It presents energy-centric state-of-the-art vertical handover approaches and their impact on energy efficiency. The paper also discusses the recommendations on possible energy gains at different stages of the vertical handover process

    An adaptable fuzzy-based model for predicting link quality in robot networks.

    Get PDF
    It is often essential for robots to maintain wireless connectivity with other systems so that commands, sensor data, and other situational information can be exchanged. Unfortunately, maintaining sufficient connection quality between these systems can be problematic. Robot mobility, combined with the attenuation and rapid dynamics associated with radio wave propagation, can cause frequent link quality (LQ) issues such as degraded throughput, temporary disconnects, or even link failure. In order to proactively mitigate such problems, robots must possess the capability, at the application layer, to gauge the quality of their wireless connections. However, many of the existing approaches lack adaptability or the framework necessary to rapidly build and sustain an accurate LQ prediction model. The primary contribution of this dissertation is the introduction of a novel way of blending machine learning with fuzzy logic so that an adaptable, yet intuitive LQ prediction model can be formed. Another significant contribution includes the evaluation of a unique active and incremental learning framework for quickly constructing and maintaining prediction models in robot networks with minimal sampling overhead

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks

    Get PDF
    The most commonly used medium access mechanism in wireless mesh networks is based on the CSMA/CA protocol. This protocol schedules properly the access to the medium among all the competing nodes. However, in a hostile environment, such as wireless mesh networks (WMNs), selfish or greedy behaving nodes may prefer to decline the proper use of the protocol rules in order to increase their bandwidth shares at the expense of the well-behaving nodes. In this paper, we focus on such misbehavior and in particular on the adaptive greedy misbehavior of a node in the context of WMN environment. In such environment, wireless nodes compete to gain access to the medium and communicate with a mesh router (MR). In this case, a greedy node may violate the protocol rules in order to earn extra bandwidth share upon its neighbors. In order to avoid its detection, this node may adopt different techniques and switch dynamically between each of them. To counter such misbehavior, we propose to use a fuzzy logicbased detection scheme. This scheme, dubbed FLSAC, is implemented in the MR/gateway to monitor the behavior of the attached wireless nodes and report any deviation from the proper use of the protocol. The simulation results of the proposed FLSAC scheme show robustness and its ability to detect and identify quickly any adaptive cheater. © 2009 John Wiley & Sons, Ltd

    Novel Approaches for the Performance Enhancement of Cognitive Radio Networks

    Full text link
    This research is dedicated to the study of the challenges faced by Cognitive Radio (CR) networks, which include self-coexistence of the networks in the spectral environment, security and performance threats from malicious entities, and fairness in spectrum contention and utilization. We propose novel channel acquisition schemes that allow decentralized CR networks to have multiple channel access with minimal spectrum contentions. The multiple channel acquisition schemes facilitate fast spectrum access especially in cases where networks cannot communicate with each other. These schemes enable CR networks to self-organize and adapt to the dynamically changing spectral environment. We also present a self-coexistence mechanism that allows CR networks to coexist via the implementation of a risk-motivated channel selection based deference structure (DS). By forming DS coalitions, CR networks are able to have better access to preferred channels and can defer transmission to one another, thereby mitigating spectrum conflicts. CR networks are also known to be susceptible to Sybil threats from smart malicious radios with either monopolistic or disruptive intentions. We formulate novel threat and defense mechanisms to combat Sybil threats and minimize their impact on the performance of CR networks. A dynamic reputation system is proposed that considerably minimizes the effectiveness of intelligent Sybil attacks and improves the accuracy of spectrum-based decision-making processes. Finally, we present a distributed and cheat-proof spectrum contention protocol as an enhancement of the adaptive On-Demand Spectrum Contention (ODSC) protocol. The Modified On-Demand Spectrum Contention (MODSC) protocol enhances fairness and efficiency of spectrum access. We also show that there is substantial improvement in spectrum utilization with the incorporation of channel reuse into the MODSC protocol
    • …
    corecore