728 research outputs found

    Building Programmable Wireless Networks: An Architectural Survey

    Full text link
    In recent times, there have been a lot of efforts for improving the ossified Internet architecture in a bid to sustain unstinted growth and innovation. A major reason for the perceived architectural ossification is the lack of ability to program the network as a system. This situation has resulted partly from historical decisions in the original Internet design which emphasized decentralized network operations through co-located data and control planes on each network device. The situation for wireless networks is no different resulting in a lot of complexity and a plethora of largely incompatible wireless technologies. The emergence of "programmable wireless networks", that allow greater flexibility, ease of management and configurability, is a step in the right direction to overcome the aforementioned shortcomings of the wireless networks. In this paper, we provide a broad overview of the architectures proposed in literature for building programmable wireless networks focusing primarily on three popular techniques, i.e., software defined networks, cognitive radio networks, and virtualized networks. This survey is a self-contained tutorial on these techniques and its applications. We also discuss the opportunities and challenges in building next-generation programmable wireless networks and identify open research issues and future research directions.Comment: 19 page

    Data Aggregation Technique to Provide Security for Wireless Sensor Networks

    Get PDF
    Due to restricted computational power and energy assets, the aggregation of information from numerous sensor nodes is performed at the aggregating node and is typically done by using basic techniques, for example by averaging. Node compromising attacks more likely occur after such sort of aggregations of data. As wireless sensor networks are generally unattended and do not use any tamper resistant equipment, they are extremely vulnerable to compromising attacks. Therefore, determining the trustworthiness of information and the reputation of sensor hubs is vital for wireless sensor networks. As the execution of low power processors drastically enhances, future aggregator nodes will be equipped for performing more refined information aggregation algorithms, in this way making WSN less vulnerable. WSN stands for Wireless Sensor Networks. For this reason, Iterative algorithms hold high value. These algorithms take the data aggregated from different sources and give a trust appraisal of these sources, generally in the form of comparing weight variables which are given to information obtained from every source. In this paper, we show that few existing iterative filtering calculations, while altogether more vigorous against collusion attacks than the basic averaging methods, are in fact susceptive to a novel refined collusion attack which we launch. To address this security issue, we propose a change for iterative filtering procedures by giving an underlying estimation to such algorithms which make them collusion resistant as well as more precise and faster for merging purposes

    Mobile platform-independent solutions for body sensor network interface

    Get PDF
    Body Sensor Networks (BSN) appeared as an application of Wireless Sensor Network (WSN) to medicine and biofeedback. Such networks feature smart sensors (biosensors) that capture bio-physiological parameters from people and can offer an easy way for data collection. A new BSN platform called Sensing Health with Intelligence Modularity, Mobility and Experimental Reusability (SHIMMER) presents an excellent opportunity to put the concept into practice, with suitable size and weight, while also supporting wireless communication via Bluetooth and IEEE 802.15.4 standards. BSNs also need suitable interfaces for data processing, presentation, and storage for latter retrieval, as a result one can use Bluetooth technology to communicate with several more powerful and Graphical User Interface (GUI)-enabled devices such as mobile phones or regular computers. Taking into account that people currently use mobile and smart phones, it offers a good opportunity to propose a suitable mobile system for BSN SHIMMER-based networks. This dissertation proposes a mobile system solution with different versions created to the four major smart phone platforms: Symbian, Windows Mobile, iPhone, and Android. Taking into account that, currently, iPhone does not support Java, and Java cannot match a native solution in terms of performance in other platforms such as Android or Symbian, a native approach with similar functionality must be followed. Then, four mobile applications were created, evaluated and validated, and they are ready for use

    An end-to-end LwM2M-based communication architecture for multimodal NB-IoT/BLE devices

    Get PDF
    The wireless Internet of Things (IoT) landscape is quite diverse. For instance, Low-Power Wide-Area Network (LPWAN) technologies offer low data rate communication over long distance, whereas Wireless Personal Area Network (WPAN) technologies can reach higher data rates, but with a reduced range. For simple IoT applications, communication requirements can be fulfilled by a single technology. However, the requirements of more demanding IoT use cases can vary over time and with the type of data being exchanged. This is pushing the design towards multimodal approaches, where different wireless IoT technologies are combined and the most appropriate one is used as per the need. This paper considers the combination of Narrow Band IoT (NB-IoT) and Bluetooth Low Energy (BLE) as communication options for an IoT device that is running a Lightweight Machine to Machine/Constrained Application Protocol (LwM2M/CoAP) protocol stack. It analyses the challenges incurred by different protocol stack options, such as different transfer modes (IP versus non-IP), the use of Static Context Header Compression (SCHC) techniques, and Datagram Transport Layer Security (DTLS) security modes, and discusses the impact of handover between both communication technologies. A suitable end-to-end architecture for the targeted multimodal communication is presented. Using a prototype implementation of this architecture, an in-depth assessment of handover and its resulting latency is performed

    Run-time compilation techniques for wireless sensor networks

    No full text
    Wireless sensor networks research in the past decade has seen substantial initiative,support and potential. The true adoption and deployment of such technology is highly dependent on the workforce available to implement such solutions. However, embedded systems programming for severely resource constrained devices, such as those used in typical wireless sensor networks (with tens of kilobytes of program space and around ten kilobytes of memory), is a daunting task which is usually left for experienced embedded developers.Recent initiative to support higher level programming abstractions for wireless sensor networks by utilizing a Java programming paradigm for resource constrained devices demonstrates the development benefits achieved. However, results have shown that an interpreter approach greatly suffers from execution overheads. Run-time compilation techniques are often used in traditional computing to make up for such execution overheads. However, the general consensus in the field is that run-time compilation techniques are either impractical, impossible, complex, or resource hungry for such resource limited devices.In this thesis, I propose techniques to enable run-time compilation for such severely resource constrained devices. More so, I show not only that run-time compilation is in fact both practical and possible by using simple techniques which do not require any more resources than that of interpreters, but also that run-time compilation substantially increases execution efficiency when compared to an interpreter

    IoT-Fog-Edge-Cloud Computing Simulation Tools, A Systematic Review

    Get PDF
    The Internet of Things (IoT) perspective promises substantial advancements in sectors such as smart homes and infrastructure, smart health, smart environmental conditions, smart cities, energy, transportation and mobility, manufacturing and retail, farming, and so on. Cloud computing (CC) offers appealing computational and storage options; nevertheless, cloud-based explanations are frequently conveyed by downsides and constraints, such as energy consumption, latency, privacy, and bandwidth. To address the shortcomings related to CC, the advancements like Fog Computing (FC) and Edge Computing (EC) are introduced later on. FC is a novel and developing technology that connects the cloud to the network edges, allowing for decentrali zed computation. EC, in which processing and storage are performed nearer to where data is created, may be able to assist address these issues by satisfying particular needs such as low latency or lower energy use. This study provides a comprehensive overview and analysis of IoT-Fog-Edge-Cloud Computing simulation tools to assist researchers and developers in selecting the appropriate device for research studies while working through various scenarios and addressing current reality challenges. This study also takes a close look at various modeling tools, which are examined and contrasted to improve the future

    PRACTICAL ASPECTS OF CELLULAR M2M SYSTEMS DESIGN

    Get PDF
    This paper highlights some crucial design challenges of Machine to Machine (M2M) systems. The focus is on the cellular based, wireless wide area network systems. Design of M2M terminals, used as wireless sensor nodes, is covered in detail, including the criteria for selecting appropriate core and hardware peripherals. Discussion is extended to modeling and design of terminal's embedded software. Communication using framework and backend application software architectures are explored. Practical examples of the described design principles are demonstrated

    Programming models for sensor networks: a survey

    Get PDF
    Sensor networks have a significant potential in diverse applications some of which are already beginning to be deployed in areas such as environmental monitoring. As the application logic becomes more complex, programming difficulties are becoming a barrier to adoption of these networks. The difficulty in programming sensor networks is not only due to their inherently distributed nature but also the need for mechanisms to address their harsh operating conditions such as unreliable communications, faulty nodes, and extremely constrained resources. Researchers have proposed different programming models to overcome these difficulties with the ultimate goal of making programming easy while making full use of available resources. In this article, we first explore the requirements for programming models for sensor networks. Then we present a taxonomy of the programming models, classified according to the level of abstractions they provide. We present an evaluation of various programming models for their responsiveness to the requirements. Our results point to promising efforts in the area and a discussion of the future directions of research in this area.
    corecore