36 research outputs found

    Toward optimal resource scheduling for Internet of Things under imperfect CSI

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordThe Internet of Things (IoT) increases the numberof connected devices and supports ever-growing complexity of applications. Owing to the constrained physical size, the IoT devices can significantly enhance computation capacity by offloading computation-intensive tasks to the resource-rich edge servers deployed at the base station (BS) via wireless networks. However, how to achieve optimal resource scheduling remains a challenge due to stochastic task arrivals, time-varying wireless channels and imperfect estimation of channel state information (CSI). In this paper, by virtue of the Lyapunov optimization technique, we propose the toward optimal resource scheduling algorithm under imperfect CSI (TORS) to optimize resource scheduling in an IoT environment. A convex transmit power and subchannel allocation problem in TORS is formulated. This problem is then solved via the Lagrangian dual decomposition method. We derive analytical bounds for the time-averaged system throughput and queue backlog. We show that TORS can arbitrarily approach the optimal system throughput by simply tuning an introduced control parameter β without prior knowledge of stochastic task arrivals and the CSI of wireless channels. Extensive simulation results confirm the theoretical analysis on the performance of TORS.National Key Researchand Development ProgramNational Natural Science Foundation of Chin

    Technologies to improve the performance of wireless sensor networks in high-traffic applications

    Get PDF
    The expansion of wireless sensor networks to advanced areas, including structure health monitoring, multimedia surveillance, and health care monitoring applications, has resulted in new and complex problems. Traditional sensor systems are designed and optimised for extremely low traffic loads. However, it has been witnessed that network performance drops rapidly with the higher traffic loads common in advanced applications. In this thesis, we examine the system characteristics and new system requirements of these advanced sensor network applications. Based on this analysis, we propose an improved architecture for wireless sensor systems to increase the network performance while maintaining compatibility with the essential WSN requirements: low power, low cost, and distributed scalability. We propose a modified architecture deriving from the IEEE 802.15.4 standard, which is shown to significantly increase the network performance in applications generating increased data loads. This is achieved by introducing the possibility of independently allocating the sub-carriers in a distributed manner. As a result, the overall efficiency of the channel contention mechanism will be increased to deliver higher throughput with lower energy consumption. Additionally, we develop the concept of increasing the data transmission efficiency by adapting the spreading code length to the wireless environment. Such a modification will not only be able to deliver higher throughput but also maintain a reliable wireless link in the harsh RF environment. Finally, we propose the use of the battery recovery effect to increase the power efficiency of the system under heavy traffic load conditions. These three innovations minimise the contention window period while maximising the capacity of the available channel, which is shown to increase network performance in terms of energy efficiency, throughput and latency. The proposed system is shown to be backwards compatible and able to satisfy both traditional and advanced applications and is particularly suitable for deployment in harsh RF environments. Experiments and analytic techniques have been described and developed to produce performance metrics for all the proposed techniques

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters
    corecore