95 research outputs found
Quality of Service for Differentiated Traffic Using Multipath in Wireless Sensor Networks
Providing Quality of Service in wireless sensor networks refers to a set of service requirements to be satisfied when transmitting a packet from source to destination. The main challenge involved in quality of service based data transmission is to select the efficient path from source to destination. Quality of service in wireless sensor networks is an important factor. The two most important parameters that hinder the goal of guaranteed event perception are time-sensitive and reliable delivery of gathered information, while minimum energy consumption is desired. In this paper, a multi-traffic, multi-path and energy aware data transmission mechanism is proposed for improving Quality of Service in Wireless Sensor Networks. The simulation results demonstrate that, the algorithms efficiently improve quality of reception ratio, satisfying the required quality of service metrics
Quality-of-service in wireless sensor networks: state-of-the-art and future directions
Wireless sensor networks (WSNs) are one of today’s most prominent instantiations
of the ubiquituous computing paradigm. In order to achieve high
levels of integration, WSNs need to be conceived considering requirements
beyond the mere system’s functionality. While Quality-of-Service (QoS) is
traditionally associated with bit/data rate, network throughput, message delay
and bit/packet error rate, we believe that this concept is too strict, in
the sense that these properties alone do not reflect the overall quality-ofservice
provided to the user/application. Other non-functional properties
such as scalability, security or energy sustainability must also be considered
in the system design. This paper identifies the most important non-functional
properties that affect the overall quality of the service provided to the users,
outlining their relevance, state-of-the-art and future research directions
A Review of Wireless Sensor Networks with Cognitive Radio Techniques and Applications
The advent of Wireless Sensor Networks (WSNs) has inspired various sciences and telecommunication with its applications, there is a growing demand for robust methodologies that can ensure extended lifetime. Sensor nodes are small equipment which may hold less electrical energy and preserve it until they reach the destination of the network. The main concern is supposed to carry out sensor routing process along with transferring information. Choosing the best route for transmission in a sensor node is necessary to reach the destination and conserve energy. Clustering in the network is considered to be an effective method for gathering of data and routing through the nodes in wireless sensor networks. The primary requirement is to extend network lifetime by minimizing the consumption of energy. Further integrating cognitive radio technique into sensor networks, that can make smart choices based on knowledge acquisition, reasoning, and information sharing may support the network's complete purposes amid the presence of several limitations and optimal targets. This examination focuses on routing and clustering using metaheuristic techniques and machine learning because these characteristics have a detrimental impact on cognitive radio wireless sensor node lifetime
Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling
Abstract—Low rate wireless sensor network has been used in industrial plant for certain production monitorings which have slow production rate. In the case of adding production line in the different building within one factory area, relay nodes are needed to increase monitoring coverage and connectivity among all nodes in the plant area. This paper presents the performance of relay node message scheduling scheme for extending monitoring area of production plan by using low rate wireless sensor network. The simulation results demonstrate that the distance and number of hop from certain relay nodes to the sink affect message end to end delay. Furthermore, increasing message rate generated by relay nodes also contributes in leveraging end to end delay of each message due to increasing queueing delay
SYSTEMATIC LITERATURE REVIEW OF IOT METRICS
The Internet of Things (IoT) touches almost every aspect of modern society and has changed the way people live, work, travel and, do business. Because of its importance, it is essential to ensure that an IoT system is performing well, as desired and expected, and that this can be assessed and managed with an adequate set of IoT performance metrics. The aim of this study was to systematically inventory and classifies recent studies that have investigated IoT metrics. We conducted a literature review based on studies published between January 2010 and December 2021 using a set of five research questions (RQs) on the current knowledge bases for IoT metrics. A total of 158 IoT metrics were identified and classified into 12 categories according to the different parts and aspects of an IoT system. To cover the overall performance of an IoT system, the 12 categories were organized into an ontology. The findings results show that the category of network metrics was the most discussed in 43% of the studies and, with the highest number of metrics at 37%. This study can provide guidelines for researchers and practitioners in selecting metrics for IoT systems and valuable insights into areas for improvement and optimization.
 
Secure authentication and data aggregation scheme for routing packets in wireless sensor network
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model
- …