10,477 research outputs found
D2D-Based Grouped Random Access to Mitigate Mobile Access Congestion in 5G Sensor Networks
The Fifth Generation (5G) wireless service of sensor networks involves
significant challenges when dealing with the coordination of ever-increasing
number of devices accessing shared resources. This has drawn major interest
from the research community as many existing works focus on the radio access
network congestion control to efficiently manage resources in the context of
device-to-device (D2D) interaction in huge sensor networks. In this context,
this paper pioneers a study on the impact of D2D link reliability in
group-assisted random access protocols, by shedding the light on beneficial
performance and potential limitations of approaches of this kind against
tunable parameters such as group size, number of sensors and reliability of D2D
links. Additionally, we leverage on the association with a Geolocation Database
(GDB) capability to assist the grouping decisions by drawing parallels with
recent regulatory-driven initiatives around GDBs and arguing benefits of the
suggested proposal. Finally, the proposed method is approved to significantly
reduce the delay over random access channels, by means of an exhaustive
simulation campaign.Comment: First submission to IEEE Communications Magazine on Oct.28.2017.
Accepted on Aug.18.2019. This is the camera-ready versio
2D Proactive Uplink Resource Allocation Algorithm for Event Based MTC Applications
We propose a two dimension (2D) proactive uplink resource allocation
(2D-PURA) algorithm that aims to reduce the delay/latency in event-based
machine-type communications (MTC) applications. Specifically, when an event of
interest occurs at a device, it tends to spread to the neighboring devices.
Consequently, when a device has data to send to the base station (BS), its
neighbors later are highly likely to transmit. Thus, we propose to cluster
devices in the neighborhood around the event, also referred to as the
disturbance region, into rings based on the distance from the original event.
To reduce the uplink latency, we then proactively allocate resources for these
rings. To evaluate the proposed algorithm, we analytically derive the mean
uplink delay, the proportion of resource conservation due to successful
allocations, and the proportion of uplink resource wastage due to unsuccessful
allocations for 2D-PURA algorithm. Numerical results demonstrate that the
proposed method can save over 16.5 and 27 percent of mean uplink delay,
compared with the 1D algorithm and the standard method, respectively.Comment: 6 pages, 6 figures, Published in 2018 IEEE Wireless Communications
and Networking Conference (WCNC
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful
energy awareness is essential when working with these devices.
Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features.
This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols.
The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and
has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference
publications in IEEE Explore and one workshop paper
Next Generation M2M Cellular Networks: Challenges and Practical Considerations
In this article, we present the major challenges of future machine-to-machine
(M2M) cellular networks such as spectrum scarcity problem, support for
low-power, low-cost, and numerous number of devices. As being an integral part
of the future Internet-of-Things (IoT), the true vision of M2M communications
cannot be reached with conventional solutions that are typically cost
inefficient. Cognitive radio concept has emerged to significantly tackle the
spectrum under-utilization or scarcity problem. Heterogeneous network model is
another alternative to relax the number of covered users. To this extent, we
present a complete fundamental understanding and engineering knowledge of
cognitive radios, heterogeneous network model, and power and cost challenges in
the context of future M2M cellular networks
- …