673 research outputs found

    Uncoordinated access schemes for the IoT: approaches, regulations, and performance

    Full text link
    Internet of Things (IoT) devices communicate using a variety of protocols, differing in many aspects, with the channel access method being one of the most important. Most of the transmission technologies explicitly designed for IoT and Machine-to-Machine (M2M) communication use either an ALOHA-based channel access or some type of Listen Before Talk (LBT) strategy, based on carrier sensing. In this paper, we provide a comparative overview of the uncoordinated channel access methods for IoT technologies, namely ALOHA-based and LBT schemes, in relation with the ETSI and FCC regulatory frameworks. Furthermore, we provide a performance comparison of these access schemes, both in terms of successful transmissions and energy efficiency, in a typical IoT deployment. Results show that LBT is effective in reducing inter-node interference even for long-range transmissions, though the energy efficiency can be lower than that provided by ALOHA methods. The adoption of rate-adaptation schemes, furthermore, lowers the energy consumption while improving the fairness among nodes at different distances from the receiver. Coexistence issues are also investigated, showing that in massive deployments LBT is severely affected by the presence of ALOHA devices in the same area

    PERFORMANCE STUDY FOR CAPILLARY MACHINE-TO-MACHINE NETWORKS

    Get PDF
    Communication technologies witness a wide and rapid pervasiveness of wireless machine-to-machine (M2M) communications. It is emerging to apply for data transfer among devices without human intervention. Capillary M2M networks represent a candidate for providing reliable M2M connectivity. In this thesis, we propose a wireless network architecture that aims at supporting a wide range of M2M applications (either real-time or non-real-time) with an acceptable QoS level. The architecture uses capillary gateways to reduce the number of devices communicating directly with a cellular network such as LTE. Moreover, the proposed architecture reduces the traffic load on the cellular network by providing capillary gateways with dual wireless interfaces. One interface is connected to the cellular network, whereas the other is proposed to communicate to the intended destination via a WiFi-based mesh backbone for cost-effectiveness. We study the performance of our proposed architecture with the aid of the ns-2 simulator. An M2M capillary network is simulated in different scenarios by varying multiple factors that affect the system performance. The simulation results measure average packet delay and packet loss to evaluate the quality-of-service (QoS) of the proposed architecture. Our results reveal that the proposed architecture can satisfy the required level of QoS with low traffic load on the cellular network. It also outperforms a cellular-based capillary M2M network and WiFi-based capillary M2M network. This implies a low cost of operation for the service provider while meeting a high-bandwidth service level agreement. In addition, we investigate how the proposed architecture behaves with different factors like the number of capillary gateways, different application traffic rates, the number of backbone routers with different routing protocols, the number of destination servers, and the data rates provided by the LTE and Wi-Fi technologies. Furthermore, the simulation results show that the proposed architecture continues to be reliable in terms of packet delay and packet loss even under a large number of nodes and high application traffic rates

    Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks

    Get PDF
    With the advancements in Internet of Things (IoT) technologies, energy harvesting IoT devices are becoming significantly important. These tiny IoT devices can harvest bounded energy, thus need an efficient protocol to conserve the energy in more efficient manner. From the review, it is found that the development of an efficient energy efficient protocol for energy harvesting IoT is still an open area of research. It is found that fuzzy based energy harvesting IoTs has shown significant improvement over the existing protocols. However, the fuzzy logic suffers from the data uncertainty issue. Therefore, in this paper, Gaussian functional shapes-based type-II fuzzy membership function is used to elect the cluster heads among the IoT devices to reduce the energy consumption of energy harvest IoTs. Thereafter, inter-cluster data aggregation is used. Finally, the communication between the elected cluster heads and the cloud servers or sink. Extensive experiments are drawn by considering the existing and the proposed protocols for energy harvesting IoTs. Comparative analysis reveals that the proposed type-II fuzzy membership function-based protocol outperforms the existing protocols in terms of bandwidth analysis, throughput, conserve energy, network lifetime, and average consumed energy

    Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations

    Full text link
    The Internet of Things (IoT) promises ubiquitous connectivity of everything everywhere, which represents the biggest technology trend in the years to come. It is expected that by 2020 over 25 billion devices will be connected to cellular networks; far beyond the number of devices in current wireless networks. Machine-to-Machine (M2M) communications aims at providing the communication infrastructure for enabling IoT by facilitating the billions of multi-role devices to communicate with each other and with the underlying data transport infrastructure without, or with little, human intervention. Providing this infrastructure will require a dramatic shift from the current protocols mostly designed for human-to-human (H2H) applications. This article reviews recent 3GPP solutions for enabling massive cellular IoT and investigates the random access strategies for M2M communications, which shows that cellular networks must evolve to handle the new ways in which devices will connect and communicate with the system. A massive non-orthogonal multiple access (NOMA) technique is then presented as a promising solution to support a massive number of IoT devices in cellular networks, where we also identify its practical challenges and future research directions.Comment: To appear in IEEE Communications Magazin

    Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

    Get PDF
    The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality. SH is the major building block for Smart Cities and have long been a dream for decades, hobbyists in the late 1970s made Home Automation (HA) possible when personal computers started invading home spaces. While SH can share most of the IoT technologies, there are unique characteristics that make SH special. From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH. Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks

    A distributed cyber-security framework for heterogeneous environments

    Get PDF
    Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional "security perimeter" approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cyber-security paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architecture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud

    Greening and Optimizing Energy Consumption of Sensor Nodes in the Internet of Things through Energy Harvesting: Challenges and Approaches

    Get PDF
    This paper presents a survey of current energy efficient technologies that could drive the IoT revolution while examining critical areas for energy improvements in IoT sensor nodes. The paper reviews improvements in emerging energy techniques which promise to revolutionize the IoT landscape. Moreover, the current work also studies the sources of energy consumption by the IoT sensor nodes in a network and the metrics adopted by various researchers in optimizing the energy consumption of these nodes. Increasingly, researchers are exploring better ways of sourcing sufficient energy along with optimizing the energy consumption of IoT sensor nodes and making these energy sources green. Energy harvesting is the basis of this new energy source. The harvested energy could serve both as the principal and alternative energy source of power and thus increase the energy constancy of the IoT systems by providing a green, sufficient and optimal power source among IoT devices. Communication of IoT nodes in a heterogeneous IoT network consumes a lot of energy and the energy level in the nodes depletes with time. There is the need to optimize the energy consumption of such nodes and the current study discusses this as well
    corecore