15 research outputs found

    A New Buffer and Energy Based Scheduling Scheme for Supporting QoS in MANETs

    Get PDF
    Today, the original IEEE 802.11 standard has several problems in providing Quality of Service in MANETs. A single FIFO queue is used in best effort manner and it does not support QoS. The upcoming IEEE 802.11e was drafted to overcome these drawbacks. In this paper we describe a new multiple queuing system with an adaptive scheduling taking into account the states of buffers and energy consumption in a mobile ad hoc network. The proposed scheduling scheme uses dynamic weights for each queue. We study the performance of this scheme and compare it with the original IEEE 802.11b and the upcoming IEEE 802.11e. We show through simulations that the proposed buffer and energy based scheduling scheme improves overall end-to-end throughput, and gives better results than the original 802.11b and the Enhanced Distributed Coordination Function (EDCF), in terms of delay and total received and lost packets, as well as support service differentiation over multi-hop ad hoc networks

    Internet of Underground Things ESP8266 WiFi Coverage Study

    Full text link
    [EN] The Internet of Underground Things (IoUT) is a novel concept regarding Internet of Things (IoT). It could have countless applications, particularly in agriculture as buried devices do not interfere with the machinery. Furthermore, wireless communication among buried and above ground devices would allow a significant cost reduction as wires would not need to be deployed and wires would not be destroyed by machinery or impede the correct performance of the activities performed by the workers of the field. In this paper, we perform a WiFi coverage study of ESP8266 nodes placed both underground and above ground so as to assess the current lack of knowledge in IoUT and the performance of low-cost controller boards for IoUT applications. Tests were performed with ESP8266 nodes buried at depths of 10 cm, 20 cm, 30 cm and 40 cm in a field located in an area of citrus fields. A node programmed as an AP (Access Point) was placed at several distances at a height of 50 cm. Results showed that the coverage was better for the node buried at a depth of 20 cm.This work has been partially supported by the European Union through the ERANETMED (Euromediterranean Cooperation through ERANET joint activities and beyond) project ERANETMED3-227 SMARTWATIR and by the European Union with the Fondo Europeo Agrícola de Desarrollo Rural (FEADER) Europa invierte en zonas rurales¿, the MAPAMA, and Comunidad de Madrid with the IMIDRA, under the mark of the PDR-CM 2014-2020 project number PDR18-XEROCESPED.García, L.; Parra-Boronat, L.; Jimenez, JM.; Lloret, J.; Abouaissa, A.; Lorenz, P. (2019). Internet of Underground Things ESP8266 WiFi Coverage Study. IARIA XPS Press. 1-6. http://hdl.handle.net/10251/180617S1

    AODV-UI with Malicious Node Detection and Removal for Public MANET

    Get PDF
    A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, this nature of MANET makes it very vulnerable to various attacks, especially by nodes within the MANET that is called malicious nodes. This paper provides a preliminary result for MANET security enhancement based on AODV-UI routing protocol. In this work we implement an algorithm to detect and remove malicious nodes in AODV-UI routing protocol. We evaluate our work in different scenarios by varying the number of nodes, the number of malicious node, the sending rate of the node in concern, and the type of the attack i.e. route poisoning, black hole, packet spoofing. Our experiment shows that on average, an attack can be completely removed within 0.48 seconds in the worst case, with the traffic rate of 100 kbps, and 0.04 seconds in the best case, with the sending rate of 10 kbps

    Quantifying the Production of Fruit-Bearing Trees Using Image Processing Techniques

    Full text link
    [EN] In recent years, the growth rate of world agricultural production and crop yields have decreased. Crop irrigation becomes essential in very dry areas and where rainfall is scarce, as in Egypt. Persimmon needs low humidity to obtain an optimal crop. This article proposes the monitoring of its performance, in order to regulate the amount of water needed for each tree at any time. In our work we present a technique that consists of obtaining images of some of the trees with fruit, which are subsequently treated, to obtain reliable harvest data. This technique allows us to have control and predictions of the harvest. Also, we present the results obtained in a first trial, through which we demonstrate the feasibility of using the system to meet the objectives set. We use 5 different trees in our experiment. Their fruit production is different (between 20 and 47kg of fruit). The correlation coefficient of the obtained regression model is 0.97.This work has been partially supported by European Union through the ERANETMED (Euromediterranean Cooperation through ERANET joint activities and beyond) project ERANETMED3-227 SMARTWATIR by the Conselleria de Educación, Cultura y Deporte with the Subvenciones para la contratación de personal investigador en fase postdoctoral, grant number APOSTD/2019/04, and by the Cooperativa Agrícola Sant Bernat Coop.V.García, L.; Parra-Boronat, L.; Basterrechea-Chertudi, DA.; Jimenez, JM.; Rocher-Morant, J.; Parra-Boronat, M.; García-Navas, JL.... (2019). Quantifying the Production of Fruit-Bearing Trees Using Image Processing Techniques. IARIA XPS Press. 14-19. http://hdl.handle.net/10251/180619S141

    A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol

    No full text
    Real-time communication has witnessed a dramatic increase in recent years in user daily usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to provide trusted services (voice or video) to end users along with efficiency, scalability, and interoperability. Just like other Internet technology, SIP stores its related data in databases with a predefined data structure. In recent, SIP technologies have adopted the real advantages of in-memory databases as cache systems to ensure fast database operations during real-time communication. Meanwhile, in industry, there are several names of in-memory databases that have been implemented with different structures (e.g., query types, data structure, persistency, and key/value size). However, there are limited resources and poor recommendations on how to select a proper in-memory database in SIP communications. This paper provides recommended and efficient in-memory databases which are most fitted to SIP servers by evaluating three types of databases including Memcache, Redis, and Local (OpenSIPS built-in). The evaluation has been conducted based on the experimental performance of the impact of in-memory operations (store and fetch) against the SIP server by applying heavy load traffic through different scenarios. To sum up, evaluation results show that the Local database consumed less memory compared to Memcached and Redis for read and write operations. While persistency was considered, Memcache is the preferable database selection due to its 25.20 KB/s for throughput and 0.763 s of call–response time

    A Survey of Outlier Detection Techniques in IoT: Review and Classification

    No full text
    The Internet of Things (IoT) is a fact today where a high number of nodes are used for various applications. From small home networks to large-scale networks, the aim is the same: transmitting data from the sensors to the base station. However, these data are susceptible to different factors that may affect the collected data efficiency or the network functioning, and therefore the desired quality of service (QoS). In this context, one of the main issues requiring more research and adapted solutions is the outlier detection problem. The challenge is to detect outliers and classify them as either errors to be ignored, or important events requiring actions to prevent further service degradation. In this paper, we propose a comprehensive literature review of recent outlier detection techniques used in the IoTs context. First, we provide the fundamentals of outlier detection while discussing the different sources of an outlier, the existing approaches, how we can evaluate an outlier detection technique, and the challenges facing designing such techniques. Second, comparison and discussion of the most recent outlier detection techniques are presented and classified into seven main categories, which are: statistical-based, clustering-based, nearest neighbour-based, classification-based, artificial intelligent-based, spectral decomposition-based, and hybrid-based. For each category, available techniques are discussed, while highlighting the advantages and disadvantages of each of them. The related works for each of them are presented. Finally, a comparative study for these techniques is provided

    Security and performance enhancement of AODV routing protocol

    No full text
    International audienceA mobile ad hoc networks (MANET) is a decentralized, self-organizing, infrastructure-less network andadaptive gathering of independent mobile nodes. Because of the unique characteristics of MANET, themajor issues to develop a routing protocol in MANET are the security aspect and the network performance.In this paper, we propose a new secure protocol called Trust Ad Hoc On-demand Distance Vector (AODV)using trust mechanism. Communication packets are only sent to the trusted neighbor nodes. Trust calculationis based on the behaviors and activities information of each node. It is divided in to trust global (TG)and trust local (TL). TG is a trust calculation based on the total of received routing packets and the totalof sending routing packets. TL is a comparison between total received packets and total forwarded packetsby neighbor node from specific nodes. Nodes conclude the total trust level of its neighbors by accumulatingthe TL and TG values. The performance of Trust AODV is evaluated under denial of service/distributeddenial of service (DOS/DDOS) attack using network simulator NS-2. It is compared with the Trust CrossLayer Secure (TCLS) protocol. Simulation results show that the Trust AODV has a better performance thanTCLS protocol in terms of end-to-end delay, packet delivery ratio, and overhead. Next, we improve theperformance of Trust AODV using ant algorithm. The proposed protocol is called Trust AODV+ Ant.The implementation of ant algorithm in the proposed secure protocol is by adding an ant agent to put thepositive pheromone in the node if the node is trusted. Ant agent is represented as a routing packet. Thepheromone value is saved in the routing table of the node. We modified the original routing table by addingthe pheromone value field. The path communication is selected based on the pheromone concentration andthe shortest path. Trust AODV+ Ant is compared with simple ant routing algorithm (SARA), AODV, andTrust AODV under DOS/DDOS attacks in terms of performance. Simulation results show that the packetdelivery ratio and throughput of the Trust AODV increase after using ant algorithm. However, in termsof end-to-end delay, there is no significant improvement

    Impact d'un modèle de propagation réaliste sur un protocole de routage pour les VANETs

    No full text
    Dans ce travail, nous présentons le protocole de routage V­AODV, une amélioration du protocole AODV (Ad­hoc On­demand Distance Vector) pour les VANETs (Vehicular Ad hoc NETworks)
    corecore