38 research outputs found

    An Energy-Efficient Cross-Layer approach for cloud wireless green communications

    Get PDF
    In wireless sensor networks (WSN), energy consumption is one of the crucial issues. It is very important to conserve energy at each sensor node to prolong a network lifetime. The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting information from deployed sensors up to the cloud resources. Many researches have been studied the designing of energy efficient technique based on one-layer stack model approach. In this study, we propose Energy-Efficient Cross-Layer (EECL) approach by using the interaction of MAC layer and physical layer information to be exploited by a network layer to achieve energy efficient communication. More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. The distance between nodes that influences energy consumption and Bit Error Rate (BER) are set to be the parameters which they are help in indicating the required power for each hop during route path selection in WSN and avoid the rely-hops that suffering from high average BER and with farther distance. We conduct the experiment using Matlab to evaluate the effectiveness of our proposed approach in terms of power consumption and obtained data rate. The results show that our proposed EECL approach outperforms its representatives in the ability of tuning the power utilized in respect with required data rate that could satisfy the desired Quality-of-Service (QoS)

    VANET routing protocols: review, implementation and analysis

    Get PDF
    Wireless technology is developing very fast. Most of the researchers are working in the field of wireless communication. VANET is an evolving technology in the field of wireless communication and with the advancement it will contribute more to the smart transportation system in days to come. VANET gives a communication framework that has enhanced the traffic service and helped in reducing the road accidents. Data sharing in this system is time sensitive and require quick and vigorous network connection forming. VANET is serving the said purposes but there are some issues and challenges like efficient handling of fast handovers for video streaming applications. Therefore, in this paper we have reviewed and discussed several studies related to the routing protocols to judge which one is the best for video applications in VANET. Moreover, after studying different systems made by the researchers, we have critically analyzed them and found advantages and disadvantages for the future works. Also, simulation is performed to check the delays and throughput comparisons between the routing protocols. Furthermore, with the experiments we have proven that the AODV performance is better than the other ad-hoc protocols in VANET environment

    An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks

    Full text link
    In heterogeneous vehicular networks, the most challenging issue is obtaining an efficient vertical handover during the vehicle roaming process. Efficient network selection process can achieve satisfactory Quality of Service for ongoing applications. In this paper, we propose an Intelligent Network Selection (INS) scheme based on maximization scoring function to efficiently rank available wireless network candidates. Three input parameters were utilized to develop a maximization scoring function that collected data from each network candidate during the selection process. These parameters are: Faded Signal-to-Noise Ratio, Residual Channel Capacity, and Connection Life Time. The results show that the proposed INS scheme is more efficient at decreasing handover delays, End-to-End delays for VoIP and Video applications, packet loss ratios as well as increasing the efficiency of network selection processes in comparison with the state of the arts.Sadiq, AS.; Abu Bakar, K.; Ghafoor, KZ.; Lloret, J.; Khokhar, R. (2013). An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks. Mobile Networks and Applications. 18(6):879-895. doi:10.1007/s11036-013-0465-8S879895186Chen YS, Cheng CH, Hsu CS, Chiu GM (2009) Network mobility protocol for vehicular ad hoc networks. In: Wireless communications and networking conference, IEEE, pp 1–6Ghafoor KZ, Abu Bakar K, Lee K, AL-Hashimi H (2010) A novel delay-and reliability-aware inter-vehicle routing protocol. Netw Protoc Algorithm 2(2):66–88Ghafoor KZ, Abu Bakar K, Lloret J, Khokhar RH, Lee KC (2013) Intelligent beaconless geographical forwarding for urban vehicular environments. Wirel netw 19(3):345–362Prakash A, Tripathi S, Verma R, Tyagi N, Tripathi R, Naik K (2011) Vehicle assisted cross-layer handover scheme in nemo-based vanets (vanemo). Int J Internet Protoc Technol 6(1):83–95Lee C-W, Chen MC, Sun YS (2013) Protocol and architecture supports for network mobility with qos-handover for high-velocity vehicles. Wirel Netw 19(5):811–830Pereira P, Casaca A, Rodrigues JJPC, Soares VNGJ, Triay Joan, Cervelló-Pastor C (2011) From delay-tolerant networks to vehicular delay-tolerant networks. IEEE Commun Surv Tutor 1(4):1166–1182Lloret J, Canovas A, Catalá A, Garcia M (2013) Group-based protocol and mobility model for vanets to offer internet access. J Netw Comput Appl 36(3):10271038Ghafoor KZ, Lloret J, Abu Bakar K, Sadiq AS, Mussa SAB (2013) Beaconing approaches in vehicular ad hoc networks: A survey. Wirel Pers Commun 1–28. doi: 10.1007/s11277-013-1222-9Wang L, Kuo G (2011) Mathematical modeling for network selection in heterogeneous wireless networks?a tutorial. IEEE Commun Surv Tutor 15(1):271–292Nguyen-Vuong QT, Ghamri-Doudane Y, Agoulmine N (2008) On utility models for access network selection in wireless heterogeneous networks. In: Network operations and management symposium. Salvador, Bahia, pp 144–151Canovas A, Bri D, Sendra S, Lloret J (2012) Vertical WLAN handover algorithm and protocol to improve the IPTV QoS of the end user. ON, Ottawa, pp 1901–1905Varma VK, Ramesh S, Wong KD, Barton M, Hayward G, Friedhoffer JA (2003) Mobility management in integrated UMTS/WLAN networks. In: International conference on communications. IEEE, USA, pp 1048–1053Mohanty S (2006) A new architecture for 3G and WLAN integration and inter-system handover management. Wirel Netw 12(6):733–745Rivera-Lara EJ, Herrerías-Hernández R, Pérez-Díaz JA, García-Hernández CF (2008) Analysis of the relationship between QoS and snr for an 802.11 g wlan. In: International conference on communication theory, reliability, and quality of service. IEEE, Bucharest, pp 103–107Rappaport TS (2002) Wireless communications principles and practice, 2nd edn. Prentice Hall PTR, Upper Saddle RiverCarpenter T (2007) CWNA certified wireless network administrator official study guide (Exam PW0-100). McGraw-Hill Osborne Media, New YorkEberspacher J, Eberspächer J, Bettstetter C, Vögel HJ, Hartmann C, Vgel HJ, et al (2009) GSM-architecture, protocols and services. Wiley, New YorkWLAN-MAC (2007) Wireless lan medium access control (MAC) and physical layer specifications. IEEE Comput Soc, pp 1–1183. http://standards.ieee.org/getieee802/802.11.html ,Kappler C (2009) UMTS networks and beyond. Wiley, New YorkEgoh K, De S (2006) A multi-criteria receiver-side relay election approach in wireless ad hoc networks. In: Military communications conference. IEEE, Washington, DC, pp 1–7Bucciol P, Ridolfo F, De Martin JC (2008) Multicast voice transmission over vehicular ad hoc networks: issues and challenges. In: Seventh international conference on networking. IEEE, Cancun, pp 746–751Thonet G, Allard-Jacquin P, Colle P (2008) Zigbee–wifi coexistence, Schneider electric white paperRibadeneira AF (2007) An analysis of the mos under conditions of delay, jitter and packet loss and an analysis of the impact of introducing piggybacking and Reed Solomon fec for VoIP. Computer science theses, pp 44Karapantazis S, Pavlidou FN (2009) Voip: A comprehensive survey on a promising technology. Comput Netw 53(12):2050–2090Ortiz C, Frigon JF, Sanso B, Girard A (2008) Effective bandwidth evaluation for voip applications in ieee 802.11 networks. In: Wireless communications and mobile computing conference. IEEE, Crete Island, pp 926–931International Telecommunication Union (1996) Telecommunication Standardization Sector. Methods for subjective determination of transmission quality, international telecommunication unionLi D, Pan J (2008) Evaluating MPEG-4/AVC video streaming over ieee 802.11 wireless distribution system. In: Wireless communications and networking conference. WCNC 2008 IEEE, IEEE, pp 2147–2152Yan X, Mani N, Cekercioglu YA (2008) A traveling distance prediction based method to minimize unnecessary handovers from cellular networks to WLANS. Commun Lett IEEE 12(1):14–16Lo SC, Lee G, Chen WT, Liu JC (2004) Architecture for mobility and QoS support in all-ip wireless networks. IEEE J Sel Areas Commun 22(4):691–705Pries R, Staehle D, Tran-Gia P, Gutbrod T (2008) A seamless vertical handover approach. In: Cerd?-Alabern L (ed) Wireless systems and mobility in next generation internet, vol 5122. Springer, Berlin Heidelberg, pp 167–184Munasinghe KS, Jamalipour A (2010) An analytical evaluation of mobility management in integrated WLAN-UMTS networks. Comput Electr Eng 36(4):735–75

    An Improved Imperceptibility and Robustness of 4x4 DCT-SVD Image Watermarking with a Modified Entropy

    Get PDF
    A digital protection against unauthorized distribution of digital multimedia is highly on demand. Digital watermarking is a defence in multimedia protection for authorized ownership. This paper proposes an improved watermarking based on 4Ă—4 DCT-SVD blocks using modified entropy in image watermarking. A modified entropy is used to select unnoticeable blocks. The proposed watermarking scheme utilizes the lowest entropy values to determine unnoticeable regions of the watermarked image. This paper investigates the relationship between U(2,1) and U(3,1) coefficients of the U matrix 4Ă—4 DCT-SVD in image watermarking. The proposed watermarking scheme produces a great level of robustness and imperceptibility of the watermarked image against different attacks. The proposed scheme shows the improvement in terms of structural similarity index and normalized correlation of the watermarked image

    Cloud Computing Delivery and Delivery Models: Opportunity and Challenges

    Get PDF
    The rapid growth of Internet and computing field results in several technological advantages. In the meanwhile, security challenges that emerge along with the growth complicate the aspects of cloud based computing. Security is by now one of the most pressing concerns in Internet business where cloud computing lies in. Cloud-based services are evolving each day introducing new business trends. Since cloud computing entails storage of information in remote servers, unauthorized access to such sensitive information becomes a looming concern. The advantages offered by cloud computing, without robust security measures and flexibility, could lead to lose its credibility. This paper reviews various aspects of cloud computing and issues inherent within its contexts. This paper has identified the gap within the topic of study through the creation of the conceptual framework, which is designed as the way of attempting to connect the different concepts. The intention of the theoretical framework is to determine the potential gaps in the research and link the gaps by the present study and its results. The delivery of both, the cloud computing as well as its models is a relatively new phenomenon within the academic libraries where the study is at the stages of nascent. The conceptual framework could not be comprehensive. Instead, it was a progressive work. Thus, this new topic could be added to form the branch within the theoretical framework. This article tries to look at different concepts of cloud computing as well as the issues, which are inherent within its contexts. It analyzes this part due to the advent and growth in the sector of cloud computing, which is developing the platform for the computing in the future

    An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    Get PDF
    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches

    Advanced mobility handover for mobile IPv6 based wireless networks

    Get PDF
    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.Sadiq, AS.; Fisal, NB.; Ghafoor, KZ.; Lloret, J. (2014). Advanced mobility handover for mobile IPv6 based wireless networks. Scientific World Journal. 2014. doi:10.1155/2014/602808S2014You, I., Han, Y.-H., Chen, Y.-S., & Chao, H.-C. (2011). Next generation mobility management. Wireless Communications and Mobile Computing, 11(4), 443-445. doi:10.1002/wcm.1136Li, L., Ma, L., Xu, Y., & Fu, Y. (2014). Motion Adaptive Vertical Handoff in Cellular/WLAN Heterogeneous Wireless Network. The Scientific World Journal, 2014, 1-7. doi:10.1155/2014/341038Nahrstedt, K. (2011). Quality of Service in Wireless Networks Over Unlicensed Spectrum. Synthesis Lectures on Mobile and Pervasive Computing, 6(1), 1-176. doi:10.2200/s00383ed1v01y201109mpc008Cho, I., Okamura, K., Kim, T. W., & Hong, C. S. (2013). Performance analysis of IP mobility with multiple care-of addresses in heterogeneous wireless networks. Wireless Networks, 19(6), 1375-1386. doi:10.1007/s11276-012-0539-8Magagula, L. A., Chan, H. A., & Falowo, O. E. (2011). Handover approaches for seamless mobility management in next generation wireless networks. Wireless Communications and Mobile Computing, 12(16), 1414-1428. doi:10.1002/wcm.1074Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., Lloret, J., & Mirjalili, S. (2012). A smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks. International Journal of Communication Systems, 27(7), 969-990. doi:10.1002/dac.2386Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., Lloret, J., & Khokhar, R. (2013). An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks. Mobile Networks and Applications, 18(6), 879-895. doi:10.1007/s11036-013-0465-8Lee, K.-W., Seo, W.-K., Cho, Y.-Z., Kim, J.-W., Park, J.-S., & Moon, B.-S. (2009). Inter-domain handover scheme using an intermediate mobile access gateway for seamless service in vehicular networks. International Journal of Communication Systems, 23(9-10), 1127-1144. doi:10.1002/dac.1076Lee, C.-W., Chen, M. C., & Sun, Y. S. (2012). Protocol and architecture supports for network mobility with QoS-handover for high-velocity vehicles. Wireless Networks, 19(5), 811-830. doi:10.1007/s11276-012-0503-7Castelluccia, C. (2000). HMIPv6. ACM SIGMOBILE Mobile Computing and Communications Review, 4(1), 48-59. doi:10.1145/360449.360474Modares, H., Moravejosharieh, A., Lloret, J., & Salleh, R. B. (2016). A Survey on Proxy Mobile IPv6 Handover. IEEE Systems Journal, 10(1), 208-217. doi:10.1109/jsyst.2013.2297705Modares, H., Moravejosharieh, A., Lloret, J., & Salleh, R. (2014). A survey of secure protocols in Mobile IPv6. Journal of Network and Computer Applications, 39, 351-368. doi:10.1016/j.jnca.2013.07.013Modares, H., Moravejosharieh, A., Salleh, R. B., & Lloret, J. (2014). Enhancing Security in Mobile IPv6. ETRI Journal, 36(1), 51-61. doi:10.4218/etrij.14.0113.0177Meneguette, R. I., Bittencourt, L. F., & Madeira, E. R. M. (2013). A seamless flow mobility management architecture for vehicular communication networks. Journal of Communications and Networks, 15(2), 207-216. doi:10.1109/jcn.2013.000034Al-Surmi, I., Othman, M., Abdul Hamid, N. A. W., & Ali, B. M. (2013). Enhancing inter-PMIPv6-domain for superior handover performance across IP-based wireless domain networks. Wireless Networks, 19(6), 1317-1336. doi:10.1007/s11276-012-0535-

    An adaptive handover prediction scheme for seamless mobility based wireless networks

    Get PDF
    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.Sadiq, AS.; Fisal, NB.; Ghafoor, KZ.; Lloret, J. (2014). An adaptive handover prediction scheme for seamless mobility based wireless networks. Scientific World Journal. 2014. doi:10.1155/2014/610652S2014You, I., Han, Y.-H., Chen, Y.-S., & Chao, H.-C. (2011). Next generation mobility management. Wireless Communications and Mobile Computing, 11(4), 443-445. doi:10.1002/wcm.1136Sepúlveda, R., Montiel-Ross, O., Quiñones-Rivera, J., & Quiroz, E. E. (2012). WLAN Cell Handoff Latency Abatement Using an FPGA Fuzzy Logic Algorithm Implementation. Advances in Fuzzy Systems, 2012, 1-10. doi:10.1155/2012/219602Song, W. (2012). Resource reservation for mobile hotspots in vehicular environments with cellular/WLAN interworking. EURASIP Journal on Wireless Communications and Networking, 2012(1). doi:10.1186/1687-1499-2012-18Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., Lloret, J., & Khokhar, R. (2013). An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks. Mobile Networks and Applications, 18(6), 879-895. doi:10.1007/s11036-013-0465-8Nahrstedt, K. (2011). Quality of Service in Wireless Networks Over Unlicensed Spectrum. Synthesis Lectures on Mobile and Pervasive Computing, 6(1), 1-176. doi:10.2200/s00383ed1v01y201109mpc008Magagula, L. A., Chan, H. A., & Falowo, O. E. (2011). Handover approaches for seamless mobility management in next generation wireless networks. Wireless Communications and Mobile Computing, 12(16), 1414-1428. doi:10.1002/wcm.1074Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., Lloret, J., & Mirjalili, S. (2012). A smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks. International Journal of Communication Systems, 27(7), 969-990. doi:10.1002/dac.2386Çeken, C., Yarkan, S., & Arslan, H. (2010). Interference aware vertical handoff decision algorithm for quality of service support in wireless heterogeneous networks. Computer Networks, 54(5), 726-740. doi:10.1016/j.comnet.2009.09.018Dutta, A., Das, S., Famolari, D., Ohba, Y., Taniuchi, K., Fajardo, V., … Schulzrinne, H. (2007). Seamless proactive handover across heterogeneous access networks. Wireless Personal Communications, 43(3), 837-855. doi:10.1007/s11277-007-9266-3Xu, C., Teng, J., & Jia, W. (2010). Enabling faster and smoother handoffs in AP-dense 802.11 wireless networks. Computer Communications, 33(15), 1795-1803. doi:10.1016/j.comcom.2010.04.044Holis, J., & Pechac, P. (2008). Elevation Dependent Shadowing Model for Mobile Communications via High Altitude Platforms in Built-Up Areas. IEEE Transactions on Antennas and Propagation, 56(4), 1078-1084. doi:10.1109/tap.2008.91920

    Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information

    Get PDF
    This is an accepted manuscript of an article published by Elsevier in Computer Networks on 04/06/2018, available online: https://doi.org/10.1016/j.comnet.2018.03.019 The accepted version of the publication may differ from the final published version.© 2018 Elsevier B.V. As part of the new era the Internet of Things, an evolved form of Vehicle Ad-hoc Networks has recently emerged as the Internet of Vehicles (IoV). IoV has obtained a lot of attention among smart vehicle manufactures and illustrations due to its promising potential, but there are still some problems and challenges that need to be addressed. Transmission error occurs when an emergency message is disseminated to provide traffic awareness, and vehicles have to increase their channel transmission power to ensure further coverage and mitigate possible accidents. This might cause channel congestion and unnecessary power consumption due to an inaccurate transmission power setup. A promising solution could be achieved via periodically and predictively evaluating channel and GEO information that is transmitted over piggybacked beacons. Thus, in this paper we propose a Transmission Power Adaptation (TPA) scheme for obtaining better power tuning, which senses and examines the probability of channel congestion. Afterwards, it proactively predicts upcoming channel statuses using developed evaluation-weighted matrix, which observes correlations between coefficients of variance for estimated metrics. Considering beacon transmission error rate, crowding inter-vehicle distance, and channel delay, the matrix is periodically constructed and proavtively weighted for each metric based on a predefined threshold value. Eventually, predicted channel status is used as an indicator to adjust transmission power. This leads to decreased channel congestion and better awareness in IoV. The performance of the proposed TPA scheme is evaluated using OMNeT++ simulation tools. The simulation results show that our proposed TPA scheme performs better than existing method in terms of overall throughput, average beacon congestion rate, beacon recipient rate probabilities, channel-busy time, transmission power over distance, and accident probabilities.Published versio
    corecore