174 research outputs found

    Performance analysis to evaluate overtaking behavior on highways

    Get PDF
    Today, cities are facing new issues with the increase of the population and the massive urbanization. One of them is the mobility as the cities were not designed to support such increase. Improving mobility in smart cities, becomes an important challenge to avoid traffic jam and improving sustainability by reducing greenhouse effect. This contributes as well to having better life for citizen. Even with rich infrastructures, the vehicles behavior could decrease the traffic flow. This is why figure out how the mobility is done on the highways can give more details on how it can create traffic jams and then several solutions could be proposed to contribute to the improvements. This is the goal of this study. In this paper, a new stochastic model based on Markov chain is proposed, which represents the behaviors of overtaking on the highways. A full description of the model is given with numerical resolution to calculate several rewards such as delays and congestion. Intensive simulations were carried out to compare both simulations and analytical model results and to provide results for more complex configurations

    Distributed architecture for resource description and discovery in the IoT

    Full text link
    Nowadays, the Internet of Things (IoT) creates a vast ecosystem of intelligent objects interconnected via the Internet, allowing them to exchange information and to interact. This paradigm has been extended to a new concept, called the Web of Things (WoT), considering that every physical object can be accessed and controlled using Web-based languages and protocols, such as: the CoAP protocol which is becoming the most accepted and suitable protocol in this context. Moreover, the architectures currently proposed for the creation of IoT environments lack efficient and standard support for the discovery, selection and composition of IoT services and their integration in a scalable and interoperable way. To overcome this, in this work, we propose a hybrid and distributed CoAP-based architecture, considering all these aspects by combining the Fog Computing paradigm and structured P2P overlay networks. Furthermore, we describe the different components of our architecture and explain the interaction between them

    Dealing with complex routing requirements using an MCDM based approach

    Get PDF
    The last decade has witnessed an ever-growing user demand for a better QoS (Quality Of Service) and the fast growth of connected devices still put high pressure on the legacy network infrastructures. To improve network performances, better manage the resources and have a greater control over traffic transmission, intelligent routing procedures are increasingly demanded. Modern applications in the dynamic context of new emerging networks have their own routing requirements, in terms of set of metrics to consider, their importance and thresholds to respect. The objective of this work is to design an approach based on MCDM (Multi-Criteria Decision Making) to decide complex routing problems when assuming threshold constraints on metrics. We give the mathematical framework to capture such requirements and to decide the routing. A case study is presented to advocate the benefit of using our approach

    Dealing with complex routing requirements using an MCDM based approach

    Get PDF
    The last decade has witnessed an ever-growing user demand for a better QoS (Quality Of Service) and the fast growth of connected devices still put high pressure on the legacy network infrastructures. To improve network performances, better manage the resources and have a greater control over traffic transmission, intelligent routing procedures are increasingly demanded. Modern applications in the dynamic context of new emerging networks have their own routing requirements, in terms of set of metrics to consider, their importance and thresholds to respect. The objective of this work is to design an approach based on MCDM (Multi-Criteria Decision Making) to decide complex routing problems when assuming threshold constraints on metrics. We give the mathematical framework to capture such requirements and to decide the routing. A case study is presented to advocate the benefit of using our approach

    LoRaLOFT-A Local Outlier Factor-based Malicious Nodes detection Method on MAC Layer for LoRaWAN

    Get PDF
    LoRaWAN is one of the network technologies that provide a long-range wireless network at low energy consumption. However, the pure Aloha MAC protocol and the duty-cycle limitation at both end devices and gateway make LoRaWAN very sensitive to malicious behaviors in the MAC layer. Moreover, this kind of sensitivity makes the false-positives problem challenging for malicious behavior detection with simple threshold methods. This study investigates two malicious behaviors - greedy and attack on the MAC layer. Furthermore, by combining the threshold method with a Local Outlier Factor (LOF) model in machine learning, LoRaLOFT is proposed. It is a centralized malicious node detection method. Analytical results show that the proposed method gives high detection accuracy while significantly reducing the false-positive rate in both behaviors

    An MDP model-based initial strategy prediction method for LoRaWAN

    Get PDF
    As one of the technologies in the wide-area network category, LoRaWAN provides a wireless network with a large capacity of end devices (ED) in long-range. With a pure Aloha protocol implemented into its MAC layer, LoRaWAN can reduce its power consumption. Besides, some orthogonal transmission parameters give LoRaWAN capability to avoid collision and packet loss. Thus, allocating transmission parameters to increase the network performance becomes a challenging issue for LoRaWAN. Some dynamic Spreading Factor (SF) allocation strategies are studied in this paper. A distributed Markov Decision Process (MDP) model is constructed for the uplink transmission of the class-A device in LoRaWAN. The model is also solved and implemented to the algorithms for the initial strategy prediction. Analytical results show that the MDP model increases the performance of the studied algorithms on the transmission of the packet

    DoS detection in WSNs: Energy-efficient designs and modeling tools for choosing monitoring nodes

    No full text
    Part 6 (Modeling and simulation for system security), Chapter 28International audienceThe use of wireless sensor networks (WSNs) has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect clustered network against denial of service attacks with the use of traffic monitoring agents on some nodes. Those control nodes have to analyze the traffic inside a cluster and to send warnings to the cluster-head whenever an abnormal behavior (i.e., high packets throughput) is detected. But if the control nodes (cNodes) die out of exhaustion, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by renewing periodically the election process. Furthermore, we propose two energy-aware and secure methods to designate the cNodes in a hierarchically clustered WSN. The first one is a self-election process where nodes randomly designate themselves. We analyze the trade-offs between static and dynamic solutions by means of two complementary approaches: through simulation with the ns-2 simulation platform and by means of statistical modelchecking with the Hybrid Automata Stochastic Logic. The second algorithm for choosing cNodes is purely based on the residual energy of the sensors.We discuss limitations of this deterministic process concerning security and cluster coverage, and suggest workarounds. Again, experimental resultsfrom simulation experiments are provided to analyse the energy repartition in the network. All experimental outcomes show improvements of the loadbalancing in the network, while maintaining good detection coverage
    • …
    corecore