154 research outputs found

    UHEED - an unequal clustering algorithm for wireless sensor networks

    Get PDF
    Prolonging the lifetime of wireless sensor networks has always been a determining factor when designing and deploying such networks. Clustering is one technique that can be used to extend the lifetime of sensor networks by grouping sensors together. However, there exists the hot spot problem which causes an unbalanced energy consumption in equally formed clusters. In this paper, we propose UHEED, an unequal clustering algorithm which mitigates this problem and which leads to a more uniform residual energy in the network and improves the network lifetime. Furthermore, from the simulation results presented, we were able to deduce the most appropriate unequal cluster size to be used

    Multi-path routing for mission critical applications in software-defined networks

    Get PDF
    Mission critical applications depends on the communication among other systems and/or users and thus, the traffic/flows generated by these applications could bring profound consequences in sectors such as military, hospital, automotive safety and air-traffic control systems. These critical flows require stringent QoS requirements on parameters such as throughput, packet loss, latency, jitter and redundancy. Network operators must have tools that allow them to provide special treatment to such mission-critical flows based on specific application requirements. Due to the constraints of traditional networks, we should seek for solutions supported by de-centralised approaches offered by SDN. In this paper, we propose a solution to achieve the stringent QoS requirement of such mission critical flows in multi-path environments based on SDN. This solution allows the network operator to prioritise traffic between specific end points. Also, using the overall view of the network, the solution allows evaluation of the path loads between two endpoints and to opt for the less congested path. Moreover, this paper tries to demonstrate a satisfactory network performance by presenting trade-offs between throughput and the number of hops within a multi-path network. The proposed solution is implemented in the application and control layer of the OpenDaylight Controller. The networking devices were simulated using Mininet simulator and background traffic was generated using Iperf

    On the performance, availability and energy consumption modelling of clustered IoT systems

    Get PDF
    Wireless sensor networks (WSNs) form a large part of the ecosystem of the Internet of Things (IoT), hence they have numerous application domains with varying performance and availability requirements. Limited resources that include processing capability, queue capacity, and available energy in addition to frequent node and link failures degrade the performance and availability of these networks. In an attempt to efficiently utilise the limited resources and to maintain the reliable network with efficient data transmission; it is common to select a clustering approach, where a cluster head is selected among the diverse IoT devices. This study presents the stochastic performance as well as the energy evaluation model for WSNs that have both node and link failures. The model developed considers an integrated performance and availability approach. Various duty cycling schemes within the medium-access control of the WSNs are also considered to incorporate the impact of sleeping/idle states that are presented using analytical modeling. The results presented using the proposed analytical models show the effects of factors such as failures, various queue capacities and system scalability. The analytical results presented are in very good agreement with simulation results and also present an important fact that the proposed models are very useful for identification of thresholds between WSN system characteristics

    Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation

    Get PDF
    Currently, Android apps are easily targeted by malicious network traffic because of their constant network access. These threats have the potential to steal vital information and disrupt the commerce, social system, and banking markets. In this paper, we present a malware detection system based on word2vec-based transfer learning and multi-model image representation. The proposed method combines the textual and texture features of network traffic to leverage the advantages of both types. Initially, the transfer learning method is used to extract trained vocab from network traffic. Then, the malware-to-image algorithm visualizes network bytes for visual analysis of data traffic. Next, the texture features are extracted from malware images using a combination of scale-invariant feature transforms (SIFTs) and oriented fast and rotated brief transforms (ORBs). Moreover, a convolutional neural network (CNN) is designed to extract deep features from a set of trained vocab and texture features. Finally, an ensemble model is designed to classify and detect malware based on the combination of textual and texture features. The proposed method is tested using two standard datasets, CIC-AAGM2017 and CICMalDroid 2020, which comprise a total of 10.2K malware and 3.2K benign samples. Furthermore, an explainable AI experiment is performed to interpret the proposed approach

    DALICA: intelligent agents for user profile deduction.

    Get PDF
    In this paper we are going to discuss the potential contributions that agent technology can bring into an Ambient Intelligence scenario, related to the fruition of cultural assets. The users are located in an area which is known to the agents: in the application, the users are the visitors of Villa Adriana, an archaeological site in Tivoli, near Rome (Italy). Agents are aware of user moves by means of Galileo satellite signal, i.e., the proposed application is based on a blend of different technologies. The agents, developed in the DALI logic programming language, pro-actively learn and/or enhance users profiles and are thus capable to competently assist the users during their visit, to elicit habits and preferences and to propose cultural assets to the users according to the learned profile

    Packet arrival analysis in wireless sensor networks

    Get PDF
    Distributed sensor networks have been discussed for more than 30 years, but the vision of Wireless Sensor Networks (WSNs) has been brought into reality only by the rapid advancements in the areas of sensor design, information technologies, and wireless networks that have paved the way for the proliferation of WSNs. The unique characteristics of sensor networks introduce new challenges, amongst which prolonging the sensor lifetime is the most important. WSNs have seen a tremendous growth in various application areas including health care, environmental monitoring, security, and military purposes despite prominent performance and availability challenges. Clustering plays an important role in enhancement of the life span and scalability of the network, in such applications. Although researchers continue to address these grand challenges, the type of distributions for arrivals at the cluster head and intermediary routing nodes is still an interesting area of investigation. Modelling the behaviour of the networks becomes essential for estimating the performance metrics and further lead to decisions for improving the network performance, hence highlighting the importance of identifying the type of inter-arrival distributions at the cluster head. In this paper, we present extensive discussions on the assumptions of exponential distributions in WSNs, and present numerical results based on Q-Q plots for estimating the arrival distributions. The work is further extended to understand the impact of end-to-end delay and its effect on inter-arrival time distributions, based on the type of medium access control used in WSNs. Future work is also presented on the grounds that such comparisons based on simple eye checks are insufficient. Since in many cases such plots may lead to incorrect conclusions, demanding the necessity for validating the types of distributions. Statistical analysis is necessary to estimate and validate the empirical distributions of the arrivals in WSNs

    Does the assumption of exponential arrival distributions in wireless sensor networks hold?

    Get PDF
    Wireless Sensor Networks have seen a tremendous growth in various application areas despite prominent performance and availability challenges. One of the common configurations to prolong the lifetime and deal with the path loss phenomena having a multi-hop set-up with clusters and cluster heads to relay the information. Although researchers continue to address these challenges, the type of distribution for arrivals at the cluster head and intermediary routing nodes is still an interesting area of investigation. The general practice in published works is to compare an empirical exponential arrival distribution of wireless sensor networks with a theoretical exponential distribution in a Q-Q plot diagram. In this paper, we show that such comparisons based on simple eye checks are not sufficient since, in many cases, incorrect conclusions may be drawn from such plots. After estimating the Maximum Likelihood parameters of empirical distributions, we generate theoretical distributions based on the estimated parameters. By conducting Kolmogorov-Smirnov Test Statistics for each generated inter-arrival time distributions, we find out, if it is possible to represent the traffic into the cluster head by using theoretical distribution. Empirical exponential arrival distribution assumption of wireless sensor networks holds only for a few cases. There are both theoretically known such as Gamma, Log-normal and Mixed Log-Normal of arrival distributions and theoretically unknown such as non-Exponential and Mixed cases of arrival in wireless sensor networks. The work is further extended to understand the effect of delay on inter-arrival time distributions based on the type of medium access control used in wireless sensor networks
    corecore