36 research outputs found

    Quality of service optimization in IoT driven intelligent transportation system

    Get PDF
    High mobility in ITS, especially V2V communication networks, allows increasing coverage and quick assistance to users and neighboring networks, but also degrades the performance of the entire system due to fluctuation in the wireless channel. How to obtain better QoS during multimedia transmission in V2V over future generation networks (i.e., edge computing platforms) is very challenging due to the high mobility of vehicles and heterogeneity of future IoT-based edge computing networks. In this context, this article contributes in three distinct ways: to develop a QoS-aware, green, sustainable, reliable, and available (QGSRA) algorithm to support multimedia transmission in V2V over future IoT-driven edge computing networks; to implement a novel QoS optimization strategy in V2V during multimedia transmission over IoT-based edge computing platforms; to propose QoS metrics such as greenness (i.e., energy efficiency), sustainability (i.e., less battery charge consumption), reliability (i.e., less packet loss ratio), and availability (i.e., more coverage) to analyze the performance of V2V networks. Finally, the proposed QGSRA algorithm has been validated through extensive real-time datasets of vehicles to demonstrate how it outperforms conventional techniques, making it a potential candidate for multimedia transmission in V2V over self-adaptive edge computing platforms

    Decentralized energy efficient model for data transmission in IoT-based healthcare system

    Get PDF
    The growing world population is facing challenges such as increased chronic diseases and medical expenses. Integrate the latest modern technology into healthcare system can diminish these issues. Internet of medical things (IoMT) is the vision to provide the better healthcare system. The IoMT comprises of different sensor nodes connected together. The IoMT system incorporated with medical devices (sensors) for given the healthcare facilities to the patient and physician can have capability to monitor the patients very efficiently. The main challenge for IoMT is the energy consumption, battery charge consumption and limited battery lifetime in sensor based medical devices. During charging the charges that are stored in battery and these charges are not fully utilized due to nonlinearity of discharging process. The short time period needed to restore these unused charges is referred as recovery effect. An algorithm exploiting recovery effect to extend the battery lifetime that leads to low consumption of energy. This paper provides the proposed adaptive Energy efficient (EEA) algorithm that adopts this effect for enhancing energy efficiency, battery lifetime and throughput. The results have been simulated on MATLAB by considering the Li-ion battery. The proposed adaptive Energy efficient (EEA) algorithm is also compared with other state of the art existing method named, BRLE. The Proposed algorithm increased the lifetime of battery, energy consumption and provides the improved performance as compared to BRLE algorithm. It consumes low energy and supports continuous connectivity of devices without any loss/interruptions

    Towards convergence of AI and IoT for energy efficient communication in smart homes

    Get PDF
    The convergence of Artificial Intelligence (AI) and Internet of Things (IoT) promotes the energy efficient communication in smart homes. Quality of Service (QoS) optimization during video streaming through wireless micro medical devices (WMMD) in smart healthcare homes is the main purpose of this research. This paper contributes in four distinct ways. First, to propose a novel Lazy Video Transmission Algorithm (LVTA). Second, a novel Video Transmission Rate Control Algorithm (VTRCA) is proposed. Third, a novel cloud-based video transmission framework is developed. Fourth, the relationship between buffer size and performance indicators i.e., peak-to-mean ratio (PMR), energy (i.e., encoding and transmission) and standard deviation is investigated while comparing the LVTA, VTRCA, and Baseline approaches. Experimental results demonstrate that the reduction in encoding (32%, 35.4%) and transmission (37%, 39%) energy drains, PMR (5, 4), and standard deviation (3dB, 4dB) for VTRCA and LVTA, respectively, is greater than that obtained by Baseline during video streaming through WMMD

    A survey on 802.11 MAC industrial standards, architecture, security & supporting emergency traffic: Future directions

    Get PDF
    The IEEE 802.11-based Wireless Local Area Network (WLAN) has become a ubiquitous networking technology deployed around the world. IEEE 802.11 WLAN are now widely used for real-time multimedia applications (e.g. voice and video streaming) and distributed emergency services such as telemedicine, healthcare, and disaster recovery. Both time-sensitive applications and emergency traffic are not only characterized by their high bandwidth requirements, but also impose severe restrictions on end-to-end packet delays (i.e. response time), jitter (i.e. delay variance) and packet losses. In other words, time-sensitive applications and emergency services require a strict Quality of Service (QoS) guarantee. Medium Access Control (MAC) protocol is one of the key factors that influence the performance of WLANs. The IEEE 802.11e working group enhanced the 802.11 MAC to provide QoS support in WLANs. However, recent studies have shown that 802.11e Enhanced Distributed Channel Access (EDCA) standard has limitations and it neither supports strict QoS guarantee nor emergency traffic. Providing a strict QoS guarantee as well as supporting emergency traffic under high traffic loads is really a challenging task in WLANs. A thorough review of literature on QoS MAC protocols reveals that most QoS schemes have focused on either network throughput enhancement or service differentiation by adjusting Contention Window (CW) or Inter-Frame Spaces (IFS). Therefore, a research on developing techniques to provide a strict QoS guarantee as well as support for emergency traffic is required in such systems. To achieve this objective, a general understanding of WLANs is required. This paper aims introduce various key concepts of WLANs that are necessary for design, model and develop such framework. Our main contribution in this paper is the QoS for IEEE 802.11 WLAN and MAC protocols for supporting industrial emergency traffic over network and future directions

    A survey on the architecture, application, and security of software defined networking: challenges and open issues

    Get PDF
    Software Defined Networking (SDN) is a new technology that makes computer networks farther programmable. SDN is currently attracting significant consideration from both academia and industry. SDN is simplifying organisations to implement applications and assist flexible delivery, offering the capability of scaling network resources in lockstep with application and data. This technology allows the user to manage the network easily by permitting the user to control the applications and operating system. SDN not only introduces new ways of interaction within network devices, but it also gives more flexibility for the existing and future networking designs and operations. SDN is an innovative approach to design, implement, and manage networks that separate the network control (control plane) and the forwarding process (data plane) for a better user experience. The main differentiation between SDN and Traditional Networking is that SDN removes the decision-making part from the routers and it provides, logically, a centralised Control-Plane that creates a network view for the control and management applications. Through the establishment of SDN, many new network capabilities and services have been enabled, such as Software Engineering, Traffic Engineering, Network Virtualisation and Automation, and Orchestration for Cloud Applications. This paper surveys the state-of-the-art contribution such as a comparison between SDN and traditional networking. Also, comparison with other survey works on SDN, new information about controller, details about OpenFlow architecture, configuration, comprehensive contribution about SDN security threat and countermeasures, SDN applications, benefit of SDN, and Emulation & Tested for SDN. In addition, some existing and representative SDN tools from both industry and academia are explained. Moreover, future direction of SDN security solutions is discussed in detail

    A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    No full text
    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods

    Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications

    No full text
    In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems became the major concern for researchers and health organizations. With time, the sophistication of these attacks is increasing. Therefore, healthcare service providers must implement efficient security mechanisms carefully while taking the advantages of connected devices without compromising the patient safety and disturbing the real-time health services. A digital twin (DT) is a virtual representation of a real-time counterpart of a physical world. DT offers significant advantages to cybersecurity experts, empowering them to predict risks without entering the physical world, and to simulate and test cyber-attacks that would otherwise be infeasible to do in real-time in the physical environment. DT in healthcare helps to identify security vulnerabilities, conduct attack simulations, and potential security breaches by creating a virtual replica of the targeted healthcare systems. In this paper, a novel and automated conceptual framework is developed for reinforcing the cybersecurity in IoT-based healthcare using DT technology. It includes the conceptualization and analysis of the proposed framework which can provide dynamic and adaptive security solution to identify real-time threats and vulnerabilities in IoTbased healthcare applications

    Towards Integration of Security and Safety Measures for Critical Infrastructures Based on Bayesian Networks and Graph Theory: A Systematic Literature Review

    No full text
    In recent times, security and safety are, at least, conducted in safety-sensitive or critical sectors. Nevertheless, both processes do not commonly analyze the impact of security risks on safety. Several scholars are focused on integrating safety and security risk assessments, using different methodologies and tools in critical infrastructures (CIs). Bayesian networks (BN) and graph theory (GT) have received much attention from academia and industries to incorporate security and safety features for different CI applications. Hence, this study aims to conduct a systematic literature review (SLR) for co-engineering safety and security using BN or GT. In this SLR, the preferred reporting items for systematic reviews and meta-analyses recommendations (PRISMA) are followed. Initially, 2295 records (acquired between 2011 and 2020) were identified for screening purposes. Later on, 240 articles were processed to check eligibility criteria. Overall, this study includes 64 papers, after examining the pre-defined criteria and guidelines. Further, the included studies were compared, regarding the number of required nodes for system development, applied data sources, research outcomes, threat actors, performance verification mechanisms, implementation scenarios, applicability and functionality, application sectors, advantages, and disadvantages for combining safety, and security measures, based on GT and BN. The findings of this SLR suggest that BN and GT are used widely for risk and failure management in several domains. The highly focused sectors include studies of the maritime industry (14%), vehicle transportation (13%), railway (13%), nuclear (6%), chemical industry (6%), gas and pipelines (5%), smart grid (5%), network security (5%), air transportation (3%), public sector (3%), and cyber-physical systems (3%). It is also observed that 80% of the included studies use BN models to incorporate safety and security concerns, whereas 15% and 5% for GT approaches and joint GT and BN methodologies, respectively. Additionally, 31% of identified studies verified that the developed approaches used real-time implementation, whereas simulation or preliminary analysis were presented for the remaining methods. Finally, the main research limitations, concluding remarks and future research directions, are presente

    Towards Integration of Security and Safety Measures for Critical Infrastructures Based on Bayesian Networks and Graph Theory: A Systematic Literature Review

    No full text
    In recent times, security and safety are, at least, conducted in safety-sensitive or critical sectors. Nevertheless, both processes do not commonly analyze the impact of security risks on safety. Several scholars are focused on integrating safety and security risk assessments, using different methodologies and tools in critical infrastructures (CIs). Bayesian networks (BN) and graph theory (GT) have received much attention from academia and industries to incorporate security and safety features for different CI applications. Hence, this study aims to conduct a systematic literature review (SLR) for co-engineering safety and security using BN or GT. In this SLR, the preferred reporting items for systematic reviews and meta-analyses recommendations (PRISMA) are followed. Initially, 2295 records (acquired between 2011 and 2020) were identified for screening purposes. Later on, 240 articles were processed to check eligibility criteria. Overall, this study includes 64 papers, after examining the pre-defined criteria and guidelines. Further, the included studies were compared, regarding the number of required nodes for system development, applied data sources, research outcomes, threat actors, performance verification mechanisms, implementation scenarios, applicability and functionality, application sectors, advantages, and disadvantages for combining safety, and security measures, based on GT and BN. The findings of this SLR suggest that BN and GT are used widely for risk and failure management in several domains. The highly focused sectors include studies of the maritime industry (14%), vehicle transportation (13%), railway (13%), nuclear (6%), chemical industry (6%), gas and pipelines (5%), smart grid (5%), network security (5%), air transportation (3%), public sector (3%), and cyber-physical systems (3%). It is also observed that 80% of the included studies use BN models to incorporate safety and security concerns, whereas 15% and 5% for GT approaches and joint GT and BN methodologies, respectively. Additionally, 31% of identified studies verified that the developed approaches used real-time implementation, whereas simulation or preliminary analysis were presented for the remaining methods. Finally, the main research limitations, concluding remarks and future research directions, are presente
    corecore