367 research outputs found

    Fuzzy Energy Efficient Routing for Internet of Things (IoT)

    Get PDF
    © 2018 IEEE. Internet of Things (IoT) envisions the idea of universal smart connectivity of everything between physical and digital world. Every smart device in IoT consists of a power source sensors, microprocessor and transceiver module to sense, communicate and exchange data among each other. In distributed IoT networks, the energy efficiency of the smart objects is a key factor in the overall network performance. Most of the times IoT\u27s have to deal with low power and communication disconnection due to the limited memory, processing capability, and power. Few techniques for stringent Quality of Service (QoS) routing in IoT have been proposed despite its great impact on future network. In this paper, we propose energy-efficient possibilistic routing based on fuzzy logic model for IoT to controls the transmission of the routing request packets to increase the network lifetime and decrease the packet loss. The proposed fuzzy logic controller accepts the input descriptors in routing metrics to optimize the network performance. The proposed algorithm adopts energy-efficient possibilistic routing by using fuzzy inference rules to merge energy aware metrics for choosing the optimal delivery path. In the simulations, we verify that the proposed algorithm has longer IoT network lifetime and consumes the residual energy of each smart node more consistently when compared with the existing traditional protocols

    Security analysis of IoT protocols: A focus in CoAP

    Get PDF
    © 2016 IEEE. Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products or smart things connected to the internet. It is a new and fast developing market which not only connects objects and people but also billions of gadgets and smart devices. With the rapid growth of IoT, there is also a steady increase in security vulnerabilities of the linked objects. For example, a car manufacturer may want to link the systems within a car to smart home network networks to increase sales, but if all the various people involved do not embrace security the system will be exposed to security risks. As a result, there are several new published protocols of IoT, which focus on protecting critical data. However, these protocols face challenges and in this paper, numerous solutions are provided to overcome these problems. The widely used protocols such as, 802.15.4, 6LoWPAN, and RPL are the resenting of the IoT layers PHY/MAC, Adoption and Network. While CoAP (Constrained Application Protocol) is the application layer protocol designed as replication of the HTTP to serve the small devices coming under class 1 and 2. Many implementations of CoAP has been accomplished which indicates it\u27s crucial amd upcoming role in the future of IoT applications. This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research

    Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN

    Get PDF
    © 2016 IEEE. Software-defined networking (SDN) has emerged as a new network architecture, which decouples both the control and management planes from data plane at forwarding devices. However, SDN deployment is not widely adopted due to the budget constraints of organizations. This is because organizations are always reluctant to invest too much budget to establish a new network infrastructure from scratch. One feasible solution is to deploy a limited number of SDN-enabled devices along with traditional (legacy) network devices in the network of an organization by incrementally replacing traditional network by SDN, which is called hybrid SDN (Hybrid SDN) architecture. Network management and control in Hybrid SDN are vital tasks that require significant effort and resources. Manual handling of these tasks is error prone. Whenever network topology changes, network policies (e.g., access control list) configured at the interfaces of forwarding devices (switches/routers) may be violated. That creates severe security threats for the whole network and degrades the network performance. In this paper, we propose a new approach for Hybrid SDN that auto-detects the interfaces of forwarding devices and network policies that are affected due to change in network topology. In the proposed approach, we model network-wide policy and local policy at forwarding device using a three-tuple and a six-tuple, respectively. We compute graph to represent the topology of the network. By using graph difference technique, we detect a possible change in topology. In the case of topology change, we verify policy for updated topology by traversing tree using six-tuple. If there is any violation in policy implementation, then affected interfaces are indicated and policies that need to be configured are also indicated. Then, policies are configured on the updated topology according to specification in an improved way. Simulation results show that our proposed approach enhances the network efficiency in term of successful packet delivery ratio, the ratio of packets that violated the policy and normalized overhead

    Haptic Feedback to Assist Blind People in Indoor Environment Using Vibration Patterns

    Get PDF
    Feedback is one of the significant factors for the mental mapping of an environment. It is the communication of spatial information to blind people to perceive the surroundings. The assistive smartphone technologies deliver feedback for different activities using several feedback mediums, including voice, sonification and vibration. Researchers 0have proposed various solutions for conveying feedback messages to blind people using these mediums. Voice and sonification feedback are effective solutions to convey information. However, these solutions are not applicable in a noisy environment and may occupy the most important auditory sense. The privacy of a blind user can also be compromised with speech feedback. The vibration feedback could effectively be used as an alternative approach to these mediums. This paper proposes a real-time feedback system specifically designed for blind people to convey information to them based on vibration patterns. The proposed solution has been evaluated through an empirical study by collecting data from 24 blind people through a mixed-mode survey using a questionnaire. Results show the average recognition accuracy for 10 different vibration patterns are 90%, 82%, 75%, 87%, 65%, and 70%

    Hybrid Deep Learning Architecture to Forecast Maximum Load Duration Using Time-of-Use Pricing Plans

    Get PDF
    Load forecasting has received crucial research attention to reduce peak load and contribute to the stability of power grid using machine learning or deep learning models. Especially, we need the adequate model to forecast the maximum load duration based on time-of-use, which is the electricity usage fare policy in order to achieve the goals such as peak load reduction in a power grid. However, the existing single machine learning or deep learning forecasting cannot easily avoid overfitting. Moreover, a majority of the ensemble or hybrid models do not achieve optimal results for forecasting the maximum load duration based on time-of-use. To overcome these limitations, we propose a hybrid deep learning architecture to forecast maximum load duration based on time-of-use. Experimental results indicate that this architecture could achieve the highest average of recall and accuracy (83.43%) compared to benchmarkmodels. To verify the effectiveness of the architecture, another experimental result shows that energy storage system (ESS) scheme in accordance with the forecast results of the proposed model (LSTM-MATO) in the architecture could provide peak load cost savings of 17,535,700KRWeach year comparing with original peak load costs without the method. Therefore, the proposed architecture could be utilized for practical applications such as peak load reduction in the grid

    Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks

    Get PDF
    © 2017, Springer Science+Business Media New York. In parallel with lots of research to improve message delivery rate in Delay Tolerant Networks (DTN), additional application specific requirements are demanded to deploy them in the real world. Among many requirements, we focus on desired delivery ratio within required deadline in DTN. To achieve this, we propose an adaptive forwarding algorithm primarily based on well-known DTN algorithm, Spray and Wait. Unlike conventional static forwarding schemes, the number of message copies and forwarding algorithm are dynamically adjusted according to the difference between current service level and given requirement in the proposed scheme. Furthermore, analytical model and recorded history on a node are used sequentially depending on availability of parameters to meet application specific requirement. Finally, simulation results demonstrate that our proposed algorithm can meet given requirement with lower resources consumption than existing protocols in varying network conditions

    Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks

    Get PDF
    © 2016 IEEE. Due to the disparity between the peer-to-peer (P2P) and the physical networks, we study the challenging problems of mobile routing in unstructured P2P networks over mobile ad hoc networks (MANETs). To route queries and objects of interest, the existing mobile P2P protocols widely adopted an inflexible techniques which experience a relatively high delivery time due to remarkable network traffic, nodes mobility and broken links. The bond between routing and mobility is crucial to obtain efficient searching in mobile P2P network. To solve this problem, we proposed fuzzy search controller [1] which reduced search time but due to peer mobility the protocol causes low hit rate and high overhead. Thus, this article proposes novel fuzzy controller based possibilistic routing for unstructured mobile P2P networks to reduce routing time. The possibilistic routing is based on ultrapeer mobility, active time and location. The inference rules are defined to select the best route to forward query walker. Simulations show that the fuzzy search controller gives better performance than the competing protocols in terms of reducing response time and increasing hit rate in different mobility scenarios
    • …
    corecore