9 research outputs found

    Mobility management for IoT: a survey

    Get PDF
    IInternet of Thing (IoT) or also referred to as IP-enabled wireless sensor network (IP-WSN) has become a rich area of research. This is due to the rapid growth in a wide spectrum of critical application domains. However, the properties within these systems such as memory size, processing capacity, and power supply have led to imposing constraints on IP-WSN applications and its deployment in the real world. Consequently, IP-WSN is constantly faced with issues as the complexity further rises due to IP mobility. IP mobility management is utilized as a mechanism to resolve these issues. The management protocols introduced to support mobility has evolved from host-based to network-based mobility management protocols. The presence of both types of solutions is dominant but depended on the nature of systems being deployed. The mobile node (MN) is involved with the mobility-related signaling in host-based protocols, while network-based protocols shield the host by transferring the mobility-related signaling to the network entities. The features of the IoT are inclined towards the network-based solutions. The wide spectrum of strategies derived to achieve enhanced performance evidently displays superiority in performance and simultaneous issues such as long handover latency, intense signaling, and packet loss which affects the QoS for the real-time applications. This paper extensively reviews and discusses the algorithms developed to address the challenges and the techniques of integrating IP over WSNs, the attributes of mobility management within the IPv4 and IPv6, respectively, and special focus is given on a comprehensive review encompassing mechanisms, advantages, and disadvantages on related work within the IPv6 mobility management. The paper is concluded with the proposition of several pertinent open issues which are of high research value

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks

    Get PDF
    Energy-efficient pulse-coupled oscillators have recently gained significant research attention in wireless sensor networks, where the wireless sensor network applications mimic the firefly synchronization for attracting mating partners. As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. This technique proposed in order to minimize the high power utilization in the network to get better data gathering of the sensor nodes during data transmission. The simulation results shown that the proposed random traveling wave pulse-coupled oscillator mechanism achieved up to 48% and 55% reduction in energy usage when increase the number of sensor nodes as well as the packet size of the transmitted data compared to traveling wave pulse-coupled oscillator and pulse-coupled oscillator methods. In addition, the mechanism improves the data gathering ratio by up to 70% and 68%, respectively. This is due to the developed technique helps to reduce the high consumed energy in the sensor network and increases the data collection throughout the transmission states in wireless sensor networks

    Impact of the deafness problem on clock synchronization in a wireless sensor network

    Get PDF
    Observations of natural phenomena are considered to be the best information source of spontaneous synchronization. Natural phenomena tend to match wireless sensor network (WSN) responses closely. Such synchronization is vital for the proper coordination of power cycles for energy conservation. A large number of fireflies employ the principle of pulse-coupled oscillators for light flash emission to attract mating partners. With respect to WSNs, the nodes are generally unable to afford packet transmission and reception simultaneously, thus preventing complete network synchronization. This paper presents a literature overview concerning the impact of the deafness problem on clock synchronization in a WSN. Data transmission based on synchronization can also be ensured through the optimization of energy usage periodic data capturing in a WSN. This study serves as a useful information source of clock synchronization to assist WSN researchers and novices in obtaining a better understanding of the impact of the deafness problem on clock synchronization and to enable them to promote effective designs and systems that address this problem

    Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection

    Get PDF
    Arabic text steganography (ATS) offers a potential opportunity in hiding secret information in characters and features. The combination with any other security sub discipline such as cryptography usually will enhance its level of security. However, it is limited in its ability to optimize embedded data capacity with a high perceptual transparency level that will also not raise suspicion when written. Besides that, other concerns are active attacks by intruders which are a crucial security issue in the transmission of the shared secret key that enables the receiver to extract the secret information. Also, such attacks can be affected through a fake identity that allows the receiver to modify the secret information thus degrading its integrity. To overcome these drawbacks, we propose a hybrid ATS with biometric multi factor authentication (BMA), which uses liveness detection using fingerprints and heartbeat sensors as the authentication factors. We propose a new ATS method, the Character Property method (CPM) which uses the basic properties of the Arabic Text such as dots, calligraphy typographical proportions, and sharp-edges to hide the secret message using a table index mapping technique to optimize data capacity with high perceptual transparency to avert suspicion. The results for the biometric authentication showed that the proposed method correctly authenticates users, having a false rejection rate of only 4%, and a 0% false acceptance rate. As for liveness detection, the results were significant where the proposed method correctly detected live subjects compared to a fingerprint only biometric authentication approach, which had a high acceptance of fake inputs. BMA was implemented through a custom Arduino smartwatch with a fingerprint and heartbeat sensor as a ‘proof-of-concept’ device which increased the capacity in hiding the secret message up to 23.5% compared to the previous methods. Given our Arabic Character Properties method (CPM) did not affect the stego-text appearance, its 1.0 Jaro Similarity score was compared to the other methods proving high transparency of the stego-text, in addition to higher security regarding user authentication using BMA with liveness detection

    Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

    Get PDF
    Abstract: Problem statement: In only a few years, Multi-Protocol Label Switching (MPLS) has evolved from an exotic technology to a mainstream tool used by service providers to create revenuegenerating services. MPLS provides a high reliable Label Switched Path (LSP). MPLS failures may degrade the reliability of the MPLS networks. Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP), Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. After the recovery time, TCP takes longer time than UDP to continue as it was before the failure. Results: In terms of packet loss, TCP performs better than UDP. However, the receiving rate of the TCP traffic is much worse than UDP traffic. A need for a mechanism to improve the behavior of TCP after a link failure is needed. This study focused on comparing the behavior of different types TCP as well as UDP traffic over MPLS networks in case of link, node or congestion failures. Conclusion: Although extensions of RSVP-TE protocol support fast recovery mechanism of MPLS networks, the behavior of TCP will be affected during recovery time much more than with UDP

    A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks

    No full text
    Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them different from terrestrial wireless sensor communication. Thus, coupled with their large cost of deployment and sensitivity, they are highly vulnerable to security attacks. For instance, a Sybil node could pretend to be at several other locations in the sparse network simultaneously, thereby deceiving legitimate nodes and infringing on the security of transmitted information. Over the last few years, researchers have studied means of preventing, detecting, and mitigating Sybil attacks for safe underwater communication under different assumptions and architectural setups. However, to our knowledge, these efforts have been scattered in the literature and concrete lessons have not been drawn from these efforts via a survey/review on this subject towards achieving safe underwater communication. This motivates the presentation of this paper that provides an exposition of the academic discussion on the solutions for addressing Sybil attacks in underwater wireless communication, with respect to attack prevention, detection and mitigation while identifying some of their limitations. Similarly, proposed methods and technical aspects peculiar to these works are identified, and a wide range of challenges, opportunities, and recommendations are provided

    Dual-Phase Resource Allocation Algorithm in Software-Defined Network SDN-Enabled Cloud

    No full text
    Software Defined Networks enabled-cloud (SDN-Cloud) is experiencing rapid evolution to accommodate the explosive growth of data-driven applications. However, traditional resource allocation algorithms are encountering limitations in efficient resources management. While some existing algorithms strive to minimize power consumption, they introduce network delays, impacting overall performance. Thus, this study aims to address the prevalent challenges of performance efficiency and energy saving within distributed systems. Artificial Intelligence techniques including machine learning and fuzzy logic, are increasingly utilized to develop more adaptive and intelligent resource management models. However, given the dynamic nature of SDN-cloud environments, rapid decision-making during VM allocation is essential to prevent network delays. Furthermore, the limited computational resource of SDN controller requires cautious consideration, as extensive calculations will result in network overhead or increased power consumption. Moreover, achieving subtle balance between network performance and power efficiency still an open challenge. This research introduces Dual-Phase resource allocation Algorithm (D-Ph) for heterogeneous SDN-Cloud networks with the integration of fuzzy logic. D-Ph algorithm indicates the level of utilization of both physical and virtual machines (PM and VM) in datacenters. It aims to find the appropriate host with the necessary capabilities to meet VM resource requirements, specifically processing capacity and memory. The performance of the D-Ph algorithm is evaluated by measuring the response time, serve time of network and central processing unit (CPU), Quality of Service (QoS) violation rate, and power consumption. Results have shown distinctly that D-Ph algorithm maintain high network performance while significantly reduce total power consumption in heavy-loaded large scale network
    corecore