Search results

1 – 10 of 45
Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 November 2023

Ashwini K. and Jagadeesh V.K.

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation…

Abstract

Purpose

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation (5 G) technology. NOMA is used for serving many mobile users, both in power and code domains. This paper considers the power-domain NOMA, which is now discussed as NOMA.

Design/methodology/approach

The first part of the paper discusses NOMA-based cooperative relay systems using different relay strategies over different channel models. In various research works, the analytical expressions of many performance metrics were derived, measured and simulated for better performance of the NOMA systems. In the second part, a brief introduction to diversity techniques is discussed. The multiple input and multiple output system merged with cooperative NOMA technology, and its future challenges were also presented in this part. In the third part, the paper surveys some new conceptions such as cognitive radio, index modulation multiple access, space-shift keying and reconfigurable intelligent surface that can be combined with NOMA systems for better performance.

Findings

The paper presents a brief survey of diverse research projects being carried out in the field of NOMA. The paper also surveyed two different relaying strategies that were implemented in cooperative NOMA over different channels and compared several performance parameters that were evaluated and derived in these implementations.

Originality/value

The paper provides a scope for recognizable future work and presents a brief idea of the new techniques that can be united with NOMA for better performance in wireless systems.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 22 August 2023

D.S. Vohra, Pradeep Kumar Garg and Sanjay Ghosh

The purpose is to derive the most effective place in the air for an aerial robot, viz., drone to use as an alternative communication system during disasters.

1477

Abstract

Purpose

The purpose is to derive the most effective place in the air for an aerial robot, viz., drone to use as an alternative communication system during disasters.

Design/methodology/approach

In this technology-driven era, various concepts are becoming the area of interest for multiple researchers. Drone technology is also one of them. The researchers, with interest in drones, are therefore trying to understand the various uses of employing drones in diverse applications which are mind-boggling, starting from civil applications (viz., an inspection of power lines, counting wildlife, delivering medical supplies to inaccessible regions, forest fire detection, and landslide measurement) to military applications (viz., real-time monitoring, surveillance, patrolling, and demining). However, one area where its usage is still to be exploited in many countries is using drones as a relay when communication lines are disrupted due to natural calamities. This will be particularly helpful in rescuing the affected people as the aerial node will enable them to communicate to the rescue team using mobiles/ordinary landline telephones even when regular communication towers are destroyed due to disastrous natural calamities, for example, tsunamis, earthquakes, and floods. Various algorithms, namely, water filling algorithm, advanced water filling algorithm, equal power distribution algorithm, and particle swarm optimization, were therefore studied and analyzed using simulation in addition to various path loss models to realize the desired place for an aerial robot, viz., drone in the air, which will eventually be used as an alternative communication system for badly hit ground users due to any disaster.

Findings

It was found that the effective combination of the water filling algorithm and particle swarm optimization algorithm may be done to place the drone in the air to increase the overall throughput of the affected ground users.

Originality/value

The research is original. None of the parts of this research paper has been published anywhere.

Details

International Journal of Intelligent Unmanned Systems, vol. 12 no. 2
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 10 October 2022

Nidhi Sharma and Ravindara Bhatt

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system…

Abstract

Purpose

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.

Design/methodology/approach

This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.

Findings

The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.

Originality/value

The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 August 2022

Britto Pari J., Mariammal K. and Vaithiyanathan D.

Filter design plays an essential role in most communication standards. The essential element of the software-defined radio is a channelizer that comprises several channel filters…

Abstract

Purpose

Filter design plays an essential role in most communication standards. The essential element of the software-defined radio is a channelizer that comprises several channel filters. Designing filters with lower complexity, minimized area and enhanced speed is a demanding task in currently prevailing communication standards. This study aims to propose an efficient reconfigurable residue number system (RNS)-based multiply-accumulate (MAC) channel filter for software radio receivers.

Design/methodology/approach

RNS-based pipelined MAC module for the realization of channel finite impulse response (FIR) filter architecture is considered in this work. Further, the use of a single adder and single multiplier for realizing the filter architecture regardless of the number of taps offers effective resource sharing. This design provides significant improvement in speed of operation as well as a reduction in area complexity.

Findings

In this paper, two major tasks have been considered: first, the RNS number conversion is performed in which the integer is converted into several residues. These residues are processed in parallel and are applied to the MAC-FIR filter architecture. Second, the MAC filter architecture involves pipelining, which enhances the speed of operation to a significant extent. Also, the time-sharing-based design incorporates a single partial product-based shift and add multiplier and single adder, which provide a low complex design. The results show that the proposed 16-tap RNS-based pipelined MAC sub-filter achieves significant improvement in speed as well as 89.87% area optimization when examined with the conventional RNS-based FIR filter structure.

Originality/value

The proposed MAC-FIR filter architecture provides good performance in terms of complexity and speed of operation because of the use of the RNS scheme with pipelining and partial product-based shift and adds multiplier and single adder when examining with the conventional designs. The reported architecture can be used in software radios.

Details

World Journal of Engineering, vol. 21 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 28 February 2023

Aman Dua, Rishika Chhabra and Deepankar Sinha

The first purpose is to assess the quality of containerized multimodal export and the second is to develop and demonstrate the design of a service network with quality approach.

Abstract

Purpose

The first purpose is to assess the quality of containerized multimodal export and the second is to develop and demonstrate the design of a service network with quality approach.

Design/methodology/approach

The article used the structural equation model to develop a model to measure the quality of multimodal transportation for containerized exports and finalized the model with an alternative approach. The evolutionary algorithm had been used to design a service network based on quality.

Findings

Provided factors affecting quality of multimodal transportation and reverse to one hypothesis, the construct variation in cost, time shape and quantity did not affect the quality of multimodal transportation for containerized exports. The model without variation construct was finalized by exploring causality.

Research limitations/implications

This research had scope till container loading onto the vessel and assessed the quality for containerized cargo only, and second research purpose is limited by assumed values of fitness function and the limited number of nodes, in service network design demonstration.

Practical implications

This research provided a tool to measure the quality of multimodal transportation for containerized exports and demonstrated the field application of the model developed in service network design. This approach included all factors applicable across the container movement. The integrated approach of the article provided an organized method to design a service network for containerized exports.

Originality/value

This work provided the tool to assess the quality of multimodal transportation for containerized exports and developed an approach to design a service network of multimodal transportation based on quality. This approach has considered the factors of multimodal transportation comprehensively in contrast to the optimization approaches based on operation research techniques.

Details

Benchmarking: An International Journal, vol. 31 no. 1
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 12 January 2024

Pengyun Zhao, Shoufeng Ji and Yuanyuan Ji

This paper aims to introduce a novel structure for the physical internet (PI)–enabled sustainable supplier selection and inventory management problem under uncertain environments.

Abstract

Purpose

This paper aims to introduce a novel structure for the physical internet (PI)–enabled sustainable supplier selection and inventory management problem under uncertain environments.

Design/methodology/approach

To address hybrid uncertainty both in the objective function and constraints, a novel interactive hybrid multi-objective optimization solution approach combining Me-based fuzzy possibilistic programming and interval programming approaches is tailored.

Findings

Various numerical experiments are introduced to validate the feasibility of the established model and the proposed solution method.

Originality/value

Due to its interconnectedness, the PI has the opportunity to support firms in addressing sustainability challenges and reducing initial impact. The sustainable supplier selection and inventory management have become critical operational challenges in PI-enabled supply chain problems. This is the first attempt on this issue, which uses the presented novel interactive possibilistic programming method.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 31 January 2024

Tan Zhang, Zhanying Huang, Ming Lu, Jiawei Gu and Yanxue Wang

Rotating machinery is a crucial component of large equipment, and detecting faults in it accurately is critical for reliable operation. Although fault diagnosis methods based on…

Abstract

Purpose

Rotating machinery is a crucial component of large equipment, and detecting faults in it accurately is critical for reliable operation. Although fault diagnosis methods based on deep learning have been significantly developed, the existing methods model spatial and temporal features separately and then weigh them, resulting in the decoupling of spatiotemporal features.

Design/methodology/approach

The authors propose a spatiotemporal long short-term memory (ST-LSTM) method for fault diagnosis of rotating machinery. The authors collected vibration signals from real rolling bearing and gearing test rigs for verification.

Findings

Through these two experiments, the authors demonstrate that machine learning methods still have advantages on small-scale data sets, but our proposed method exhibits a significant advantage due to the simultaneous modeling of the time domain and space domain. These results indicate the potential of the interactive spatiotemporal modeling method for fault diagnosis of rotating machinery.

Originality/value

The authors propose a ST-LSTM method for fault diagnosis of rotating machinery. The authors collected vibration signals from real rolling bearing and gearing test rigs for verification.

Details

Industrial Lubrication and Tribology, vol. 76 no. 2
Type: Research Article
ISSN: 0036-8792

Keywords

1 – 10 of 45