Search results

1 – 10 of 19
Article
Publication date: 20 September 2022

Robin Cyriac and Saleem Durai M.A.

Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes…

Abstract

Purpose

Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.

Design/methodology/approach

This study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.

Findings

This model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.

Originality/value

In this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 14 July 2021

Sakshi Garg, Deepti Mehrotra, Sujata Pandey and Hari Mohan Pandey

This paper aims to determine the network efficient topology for low power and lossy networks (LLNs) using routing protocol for LLN (RPL) with respect to the increase in network

Abstract

Purpose

This paper aims to determine the network efficient topology for low power and lossy networks (LLNs) using routing protocol for LLN (RPL) with respect to the increase in network size and propose a novel approach to overcome the shortcomings of the existing models.

Design/methodology/approach

The authors have used Contiki OS/Cooja simulator to conduct experiments on primarily four topologies (star, bus/linear, ring/eclipse and random). They have implemented RPL protocol using Sky motes for each topology from 10, 20, 30 and up to 70 nodes. Consequently, after 24 h of experimentation, the readings have been noted and, alongside, a comprehensive comparative analysis has been performed based on the network density and metric parameters: packet delivery ratio (PDR), expected transmission (ETX) and power consumption. Further, a hybrid model is proposed where the additional factors of mobility, multiple sink and a combination of static and mobile nodes are introduced. The proposed model is then compared with the star model (all static nodes and star topology) and the dynamic model (all mobile nodes) to analyze the efficiency and network performance for different network sizes (28, 36, 38 and 44 nodes). The mobility is introduced using BonnMotion tool in Contiki OS.

Findings

Simulation results have shown that the star topology is most network efficient when compared with bus/linear, ring/eclipse and random topologies for low density and high scalable network. But when the same setup is compared with the proposed hybrid model, the proposed model shows a significant improvement and gives the best and efficient network performance with highest PDR (average improvement approximately 44.5%) and lowest ETX (average improvement approximately 49.5%) comparatively.

Practical implications

Also, these findings will benefit the deployment of smart devices used in advanced metering infrastructure, road side units and in various industrial applications such as traffic monitoring system, electronic toll collection and traffic analysis in the smart grid infrastructure.

Originality/value

The impact of topology is significant and detailed analysis is required to understand the impact of different topologies of the nodes in the network for the present and the future scenarios. As very few research studies have discussed this gap, this research paper is quintessential and shall open novel future potential direction. Also, the proposed approach of hybrid model with mobility has not been considered in the literature yet.

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6483

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 3 July 2020

Yahya AlSawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi

Wireless sensor network (WSN) and mobile crowd sensing (MCS) technologies face some challenges, especially when deployed in a large environment such as a smart city environment…

Abstract

Purpose

Wireless sensor network (WSN) and mobile crowd sensing (MCS) technologies face some challenges, especially when deployed in a large environment such as a smart city environment. WSN faces network latency, packets delivery and limited lifetime due to the nature of the used constrained internet of things small devices and low power network. On the other hand, most of the current applications that adapt MCS technology use 3G or long term evalution network to collect data and send them directly to the server. This leads to higher battery and bandwidth consumption and higher data cost.

Design/methodology/approach

This paper proposes a hybrid routing protocol based on the routing protocol (RPL) protocol that combines the two wireless sensing technologies (WSN and MCS) and allows the integration between them. The aim is to use MCS nodes in an opportunistic way to support static WSN nodes to enhance the performance.

Findings

The evaluation of the proposed protocol was conducted in a static WSN to study the impact of the integration on the WSN performance. The results reveal a good enhancement on packet delivery ratio (17% more), end-to-end delay (50% less) and power consumption (25% less) compared with native RPL (without MCS integration).

Originality/value

The authors believe that the hybrid-RPL protocol can be useful for sensing and data collection purposes, especially in urban areas and smart city contexts.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 March 2012

Antonio Liotta, Daniël Geelen, Gert van Kempen and Frans van Hoogstraten

At present the energy generation and distribution landscape is changing rapidly. The energy grid is becoming increasingly smart, relying on an information network for the purposes…

1078

Abstract

Purpose

At present the energy generation and distribution landscape is changing rapidly. The energy grid is becoming increasingly smart, relying on an information network for the purposes of monitoring and optimization. However, because of the particularly stringent regulatory and technical constraints posed by smart grids, it is not possible to use ordinary communication protocols. The purpose of this paper is to revisit such constraints, reviewing the various options available today to realize smart‐metering networks.

Design/methodology/approach

After describing the regulatory, technological and stakeholders' constraints, the authors provide a taxonomy of network technologies, discussing their suitability and weaknesses in the context of smart‐metering systems. The authors also give a snapshot of the current standardization panorama, identifying key differences among various geographical regions.

Findings

It is found that the field of smart‐metering networks still consists of a fragmented set of standards and solutions, leaving open a number of issues relating to the design and deployment of suitable systems.

Originality/value

This paper addresses the need to better understand state‐of‐the‐art and open issues in the fast‐evolving area of smart energy grids, with particular attention to the challenges faced by communication engineers.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 August 2020

Suganya Pandi and Pradeep Reddy Ch.

Inclusion of mobile nodes (MNs) in Internet of Things (IoT) further increases the challenges such as frequent network disconnection and intermittent connectivity because of high…

Abstract

Purpose

Inclusion of mobile nodes (MNs) in Internet of Things (IoT) further increases the challenges such as frequent network disconnection and intermittent connectivity because of high mobility rate of nodes. This paper aims to propose a proactive mobility and congestion aware route prediction mechanism (PMCAR) to find the congestion free route from leaf to destination oriented directed acyclic graph root (DODAG-ROOT) which considers number of MNs connected to a static node. This paper compares the proposed technique (PMCAR) with RPL (OF0) which considers the HOP-COUNT to determine the path from leaf to DODAG-ROOT. The authors performed a simulation with the proposed technique in MATLAB to present the benefits in terms of packet loss and energy consumption.

Design/methodology/approach

In this pandemic situation, mobile and IoT play major role in predicting and preventing the CoronaVirus Disease of 2019 (COVID-19). Huge amount of computations is happening with the data generated in this pandemic with the help of mobile devices. To route the data to remote locations through the network, it is necessary to have proper routing mechanism without congestion. In this paper, PMCAR mechanism is introduced to achieve the same. Internet of mobile Things (IoMT) is an extension of IoT that consists of static embedded devices and sensors. IoMT includes MNs which sense data and transfer it to the DODAG-ROOT. The nodes in the IoMT are characterised by low power, low memory, low computing power and low bandwidth support. Several challenges are encountered by routing protocols defined for IPV6 over low power wireless personal area networks to ensure reduced packet loss, less delay, less energy consumption and guaranteed quality of service.

Findings

The results obtained shows a significant improvement compared to the existing approach such as RPL (OF0). The proposed route prediction mechanism can be applied largely to medical applications which are delay sensitive, particularly in pandemic situations where the number of patients involved and the data gathered from them flows towards a central root for analysis. Support of data transmission from the patients to the doctors without much delay and packet loss will make the response or decisions available more quickly which is a vital part of medical applications.

Originality/value

The computational technologies in this COVID-19 pandemic situation needs timely data for computation without delay. IoMT is enabled with various devices such as mobile, sensors and wearable devices. These devices are dedicated for collecting the data from the patients or any objects from different geographical location based on the predetermined time intervals. Timely delivery of data is essential for accurate computation. So, it is necessary to have a routing mechanism without delay and congestion to handle this pandemic situation. The proposed PMCAR mechanism ensures the reliable delivery of data for immediate computation which can be used to make decisions in preventing and prediction.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 May 2019

Omerah Yousuf and Roohie Naaz Mir

Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an…

1825

Abstract

Purpose

Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing.

Design/methodology/approach

The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks.

Findings

The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated.

Originality/value

The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 12 February 2020

Peter Reji Ramanatt, K. Natarajan and K.R. Shobha

Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect…

Abstract

Purpose

Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect. The existing wired technology, using cables to connect different on board line replaceable unit apart from increasing the weight also increases the complexity related to electromagnetic interference, installation and maintenance. With continuous technology upgradation in the wireless domain, aviation industry is in the process of using wireless technology for intra-aircraft communication. Wireless technology can meet most of the challenges of modern avionics systems and significantly reduce the weight. This paper aims to look at various aspects of implementing a wireless network including issues related to wired network, aircraft channel, interference issues, suitable wireless protocols for aircraft applications and security aspects.

Design/methodology/approach

The paper has relied on literature study on wireless avionics intra-communications (WAIC) and the research work carried out in specific areas related to channel inside an aircraft, interference issues of wireless systems with onboard and external systems operating in the same band and security issues related to wireless network and security requirements of implementing an avionics wireless network (AWN). To identify suitable wireless protocol for AWN literature review and simulation to compare different protocols was carried out.

Findings

A single wireless protocol may not be suitable for all aircraft systems, and therefore, there may be a requirement to use multiple technologies. Mutual interference is not expected between WAIC systems with on board and external systems operating in the same band. The channel inside an aircraft is expected to be Rician (LOS) or Rayleigh (NLOS). However, additional measurements may have to be undertaken to have a generalized channel model. Security aspects in an AWN are critical and needs to be analyzed in detail prior to any wireless deployment.

Practical implications

Implementation of wireless technology can pave the way for usage of wireless technology for future generation avionics. With International Telecommunication Union allotting dedicated band for WAIC operations, considerable amount of research has been initiated in this field. It is believed that in the coming 2-3 years, the designers will be ready to replace the existing data wires with wireless transceivers. With radio technical commission for aeronautics and EURACAE involved in development of minimum operations performance standards for WAIC systems use of wireless for intra communication is bound to happen. Therefore, it is necessary to look at different issues for integrating wireless in the avionics domain.

Originality/value

The existing studies have been carried out in individual domains of using wireless in avionics. Separate studies and research work has been carried out for identifying wireless protocols, aircraft channel models, interference issues and security aspects. The paper has attempted to look at all these aspects together including certification.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 5 April 2011

Christos Grecos and Qi Wang

The interdisciplinary nature of video networking, coupled with various recent developments in standards, proposals and applications, poses great challenges to the research and…

Abstract

Purpose

The interdisciplinary nature of video networking, coupled with various recent developments in standards, proposals and applications, poses great challenges to the research and industrial communities working in this area. The main purpose of this paper is to provide a tutorial and survey on recent advances in video networking from an integrated perspective of both video signal processing and networking.

Design/methodology/approach

Detailed technical descriptions and insightful analysis are presented for recent and emerging video coding standards, in particular the H.264 family. The applications of selected video coding standards in emerging wireless networks are then introduced with an emphasis on scalable video streaming in multihomed mobile networks. Both research challenges and potential solutions are discussed along the description, and numerical results through simulations or experiments are provided to reveal the performances of selected coding standards and networking algorithms.

Findings

The tutorial helps to clarify the similarities and differences among the considered standards and networking applications. A number of research trends and challenges are identified, and selected promising solutions are discussed. This practice would provoke further thoughts on the development of this area and open up more research and application opportunities.

Research limitations/implications

Not all the concerned video coding standards are complemented with thorough studies of networking application scenarios.

Practical implications

The discussed video coding standards are either playing or going to play indispensable roles in the video industry; the introduced networking scenarios bring together these standards and various emerging wireless networking paradigms towards innovative application scenarios.

Originality/value

The comprehensive overview and critiques on existing standards and application approaches offer a valuable reference for researchers and system developers in related research and industrial communities.

Details

International Journal of Pervasive Computing and Communications, vol. 7 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 19