Results (34)
Search Parameters:
Section: enwStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreA Self-Adaptive Routing Algorithm for Real-Time Video Transmission in VANETs
Given the strict Quality of Experience (QoE) and Quality of Service (QoS) criteria for video transmission, such as delivery ratio, transmission delay, and mean opinion Score (MOS), video streaming is one of the hardest challenges in Vehicular Ad-Hoc Networks (VANETs). Additionally, VANET attributes, including environmental impediments, fluctuating vehicle density, and highly dynamic topology, have an…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MorePower Saving MAC Protocols in Wireless Sensor Networks: A Performance Assessment Analysis
Wireless sensor networks are an emerging technology that is used to monitor points or objects of interest in an area. Despite its many applications, this kind of network is often limited by the fact that it is difficult to provide energy to the nodes continuously, forcing the use of batteries, which restricts its operations. Network…
Read MoreSecuring IPv6 Neighbor Discovery using Pre-Shared Key
Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…
Read MoreApplication of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET
A significant problem of routing protocols in the Flying Ad Hoc Networks (FANET) is a significant overhead cost due to the high mobility of networking nodes. The problem is caused by a need to send information messages about locations of unmanned aerial vehicles (UAVs). In order to reduce the amount of service information, the following…
Read MoreInvestigation of the Impact of Distributed Generation on Power System Protection
Integration of Distributed Generation (DG) on distribution networks has a positive impact which includes the following: low power losses, improved utility system reliability and voltage improvement at buses. A real distribution network is radial in which energy flow is unidirectional from generation to transmission and from distribution to the load. However, when a DG is…
Read MorePerformance Evaluation Reprogrammable Hybrid Fiber-Wireless Router Testbed for Educational Module
Fiber-Wireless (FiWi) network is an integration of fiber optic and wireless connections in the same network. It is one of the best solutions to overcome rapid increment of Internet users and bandwidth-hungry services. To facilitate fundamental knowledge and further understanding on FiWi for students and researchers at the university level, this article proposes the development…
Read MoreInvestigation of the LoRa Transceiver in Conditions of Multipath Propagation of Radio Signals
The article presents some results of the research of the LoRa module. These modules can be the basis of possible IoT technologies are implementing, providing enough good range of receiving and transmitting messages. The SX1276 transceiver has been testing to determine the signal loss in the propagation channel. These experiments took in a highly-populated Kyiv…
Read MoreTraffic Aggregation Techniques for Optimizing IoT Networks
Internet of Things (IoT) is changing the world through a new wave of revolution for communications technologies that are no more limited to the human being. One of the main challenges that result from the exponential spread of IoT technology is the difference in the traffic characteristics between classical human communications and advanced things communications.…
Read MoreQoE-aware Bandwidth Allocation for Multiple Video Streaming Players over HTTP and SDN
For many years, the most popular technique for Internet video streaming is hypertext transfer protocol-based adaptive streaming, known as HAS (HTTP Adaptive Streaming). However, a seamless viewing experience can not be just simply guaranteed by HAS only. In the management network, the adaptation of HAS copes with a huge challenge since client- driven schemes lead…
Read MoreAutonomous Robot Path Construction Prototype Using Wireless Sensor Networks
The use of wireless sensor networks (WSN) can be a valuable contribution in disaster situations or life-threatening exploration. Using wireless mobile robots, it is possible to explore vast areas without human intervention. However, the wireless network coverage that can keep mobile robots connected to the base station / gateway is a major limitation. With this…
Read MoreDesign of Power Efficient Routing Protocol for Smart Livestock Farm Applications
The demand on livestock as a source of protein is increasing with the dramatic increase of world population which approaches 8 billion. As a result, the monitoring of the performance of livestock breeding is becoming essential. The technique which could increase livestock production and improve the efficiency of operation is digitalization of livestock management .…
Read MoreA Software-Defined Network Approach for The Best Hospital Localization Against Coronavirus (COVID-19)
Traditional networks have difficulty in meeting the technological developments and the continuous increase in the size of data to be processed. Software-Defined Network (SDN) approach has emerged as an alternative to traditional networks. SDN separates the control and data planes from each other and manages the network over the control plane with flexibility and cost…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreTrace-Driven Simulation of LoRaWAN Air Channel Propagation in an Urban Scenario
Long-range, Low-Power Wide Area Network (LoRaWAN) is a very scalable solution for the Internet of Things (IoT). Due to the air channel environment’s complexity, connectivity is a crucial parameter for successfully planning and deploying the IoT networks. Measurements and simulations have been used to evaluate LoRaWAN propagation models in the Urban environment, but it is…
Read MoreA Proactive Mobile Edge Cache Policy Based on the Prediction by Partial Matching
The proactive caching has been an emerging approach to cost-effectively boost the network capacity and reduce access latency. While the performance of which extremely relies on the content prediction. Therefore, in this paper, a proactive cache policy is proposed in a distributed manner considering the prediction of the content popularity and user location to minimise…
Read MoreApplicability of Generalized Metropolis-Hastings Algorithm to Estimating Aggregate Functions in Wireless Sensor Networks
Over the last decades, numerous distributed consensus-based algorithms have found a wide application as a complementary mechanism for data aggregation in wireless sensor networks. In this paper, we provide an analysis of the generalized Metropolis-Hastings algorithm for data aggregation with a fully-distributed stopping criterion. The goal of the implemented stopping criterion is to effectively bound…
Read MoreThermal Performance Analysis of Parabolic Trough Solar Collector System in Climatic Conditions of Errachidia City, Morocco
The water heating with parabolic trough solar collectors (PTC) is a very widespread and at the same time quite promising solar technology. However, PTC presents several problems in terms of the profitability of water heating. For this reason, our study of water heating with PTC collectors consists of two main parts. In the first part,…
Read MoreA Review of RPL Objective Function based Enhancement Approaches
Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…
Read MoreThe Effects of Transmission Power and Modulation Schemes on the Performance of WBANs in on-Body Medical Applications
Wireless Body Area Networks support the operation within multiple frequency bands. Thus, they can be integrated in several applications, one of which is on-body medical monitoring applications, as concerned in this paper. Therefore, the purpose of this study is to present the impact of transmission power and both of Differential Binary Phase Shift Keying and…
Read MoreCluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT
Wireless sensor network is highly resource constrained, where energy efficiency and network lifetime plays a major role for its sustenance. As the sensor nodes are battery operated and deployed in hostile environments, either recharging or replacement of batteries in sensor nodes is not possible after its deployment in inaccessible areas. In such condition, energy is…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read MorePerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreAttacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN
Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…
Read More
