A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication Cost

Author(s):  
Yi Liu ◽  
Kosuke Ozera ◽  
Keita Matsuo ◽  
Makoto Ikeda ◽  
Leonard Barolli
Author(s):  
Yi Liu ◽  
Ermioni Qafzezi ◽  
Phudit Ampririt ◽  
Seiji Ohara ◽  
Leonard Barolli

This work presents a distributed event-based awareness approach for P2P groupware systems. The authors present two fuzzy-based systems for improving peer awareness and group synchronization according to four parameters: activity awareness (AA), sustained communication time (SCT), group synchronization (GS), and peer communication cost (PCC). Then, this research uses fuzzy-based model to decide peer coordination quality (PCQ). The authors call the proposed systems: fuzzy-based peer coordination quality (FBPCQ) systems (FBPCQS1 and FBPCQS2). The authors make a comparison study between FBPCQS1 and FBPCQS2. The simulations results conclude that when AA, GS, and SCT are high, the PCQ is high, but with increasing of the PCC, the PCQ is decreased. The proposed systems can choose reliable peers with good peer coordination quality in mobilePeerDroid mobile system. Comparing the complexity, the FBPCQ2 is more complex than FBPCQS1. However, FBPCQS2 considers also the PCC, which makes the system more reliable.


Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


2021 ◽  
Vol 2 (4) ◽  
pp. 1-30
Author(s):  
Beshr Al Nahas ◽  
Antonio Escobar-Molero ◽  
Jirka Klaue ◽  
Simon Duquennoy ◽  
Olaf Landsiedel

Bluetooth is an omnipresent technology, available on billions of devices today. While it has been traditionally limited to peer-to-peer communication and star networks, the recent Bluetooth Mesh standard extends it to multi-hop networking. In addition, the Bluetooth 5 standard introduces new modes to allow for increased reliability. In this article, we evaluate the feasibility of concurrent transmissions (CT) in Bluetooth via modeling and controlled experiments and then devise an efficient network-wide data dissemination protocol, BlueFlood, based on CT for multi-hop Bluetooth networks. First, we model and analyze how CT distorts the received waveform and characterize the Bit Error Rate of a Frequency-Shift Keying receiver to show that CT is feasible over Bluetooth. Second, we verify our analytic results with a controlled experimental study of CT over Bluetooth PHY. Third, we present BlueFlood, a fast and efficient network-wide data dissemination in multi-hop Bluetooth networks. In our experimental evaluation, in two testbeds deployed in university buildings, we show that BlueFlood achieves 99.9% end-to-end delivery ratio with a duty-cycle of 0.4% for periodic dissemination of advertising packets of 38 bytes with 200 milliseconds intervals at 2 Mbps. Moreover, we show that BlueFlood can be received by off-the-shelf devices such as smartphones, paving a seamless integration with existing technologies.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 539 ◽  
Author(s):  
Arun Kumar Sangaiah ◽  
Ali Asghar Rahmani Hosseinabadi ◽  
Morteza Babazadeh Shareh ◽  
Seyed Yaser Bozorgi Rad ◽  
Atekeh Zolfagharian ◽  
...  

The Internet of Things (IoT) is a distributed system that connects everything via internet. IoT infrastructure contains multiple resources and gateways. In such a system, the problem of optimizing IoT resource allocation and scheduling (IRAS) is vital, because resource allocation (RA) and scheduling deals with the mapping between recourses and gateways and is also responsible for optimally allocating resources to available gateways. In the IoT environment, a gateway may face hundreds of resources to connect. Therefore, manual resource allocation and scheduling is not possible. In this paper, the whale optimization algorithm (WOA) is used to solve the RA problem in IoT with the aim of optimal RA and reducing the total communication cost between resources and gateways. The proposed algorithm has been compared to the other existing algorithms. Results indicate the proper performance of the proposed algorithm. Based on various benchmarks, the proposed method, in terms of “total communication cost”, is better than other ones.


1985 ◽  
Vol 3 (4) ◽  
pp. 383-399 ◽  
Author(s):  
Tullia Musatti ◽  
Edward Mueller
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document