scholarly journals Comparison of the Device Lifetime in Wireless Networks for the Internet of Things

IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 7097-7114 ◽  
Author(s):  
Elodie Morin ◽  
Mickael Maman ◽  
Roberto Guizzetti ◽  
Andrzej Duda
2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


2019 ◽  
Vol 75 (3) ◽  
pp. 380-394
Author(s):  
Uday Khanapurkar

Huawei, the Chinese telecom giant, has emerged as a key player in the provision of infrastructure required to support 5G wireless networks, the adoption of which will be foundational to recipient countries’ deployment of emerging technologies such as artificial intelligence and the Internet of things.   At the same time, however, security concerns with respect to Huawei’s ties to the Chinese army and state abound, prompting a number of countries to ban the company from supplying them said telecom infrastructure. India, however, is on the fence in this regard. This article assesses India’s Huawei conundrum through a conceptual framework of economic dependence wherein the costs of a ban and willingness to ban are examined in detail. It is argued that since the expected costs of banning Huawei equipment and the security risks of using them are both substantially high, India’s course of action must be to defer a quick decision and bargain for benefits and assurances.


Author(s):  
Ohood Saud Althobaiti

Several current computer science applications, implemented within specific paradigms, work at different levels to solve various challenges facing particular sectors. The potential of the internet of things (IoT) in the context of fifth-generation networks (5G) is envisioned as suggesting several beneficial opportunities for companies, industries, and users to exploit this technology's applications. This chapter establishes how the IoT works, considering its 5G architecture. The emphasis is on the infrastructural characteristic in terms of transmission power, frequency, speed, security, localization, device lifetime, and others. Additionally, the chapter illustrates what the IoT entails, discussing its workability and efficiency. Furthermore, it highlights a range of newly distinguishing features that would give it much-touted success in comparison with other technologies. It also presents research issues and challenges.


2020 ◽  
Vol 117 (11) ◽  
pp. 5624-5630 ◽  
Author(s):  
Giulia Fanti ◽  
Nina Holden ◽  
Yuval Peres ◽  
Gireeja Ranade

Motivated by applications in wireless networks and the Internet of Things, we consider a model of n nodes trying to reach consensus with high probability on their majority bit. Each node i is assigned a bit at time 0 and is a finite automaton with m bits of memory (i.e.,2mstates) and a Poisson clock. When the clock of i rings, i can choose to communicate and is then matched to a uniformly chosen node j. The nodes j and i may update their states based on the state of the other node. Previous work has focused on minimizing the time to consensus and the probability of error, while our goal is minimizing the number of communications. We show that, whenm>3⁡log⁡log⁡log(n), consensus can be reached with linear communication cost, but this is impossible ifm<log⁡log⁡log(n). A key step is to distinguish when nodes can become aware of knowing the majority bit and stop communicating. We show that this is impossible if their memory is too low.


Mobile networks presently supply connectivity to an extensive variety of gadgets, enabling the progression of impressive brand-new solutions and apps. The Internet of Things (IoT) is actually counted on to result in the development of brand-new value in mix with huge information study technology, and also possess a considerable as well as good influence on people's lives and the economic condition. Therefore, it is actually vital to possess continual development as well as technology of each wired and cordless network innovations, while developing input/output stations and also cloud computing. This paper gives an improved IoT accommodation strategy to wireless networks


This theory has recently been expanded to IEEE 802.15.4 wireless networks, which constitute a key element of the Internet of Things (IoT). Nonetheless, the various patterns of traffic needed for SDN management make it difficult to adapt this method to these extremely demanding situations. Software-Defined Networking (SDN) key contribution of this work is the solution to network with IoT devices that enables network because of better functionalities in case of providing interfacesfor the layers. SDN enables significant advantages of applications to be created on the basis of interaction with traffic networks, trustable authentication, or service eminence. This report suggests the use of a SDN gateway as a decentralized platform to track traffic from IoT gadgets. The configured SDN gateway capable of detection the possible abnormal behaviors and provide it particularly valuable applicability for (obstructive, transmission or application of providing best services to the system).


2021 ◽  
Vol 26 (2) ◽  
Author(s):  
Tymofii Vitaliiovych Yakushkin ◽  
Yevhenii Viacheslavovych Kuts ◽  
Roman Dmytrovych Yershov ◽  
Serhii Anatoliiovych Stepenko

Autonomous systems based on the "Internet of Things" paradigm have become widespread. The Internet of Things devices are used for collecting and analyzing data, control electrical systems. The Internet of Things the most common fields of use are smart houses, smart cities, smart traffic, environment monitoring, healthcare etc. With the automation to the degree of autonomy of such processes as cargo delivery and human transportation, the Internet of Things paradigm begins to extend not only to stationary devices, but also to mobile, primarily small unmanned aerial vehicles. UAV can be used not only for civil use but for police or military operations too. This poses a potential threat to skilled criminals such as terrorists, smugglers and drug couriers. There is an urgent problem of secure transmission of data and control signals at distances up to tens of kilometers without loss of communication and the possibility of interception of control. Wireless communication technologies are widely used in all areas of the economy: control systems, environmental safety monitoring, industrial automation, logistics, etc. Wireless networks have many characteristics in common with wireline networks, and therefore, many security issues of wireline networks apply to the wireless environment. Wireless data is easy to intercept by potential eavesdroppers. Issue of security and privacy become more notable with wireless networks. The paper substantiates the transition to cryptographically protected wireless communication channels in autonomous control systems for both fixed and mobile performance. Possible attack vectors in such systems are considered. An analytical review and classification of modern cryptographic protection (encryption) algorithms used at the representative, session and channel levels of communication interfaces together and functional diagrams for some of them are performed. Selected criteria for comparing cryptographic algorithms, which allows you to choose the best depending on the functions performed and the conditions of use of a particular autonomous system.


Author(s):  
А.С. Бородин ◽  
Р.В. Киричек ◽  
Д.Д. Сазонов ◽  
М.А. Рожков ◽  
А.В. Колесников ◽  
...  

Представлено описание системы идентификации на базе архитектуры цифровых объектов (Digital Object Architecture DOA), которая в настоящее время рассматривается в качестве приоритетной для идентификации устройств и приложений интернета вещей. Приведен анализ альтернативных идентификаторов и показаны преимущества DOA как для задач идентификации, так и для борьбы с контрафактом. В первой части статьи рассмотрены основные положения, связанные с идентификацией устройств интернета вещей, проведен анализ существующих подходов и решений по идентификации. Дано описание базовых компонентов архитектуры цифровых объектов DOA и дана оценка возможности ее применения для построения систем идентификации. A description of an identification system for IoT devices based on the Digital Object Architecture (DOA) is given. The analysis of alternative identifiers is carried out. The advantages of DOA for both identification and counterfeiting tasks have been shown. The first part of the article discusses the main provisions related to the identification of IoT devices.


Sign in / Sign up

Export Citation Format

Share Document