Routing in IoT Lossy Networks: Potential Issues and Proposed Changes

2021 ◽  
Vol 21 (03) ◽  
Author(s):  
Mohamed Hechmi Jeridi ◽  
Sami Elmadssia ◽  
Tahar Ezzedine

The specificities of the Internet of Things (IoT) require innovative methods to perform routing, owing to the resource limitations of network nodes. The IPv6 routing protocol for low-power and lossy networks ( RPL), as one of these pioneering methods, performs a variety of routing measurements to meet the requirements of some IoT applications, but, does not solve the problems of sudden and intense data traffic caused by the particularity of the other ones. Indeed, it has been observed that such unexpected and excessive data traffic leads to routing instability and traffic congestion in the IoT network. In order to overcome the mentioned shortcomings, we propose a common solution using the mobility of some nodes to reduce system instability and alleviate congestion on the network, to be named: use of mobile node for the Instability & Congestion Alleviation in IoT networks (mob-ICA). Therefore, our contribution consists in overcoming network instability by dynamically regulating the message transmission period to choose the parent nodes according to the speed and direction of the mobile nodes and in reducing congestion by using these nodes to locally create alternative paths to the parental node

2020 ◽  
Vol 16 (1) ◽  
pp. 155014772090360
Author(s):  
Soon-Woong Min ◽  
Sang-Hwa Chung ◽  
Hee-Jun Lee ◽  
Yu-Vin Ha

With the diversification of industrial Internet of Things applications, there is a growing demand for mobility support in industrial wireless networking environments. However, the routing protocol for low-power and lossy networks is designed based on a static environment and is vulnerable in a mobility environment. Routing protocol for low-power and lossy networks is an Internet engineering task force standard in the low-power and lossy network environments used mainly in industrial environments. In addition, although routing protocol for low-power and lossy networks is based on collection tree protocol and is suitable for data collection and upward traffic transmission, it struggles with downward traffic transmission in terms of control, actuation, and end-to-end transmission. In this article, the problems caused by mobile nodes in routing protocol for low-power and lossy networks are discussed, and a retransmission scheme named IM-RPL is proposed. This retransmission scheme can improve the performance of downward traffic for the mobile nodes by retransmitting the packets to the neighbor nodes, the mobile node’s new parent sets, and relaying them to the mobile node. Its performance is evaluated through an experiment. The results demonstrate that using OpenMote in OpenWSN’s time slotted channel hopping induces a packet reception ratio improvement and a lower transmission delay as compared to standard routing protocol for low power and lossy.


2014 ◽  
Vol 2014 ◽  
pp. 1-16
Author(s):  
Peer Azmat Shah ◽  
Halabi B. Hasbullah ◽  
Ibrahim A. Lawal ◽  
Abubakar Aminu Mu’azu ◽  
Low Tang Jung

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).


2021 ◽  
Vol 8 ◽  
pp. 62-71
Author(s):  
D.L.S. Rasagna ◽  
K.S.N. Reddy ◽  
Sanjay Singh ◽  
Sudip Das

The development of urban infrastructure projects like metro rail projects in the major cities in India is one of the challenging tasks due to several site construction and operating constraints. These rapid transit systems (RTS) are conceived to minimise traffic congestion by providing commuters with fast and efficient transportation alternatives. One such project is the Phase-II of the ongoing Bangalore Underground Metrorail Project. The design and construction of the metro rail project require sound engineering judgment and field experience on envisaged strata conditions along the proposed route alignment. The important factors that govern the excavation cycle depend on Rock mass material properties, efficient blast design and construction performance. All these considerations needs to be evaluated for achieving safe, cost-effective excavation design layouts. Proper blast design and safe blasting operations play a key role in achieving good fragmentation, minimising over break and equipment downtime. Site-specific innovative methods on controlled blasting techniques are being experimented with and demonstrated to minimise the ground vibrations. The major challenge lies with the design of efficient and smooth wall blasting techniques to safeguard the old heritage buildings and other subsurface structures and utilities.      


2021 ◽  
Author(s):  
Bingxin Chen ◽  
Lifei Kuang ◽  
Wei He

Abstract Today, with the rapid development of information age, the communication of science and technology is getting closer to each other, and our country has begun to conduct in-depth research on WSN. This study mainly discusses the computer simulation algorithm of gymnastics formation transformation path based on wireless sensor. In this study, an improved leader follower method is designed. In the research of gymnastics formation transformation of mobile nodes in wireless sensor network environment, the traditional three types of nodes are divided into four categories according to different formation responsibilities, namely coordinator, beacon node, leader and follower. When it makes accurate positioning with the help of beacon node information, it will send the information in the form of broadcast, and then the coordinator will send the information to the host computer through the serial port for tracking display. In order to make the mobile nodes in the network keep the current gymnastics formation moving towards the target point after completing the gymnastics formation transformation, this paper uses the L - φ closed-loop control method to modify the gymnastics formation in real time. The method based on the received signal strength is used to locate the mobile node. Combined with the positioning engine in the core processor CC2431 of the mobile node, the efficient and low-energy wireless positioning can be realized. Multiple mobile nodes coordinate and control each other, and each node communicates with each other through wireless mode, and senses its own heading angle information through geomagnetic sensor, so as to judge and adjust the maintenance and transformation of the current gymnastics formation. In the process of formation transformation, the analysis shows that the maximum offset of follower2 relative to the ideal path is + 0.28M in the process of marching to the desired position in the triangle queue. This research effectively realizes the computer simulation of autonomous formation.


2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


Author(s):  
Vasuky Mohanan ◽  
Rahmat Budiarto ◽  
Sivakumar Ramakrishnan

4G networks provide bandwidth of up to 1Gbps for a Mobile Node (MN) that is moving at pedestrian speed. On the other hand, it also supports mobile nodes that can move at a speed of 250 km/hr with bandwidths value of 100 Mbps. This sets the premise of a network that supports diverse needs. This goal will be harder to achieve if Network Selection Problems (NSP) are not addressed comprehensively. NSP refers to the selection of target access network selection from a collection of Candidate Networks (CNs) when MNs are moving from one access network into another. The most logical way of achieving this is to select the “best” network. This translates to identifying performance values of the CNs. The analysis in this chapter shows clearly that access network selection done based on limited criteria is detrimental in achieving optimum communication. Instead, this chapter suggests a framework that would be complementary to a 4G network.


Author(s):  
Omar Raoof ◽  
Hamed Al-Raweshidy

This chapter proposes a novel game-based green interface/network selection mechanism that is an extension to the multi-interface fast-handover mobile IPv6 protocol and works when the mobile node has more than one wireless interface. The mechanism controls the handover decision process by deciding whether a handover is needed or not and helps the node to choose the right access point at the right time. Additionally, the mechanism switches the mobile nodes interfaces “ON” and “OFF” when needed to control the mobile node’s energy consumption and improves the handover latency.


Author(s):  
Z. Abdul-Mehdi ◽  
A. Mamat ◽  
H. Ibrahim ◽  
M. Dirs

In this article, we consider the distributed database that can make up mobile nodes and the peer-to-peer concept. These nodes are peers and may be replicated both for fault-tolerance, dependability, and to compensate for nodes that are currently disconnected. Thus we have a distributed replicated database where several sites must participate in the synchronization of transactions. The capabilities of the distributed replicated database are extended to allow mobile nodes to plan disconnection, with the capability of updating the database on behalf of the mobile node by using a fixed proxy server to make these updates during the mobile disconnection, once a mobile reconnects automatically, synchronously, and integrates into the database.


2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Muhammad Amir Khan ◽  
Halabi Hasbullah ◽  
Babar Nazir ◽  
Imran Ali Khan

Recently, wireless sensor network (WSN) applications have seen an increase in interest. In search and rescue, battlefield reconnaissance, and some other such applications, so that a survey of the area of interest can be made collectively, a set of mobile nodes is deployed. Keeping the network nodes connected is vital for WSNs to be effective. The provision of connectivity can be made at the time of startup and can be maintained by carefully coordinating the nodes when they move. However, if a node suddenly fails, the network could be partitioned to cause communication problems. Recently, several methods that use the relocation of nodes for connectivity restoration have been proposed. However, these methods have the tendency to not consider the potential coverage loss in some locations. This paper addresses the concerns of both connectivity and coverage in an integrated way so that this gap can be filled. A novel algorithm for simultaneous-node repositioning is introduced. In this approach, each neighbour of the failed node, one by one, moves in for a certain amount of time to take the place of the failed node, after which it returns to its original location in the network. The effectiveness of this algorithm has been verified by the simulation results.


2019 ◽  
Vol 2019 ◽  
pp. 1-18
Author(s):  
Tommaso Muciaccia ◽  
Vittorio M. N. Passaro

Today, telecommunication operators are facing an epochal challenge due to the need of higher reconfigurability, flexibility, and dynamicity for their networks. In the latest years, this necessity has been addressed by the introduction of Software-Defined Networking (SDN), mainly in the fields of data centers and core networks. The present work introduces a unified metro-access optical network architecture based on some features inspired by SDN models. The essential aim is to enable bandwidth shared among different passive optical networks (PONs) in order to achieve higher adaptability to increasingly migratory and volatile traffic patterns. Even if the present work is mainly focused on the architecture, several hints for specific implementation of the network nodes are detailed as well in order to demonstrate its feasibility. Several numerical simulations have been performed to assess the performance of the proposed solution both about physical effects and about quality of service. Bit error ratio degradation due to physical impairments has been evaluated and traffic congestion has been estimated in terms of burst loss probability and average throughput.


Sign in / Sign up

Export Citation Format

Share Document