scholarly journals Performance Evaluation of a Dual Coverage System for Internet of Things Environments

2016 ◽  
Vol 2016 ◽  
pp. 1-20 ◽  
Author(s):  
Omar Said ◽  
Amr Tolba

A dual coverage system for Internet of Things (IoT) environments is introduced. This system is used to connect IoT nodes regardless of their locations. The proposed system has three different architectures, which are based on satellites and High Altitude Platforms (HAPs). In case of Internet coverage problems, the Internet coverage will be replaced with the Satellite/HAP network coverage under specific restrictions such as loss and delay. According to IoT requirements, the proposed architectures should include multiple levels of satellites or HAPs, or a combination of both, to cover the global Internet things. It was shown that the Satellite/HAP/HAP/Things architecture provides the largest coverage area. A network simulation package, NS2, was used to test the performance of the proposed multilevel architectures. The results indicated that the HAP/HAP/Things architecture has the best end-to-end delay, packet loss, throughput, energy consumption, and handover.

Author(s):  
Abdul Rafay ◽  
Arsala Khan

This chapter examines the merger of two cellular companies (MOBILINK and WARID) for sustainability in the telecommunication sector of Pakistan. During 2011-2013, WARID faced the news of the possible sales of the company due to falling revenues, constant poor network quality, and lower network coverage in rural areas. In 2014, all telecom players participated in the auction for 3G/4G licenses, but WARID did not participate due to its technology neutral license (TNL). Important decisions were taken in 2014 like launching of 4G/LTE services in major cities, US$500 million investment, increase of tower sites, opening of new regional sales offices. These decisions along with presence of TNL made WARID an attractive target for merger with MOBILINK. In 2016, the formal merger was finalized for benefits like synergies in CAPEX/OPEX, fastest 4G network, network reach to rural areas, roll-out of new services like the internet of things (IoT) and mobile banking. The merger proved successful. During the first quarter of 2017, the company generated PKR 38.7 billion in revenues, up from the same period a year before.


2019 ◽  
Vol 11 (11) ◽  
pp. 233
Author(s):  
Zou ◽  
Zhang ◽  
Yi

In order to improve the network layer of the Internet of things to improve transmission reliability, save time delay and energy consumption, the Internet of things cooperative communication and intelligent agent technology were studied in this paper. In cooperative communication, a new cooperative communication algorithm KCN (k-cooperative node), and a reliability prediction model are proposed. The k value is determined by the end-to-end reliability. After k cooperative nodes are selected, other nodes enter dormancy. In aggregate traffic allocation, game theory is used to model the traffic equilibrium and end-to-end delay optimization scenarios. In practice, the optimal duty cycle can be calculated, which makes some cooperative nodes enter an idle state to save energy. Under the premise of guaranteeing end-to-end delay, it is shown that the reliability of the proposed KCN algorithm is better than that of the other existing routing protocols. In the aspect of intelligent agent, a directional source grouping algorithm D-MIP is proposed. This algorithm studies the routing problem of multi-agent parallel access to multiple source nodes. A directed source packet multi-agent routing planning algorithm is proposed. The iterative algorithm of each source node is limited to a sector, and the optimal intelligent agent route is obtained by selecting an appropriate angle. Compared with other algorithms, it is shown through a lot of simulated results that energy consumption and time delay has been saved by the proposed D-MIP algorithm.


2018 ◽  
Author(s):  
Steven M. Bellovin

Today, all privacy regulations around the world are based on the 50-year-old paradigm of notice and consent. It no longer works. The systems we deal with—web pages with their multiple levels of advertising, the Internet of Things, and more—are too complex; consumers have no idea what sites they are contacting nor what their privacy policies are. Privacy harms are not well-defined, especially under U.S. law. Furthermore, their privacy policies are ambiguous and confusing. Use controls—the ability for users to control how their data is used, rather than who can collect it—are more promising but pose their own challenges. I recommend research on a new privacy paradigm, and give suggestions on interim changes to today's privacy regulations until there is something new.


2020 ◽  
Vol 5 (1) ◽  
pp. 11
Author(s):  
Fachri Nugraha Adhiatma ◽  
Doan Perdana ◽  
Nachwan Mufti Adriansyah ◽  
Risqi Herlambang Raharjo

The growth of Wireless Fidelity (WiFi) technology is so rapid and popular. The technology most widely used for WiFi services is the IEEE 802.11 family of standards. To support the Internet of Things (IoT) era, 802.11ah standard technology has developed, and the standard is intended to provide a low-cost mode of operation, with a wider coverage area, and can support thousands of devices per cell. This paper discusses IEEE 802.11ah Standard Network Planning for the Internet of Things Application (Case Study: Smart Meter Using WiFi.id Network in Bandung), to improve network quality in terms of coverage and capacity to improve the efficiency of the WiFi network and so that it can supports the Internet of Things (IoT) service. Network planning using 802.11ah for the internet of things application with a smart meter case study using the WiFi.id network has been successfully carried out. To cover the entire area of Bandung, 23 sites are required. In the capacity, the Tx slots needed to cover possible smart meters for each site are only 9 tx slots out of a total of 100 tx slots. 


Author(s):  
I Wayan Krisnhadi Bima ◽  
Vera Suryani ◽  
Aulia Arif Wardana

Internet of Things (IoT) refers to a concept connecting any devices onto the internet. The IoT devices cannot only use a service or server to be controlled at a distance but also to do computation. IoT has been applied in many fields, such as smart cities, industries, and logistics. The sending of IoT data can use the existing GSM networks such as GPRS. However, GPRS is not dedicated particularly to the transmission of IoT data in consideration of its weaknesses in terms of coverage and power efficiency. To increase the performance of the transmission of IoT data, Narrowband-IoT (NB-IoT), one alternative to replace GPRS, is offered for its excellence in coverage and power. This paper aims to compare the GPRS and NB-IoT technology for the transmission of IoT data, specifically in Bandung region, Indonesia. The results obtained showed that the packet loss from clients for the GPRS network was at 68%, while the one for NB-IoT was at 44%. Moreover, NB-IoT technology was found excellent in terms of battery saving compared to GPRS for the transmission of IoT data. This result showed that NB-IoT was found more suitable for transmitting the IoT data compared to GPRS.


2021 ◽  
Vol 7 ◽  
pp. e543
Author(s):  
Katayoun Bakhshi Kiadehi ◽  
Amir Masoud Rahmani ◽  
Amir Sabbagh Molahosseini

Considering the Internet of Things (IoT) impact in today’s world, uninterrupted service is essential, and recovery has received more attention than ever before. Fault-tolerance (FT) is an essential aspect of network resilience. Fault-tolerance mechanisms are required to ensure high availability and high reliability in systems. The advent of software-defined networking (SDN) in the IoT plays a significant role in providing a reliable communication platform. This paper proposes a data plane fault-tolerant architecture using the concepts of software-defined networks for IoT environments. In this work, a mathematical model called Shared Risk Link Group (SRLG) calculates redundant paths as the primary and backup non-overlapping paths between network equipment. In addition to the fault tolerance, service quality was considered in the proposed schemes. Putting the percentage of link bandwidth usage and the rate of link delay in calculating link costs makes it possible to calculate two completely non-overlapping paths with the best condition. We compare our two proposed dynamic schemes with the hybrid disjoint paths (Hybrid_DP) method and our previous work. IoT developments, wireless and wired equipment are now used in many industrial and commercial applications, so the proposed hybrid dynamic method supports both wired and wireless devices; furthermore multiple link failures will be supported in the two proposed dynamic schemes. Simulation results indicate that, while reducing the error recovery time, the two proposed dynamic designs lead to improved service quality parameters such as packet loss and delay compared to the Hybrid_DP method. The results show that in case of a link failure in the network, the proposed hybrid dynamic scheme’s recovery time is approximately 12 ms. Furthermore, in the proposed hybrid dynamic scheme, on average, the recovery time, the packet loss, and the delay improved by 22.39%, 8.2%, 5.66%, compared to the Hybrid_DP method, respectively.


2020 ◽  
Vol 10 (21) ◽  
pp. 7940
Author(s):  
Soohwan Cho ◽  
Deokyoon Ko ◽  
Sooyoung Park

The Internet of Things uses low-power wireless communication for wireless connectivity and efficient energy. Low-power wireless communication is applied to IoT for wireless connection and efficient energy consumption in various areas such as wearable devices, smart homes, and power plants in order to send and receive data and control the environment. Security is becoming more important because the Internet of Things controls real physical systems. For the security of the Internet of Things, the encryption key is important to identify and authenticate devices that are trusted. The static encryption key method used for devices is likely to be calculated in reverse through the value of the key and is vulnerable to exploitation attacks. This requires the application of dynamic encryption keys that generate keys periodically. However, in the case of low-power wireless communication, the asynchronous communication method and the packet loss make it difficult to apply existing dynamic encryption key technologies. In this paper, we proposed dynamic encryption key method that applies the mechanism of the block chain to solve these problems. Based on the history of sensor data between devices, encryption keys are dynamically generated. The proposed method is to generate the same encryption key between devices with only one step of asynchronous communication considering packet loss. The proposed method is also validated in terms of availability and security in the Internet of Things low-power wireless communication.


Sign in / Sign up

Export Citation Format

Share Document