packet delivery ratio
Recently Published Documents


TOTAL DOCUMENTS

127
(FIVE YEARS 75)

H-INDEX

8
(FIVE YEARS 3)

2022 ◽  
Vol 13 (2) ◽  
pp. 0-0

A novel secure energy aware game theory (SEGaT) method has proposed to have better coordination in wireless sensor actor networks. An actor has a cluster of sensor nodes which is required to perform different action based on the need that emerge in the network individually or sometime with coordination from other actors. The method has different stages for the fulfilment of these actions. Based on energy aware actor selection (EAAS), selection of number of actors and their approach is the initial step followed by the selection of best team of sensors with each actor to carry out the action and lastly the selection of reliable node within that team to finally nail the action into place in the network for its smooth working and minimum compromise in the energy The simulations are done in MATLAB and result of the energy and the packet delivery ratio are compared with game theory (GaT) and real time energy constraint (RTEC) method. The proposed protocol performs better in terms of energy consumption, packet delivery ratio as compared to its competitive protocols.


Author(s):  
C. Sapna Kumari ◽  
C. N. Asha ◽  
U. Rajashekhar ◽  
K. Viswanath

At present, due to the various hacking approaches, the protection for any data transmitted through any channel or mode is one of the important issues. Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers. Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including AES use a larger size of key simultaneously and there exists security problems due to hacking approaches. To illustrate the protection level and hacking problems, a new ECC is presented as well as by employing scalar duplication, the synchronous key is generated and consists of point doubling and point addition. The created focuses are encrypted before transmission by using ECC-Elgamal-Holomorphic (ECCEH) and transferred through a distant channel and encipher data is failed at the receiver using ECCEH which includes the reverse process. The unique standards of cryptography context have been generated by MATLAB; the defined framework has endeavored to the extent that speed, delay as well as control, and many others are accepted in MATLAB 2017a. The user of the sender, the original information is transformed into integer value by employing Holomorphic and encodes it by utilizing the Elgamal ECC algorithm which employs point doubling and point addition. The encoded information is uploaded into the cloud for storage, here www.thingspeak.com is utilized for storage. When the user presents at the receiver request the cloud to access from it, initially the cloud server authenticates the access control strategies of the requester, and then access is provided by the cloud server. If the user authenticates the strategies, then encoded data can download and the original data is decoded by synchronous key employing ECC- Elgamal algorithm. Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods and found to be 12%, 31%, 24%, and 8% progress concerned with packet delivery ratio, latency, outturn and execution time.


2021 ◽  
Vol 6 (9 (114)) ◽  
pp. 6-14
Author(s):  
Shaymaa Kadhim Mohsin ◽  
Maysoon A. Mohammed ◽  
Helaa Mohammed Yassien

Bluetooth uses 2.4 GHz in ISM (industrial, scientific, and medical) band, which it shares with other wireless operating system technologies like ZigBee and WLAN. The Bluetooth core design comprises a low-energy version of a low-rate wireless personal area network and supports point-to-point or point-to-multipoint connections. The aim of the study is to develop a Bluetooth mesh flooding and to estimate packet delivery ratio in wireless sensor networks to model asynchronous transmissions including a visual representation of a mesh network, node-related statistics, and a packet delivery ratio (PDR). This work provides a platform for Bluetooth networking by analyzing the flooding of the network layers and configuring the architecture of a multi-node Bluetooth mesh. Five simulation scenarios have been presented to evaluate the network flooding performance. These scenarios have been performed over an area of 200×200 meters including 81 randomly distributed nodes including different Relay/End node configurations and source-destination linking between nodes. The results indicate that the proposed approach can create a pathway between the source node and destination node within a mesh network of randomly distributed End and Relay nodes using MATLAB environment. The results include probability calculation of getting a linking between two nodes based on Monte Carlo method, which was 88.7428 %, while the Average-hop-count linking between these nodes was 8. Based on the conducted survey, this is the first study to examine and demonstrate Bluetooth mesh flooding and estimate packet delivery ratio in wireless sensor networks


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7611
Author(s):  
Appasamy C. Sumathi ◽  
Muthuramalingam Akila ◽  
Rocío Pérez de Prado ◽  
Marcin Wozniak ◽  
Parameshachari Bidare Divakarachari

Smart home and smart building systems based on the Internet of Things (IoT) in smart cities currently suffer from security issues. In particular, data trustworthiness and efficiency are two major concerns in Internet of Things (IoT)-based Wireless Sensor Networks (WSN). Various approaches, such as routing methods, intrusion detection, and path selection, have been applied to improve the security and efficiency of real-time networks. Path selection and malicious node discovery provide better solutions in terms of security and efficiency. This study proposed the Dynamic Bargaining Game (DBG) method for node selection and data transfer, to increase the data trustworthiness and efficiency. The data trustworthiness and efficiency are considered in the Pareto optimal solution to select the node, and the bargaining method assigns the disagreement measure to the nodes to eliminate the malicious nodes from the node selection. The DBG method performs the search process in a distributed manner that helps to find an effective solution for the dynamic networks. In this study, the data trustworthiness was measured based on the node used for data transmission and throughput was measured to analyze the efficiency. An SF attack was simulated in the network and the packet delivery ratio was measured to test the resilience of the DBG and existing methods. The results of the packet delivery ratio showed that the DBG method has higher resilience than the existing methods in a dynamic network. Moreover, for 100 nodes, the DBG method has higher data trustworthiness of 98% and throughput of 398 Mbps, whereas the existing fuzzy cross entropy method has data trustworthiness of 94% and a throughput of 334 Mbps.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7192
Author(s):  
Imtiaz Mahmud ◽  
You-Ze Cho

Energy-efficient routing has become a critical issue for advanced energy-hungry unmanned aerial vehicles (UAVs). Routing in a flying ad hoc network is always challenging and becomes even more critical when a small number of UAVs must cover a large area. The routing protocols based on the delay-tolerant network (DTN) are best suited for such scenarios. However, traditional DTN-based routing protocols depend on data dissemination to offer a better packet delivery ratio, leading to congestion and excess transmissions, causing heavy and unnecessary energy consumption. We propose a location estimation-based congestion-aware routing protocol (LECAR) to balance these two issues. Considering outdated location information, LECAR takes advantage of the mobility model to estimate the current location of the destination. In addition, LECAR routes a packet by considering both the distance to destination and buffer occupancy of the neighboring UAVs. Simulation results show that LECAR could ensure both a high packet delivery ratio and low energy consumption. Moreover, LECAR could provide a minimal number of transmissions, while minimizing the number of copies per packet at a time.


Author(s):  
Charles Blanov Hasudungan Pakpahan ◽  
Siti Agustini

MANET adalah sekelompok node yang membentuk kesatuan dan mengirim paket kepada node yang lain. Namun dari segi keamanan, MANET sangat rentan terhadap berbagai macam serangan. Serangan black hole merupakan jenis serangan pada jaringan yang dapat menyerap network traffic dan menjatuhkannya. Cara kerja dari serangan black hole adalah dengan berpura-pura memiliki rute yang cukup fresh ke semua tujuan yang diminta oleh semua node dan menyerap semua network traffic. Saat node sumber melakukan broadcast pesan RREQ untuk node tujuan, node black hole akan segera merespon dengan pesan RREP yang berisi informasi sequence number tertinggi dan pesan ini dianggap seolah-olah datang dari node tujuan atau dari node yang memiliki rute yang cukup fresh ke node tujuan. IDSAODV merupakan suatu routing protokol yang digunakan untuk meminimalisir efek dari black hole. Protokol IDSAODV akan memeriksa paket RREP dari node black hole untuk jalur minimum ke tujuan dan maksimum sequence number tujuan. Protokol IDSAODV akan membuang paket RREP pertama yang datang dari node black hole dan memilih paket RREP kedua yang datang dari node tujuan. Pada penelitian ini akan dilakukan uji coba serangan black hole pada lingkungan MANET dengan jumlah node sebanyak 100, 110, 120, 130, 140, dan 150 dengan menggunakan routing protokol AODV dan IDSAODV. Dari percobaan tersebut didapatkan hasil peningkatan Packet Delivery Ratio (PDR) paling tinggi sebesar 47,36%, peningkatan Throughput sebesar 156,78 Kbps dan penurunan End-to-End Delay sebesar 27,62 ms.


2021 ◽  
Vol 11 (16) ◽  
pp. 7304
Author(s):  
Zhenbo Cao ◽  
Zujie Fan ◽  
Jaesool Kim

Due to the limitations of the urban environment, the data transferred between vehicles can only change direction at the intersections. Therefore, the routing decision at an intersection will largely affect the overall routing decision. In this article, we propose an Intersection-Based Routing with Fuzzy Multi-Factor Decision (IRFMF), which utilizes several factors to decide the next road segment. In the scheme, each intersection introduces three factors including the direction, the number of lanes, and the traffic. After the fuzzification and defuzzification of these factors, the candidate segment with the highest evaluation will be selected. The simulation shows a significant improvement of VANETs performance on packet delivery ratio and end-to-end delay.


Author(s):  
Joy Iong-Zong Chen ◽  
S Smys

In recent years, both developed and developing countries have witnessed an increase in the number of traffic accidents. Aside from a significant rise in the overall number of on-road commercial and non-commercial vehicles, advancements in transportation infrastructure and on-road technologies may result in road accidents, which generally result in high mortality. More than half of these fatalities are the result of delayed response by medical and rescue personnel. If an accident site receives quick medical treatment, an accident victim's chances of survival may improve considerably. Based on the IoT-based multiple-level vehicle environment, this study proposes a low-cost accident detection and alarm system. Vehicles are equipped with a "Black Box" board unit and an accident location identification module for the Global Positioning System (GPS), in addition to mechanical sensors (accelerometer, gyroscope) for accurate accident detection. This study has evaluated the proposed system with average packet delivery ratio (PDR) vs. relay nodes. Our simulation results have evaluated the evolution of relay nodes in the mobile / sensor node through internet gateway. It has also been demonstrated that the packet delivery ratio is inversely related to the incremental number of relay nodes.


2021 ◽  
Author(s):  
Sathyaraj P ◽  
Rukmani Devi D ◽  
K Kannan

Abstract Background: Mobile Ad-hoc Networks (i.e.) MANETs are gaining rapid fame in recent days and are considered as very significant because of their easier implementation and growing property. Various types of attacks are prone to damage the networks due to the elastic property possessed by the network. And among different categories of attacks that can affect MANETs, black hole attack is considered as the commonly occurring one within a MANET. Chicken Swarm Optimization (CSO) algorithm is one among the technique used for the detection of black hole attacks occurring in the MANETs. But the CSO algorithm possesses some disadvantages and necessity rises for overcoming the weakness in the CSO algorithm. Objective: Therefore, in this research paper, to address the black hole attack in MANET, an Improved Crossover Chicken Swarm Optimization (ICCSO) algorithm and the concept of Enhanced Partially-Mapped Crossover operation proposed and the best fitness values obtained. Methods: In ICCSO algorithm, parameter initialization is carried out in step 1 of the algorithm, where the attacked nodes and non-attack nodes are created separately with the aid of parameters like PDR (i.e.) Packet Delivery Ratio and RSSI (i.e.) Received Signal Strength Indicator. Further, If the node is affected by any attack, then the nodes are discarded and the data is transmitted through the non-attacked node. Routing is carried by a protocol of AODV.Results: The effectiveness of the algorithm proposed in the work is evaluated using various performance measures like packet delivery ratio (PDR), end-to-end delay (EED) and throughput. The performance measures are compared with a different state of the art routing protocols and it can be inferred that the proposed methodology comes up with improved results.


MIND Journal ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 135-148
Author(s):  
HERIANSYAH HERIANSYAH ◽  
AHMAD REYNALDI NOPRIANSYAH ◽  
SWADEXI ISTIQPHARA

AbstrakJaringan Ad hoc pada perangkat Internet of Things (IoT) mempunyai sifat yang yang dinamis dengan node pada jaringan yang berperan sebagai router dan bergerak bebas secara random tanpa bantuan infrasturktur komunikasi sehingga topologi berubah sangat cepat seiring dengan perubahan posisi. Perubahan ini sangat mempengaruhi kualitas layanan pada perangkat IoT itu sendiri. Penelitian ini bertujuan untuk mengevaluasi protocol routing yang sudah ada dengan cara mengimplementasikan routing protocol tersebut di perangkat testbed berbasis NodeMCU ESP8266. Hal ini bertujuan untuk memilih protocol routing yang paling optimal sebelum proses implementasi dilaksanakan. Pengujian ini berlaku untuk routing protocol yang sudah ada maupun yang baru. Kinerja protocol jaringan  diukur melalui nilai  Quality of Service (QoS) ditempatkan pada scenario berbeda yang terdiri dari throughput, delay, jitter, dan packet delivery ratio sesuai dengan perbedaan beban jaringan, mobilitas, dan ukuran jaringan. Hasil penelitian ini menunjukkan bahwa testbed  yang dibangun berhasil mensimulasikan routing protocol yang ada untuk menghasilkan QoS yang baik pada perangkat IoT.Kata kunci: IoT, routing protocol, testbed, QoS.AbstractAd hoc networks on Internet of Things (IoT) devices have dynamic characteristics where the nodes on this network can operate as routers and move freely randomly without using any communication infrastructure so that the topology changes very quickly along with changes in position. This adjustment has a significant impact on the IoT device's service quality. This study aims to evaluate the existing routing protocols by implementing the routing protocol in a testbed based on NodeMCU ESP8266. It aims to choose the most optimal routing protocol before the implementation process is carried out. This test applies to both existing and new routing protocols. Network protocol performance is measured by the Quality of Service (QoS) value which includes throughput, delay, jitter, and packet delivery ratio in different scenarios based on network load, mobility, and different network sizes. The results show that this study was successful in simulating routing protocol in order to provide good QoS on IoT devices.Keywords: IoT, routing protocol, testbed, QoS.


Sign in / Sign up

Export Citation Format

Share Document