Advances in Wireless Technologies and Telecommunication - Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization
Latest Publications


TOTAL DOCUMENTS

23
(FIVE YEARS 23)

H-INDEX

2
(FIVE YEARS 2)

Published By IGI Global

9781522573357, 9781522573364

Author(s):  
Roselin Jones

In target-covered WSN, all critical points (CPs) are to be monitored effectively. Even a single node failure may cause coverage hole reducing the lifetime of the network. The sensor has non-rechargeable battery, and hence, energy supervision is inevitable. To maximize the lifetime of the WSN with guaranteed coverage and effective battery utilization, the activities of the sensors are to be scheduled and also the sensors may be repositioned towards the critical points. This chapter proposes an energy-efficient coverage-based artificial bee colony optimization (EEC-ABC) approach that exploits the intelligent foraging behavior of honeybee swarms to solve EEC problem to maximize the lifetime of the WSN. It also adheres to quality of service metrics such as coverage, residual energy, and lifetime. Similarly, energy-balanced dynamic deployment (EB-DD) optimization approach is proposed to heal the coverage hole to maximize the lifetime of the WSN. It positions the self-deployable mobile sensors towards the CPs to balance their energy density and thus enhances the lifetime of the network.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Author(s):  
Nitin Gupta ◽  
Sanjay Kumar Dhurandher ◽  
Bhoopendra Kumar

The radio spectrum is witnessing a major paradigm shift from fixed spectrum assignment policy to the dynamic spectrum access, which will completely change the way radio spectrum is managed. This step is required to greatly reduce the load on limited spectrum resources, which is being enforced by the exponential growth of wireless services. This is only feasible due to the capabilities of the cognitive radio, which will provide a new paradigm in wireless communication by exploiting the existing unused spectrum bands opportunistically. The chapter provides insight into recent developments in the area of cognitive radio networks with the main focus on review of the spectrum management, which consists of four main challenges: sensing of selected spectrum band, decision about sensed spectrum, sharing of spectrum among many users, and spectrum handoff. Further, sharing of target channel after a channel handoff is analyzed using game theory to get a different perspective on the existing medium access techniques.


Author(s):  
Pushpender Kumar Dhiman ◽  
Narottam Chand ◽  
Naveen Chauhan ◽  
Rajeev Kumar

Caching is a technique that transparently stores data nearer to the requester so that future requests for that data can be served faster. In networking environment, caching is a method of storing data in multiple places on the network, typically to reduce response time and network traffic. In wireless environment, through caching we can improve the efficiency. Caching can be utilized to improve the efficiency by storing the data nearer to the requester. Data are stored nearer to the requester, so it will reduce the access latency and bandwidth usage to transmit data to the requester, and reduce the overall cost of accessing data. Wireless environment is infrastructure-less so all nodes directly communicate with their neighbors. In wireless sensor network, nodes have limited resources such as battery, communication bandwidth, storage, etc. Through caching we can reduce the overall cost of accessing data and conserve the scarce resources.


Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

Internet of things (IoT) is developed to enhance easy communication by creating a large network of billions and trillions of entities. It serves an important role in future technologies about vast attention from different organizations. IoT is integrating a number of software and applications from different cloud services. This chapter presents the current IoT application, current cloud applications, current cloud applications based on IoT, future trends of IoT, and IoT-based cloud applications and their future research challenges.


Author(s):  
Manoj Himmatrao Devare

The scientist, engineers, and researchers highly need the high-performance computing (HPC) services for executing the energy, engineering, environmental sciences, weather, and life science simulations. The virtual machine (VM) or docker-enabled HPC Cloud service provides the advantages of consolidation and support for multiple users in public cloud environment. Adding the hypervisor on the top of bare metal hardware brings few challenges like the overhead of computation due to virtualization, especially in HPC environment. This chapter discusses the challenges, solutions, and opportunities due to input-output, VMM overheads, interconnection overheads, VM migration problems, and scalability problems in HPC Cloud. This chapter portrays HPC Cloud as highly complex distributed environment consisting of the heterogeneous types of architectures consisting of the different processor architectures, inter-connectivity techniques, the problems of the shared memory, distributed memory, and hybrid architectures in distributed computing like resilience, scalability, check-pointing, and fault tolerance.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


Author(s):  
Brahim Raouyane ◽  
Sara Khairi ◽  
Imane Haddar ◽  
Elmostafa Belmekki ◽  
Mostafa Bellafkih

New generation networks (NGN) are based on revolutionary aspects in IT and telecom fields. Huge throughput as well as a simplified infrastructure are based on the data center result of virtualization and cloud computing. Nevertheless, a very important question about the management part is always relevant, regardless of QoS management, of business, or of security. The chapter aims to propose a management architecture, which invokes the notion of broker and also of controller to centralize the management of networks and services.


Author(s):  
Nidhi Sharma ◽  
Rajeev Mohan Sharma

The tactile internet works on opportunities, critical services, and skill-set transfer instead of data. The global scenario is how realistically a machine/device is going to communicate with the other machine/device. Machine/device connectivity in IoT architecture relies on scalability, signal simplification, low cost and long-term sensors for energy efficiency, and improved battery lifetime. While 5G designs are guided by increased user networking demands in the field of industrial automation, precision agriculture, and augmented reality, researchers are forced to consider the unison of new technologies instead of incremental additions to the LTE specifications.


Author(s):  
Can Umut Ileri ◽  
Yasin Yigit ◽  
Ozkan Arapoglu ◽  
Hüseyin Tolga Evcimen ◽  
Mustafa Asci ◽  
...  

Main components of internet of things such as wireless sensor networks (WSNs) are generally modeled as graphs. Matching, dominating set, spanning tree, and vertex cover are fundamental graph theoretical structures which are widely used to solve backup assignment, clustering, backbone formation, routing, link monitoring, and other important problems in WSNs. Capacitated versions of these graph theoretical problems restrict at least one feature of the original problem such as a capacity value assignment to restrict the number of cluster member that a cluster head can serve in capacitated dominating set problem, limiting the number of nodes in each subtree connected to the root in capacitated minimum spanning tree problem, etc. The general aim of these operations is to provide energy efficiency by balancing the load evenly across the nodes. In this chapter, the authors introduce important capacitated graph theoretical problems and explain both central (sequential) and distributed algorithms for constructing these structures. The operations of the algorithms are demonstrated by sample topologies.


Sign in / Sign up

Export Citation Format

Share Document