Article
Computer Science, Hardware & Architecture
Rukhsana Ruby, Shuxin Zhong, Basem M. ElHalawany, Hanjiang Luo, Kaishun Wu
Summary: This study investigates the routing problem in underwater sensor networks and employs Software Defined Networking (SDN) to address performance issues by developing advanced algorithms to enhance network performance. The research findings show that the globally optimal routing scheme consistently outperforms existing decentralized routing protocols in terms of reliability, latency, energy efficiency, lifetime, and fairness.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2021)
Article
Engineering, Electrical & Electronic
Rodolfo W. L. Coutinho, Azzedine Boukerche
Summary: This paper proposes a novel stochastic model for opportunistic routing (OR) in multi-modal UWSNs, and designs two candidate set selection heuristics to reduce energy consumption and improve the network data delivery ratio in multi-modal UWSNs. The proposed heuristics outperform classical related work protocols and the CAPTAIN routing protocol in terms of energy consumption and data delivery ratio.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Junhai Luo, Yanping Chen, Man Wu, Yang Yang
Summary: Underwater wireless sensor networks are a hot research field with various limitations and challenges, and well-designed routing protocols can effectively address these issues. Existing underwater routing protocols can be classified into three categories: energy-based, data-based, and geographic information-based. Research challenges and future directions in underwater routing protocols are worth exploring.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2021)
Article
Computer Science, Information Systems
Rehenuma Tasnim Rodoshi, Yujae Song, Wooyeol Choi
Summary: In underwater wireless sensor networks, routing algorithms based on reinforcement learning can learn and optimize in underwater environments without prior knowledge, however, facing challenges such as high energy consumption and narrow bandwidth. Various routing protocols differ in terms of key ideas, designs, optimization criteria, and performance evaluation.
Article
Chemistry, Analytical
Danfeng Zhao, Guiyang Lun, Rui Xue, Yanbo Sun
Summary: UWSNs are an important technology, with traditional routing protocols inefficient and OR protocols better adapting to the underwater environment; cross-layer design can optimize OR routing in UWSNs, but typical cross-layer OR routing protocols are prone to congestion; CLOR protocol reduces congestion in UWSNs through negotiation and transmission phases, significantly improving network performance.
Article
Computer Science, Information Systems
Zhongwei Shen, Hongxi Yin, Fangyuan Xing, Xiuyang Ji, An Huang
Summary: In this paper, a routing-aware power control scheme is proposed for underwater wireless sensor networks, aiming to assign an optimal communication radius for each sensor node. Compared with existing studies, this scheme focuses more on the combination of power control and opportunity routing mechanisms, distributed implementation of algorithms, and specific characteristics of underwater sensor network topology. The scheme consists of two main algorithms, namely, the rough adjustment algorithm and the fine adjustment algorithm, which achieve a trade-off among network connectivity maintenance, routing performance promotion, and energy utilization optimization through game theory and flooding mechanism. Based on theoretical analysis, the proposed algorithms enable each node to adjust its transmitted power in a distributed, convergent, and low-complexity manner. Numerical simulation experiments show that the designed power control scheme can improve various networking performances, including network lifetime, packet delivery ratio, energy efficiency, load balance, and end-to-end delay.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Chao Wang, Xiaohong Shen, Haiyan Wang, Hongwei Zhang, Haodi Mei
Summary: This article proposes a reinforcement learning-based opportunistic routing protocol (DROR) to address the issue of void regions in underwater wireless sensor networks (UWSNs). The protocol combines reinforcement learning (RL) with opportunistic routing (OR) to ensure real-time performance and energy efficiency considering limited energy and the underwater environment. It includes a void recovery mechanism and a relative Q-based dynamic scheduling strategy to enable reliable transmission and efficient forwarding along the global optimal routing path.
IEEE SENSORS JOURNAL
(2023)
Article
Computer Science, Information Systems
Zhixin Liu, Xiaocao Jin, Yi Yang, Kai Ma, Xinping Guan
Summary: This article proposes a localization-free routing scheme called energy-efficient guiding-network-based routing (EEGNBR) protocol for underwater wireless sensor networks (UWSNs). The protocol aims to provide time-saving and reliable routing for UWSNs, specifically for applications with intermittent connectivity. EEGNBR utilizes the distance-vector mechanism and a guiding network to reduce network delay and establish the shortest route towards the sinks. It also introduces a novel data forwarding mechanism called concurrent working mechanism to reduce forwarding delay while ensuring reliable routing. The forwarding protection mechanism is adopted to save energy consumption and extend the network's service life. Simulation results show that EEGNBR outperforms classical related protocols in terms of network delay while maintaining comparable or better energy consumption and packet delivery ratio.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Optics
Hao Zhang, Yunhai Gao, Zhijian Tong, Xingqi Yang, Yufan Zhang, Chao Zhang, Jing Xu
Summary: In this paper, an omnidirectional underwater wireless optical communication (UWOC) system is proposed, which includes six lens-free transceivers. Experimental results demonstrate a omnidirectional communication with a data rate of 5 Mbps in a 7-m underwater channel. The system is integrated into a self-designed robotic fish, with real-time signal processing through an integrated micro-control unit (MCU). Additionally, experimental results show the system establishing a stable communication link between two nodes, regardless of their locomotion and attitude, with a data rate of 2 Mbps and a communication range of up to 7 m. The optical communication system features small footprint and low power consumption, making it suitable for integration in autonomous underwater vehicle (AUV) swarms to achieve omnidirectional information transmission with low latency, high security, and high data rate compared to its acoustic counterpart.
Article
Engineering, Electrical & Electronic
Mingqing Liu, Shuaifan Xia, Mingliang Xiong, Mengyuan Xu, Wen Fang, Qingwen Liu
Summary: This paper proposes a monocular resonant beam-based integrated communication and positioning (ICP) system design that achieves high-rate data transfer and high-accuracy localization while ensuring intrinsic safety. By utilizing the resonant beam system and frequency-doubled beam design, the system solves the issue of echo interference and introduces distance and angle estimation models.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Yusi Long, Gaofei Huang, Hui Zheng, Sai Zhao, Guiyun Liu, Dong Tang
Summary: In this article, a new hybrid relaying protocol is proposed for wireless multirelay networks with energy-constrained relays to improve network throughput. The protocol allows relays to switch between different operation modes based on channel states, data buffer states, and energy states, achieving efficient energy utilization and superior throughput performance. Numerical simulations demonstrate the effectiveness of the proposed strategy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Yuan Zhang, Zixian Wei, Zhongxu Liu, Chen Cheng, Zhaoming Wang, Xinke Tang, Yanfu Yang, Changyuan Yu, H. Y. Fu
Summary: This article presents a novel scheme based on underwater optical wireless communication and positioning (UOWC-UOWP) for an underwater wireless sensor network (UWSN). The scheme utilizes a dual-hop system with a grade-index plastic optical fiber (GI-POF) link and a wireless link to extend the coverage area and enable high-speed transmission, positioning, and multi-user signal transmission. Proof-of-concept experiments demonstrate the feasibility and potential of the proposed scheme for future underwater transmission scenarios.
JOURNAL OF LIGHTWAVE TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar
Summary: The aim of Beyond Fifth Generation (B5G) communication is to improve Quality of Service (QoS) through enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communication (URLLC), and massive Machine Type Communication (mMTC). Interference mitigation is a foundational aim in B5G communication research. Software Defined Networking (SDN) is emerging as a solution for centralized routing-based interference mitigation. This review focuses on SDN-based interference mitigation in wireless communication, discussing current research and evaluating existing solutions.
Article
Computer Science, Hardware & Architecture
Chandra Sukanya Nandyala, Hee-Won Kim, Ho-Shin Cho
Summary: In this paper, a energy-efficient Q-learning-based routing protocol called QTAR is proposed for underwater wireless sensor networks. Compared with existing protocols, QTAR considers the network topology to determine the next-forwarder candidates and adopts Q-learning to make optimal decisions. Additionally, QTAR uses implicit cut-vertex recognition to optimize NF selection and minimize energy wastage. Experimental results show that QTAR outperforms QELAR, EEDBR, QDAR, and RLOR in terms of energy consumption, latency, and network lifetime.
Article
Computer Science, Information Systems
Waqas Aman, Saif Al-Kuwari, Muhammad Muzzammil, Muhammad Mahboob Ur Rahman, Ambrish Kumar
Summary: The technologies used in underwater and A-W wireless communication networks are attracting attention due to modern applications, and the security of these networks needs to be ensured. This survey systematically discusses the security needs and proposed solutions for these networks. It covers the fundamentals of underwater and A-W communication, information security, and existing research on security aspects.
Article
Computer Science, Information Systems
Ruhul Amin Khalil, Nasir Saeed, Muhannad Almutiry
Summary: This paper investigates the problem of passive target localization using mobile unmanned aerial vehicles (UAVs), proposes a novel TDOA model for target localization with mobile UAVs, and measures the performance limit between its Cramer-Rao lower bound (CRLB) and the mean-squared error (MSE).
Article
Engineering, Electrical & Electronic
Hanyu Jiang, Li You, Ahmed Elzanaty, Jue Wang, Wenjin Wang, Xiqi Gao, Mohamed-Slim Alouini
Summary: In recent years, the prevalence of wireless devices has become a significant source of electromagnetic radiation, raising concerns about the risks of long-term exposure. To address this issue, the use of rate-splitting multiple access (RSMA) has been proposed to improve wireless transmission performance while limiting electromagnetic exposure. This study focuses on optimizing transmit covariance matrices and decoding order using statistical channel state information, tackling the problem as a non-convex mixed integer program. The proposed EM exposure-aware EE maximization scheme for uplink RSMA is shown to be effective through numerical results.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Hongjiang Lei, Xusheng She, Ki-Hong Park, Imran Shafique Ansari, Zheng Shi, Jing Jiang, Mohamed-Slim Alouini
Summary: This paper proposes a new scheme to enhance the secrecy performance of non-orthogonal multiple access (NOMA)-based coordinated direct relay transmission (CDRT) systems with an untrusted relay. The scheme combines physical-layer network coding (PNC) and NOMA to improve spectrum efficiency. Inter-user interference and friendly jamming signals are utilized to suppress the eavesdropping ability of the untrusted relay without compromising the acceptance quality of legitimate users. The paper investigates the secrecy performance of the NOMA-based CDRT systems, derives the closed-form expression for the ergodic secrecy sum rate, and performs asymptotic analysis to gain more insights.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Hongjiang Lei, Sha Zhou, Ki-Hong Park, Imran Shafique Ansari, Hong Tang, Mohamed-Slim Alouini
Summary: This research investigates the outage performance of the mmWave RSMA multiple-input-single-output system and proposes two beamforming schemes to enhance signal reliability. Closed-form expressions for the outage probability (OP) with the proposed schemes are derived using stochastic geometry theory, and expressions for the asymptotic OP are also derived. Monte Carlo simulation results are presented to verify the analysis and the effects of system parameters on the outage performance are studied.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Fahad S. Alqurashi, Abderrahmen Trichili, Nasir Saeed, Boon S. Ooi, Mohamed-Slim Alouini
Summary: This article provides a comprehensive overview of maritime communication technologies and highlights the latest advances in various marine technologies. It introduces different techniques used for maritime communications over the radio frequency (RF) and optical bands, and presents channel models, modulation and coding schemes, coverage and capacity, and radio resource management in maritime communications. It also discusses emerging use cases of maritime networks and identifies future research directions such as bringing broadband connectivity to the deep sea and using terahertz and visible light signals for on-board applications.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Yujie Qin, Mustafa A. Kishk, Mohamed-Slim Alouini
Summary: This study investigates the SINR meta distribution in the uplink transmission of UAV-enabled wireless networks with inversion power control. The Matern cluster process is used to model the locations of users and UAVs within a stochastic geometry framework. The conditional success probability and moments are derived to compute the exact expression and moment matching approximation of the SINR meta distribution. The impact of power control compensation factor and UAV altitude are specifically studied, revealing that UAV altitude has a greater influence on system reliability than transmit power at low SINR thresholds due to the advantage of establishing LoS links.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2023)
Article
Telecommunications
Zhengying Lou, Baha Eddine Youcef Belmekki, Mohamed-Slim Alouini
Summary: This letter presents a dual-hop decode-and-forward (DF) routing protocol called hybrid relay selection (HRS) in a hybrid RF and THz relay network. The HRS protocol prioritizes THz relays for high data rates or short distances, and RF relays for low data rates or long distances. Experimental results show that the proposed HRS protocol achieves similar performance to the optimal selection protocol, which requires complete channel information.
IEEE COMMUNICATIONS LETTERS
(2023)
Article
Engineering, Electrical & Electronic
Ammar El Falou, Mohamed-Slim Alouini
Summary: In this article, the use of TV towers with multi user (MU) massive multiple input multiple output (mMIMO) techniques to offer connectivity in rural areas is investigated and compared with a legacy mMIMO base station (BS). The results show that a high tower BS can cover an area at least 25 times larger than a legacy BS, making it an affordable solution to enhance rural connectivity.
IEEE COMMUNICATIONS MAGAZINE
(2023)
Article
Engineering, Electrical & Electronic
Ramy Samy, Hong-Chuan Yang, Tamer Rakia, Mohamed-Slim Alouini
Summary: The next generation of satellite communication systems aims to achieve terabit-per-second throughput. Free-space optical (FSO) transmission is a possible alternative that has gained increased attention in the satellite community. However, FSO communications are vulnerable to the severe effects of atmospheric turbulence. To remedy such effects, a space-air-ground (SAG) FSO network with a strategically deployed high-altitude platform acting as a relay is proposed. Furthermore, a novel SAG satellite communication network that integrates the suggested SAG-FSO transmission and conventional hybrid single-hop FSO/RF transmission is presented to improve overall system reliability and performance.
IEEE COMMUNICATIONS MAGAZINE
(2023)
Article
Engineering, Electrical & Electronic
Hong-Bae Jeon, Soo-Min Kim, Hyung-Joo Moon, Do-Hoon Kwon, Joon-Woo Lee, Jong-Moon Chung, Sang-Kook Han, Chan-Byoung Chae, Mohamed-Slim Alouini
Summary: Researchers have studied innovations in future 6G wireless communications, focusing on the use of free-space optical communication technology for ultrafast data links. Through experiments, they have demonstrated successful transmission of ultra-high-definition videos under severe turbulence and high wind speeds.
IEEE COMMUNICATIONS MAGAZINE
(2023)
Article
Engineering, Electrical & Electronic
Luca Chiaraviglio, Stefania Bartoletti, Nicola Blefari-Melazzi, Chiara Lodovisi, Alessia Moretti, Francesco Zampognaro, Mohamed-Slim Alouini
Summary: The deployment of 5G networks is in a mature phase globally, but little research has been done to compare EMF exposure and traffic levels before and after 5G activation. This study aims to provide a comprehensive assessment by conducting repeated measurements before and after 5G service. A combination of an EMF meter and a spectrum analyzer is used to measure the contribution of each pre-5G and 5G band. The results show that 5G service over mid-band frequencies has limited impact on exposure, while traffic more than doubles when 5G is activated in mid-bands. Provisioning 5G over sub-GHz bands does not substantially increase traffic levels. Additionally, changes in sight conditions and power reception due to 5G panel installation affect EMF exposure.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
(2023)
Article
Engineering, Electrical & Electronic
Luca Chiaraviglio, Chiara Lodovisi, Daniele Franci, Settimio Pavoncello, Stefano Coltellacci, Marco Donald Migliore, Timothy Cicciarelli, Luigi Basset, Leonardo Spugnini, Tommaso Aureli, Mohamed-Slim Alouini
Summary: This study examines the EMF and throughput performance of a FWA deployment using 5G Standalone technology at 3.5 GHz. An innovative framework and methodologies are introduced to evaluate the exposure and results show low exposure levels and high throughput. The measured exposure levels are in close agreement with the estimated values from simulation.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
(2023)
Article
Computer Science, Artificial Intelligence
Mian Imtiaz Ul Haq, Ruhul Amin Khalil, Muhannad Almutiry, Ahmad Sawalmeh, Tanveer Ahmad, Nasir Saeed
Summary: A novel localisation algorithm is proposed for noisy range measurements in harsh IIoT environments. The algorithm estimates the position of an unknown machine device using the relative distances between blind machines and anchor machines. A practical scenario with erroneous anchor positions is also considered, and an AMs selection algorithm is introduced to improve the accuracy of the final location estimate. The proposed greedy successive anchorization process prevents local convergence, reduces computation, and achieves Cramer-Rao lower bound accuracy.
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY
(2023)
Article
Engineering, Electrical & Electronic
Safa Khemiri, Mustafa A. Kishk, Mohamed-Slim Alouini
Summary: Unmanned aerial vehicle-mounted base stations (UAV-BS) and tethered UAVs (TUAVs) are promising technologies for enhancing coverage and energy efficiency in wireless networks. Deploying ABS in user hotspots can offload traffic and support terrestrial base stations, while TUAVs can ensure continuous operation of UAV networks.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
(2023)
Article
Engineering, Electrical & Electronic
Maurilio Matracia, Mustafa A. Kishk, Mohamed-Slim Alouini
Summary: This study proposes an analytical framework using stochastic geometry tools to analyze the coverage probability of a wireless network assisted by aerial reconfigurable intelligent surface (ARIS) technology. Various factors, including the altitude and line-of-sight condition of terrestrial base stations, as well as the fading conditions of wireless links, were considered. The numerical results demonstrate different coverage situations in different scenarios.
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Muna Al-Hawawreh, Nour Moustafa
Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.
Article
Computer Science, Information Systems
Youcef Azzoug, Abdelmadjid Boukra
Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.
Article
Computer Science, Information Systems
Paulo Cesar Prandel, Priscila Solis Barreto
Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.
Article
Computer Science, Information Systems
Michele Girolami, Davide La Rosa, Paolo Barsocchi
Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.
Review
Computer Science, Information Systems
Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor
Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.
Article
Computer Science, Information Systems
Yangyang Li, Lei Feng, Yang Yang, Wenjing Li
Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.
Article
Computer Science, Information Systems
Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo
Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Article
Computer Science, Information Systems
Shahaf Yamin, Haim H. Permuter
Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.
Article
Computer Science, Information Systems
Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang
Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.
Article
Computer Science, Information Systems
Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane
Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.
Article
Computer Science, Information Systems
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli
Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.
Article
Computer Science, Information Systems
Xue Li, Xiaojuan Chen, Guohua Li
Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.
Article
Computer Science, Information Systems
Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song
Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.