Article
Engineering, Electrical & Electronic
S. Jeevanantham, B. Rebekka
Summary: Wireless sensor networks are crucial for long-term data gathering and monitoring in IoT applications. However, the deployment field and limited energy sources are critical constraints. To address this, we propose a new hierarchical stable election protocol (HISEP) that improves routing efficiency and extends network lifespan.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2022)
Article
Chemistry, Analytical
Gayoung Kim, Minjoong Rim
Summary: This paper proposes a new duty-cycle-based protocol for transmitting emergent data with high priority and low latency in a sensor network environment. By using preemption, coverage extension, and an asymmetric sleep cycle, the delay of high-priority data can be minimized.
Article
Computer Science, Information Systems
Yu-Heng Hsieh, Chih-Min Chao, Chih-Yu Lin, Chun-Chao Yeh
Summary: In order to improve channel usage efficiency, unlicensed users in a Cognitive Radio Network (CRN) can utilize channels not occupied by licensed users. Communication between users in a CRN remains a challenge, thus various resilient channel hopping protocols have been proposed. Existing anti-jamming protocols create channel hopping sequences using channel hopping matrices, with rendezvous probability determined by the matrix structure. To address limitations in existing methods, this paper presents the Anti-jamming Low-Latency channel hopping (ALL) protocol which allows for sender adaptation of the matrix structure to improve rendezvous success. Simulation results show that the ALL protocol outperforms the practical solution OLAA, increasing network throughput by up to 33% and reducing TTR by 30%.
Article
Computer Science, Information Systems
Murat Dener
Summary: This study developed a comprehensive clustering protocol that considers all security requirements, especially data availability, in order to enhance the lifetime and efficiency of wireless sensor networks.
Article
Energy & Fuels
Pawel Dymora, Miroslaw Mazurek, Krzysztof Smalara
Summary: This paper presents the essence of how IoT works, emphasizing the importance of fault-tolerance in IoT systems. It explores the impact of routing algorithms on sensor power consumption and studies the fault tolerance of IoT infrastructure through simulation of node failure scenarios.
Article
Computer Science, Hardware & Architecture
Isaias Martinez-Yelmo, Joaquin Alvarez-Horcajo, Juan Antonio Carral, Diego Lopez-Pajares
Summary: eHDDP is an enhanced version of the Hybrid Domain Discovery Protocol that enables SDN control plane to discover and manage hybrid topologies with wired and/or wireless devices, while also detecting links between wireless devices. The proposal has been thoroughly evaluated in different scenarios, showing good scalability and discovery times.
Article
Computer Science, Information Systems
Sabrine Khriji, Rym Cheour, Olfa Kanoun
Summary: This paper aims to experimentally implement a hybrid energy management solution combining DVFS and duty-cycling to improve energy efficiency of IoT services. Hardware optimization is performed by selecting the low-power microcontroller MSP430. The energy-saving design is evaluated by defining normalized power. Extensive simulations and real-world implementations show that energy consumption can be significantly reduced in high-data IoT use cases.
Article
Computer Science, Information Systems
Omid Abedi, Amin Pourhasani
Summary: The paper proposes a Tight Synchronized MAC protocol to address channel synchronization and competition issues in multi-channel ad hoc networks, improving performance through prioritization and fair preemptive data transmission phases.
Article
Engineering, Electrical & Electronic
Mohammad Javad Sadri, Maryam Rajabzadeh Asaar
Summary: This paper proposes a new hash-based authentication protocol for IoT-based WSNs, which can better defend against various attacks and reduce the execution time of the user authentication process. The research shows that the protocol is more secure, has lower computational costs, and outperforms existing protocols in terms of performance.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2021)
Article
Computer Science, Information Systems
Hamideh Hajizadeh, Majid Nabi, Kees Goossens
Summary: This article proposes a runtime decentralized self-optimization framework based on deep reinforcement learning for parameter configuration of a multihop TSCH network. It enables the network to use the right configuration settings according to the diverse QoS demands of different nodes and achieves fast convergence time.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Chemistry, Multidisciplinary
Puneet Kaur, Kiranbir Kaur, Kuldeep Singh, SeongKi Kim
Summary: Wireless sensor networks are crucial for forest applications, but battery drainage is a major drawback. The proposed EEWBP protocol extends the network lifespan through weighted metrics for cluster-building and node-scheduling. Simulation results demonstrate that EEWBP consumes less energy and maintains higher consistency compared to other protocols.
APPLIED SCIENCES-BASEL
(2023)
Article
Automation & Control Systems
Lokesh Bommisetty, T. G. Venkatesh
Summary: In this article, a contention-based proportional fairness transmission scheme is proposed for TSCH networks to maximize system throughput and achieve fair allocation of resources to nodes. A convex programming-based method is used to achieve the fairness and throughput objectives. Performance metrics such as throughput, delay, and energy consumption per successful transmission are derived and validated through simulations and real-time testbed implementations.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Feng-Wen Lo, Guu-Chang Yang, Min-Kuan Chang, Wing C. Kwong
Summary: This article studies two-hop transmissions in channel-hopping cognitive-radio wireless networks with buffer-aided relays. By using symmetric CH sequences, an improved relay model is formulated to minimize data-transfer latency, with derived bounds for maximum-time-to-rendezvous and throughput. Numerical studies show that the utilization of IoT devices and multiple regions in CRWNs are enhanced when relays are used.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Software Engineering
Hilmi Lazrag, Abdellah Chehri, Rachid Saadane, Moulay Driss Rahmani
Summary: Embedded systems and wireless sensor networks have become integral to various aspects of daily life, with the number of connected devices increasing. To address the security risks associated with these devices, the adoption of WSN security standards is crucial. Utilizing Blockchain technology for decentralized networks can help design self-managing systems for WSN devices.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2021)
Article
Chemistry, Analytical
JoonYoung Lee, JiHyeon Oh, DeokKyu Kwon, MyeongHyun Kim, SungJin Yu, Nam-Su Jho, Youngho Park
Summary: This paper discusses the issues of authentication and security in the IoT environment. It proposes a solution that combines PUF and honey list techniques with three-factor authentication, and demonstrates the security and efficiency of the proposed protocol through formal analysis and performance comparison.
Article
Telecommunications
Muhammad Basit Shahab, Sarah J. Johnson, Mahyar Shirvanimoghaddam, Mischa Dohler
Summary: This letter discusses the issue of handling discontinuous data streams in PD-NOMA systems, proposing the use of multiple detectors for user activity detection and performing multi-user detection. Simulation results show that the proposed detectors outperform conventional PD-NOMA receivers in terms of bit error rate.
IEEE COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Hardware & Architecture
Hui Zhou, Changyang She, Yansha Deng, Mischa Dohler, Arumugam Nallanathan
Summary: The Industrial Internet of Things (IIoT) revolutionizes future manufacturing facilities by integrating IoT technologies, but faces unique challenges in dealing with massive IIoT problems. This article systematically summarizes the QoS requirements, unique characteristics, and machine learning solutions for massive IIoT scenarios.
IEEE WIRELESS COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Harsh Tataria, Mansoor Shafi, Mischa Dohler, Shu Sun
IEEE VEHICULAR TECHNOLOGY MAGAZINE
(2022)
Article
Chemistry, Analytical
C. V. S. Junior Jose, Sergio N. Silva, Matheus F. Torquato, Toktam Mahmoodi, Mischa Dohler, Marcelo A. C. Fernandes
Summary: This paper proposes a strategy to reduce latency generated by robotic devices by using FPGAs, and presents a new hardware reference model along with experimental validation and result analysis.
Article
Computer Science, Artificial Intelligence
Fatimah Alqahtani, Mischa Dohler
Summary: Authorship identification is the process of analyzing writing styles to determine the author's identity, which is important in digital forensics and cyber investigations. This survey focuses on authorship identification in the Arabic language and reviews 27 prominent studies, considering data, features, methods, and results. The results vary based on features and datasets, and challenges are faced in data preprocessing due to the complexities of Arabic morphology.
ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING
(2023)
Article
Multidisciplinary Sciences
Ohood Saud Althobaiti, Toktam Mahmoodi, Mischa Dohler
Summary: The emergence of IoT and tactile internet has provided high-quality connectivity for smart systems, while quantum computing is supporting the next technological revolution. However, quantum computing also introduces threats to cybersecurity algorithms. This research proposes a lattice-driven cryptosystem for face recognition that effectively overcomes these challenges and demonstrates high performance.
Proceedings Paper
Telecommunications
Hui Zhou, Yansha Deng, Luca Feltrin, Andreas Hoglund, Mischa Dohler
Summary: The study compares the 4/2-step SDT RA schemes with the benchmark 4/2-step RA schemes and finds that the 2-step SDT RA scheme provides the highest overall packet transmission success probability. However, the performance gain decreases with the increase of device intensity.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)
Article
Computer Science, Information Systems
Kaveh Ahmadi, Mona Ghassemian, Massimo Condoluci, Mischa Dohler
Summary: This research proposes a signalling mechanism for next-generation communication systems, which improves communication efficiency through the decoupling of downlink and uplink connections, and demonstrates significant improvements in uplink performance.
Article
Engineering, Electrical & Electronic
Tooba Faisal, Mischa Dohler, Simone Mangiante, Diego R. Lopez
Summary: Infrastructure sharing is widely discussed and implemented in current telecommunications networks, and it is expected to play an even greater role in future 6G networks. This work presents an automated, transparent, and accountable end-to-end architecture for network sharing based on blockchain and smart contracts, which can be implemented with minimal hardware changes and overheads.
IEEE COMMUNICATIONS MAGAZINE
(2022)
Article
Computer Science, Information Systems
Mohammad Afhamisis, Maria Rita Palattella
Summary: This research designs a wide area network using LoRaWAN technology on low earth orbit satellites, addressing synchronization issues and improving communication performance with the SALSA algorithm. Simulation results demonstrate the superior performance of SALSA compared to standard LoRa under different policies.
Article
Computer Science, Information Systems
Denis Horvath, Juraj Gazda, Eugen Slapak, Taras Maksymyuk, Mischa Dohler
Summary: Self-organized wireless networks based on unmanned aerial vehicles are gaining attention for their flexible deployment opportunities. This paper introduces a self-organizing UAV swarm model with a virtual forces approach for positioning UAVs. Results show significant improvement in KPI efficiency metrics compared to nonmutated systems.
Proceedings Paper
Computer Science, Information Systems
Zhenfeng Sun, Weiqiang Guo, Mohammad Reza Nakhai, Mischa Dohler
Summary: The paper focuses on tackling the issue of online content caching and elimination in a collaborative edge caching network, proposing the CEC-TS algorithm as a solution to reduce content providers' and QoS penalty cost in the long run.
2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW)
(2021)
Article
Computer Science, Information Systems
Ohood Saud Althobaiti, Mischa Dohler
Summary: This research introduces a location-aware cryptographic system that uses geographical location as a player's identity and credential, providing efficient and lightweight protection for sensitive data in post-quantum IoT scenarios.
Article
Computer Science, Cybernetics
Xun Liu, Mischa Dohler
Summary: Two vibrotactile alphabets, 3F Vibraille and 2F Vibraille, were designed and evaluated through human experiments. Results showed that participants could recognize words and symbols with over 90% accuracy after 6-8 hours of training. The main difference between the two alphabets was the transmission rate and training time required.
IEEE TRANSACTIONS ON HAPTICS
(2021)
Article
Computer Science, Information Systems
Eugen Slapak, Juraj Gazda, Weiqiang Guo, Taras Maksymyuk, Mischa Dohler
Summary: The paper proposes a new approach to optimize hardware resource allocation for edge nodes in a multitier MEC hierarchy, significantly increasing the overall computational capacity of a 5G-based MEC system. Simulation results show that the proposed solution outperforms pseudorandom resource allocation in terms of the proportion of computational tasks completed, achieving gains in the range of 20-40%.