scholarly journals Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

2015 ◽  
Vol 2015 ◽  
pp. 1-8
Author(s):  
Qin Qin ◽  
Yong-qiang He ◽  
Li-ming Nie

In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

Nowadays Wireless Sensor Networks are using Internet-of-Thing (IoT) technology-based nodes because of the wide usance and cost effectiveness. Many of the Wireless sensor nodes are battery powered devices with limited computational and communication resources. The algorithm of the conventional wireless sensor networks are designed for small closed group network communications with better power management and reasonable security strategies. When using IoT based Wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secured algorithm. The internet protocols are having powerful security authentication systems those require more computational resources, thus they can drain a battery operated little wireless sensor node. This work is indented to introduce a legacy power-security balanced algorithm to use in the IoT based Wireless Sensor Network environments. Proxy Mobile Internet Protocol version 6 (PMIPv6) is selected as the base protocol in which the proposed security authentication mechanism is used instead of inbuilt Diffie-Hellman authentication scheme. A customized Media Access Control (MAC) address-based session key initialization procedure along with seed based random number session key update mechanism is proposed and verified in this work.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3074
Author(s):  
Min-Jae Kim ◽  
Sang-Hwa Chung

The combination of time slotted access and channel hopping technology in IEEE 802.15 TSCH networks enables high reliability and low power operation to meet the stability and real-time requirements of industrial applications. Basically, TSCH and RPL, a routing protocol for TSCH, are proposed for static nodes that generate fewer control messages, so they allow collisions in shared cells when they exchange control messages. In a topology containing mobile nodes, the collision of control messages in a shared cell makes the network difficult to recover quickly. The proposed scheme minimizes the collision of control messages by allocating dedicated control cells to form preferred parent nodes quickly for mobile nodes. We also proposed a method for establishing a fixed route from the root node to the mobile node in RPL to minimize the delay time. Through the simulation using the 6TiSCH simulator, it was confirmed that the performance of the proposed method was approximately 2.5 times better in terms of overhead and resource use, and 33% better in terms of network participation time of mobile nodes compared with existing solutions.


2013 ◽  
Vol 756-759 ◽  
pp. 2873-2877
Author(s):  
Chun Yan Lei ◽  
Bin Huang

Mobile internet as one operating system has already become very mature. But traffic billing is a hot issue among mobile complaints currently. In order to adjust the instability of mobile traffic billing system, adjustment is being made on multiple aspects of the stability to solve the problem of the variable billing system. The internet traffic billing system is stabilized through the establishment of mobile internet traffic billing system, system of mobile internet traffic accumulation and mobile internet identification system, while combining with system of reminding with text messages of mobile phone. In order to carry out the executive process, take for example the cases of the internet traffic billing system of two major communication operators in China. Analysis on the examples showed that with multiple subsystems assistance, internet traffic billing system can make more accurate calculation and system of monitoring mobile Internet will monitor the use of traffic and provide the most stable methods of billing internet traffic. The combination of multiple systems can better eliminate the errors caused by the instability of the mobile internet traffic billing system. * Chunyan Lei is the first author; Bin Huang is the correspondence author The mobile internet has become one of the main channels of accessing to external information, and more people choose handheld type to browse information. Because the related coverage of information is becoming broader and broader, the interests are related to higher extent; the requirements for data accuracy of audience is higher and higher, it is very necessary to establish internet traffic billing system that is accurate, safe and user-friendly so that the stable traffic billing system can provide the accurate process of traffic usage more stably.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2016 ◽  
Vol 13 (1) ◽  
pp. 116
Author(s):  
Wan Isni Sofiah Wan Din ◽  
Saadiah Yahya ◽  
Mohd Nasir Taib ◽  
Ahmad Ihsan Mohd Yassin ◽  
Razulaimi Razali

Clustering in Wireless Sensor Network (WSN) is one of the methods to minimize the energy usage of sensor network. The design of sensor network itself can prolong the lifetime of network. Cluster head in each cluster is an important part in clustering to ensure the lifetime of each sensor node can be preserved as it acts as an intermediary node between the other sensors. Sensor nodes have the limitation of its battery where the battery is impossible to be replaced once it has been deployed. Thus, this paper presents an improvement of clustering algorithm for two-tier network as we named it as Multi-Tier Algorithm (MAP). For the cluster head selection, fuzzy logic approach has been used which it can minimize the energy usage of sensor nodes hence maximize the network lifetime. MAP clustering approach used in this paper covers the average of 100Mx100M network and involves three parameters that worked together in order to select the cluster head which are residual energy, communication cost and centrality. It is concluded that, MAP dominant the lifetime of WSN compared to LEACH and SEP protocols. For the future work, the stability of this algorithm can be verified in detailed via different data and energy. 


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 219
Author(s):  
Phuoc Duc Nguyen ◽  
Lok-won Kim

People nowadays are entering an era of rapid evolution due to the generation of massive amounts of data. Such information is produced with an enormous contribution from the use of billions of sensing devices equipped with in situ signal processing and communication capabilities which form wireless sensor networks (WSNs). As the number of small devices connected to the Internet is higher than 50 billion, the Internet of Things (IoT) devices focus on sensing accuracy, communication efficiency, and low power consumption because IoT device deployment is mainly for correct information acquisition, remote node accessing, and longer-term operation with lower battery changing requirements. Thus, recently, there have been rich activities for original research in these domains. Various sensors used by processing devices can be heterogeneous or homogeneous. Since the devices are primarily expected to operate independently in an autonomous manner, the abilities of connection, communication, and ambient energy scavenging play significant roles, especially in a large-scale deployment. This paper classifies wireless sensor nodes into two major categories based the types of the sensor array (heterogeneous/homogeneous). It also emphasizes on the utilization of ad hoc networking and energy harvesting mechanisms as a fundamental cornerstone to building a self-governing, sustainable, and perpetually-operated sensor system. We review systems representative of each category and depict trends in system development.


2014 ◽  
Vol 602-605 ◽  
pp. 3643-3647
Author(s):  
Li Yan Liu ◽  
Rong Fu ◽  
Yi He ◽  
Ying Qian Zhang

Distributed underwater sensor network coverage is divided into two main categories: deterministic coverage and stochastic coverage. A strategy is put forward to deploy determinate area by using a triangular-grid method. When a coverage ratio is known, the distance between nodes can be adjusted to meet the coverage ratio in the monitored area, and the least number of sensor nodes can be calculated. Also a heuristic method is proposed for stochastic area deployment strategy. It is under the premise that the initial node location randomly deployed is given, using Voronoi diagram, the not easiest monitored path is searched, and the network coverage performance is improved by configuring the new nodes in the path. Finally it is proved that network performance is more improved by the simulation experiments, when one to four nodes are configured in the easiest breach path.


2021 ◽  
pp. 107-125
Author(s):  
L.A. Regush ◽  
◽  
A.V. Orlova ◽  
E.V. Alekseeva ◽  
O.R. Veretina ◽  
...  

The purpose of the study was to justify the essence of the “Internet immersion” phenomenon and to create a standardized method for its measurement. A comparative analysis of approaches to human behavior on the Internet environment and existing diagnostic methods has revealed a significant variety of categories and definitions used. At the same time, there is no definition that: first, characterizes the degree and quality of user's Internet activity; second, is free from negative and clinical connotations; and, third, describes a wider time range of Internet usage than the actual state of immersion. The authors substantiate the possibility of studying the phenomenon of the Internet immersion through the category of disposition. It consists of the readiness to use technical means and informational resources of the Internet to solve problems in various types of activities and communication. The authors identify traditional components in the structure of the Internet immersion phenomenon. These are, first of all, a cognitive component, represented by digital competence self-assessment; then, an affective component, represented by motivation and emotional and value-based attitude towards the Internet; and a behavioral component, represented by the amount of digital consumption. Based on this definition, it was possible to construct a compact 9-block “Index of the Internet immersion” questionnaire. Its standardization was conducted on the sample of 712 adolescents, aged from 11 to 17. Using the factor analysis, the structure of the questionnaire was identified. The first factor includes questions that relate to the time spent on the Internet and signs of dependence on it. The second factor includes questions that reveal the activity component and emotional attitude to the Internet. The third factor includes questions about experience and self-assessment of digital competence. The advantage of the “Index of the Internet immersion” questionnaire is a fairly high reliability for internal consistency of scales throughout the questionnaire. We also confirmed the sufficient convergent validity of the “Internet environment immersion Index” method with the “Scale of Problematic Internet Usage” by A.A. Gerasimova, A.B. Kholmogorova (adapted version of Generalized Problematic Internet Use Scale (GPIUS) by S. Caplan) and the Internet Addiction Test (IAT, K. Young), modified by V. A. Loskutova. This indicates its validity as an independent tool that does not duplicate other tools for semantically similar phenomena measurement. In the conditions of forced self-isolation that have developed in our country, the method of the Internet immersion diagnostics as an adequate and theoretically justified tool will allow us to study changes in the emotional state and behavior of teenagers on the Internet.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 56737-56749 ◽  
Author(s):  
Heba Kurdi ◽  
Fadwa Ezzat ◽  
Lina Altoaimy ◽  
Syed Hassan Ahmed ◽  
Kamal Youcef-Toumi

Sign in / Sign up

Export Citation Format

Share Document