scholarly journals A HYBRID RESOURCE ALLOCATION APPROACH FOR 5G IOT APPLICATIONS

Author(s):  
Mohammad Alkandari ◽  
◽  
Jassim Alfadhli ◽  
Lamis Waleed ◽  
◽  
...  

5G cellular network expects to sustain various QoS (Quality of Service) requirements and provide customers with multiple services based on their requirements. Implementing 5G networks in an IoT (Internet of Things) infrastructure can help serving the requirements of IoT devices in a 100x faster and more efficient manner. This objective can be accomplished by applying the network slicing approach, where it partitions a single physical infrastructure into multiple virtual resources that can be distributed among different devices independently. This paper merges the benefits of both the static allocation and the network slicing approach to propose a mechanism that can allocate resources efficiently among multiple customers. The allocation mechanism based on a pre-defined policy between the slice provider and the customer is to specify the attributes that will be computed before any allocation process. Network slicing is the idiosyncratic latest 5G technology which produces diverse requirements to sustain the traditional network infrastructure's adequate granularity level. The main objective of this paper is to present a simulation suite for a network consists of base stations, including clients whose probable scenarios of 5G can attain high standards of network operation plus perform a better and easier analysis of various concepts. Network slicing methodology is enhanced at blocking. Further, it was obvious that the block ratio correspondingly increased the usage of the bandwidth. Based on the results, network slicing methodology enhanced at blocking and the block ratio correspondingly increased the usage of the bandwidth.

Author(s):  
Kailash Subramanian

Wireless Sensor Networks motes have a small size, which leads to severe power supply restrictions. Much of the work on conserving power has been undertaken in the domain of routing protocols which deals with sending data in an efficient manner. In this paper a new scalar based protocol is proposed with a combination of multiple sub-base stations, that seeks to enhance the efficiency of protocol in terms of consumption of power and node failure tolerance. All the nodes are divided into regions, with each region having a sub- base station(sBS) and an arbitrary scalar value. Each sBS has lesser power supply and computation power compared to main station, but more of the mentioned metrics with respect to the sensor motes. Previous studies have described various paradigms and metrics for routing protocols and the placement of base stations. In this paper, the said algorithm is proposed, and its efficiency is analysed.


Author(s):  
Hayoung Oh ◽  
Sangsoon Lim

<p><span lang="EN-US">The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.</span></p>


2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Xavier Salleras ◽  
Vanesa Daza

5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides nonlinkable protection for any issued information, preventing an SO or an eavesdropper from tracking users’ activity and relating it to their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKPs). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.


Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 315
Author(s):  
Luis Guijarro ◽  
Jose Vidal ◽  
Vicent Pla

Network slicing is gaining an increasing importance as an effective way to introduce flexibility in the management of resources in 5G networks. We envision a scenario where a set of network operators outsource their respective networks to one Infrastructure Provider (InP), and use network slicing mechanisms to request the resources as needed for service provision. The InP is then responsible for the network operation and maintenance, while the network operators become Virtual Network Operators (VNOs). We model a setting where two VNOs compete for the users in terms of quality of service, by strategically distributing its share of the aggregated cells capacity managed by the InP among its subscribers. The results show that the rate is allocated among the subscribers at each cell in a way that mimics the overall share that each VNO is entitled to, and that this allocation is the Nash equilibrium of the strategic slicing game between the VNOs. We conclude that network sharing and slicing provide an attractive flexibility in the allocation of resources without the need to enforce a policy through the InP.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6013
Author(s):  
Sumit Gautam ◽  
Sourabh Solanki ◽  
Shree Krishna Sharma ◽  
Symeon Chatzinotas ◽  
Björn Ottersten

In order to support a massive number of resource-constrained Internet-of-Things (IoT) devices and machine-type devices, it is crucial to design a future beyond 5G/6G wireless networks in an energy-efficient manner while incorporating suitable network coverage expansion methodologies. To this end, this paper proposes a novel two-hop hybrid active-and-passive relaying scheme to facilitate simultaneous wireless information and power transfer (SWIPT) considering both time-switching (TS) and power-splitting (PS) receiver architectures, while dynamically modelling the involved dual-hop time-period (TP) metric. An optimization problem is formulated to jointly optimize the throughput, harvested energy, and transmit power of a SWIPT-enabled system with the proposed hybrid scheme. In this regard, we provide two distinct ways to obtain suitable solutions based on the Lagrange dual technique and Dinkelbach method assisted convex programming, respectively, where both the approaches yield an appreciable solution within polynomial computational time. The experimental results are obtained by directly solving the primal problem using a non-linear optimizer. Our numerical results in terms of weighted utility function show the superior performance of the proposed hybrid scheme over passive repeater-only and active relay-only schemes, while also depicting their individual performance benefits over the corresponding benchmark SWIPT systems with the fixed-TP.


Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4361 ◽  
Author(s):  
Ahmed Mostafa ◽  
Suk Jin Lee ◽  
Yesem Kurt Peker

Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments.


2015 ◽  
Vol 55 (2) ◽  
pp. 487
Author(s):  
Andrew Jones ◽  
Justin Stirling

For many organisations, the hydrocarbon allocation process can be a black box; it can be difficult to manage and consequently there is a struggle to keep up as the business progresses. Often large investments from joint ventures (JVs) drive the requirement for an effective allocation on which return on investment is accounted, while regulatory bodies hold an interest for taxation and environmental purposes. It is the mix of people, process and technology that is the key to achieving a reliable and manageable allocation. Technology is a powerful tool, but without effective resource and knowledge management there is no guarantee the allocation process will meet the requirements of the business in an efficient manner. Recognising common allocation management pitfalls and using a proven best practice approach will help to ensure stakeholders and assets are serviced correctly. At the same time a good understanding of the allocation is necessary for it to be transparent and responsive, to ensure resources are optimally used, and that timely and costly support issues are avoided. Staff in and around the hydrocarbon accounting function in the process need to be engaged and used effectively. Technology must be implemented with care, documents must be effective, and business support processes must be clear and enforceable. On an ongoing basis knowledge management must balance the technology against the business.


2022 ◽  
pp. 368-379
Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
Ismaeel Al Ridhawi ◽  
Ouns Bouachir ◽  
Moayad Aloqaily ◽  
Azzedine Boukerche

Internet of Things (IoT) systems have advanced greatly in the past few years, especially with the support of Machine Learning (ML) and Artificial Intelligence (AI) solutions. Numerous AI-supported IoT devices are playing a significant role in providing complex and user-specific smart city services. Given the multitude of heterogeneous wireless networks, the plethora of computer and storage architectures and paradigms, and the abundance of mobile and vehicular IoT devices, true smart city experiences are only attainable through a cooperative intelligent and secure IoT framework. This article provides an extensive study on different cooperative systems and envisions a cooperative solution that supports the integration and collaboration among both centralized and distributed systems, in which intelligent AI-supported IoT devices such as smart UAVs provide support in the data collection, processing and service provisioning process. Moreover, secure and collaborative decentralized solutions such as Blockchain are considered in the service provisioning process to enable enhanced privacy and authentication features for IoT applications. As such, user-specific complex services and applications within smart city environments will be delivered and made available in a timely, secure, and efficient manner.


Sign in / Sign up

Export Citation Format

Share Document