SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 2474~2483
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp2474-2483 ๏ฒ 2474
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Advanced location-based IPv6 address for the node of
wireless sensor network
Mohammed Nazar Hussein1
, Raed Abdulla2
, Thomas Oโ€™Daniel3
, Maythem K. Abbas4
1,2,3
Faculty of Computing, Engineering and Technology, Asia Pacific University of Technology and Innovation (APU),
Technology Park Malaysia, Malaysia
4
Faculty of Science & Information Technology, Universiti Teknologi PETRONAS, Malaysia
Article Info ABSTRACT
Article history:
Received May 5, 2019
Revised Oct 4, 2019
Accepted Nov 22, 2019
Fields such as military, transportation applications, human services, smart
cities and many others utilized Wireless Sensor Network (WSN) in their
operations. Despite its beneficial use, occurrence of obstacles is inevitable.
From the sensed data, the randomly nodes distribution will produce multiple
benefits from self-configuration and regular positioning reporting.
Lately, localization and tracking issues have received a remarkable attention
in WSNs, as accomplishing high localization accuracy when low energy is
used, is much needed. In this paper, a new method and standards-compliant
scheme according to the incorporation of GPS location data into the IPv6
address of WSN nodes is suggested. The suggestion is likewise others which
depends on ground-truth anchor nodes, with a difference of using the network
address to deliver the information. The findings from the results revealed that
perfect GPS coordinates can be conducted in the IPv6 address as well as with
the transmission radius of the node, and the information is significantly
adequate to predict a nodeโ€™s location. The location scheme performance is
assessed in OMNet++ simulation according to the positioning error and
the power metrics used. Moreover, some improvement practices to increase
the precision of the node location are suggested.
Keywords:
Attendance management
Beacon
IOT
Mobile application
Copyright ยฉ 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Raed Abdulla,
School of Engineering,
Asia Pacific University of Technology and Innovation (APU),
Technology Park Malaysia, Bukit Jalil, Kuala Lumpur 57000, Malaysia.
Email: dr.raed@apu.edu.my
1. INTRODUCTION
WSNs are rapidly emanating as an important and influential factor in mobile computing [1].
Apparently, the integration of WSNs amongst computing, wireless and sensor technology has fascinated many
people recently. The networks comprising a number of nodes, are facilitated with handling, communicating
and sensing capabilities. WSNs which are operated using battery, consisting of cheap tiny devices of
constrained processing and memory resources, is practical to measure and exchange various environmental
data in their operation condition [2]. Identifying the location of sensed data and knowing the physical position
of these sensor nodes are crucial to some applications [3]. However, each node needs to identify its location
via one of the self-localization methods, which means estimating the unknown node position within
the network [4].
The path length of mobile elements is shortened which as a result leads to minimize the energy
consumption and to reduce the overall data gathering latency [5]. In order to have a longer battery lifespan,
the power is utilized by taking into considerations of the unreliable radio connectivity, minimum bandwidth,
small packet payload size, dynamic topology changes, ad hoc deployment, and nodes. Estimating the physical
position of a sensor node within the IoT is a real challenge as it subjected to small capacity, low bandwidth,
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein)
2475
variable links, dynamic typologies, and the difficulty of battery replacement or recharging in several
circumstances. On the other hand, being able to trace the source of information is crucial for various WSN
applications, especially in military, environmental monitoring, and aviation for example. Nodes can be
equipped with GPS, but this is a costly solution in terms of both money and energy. Cost and energy
consumption are in fact the most important criteria that must be taken into account when designing
the protocols and platforms of these small devices. GPS typically fails in severe environments (i.e. inside
homes, offices, underground, shopping malls and between a heavy vegetative cover) [6].
This paper recommends a major design for a WSN which contains lightly distributed nodes that are
small in numbers of GPS ground-truth and nodes of bigger numbers that include their location through
inter-communication. The main objective of this localization process is to search for the physical position of
a node (a node with obscure position) whilst utilizing reference nodes also called โ€œground-truthโ€ (nodes with
preconfigure locations) to obtain specific accuracy from uneven radio communication and at the same time
reducing power consumption to its minimum level. The method being introduced envelops the GPS coordinates
and the nominal transmission radius for a node into its IPv6 address. The objective is for a node to secure
an early approximation of the nodeโ€™s location and also limited alternate points which are possible as its actual
location. It can be achieved by listening unreceptively to the transmissions with several accurate calculations.
This action will reveal the farthest distance between a node and its neighbors when the transmissions are
received. The method of location is conducted and validated in OMNet++ simulation. The findings displayed
that precise GPS coordinates can be conducted in the IPv6 address in addition to the transmission radius
of the node.
2. LOCATION INTERPOLATION IN IPv6 ADDRESS
Requests for Comments (RFCs) is set as Internet standards by the Internet Engineering Task Force
(IETF) [5]. Most of the IP-based networks depend on a one-to-one addressable flow pattern [7-8]. The IETF
standard which functions to expand the use of IPv6 to WSNs is known as IPV6 over Low Power Wireless
Personal Area Networks (6LoWPAN). The 6LoWPAN procedure mass contains IEEE 802.15.4 at the physical
and Medium Access Control (MAC) layers, a 6LoWPAN adaptation layer, IPv6 at the network layer,
and the standard Internet procedures at the transport and application layers [9-13]. Additional technologies
used with 6LoWPAN include sub-GHz radios, long-range telemetry links and even power-line
communications [14-15]. 6LoWPAN gateway architecture that aims to achieve end-to-end communication
where Internet users can retrieve and observe real-time data [16]. 6LoWPAN has embraced the mechanism
of IPv6 Stateless Address Autoconfiguration [17-20]. The WSN routing protocol usually employs
data-centric routing [21] or location-based routing rather than address-centric routing that is normally used in
TCP/IP networks.
The IPv6 addressing architecture which is one of its kind and designed for local communicationsโ€™
purpose has a special-purpose address block and IPv6 unicast address format, usually discovered inside a site.
The โ€œUnique Local IPv6 Unicast Addressesโ€ are not supposed to be forwarded to another network on
the Internet [22-24] contain general forms which are; an 8-bit prefix 0xFD00, a 40-bit Global ID set to a pseudo-
random number that utilizes a standard algorithm [25] a 16-bit Subnet ID decided by the site; and a 64-bit
Interface ID as displayed in Figure 1.
Figure 1. IPv6 unique local address [6]
In order to instill GPS coordinates in an IPv6 address, the coordinates can be moved into positive
integer space. A grid of 360*180=64,800 zones were produced from 360 degrees longitude and 180 degrees
latitude. The 9,999,999 offsets in each direction are derived from the seven-digit precision within each
zone [25]. Basically, in a usual computer architecture representation, the latitude and longitude zone can be
kept as an unsigned short integer (ushort, 16 bits), meanwhile the offsets need 24 bits of a 32-bit unsigned
integer (uint). The finish coordinates could be kept in an unsigned long integer (ulong, 64 bits). Although 64
bits is the needed length for the interface recognition in an IPv6 unicast address to enable the zone and offsets
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483
2476
to be pushed wholly into the space, an enticing possibility could happen. The 16-bit Subnet-ID field in
the address permits 65,536 subnets, which can easily accommodate all the latitude/longitude zones. The two
24-bit offsets can later be positioned in the interface identifier field and the 16 bits will be used as flags [13].
The numerical part is to be recorded onto the unsigned integer grid, and the zone is joined with FD00 and
the 40-bit Global-ID to shape the first half part of the address. Interleaved bits (also known as Morton numbers)
are suitable for linearizing 2D integer coordinates, where x and y are merged as one number that can be
compared without difficulty and also has a characteristic that a number is typically close to one another if
the x value is near to the y value [25]. The new IPv6 address scheme is displayed in Figure 2.
Figure 2. New IPv6 address scheme
3. EXPERIMENTS AND RESULTS
Different steps and situations are used to perform the location model and to be validated in OMNeT
ver.4.1. The researcher experimental situation in the simulation is grounded on one main theory: no other
network in radio range is available, in other words, there is no interference. In addition, all network nodes will
be operating the identical software with no GPS attached to the nodes. Only several anchor nodes (ground-
truth) will be embedded with actual GPS coordinates of their areas. However, majority of the nodes are without
the coordinates. The network topology which is employed in the simulation exercises mainly begins with three
fundamental Ground-Truth nodes with location coordinates (GT) which have been identified earlier and in
a straight horizontal line positioning. 1000 seconds was the accumulated simulation time performance.
Free space model is the best situation of the simulation of the whole experiment tests due to the absence of any
hurdles of the sensing area. In the beginning, with no simulations being left out, these simulations used
the OMNet++ default configuration settings and also the default configurations of the radio and within
the boundary of the physical layer (Ieee802154Phy).
3.1. Evaluating the accuracy of the estimated nodes locations
The number of nodes and their deployment locations and implemented transmission radius were key
factors for the simulation tests to evaluate the feasibility of implementing this localization model.
When the simulation starting, the GTs (Ground-Truth) nodes begins to transmit ICMP Echo Request messages.
The neighbouring added node after simulation run (โ€œNewHostsโ€) can listen to this conversation and receive
the packets that already consists of their neighbours location coordinates. Thus, the target node can implement
the triangulation localization algorithm to determine its estimated location coordinates (longitude and latitude)
after parsing their neighbours received addresses. To grasp the accuracy of this new location scheme,
the position error between the exact coordination of the newly-added node and the approximate location is
computed using the following (1):
๐ธ๐‘Ÿ๐‘Ÿ = โˆš(๐‘‹๐‘’๐‘ฅ๐‘Ž๐‘๐‘ก โˆ’ ๐‘‹๐‘’๐‘ ๐‘ก.)2 + (๐‘Œ๐‘’๐‘ฅ๐‘Ž๐‘๐‘ก โˆ’ ๐‘Œ๐‘’๐‘ ๐‘ก.)2 (1)
3.1.1. Scenario 1
The simulation network area in this scenario was 1200 โˆ— 1200 meters, and the distribution (x,y)
coordinates of these GT nodes in the simulation in (longitude, latitude) coordinates is illustrated in Table 1.
Five new sensor nodes were added dynamically during the runtime, named from โ€œNewHost1โ€ to โ€œNewHost5โ€.
The total number of nodes in this simulation trials will be 8 sensor nodes (3 GTs and 5 unlocated nodes).
The network topology of this scenario is shown in Figure 3(a). Figure 3 (b) showed all the actual positions of
the basic GT nodes and the new added nodes in the simulation experiment. The obtained results from this
scenario 1 shown that all newly-added nodes can be estimated their approximate location coordinates with
a varied number of location errors as seen in Table 1.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein)
2477
(a) (b)
Figure 3. (a) Scenario 1 network topology with 8 nodes, (b) absolute node position in scenario 1
Table 1. The exact location of new added nodes in Scenario 1 with estimated locations and location errors
Node Omnet Location Obt. Location Lon. Error (m) Lat. Error (m) location Error (m)
NewHost1 300,500 270,460 -30 -40 50
NewHost2 400,500 430,460 +30 -40 50
NewHost3 350,400 350,320 0 -80 80
NewHost4 400,400 510,320 +110 -80 136
NewHost5 300,400 190,320 -110 -80 136
The analysed results from the table shows that nodes with more neighbouring ground-truth nodes can
obtain more accurate estimated locations than those nodes located further away from the original
ground-truth hosts with pre-configured location coordinates. These outcomes indicate that the localization
technique is not precise when using this network topology pattern (this way of nodes deployment) and within
177m of transmission radius.
- The influence of transmission radius on estimated location
As mentioned before, the network topology style and transmission radius have a real effect on
the calculated locations accuracy of the sensor nodes. This happens because the implemented triangulation
technique relies on finding the intersection point of the circles that continue to emit by its neighbour nodes.
These circles empirically represent the actual transmission radius of the node. On the other hand, a random or
specific location of the unlocated node from the intersection point of circles can also affect the accuracy of
the estimated location in the network. However, the transmission power parameter was one of the key
elements that is involved inside the calculation equation of the transmission radius distance for each node
as shown in (2).
๐‘‡๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘…๐‘Ž๐‘‘๐‘–๐‘ข๐‘  ๐‘‘๐‘–๐‘ ๐‘ก๐‘Ž๐‘›๐‘๐‘’ = (
๐‘ค๐‘Ž๐‘ฃ๐‘’๐ฟ๐‘’๐‘›๐‘”๐‘กโ„Žโˆ—๐‘ค๐‘Ž๐‘ฃ๐‘’๐ฟ๐‘’๐‘›๐‘”๐‘กโ„Žโˆ—๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘š๐‘–๐‘ก๐‘ก๐‘’๐‘Ÿ๐‘ƒ๐‘œ๐‘ค๐‘’๐‘Ÿ
16.0โˆ—๐‘š๐‘–๐‘›๐‘…๐‘’๐‘๐‘’๐‘–๐‘ฃ๐‘’๐‘ƒ๐‘œ๐‘ค๐‘’๐‘Ÿโˆ—๐‘€ ๐‘ƒ๐ผ
2 )
1.0/๐‘Ž๐‘™๐‘โ„Ž๐‘Ž
(2)
Start from that, the transmission radius in meter can be a benchmark to refine the process for
estimating the locations of the node, specifically by finding the best radio transmission coverage to give
the most accurate measurements of the estimated nodes locations. These factors include wavelength,
transmitterPower, minReceivePower. The minimum received power (minReceivePower) refers to sensitivity,
and its value equals to the sensitivity value. The wavelength value comes from the division of speed of light
over the carrier frequency. As is well known, the speed of light is constant at around 3 * 108 in
the communication of wireless network. As shown in Table 1 (Scenario 1), the initial results of most
approximate locations for the nodes have a high location errors in one or both longitude and latitude coordinates
when applying the default configuration setting of physical and radio parameter. This methodology depends
on trial-and-error by adapting several parameter values inside the transmission radius (2). These factors include
transmitterPower, sensitivity and carrier frequency. In the first trial test, the radio transmission power of
the nodes set to the range between (0.7 and 1) mW in Scenario 1. The detailed results are shown in Table 2(a),
and the results of the second portion of the trial when set transmitterPower within the range (0.6 to 0.4) mW.
The modified sensitivity value or/and carrierfrequency values in the tests are in Table 2(b).
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483
2478
Table 2(a). Estimated locations of nodes with location error and transmission radius, changing transmission
power and/or sensitivity and/or carrier frequency
TransRadius (m) Node Est. Loc. Lon, Lat
Error (m)
Loc.
Error (m)
TrPw (mW) Min RecPw
mW
Sen
dBm
Fr.
GHz
177
(Def.)
NewHost1 270,460 -30,-40 50 1.0 3.16228e-09 -85 2.4
NewHost2 430,460 +30,-40 50
NewHost3 350,320 0,-80 80
NewHost4 510,320 +110,-80 136
NewHost5 190,320 -110,-80 136
141 NewHost1 270,500 -30,0 30 3
NewHost2 400,520 0,+20 20
NewHost3 360,400 +10,0 10
NewHost4 480,430 +80,+20 82.46
NewHost5 230,380 -70,-20 72.80
142 NewHost1 270,500 -30,0 30 0,8 2.51189e-09 -86 3
NewHost2 400,520 0,+20 20
NewHost3 360,400 +10,0 10
NewHost4 480,420 +80,+20 82.46
NewHost5 230,380 -70,-20 72.80
NewHost4 500,340 +100,-60 116.61
NewHost5 200,340 -100,-60 116.61
Certainly, the nodes are located far away one hop from the base sensor hosts (ground-truth).
From Tables 3 and 4, comparing with the results from Table 2, most of the nodes in the network resulted in
actual improvements in the approximate locations when fitting their transmission radius to 142m or 141m
rather than the original 177m. The comparison of the estimated location errors for the sensor nodes before and
after optimizing the transmission radius are shown in Figure 4. A comparison of the results from
the Tables 2(a) and 2(b) illustrated that the approximate locations of the nodes with the best accuracy in
the estimated locations of the nodes can be gathered at radio transmission radius equal to 142 m or 141 m in
the simulation. Despite these accurate outcomes of the node positions, the approximate location coordinates of
the nodes are still within the location errors when using the network topology pattern of Scenario 1.
Table 2(b). Estimated locations of nodes with location error and transmission radius, changing transmission
power and/or sensitivity and/or carrier frequency
TransRadius (m) Node Est. Loc. Lon, Lat
Error (m)
Loc.
Error (m)
TrPw mW Min RecPw
mW
Sen
dBm
Fr.
GHz
142 NewHost1 270,500 -30,0 30 0.5 1.58489e-09 -88 3
NewHost2 400,520 0,+20 20
NewHost3 360,400 +10,0 10
NewHost4 480,420 +80,+20 82.46
NewHost5 230,380 -70,-20 72.80
142 NewHost1 270,500 -30,0 30 0.4 1.25893e-09 -89
NewHost2 400,520 0,+20 20
NewHost3 360,400 +10,0 10
NewHost4 480,420 +80,+20 82.46
NewHost5 230,380 -70,-20 72.80
Figure 4. Approximate location errors of sensor nodes in scenario 1 before and after optimizing
the transmission radius
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein)
2479
3.1.2. Scenario 2
The simulation network in this scenario is configured with a network deployment area of 1200 x 1200
meters, and began also with three ground-truth (GT) nodes with preconfigured A data stream framework is
proposed in this phase where Figure 4 shows the flow of each package between several activities designed in
phase one. In the phase, it keeps pairing with the existing receiver and corresponds the communication between
beacon network and user-end equipment which allows the physical transmission of data, not only connecting
but also matching and packing. All the data found are resided in datalink layer and waited for further
processing. Locations in a straight line. The position coordinates of these nodes are shown in Figure 5(b) and
Table 5. The deployment locations of these nodes are slightly different in this network topology from
the previous Scenario 1. As before, network topology comprises three straight GT nodes (with known
locations). As well as, five new sensor nodes were added dynamically during simulation time without any idea
about their positions as depicted in the Figure 5(a). The exact or absolute locations coordination of these sensor
nodes were shown in the Figure 5(b).
(a) (b)
Figure 5. (a) Scenario 2 network topology with 8 nodes, (b) Absolute node position in scenario 2
The obtained outcomes from this trial scenario about estimating the locations of unlocalized nodes
shown that all new added nodes can be measured their approximate location coordinates with a varied numbers
of location errors as illustrated in Table 3, by only listening and parsing the addresses of neighbour nodes that
already determined their position coordinates. Thus, implement the triangulation mechanism successfully in
OMNeT++.
Table 3. The exact location of new added nodes in Scenario 2 with estimated positions and location errors
Node Omnet Location Obtained Location Longitude Error (m) Latitude Error (m) Margin of Error (m)
NewHost1 470,750 470,760 0 +10 10
NewHost2 630,750 630,760 0 +10 10
NewHost3 550,600 550,620 0 +20 20
NewHost4 400,600 390,620 -10 +20 22.36
NewHost5 700,600 710,620 +10 +20 22.36
- The impact of network style of nodes distribution on estimated location
The network topology and the distribution positions of the sensor nodes inside the network area have
actual impact on the accuracy of the approximate node location. The position of the node with regard to
the presumed intersection point is very significant because the triangulation technique depends on estimating
the intersection point position of the circles form by the neighbor nodes. There is a real trade-off between
the used network pattern and the transmission radius of the involved nodes.
The result of the calculated node location will be very accurate and without any position error,
if the unlocated node randomly or purposely lies exactly on the intersection point of the transmission radius
circles. That means that the estimated location of the node will be similar to the absolute physical location of
that sensor host. Both of the scenarios 1 and 2 use exactly the same configuration settings in the simulation and
even apply the same transmission radius which is 177 m. The only difference was in the locations of
the deployed nodes in the network.
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483
2480
The analysis in Scenario 1 Table 2(a) and Table 2(b) showed that the transmission radius of the node
can play a crucial role on this localization scheme. Scenario 2 Table 3 showed that the distribution locations of
the sensor nodes also were inappropriate in Scenario 1 network fashion, with regard to the calculations resulting
from triangulation. Figure 6 shows the approximate location outcomes, Table 3 for Scenario 1 and Table 4 for
Scenario 2. The conclusion of this observation test in the simulation demonstrates that network topology style
and distribution manner have greater effect on the accuracy of the estimated location than just from making
adjustments to the transmission radius of these nodes. Exceptionally, only the NewHost3 node recorded
a downgrade in its measured location in the Scenario 2.
Figure 6. Estimated location errors of nodes in scenario 1 after optimizing the transmission radius and
scenario 2 (adapted locations)
3.1.3. Senario 3
This scenario extends to previous Scenario 2. All the configuration settings in the simulation are
the same as the configuration settings of the previous scenarios. This scenario is only different from
the previous one in terms of the number of nodes, principally by increasing the number of sensor nodes to 14.
The new network topology was formed from the basic GT nodes in straight horizontal line and 11 nodes were
added within simulation time without any idea about their positions, as seen in Figure 7(a). All the actual
coordinates of the deployed nodes in the simulation are depicted in Figure 7(b). The results from this scenario
are gathered with also regard to the accuracy of the approximate locations for all sensor nodes in the network.
Consequently, all the obtained location outcomes for all nodes are shown in the Table 4. The analysis of
the localization results in this Table showed that all the additional appended nodes in the simulation network
can estimate their positions with different location error.
(a) (b)
Figure 7. (a) Scenario 3 network diagram with 14 nodes, (b) Absolute node locations in scenario 3
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein)
2481
Table 4. The exact location of all added nodes in Scenario 3 with measured positions and location errors
Node Omnet Location Obtained Location Longitude Error (m) Latitude Error (m) Margin of Error (m)
NewHost1 470,750 470,760 0 +10 10
NewHost2 630,750 630,760 0 +10 10
NewHost3 550,600 550,620 0 +20 20
NewHost4 400,600 390,620 -10 +20 22.36
NewHost5 700,600 710,620 +10 +20 22.36
NewHost6 350,750 320,760 -30 +10 31.62
NewHost7 750,750 780,760 +30 +10 31.62
NewHost8 250,650 230,630 -20 -20 28.28
NewHost9 850,650 870,630 +20 -20 28.28
NewHost10 470,500 470,490 0 -20 20
NewHost11 630,500 630,490 0 -20 20
3.2. Evaluating the consumed power for this localization model
Wireless embedded applications are characterized by low data rate (< 2Mbps), low-power (can be
battery-powered for years), and their short range. The power consumption evaluation of this location model
was under assumption of using the TmoteSky sensor powered by the MSP430G2x53 microcontroller.
The sensor radio circuit is assumed to be CC2480. The code that is used to calculate the results was compiled,
run and analyzed on Linux on an Intel Core i7-8750H. The energy consumption of this thesis localization
process was audited using Perf tools that is one of Linux tools. Use the perf stat command line to get the number
of CPU cycles. In fact, many CPU factors can be obtained when performing perf stat. Eventually, the power
consumption for each of these three functions is individually estimated. All the resulted indications for these
three functions are listed in Table 5.
Table 5. CPU factors from execution of location estimation
Function CPU indication Value Note Time (mS)
1. two audible neighbors
cycles 210331 0.793 GHz
1.581
instructions 767624 0.95 ins per cycle
2. one audible neighbor with two neighbors
cycles 303164 0.794 GHz
1.761
instructions 880933 0.91 ins per cycle
3. one audible neighbor with one audible neighbor
cycles 215291 1.387 GHz
0.9338
instructions 787594 0.91 ins per cycle
All of these obtained results from the Table 5 may differ from CPU to others, because
the architecture type of the CPU and the hardware provider have a real impact on the outcomes of these CPU
indications. Actually, all of these factors are gathered under using the 64-bit CPU and most of the IoT CPU
chips are built using 16- or 32-bit architectures. In addition, it relies on the kind of used compiler and
the operation environment.
a. Power consumption outcomes of these localization functions
There are a number of equations used to calculate the power consumption of each location function.
Firstly, the clock frequency is 16MHz with a maximum voltage of 3.5V, and the active mode current 4.5 mA,
obtained from the MSP430G2x53 microcontroller datasheet. The results from the Table 6 illustrate that
the power consumed of this localization scheme was small in each performed function and appropriate to these
low power devices. These outcomes are not very precise and just approximate values because only a 64-bit
CPU architecture is used in this test.
Table 6. Energy consumption of each location function
Function Power Consumption (W) Execution Time (mS) Energy Consumption (mJ)
1. two audible neighbors
0.01575
13.145 0.2070
2. one audible neighbor with two neighbors 18.947 0.2984
3. one audible neighbor with one audible neighbor 13.455 0.2119
b. Estimation power cost compared to transmission power cost
The interval period and power cost per interval of different radio states should be calculated to
compute the total power consumption of radio transmission operation. All the consumed current in various
radio states are represented in Table 7. The collected results from Table 7 show that the cost of energy during
transmission was very big compared with the energy consumed by the CPU to execute this localization scheme
as shown in Table 6. The significance of this result is to show that several (possibly iterative) location
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483
2482
calculations can be carried out on packets that embed the location coordinates in the address of normal
communications, for the same or at a lower cost of a single beacon message dedicated to distributing location
information.
Table 7. Energy consumed for each phase of the CC2480 radio transceiver for transmission
Radio State Power Consumption (W) Execution Time (mS) Energy Consumption (mJ)
Phase 1 Activate the processor, radio on 0.047 10.2 0.4774
Phase 2 Clear Channel Assessment 0.117 1.6 0.1872
Phase 3 Send data packet (2 bytes data) 0.110 0.7 0.0075
Phase 4 Receive ACK packet 0.117 1.3 0.1521
Phase 5 Commute to sleep mode 0.047 9.0 0.4212
Total 22.9 1.2454
4. CONCLUSION
The key solution of this thesis research was to calculate the location of these unknown location nodes
through their neighbour sensor hosts that already know their location and interpolated their location
information in their addresses. Thus, these new nodes interpolate the location information into the IPv6 address
after determining their locations with availability of minimum information. This means these position
coordinates will already be included in their sending packets. Different scenarios were implemented in
the OMNeT++ ver. 4.1 simulation and the results from the simulation scenarios are also gathered and analysed
for this location method based on the accuracy (computation of location errors) of the measured locations and
power consumption metrics.
REFERENCES
[1] Ghassan S, Mohammad A., "Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor
networks," International Journal of Electrical and Computer Engineering (IJECE), vol. 9(1), pp. 496-504, 2019.
[2] Chehri, A., Jeon, G., Choi, B., "Link-quality measurement and reporting in wireless sensor networks," sensors,
vol. 13, pp. 3066โ€“3076,2013.
[3] Shahra, E. Q., Sheltami, T. R. and Shakshuki, E. M., "A comparative study of range-free and range-based localization
protocols for wireless sensor network: Using cooja simulator," International Journal of Distributed Systems and
Technologies (IJDST). IGI Global, vol. 8(1), pp. 1โ€“16, 2017.
[4] Cheng, C.-Y., Chuang, C.-C. and Chang, R.-I., "Three-dimensional location-based IPv6 addressing for wireless
sensor networks in smart grid," 2012 IEEE 26th International Conference on Advanced Information Networking and
Applications (AINA), IEEE, pp. 824โ€“831, 2012.
[5] Alhasanat A, et al., "Data collection algorithm for wireless sensor networks using collaborative mobile elements,"
International Journal of Electrical and Computer Engineering (IJECE), vol. 9(3), pp. 2131-2140, 2019.
[6] Maheshwari, H. K., "Optimizing range aware localization in wireless sensor networks (WSNs)," PhD thesis,
University of Leeds, 2011.
[7] Kujur, R. R. and Dwivedi, A. K., "Exploration of Existing Frameworks for Connecting Wireless Sensor Networks
(WSNs) with Current Internet," International Journal of Computer Applications. Foundation of Computer Science,
vol. 86(4), 2014.
[8] Ding, R. and Du, H., "Location-based IP addressing in IP-enable wireless sensor networks," in 2011 International
Conference on Control, Automation and Systems Engineering (CASE), IEEE, pp. 1โ€“4, 2011.
[9] Ishaq, I., et al., "IETF standardization in the field of the internet of things (IoT): a survey," J. Sens. Actuator Networks
vol. 2, pp. 235โ€“287, 2013.
[10] Kushalnagar, N., et al. "IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions,
problem statement, and goals," RFC 4919 (Informational), Internet Engineering Task Force, 2007.
[11] Montenegro, G., et al., "Transmission of IPv6 packets over IEEE 802.15. 4 networks," 2007.
[12] Devasena, C. L., "IPv6 Low Power Wireless Personal Area Network (6LoWPAN) for Networking Internet of Things
(IoT)โ€“Analyzing its Suitability for IoT," Indian Journal of Science and Technology, vol. 9(30), 2016.
[13] Oโ€™Daniel, T., Hussein, M.N., Abdulla, R., "Localization using GPS Coordinates in IPv6 Addresses of Wireless Sensor
Network Nodes," Indian J. Sci. Technol., vol. 9, 2016.
[14] Ismail, N. H. A., et al., "A study on protocol stack in 6LoWPAN model. Journal of Theoretical and Applied
Information Technology," Little Lion Scientific Islamabad Pakistan, vol. 41(2), pp. 220โ€“229, 2012.
[15] Olsson, J., "6LoWPAN demystified," Texas Instruments, pp. 13, 2014.
[16] Gopinath, R. S. et al., "A gateway solution for IPv6 wireless sensor networks," in International Conference on Ultra
Modern Telecommunications & Workshops, 2009. ICUMTโ€™09. IEEE, pp. 1โ€“6, 2009.
[17] Shelby, Z. et al., "Rfc 6775: Neighbor discovery optimization for ipv6 over low-power wireless personal area
networks (6lowpans)," The Internet Engineering Task Force (IETF), pp. 28, 2013. [Online], Available:
http://tools.ietf.org/html/rfc6775.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein)
2483
[18] Li, X., et al., "LaConf: A Localized Address Autoconfiguration Scheme for Wireless Ad Hoc Networks," Tsinghua
Science & Technology. Elsevier, vol. 16(5), pp. 529โ€“538, 2011.
[19] Xu, Y. et al., "Connect Internet with sensors by 6LoWPAN," Journal of Networks, vol. 8(7), pp. 1480โ€“1487, 2013.
[20] Ma, L. et al., "IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks," Sensors &
Transducers. IFSA Publishing, SL2014, vol. 174(7), pp. 81, 2014.
[21] Tyagi, M. P. and Jain, M. S., "Comparative Study of Routing Protocols in Wireless Sensor Network," International
Journal of Advanced Research in Computer Science and Software Engineering, Citeseer, vol. 2(9), 2012.
[22] Blanchet, M., "Special-Use IPv6 Addresses," RFC 5156, 2008.
[23] Cotton, M., Vegoda, L., Bonica, R., Haberman, B., "Special-purpose IP address registries," IETF, pp. 1721โ€“2070,
Apr. 2013.
[24] Nnn Hinden, R.M., Haberman, B., "Unique local IPv6 unicast addresses," 2005.
[25] Oโ€™Daniel, T., Hussein, M.N., Abdulla, R., "Location Determination Using Tesselated Addresses in IPv6 Wireless
Sensor Networks," Adv. Sci. Lett. vol. 24, pp. 1723โ€“1726, 2018.
BIOGRAPHIES OF AUTHORS
Mohammed Nazar Hussien a PhD in Computing from Asia Pacific University of Technology and
innovation (APU), Bukit Jalil, Kuala Lumbur, Malaysia in 2019. He completed his B.E degree in
Computer Engineering from Baghdad University, Baghdad, Iraq in 1999 and the Master degree in
Electronic Business (e-business) from Arabic Academic University, Amman, Jordan in 2009. He has
15 years of networking and IT experiences within multiple companies in Iraq and Jordan, and he has
about one and half year of teaching experience as a Part-Time lecturer at APU. My research field is
about using a localization technique with Global GPS Coordinates in Wireless Sensor Network. Thus,
proposed a fresh approach and standards-compliant scheme based on incorporate GPS location
information into the IPv6 address of WSN. Thus innovate a new standard scheme and a baselining
model toward achieving IoT.
Raed Mohammed Taher Abdulla received the Bachelorโ€™s degree in Electrical engineering from AL-
Mustansiria University, Baghdad, Iraq in 1997, the Master degree in Electronic Systems Design
Engineering from Universiti Sains Malaysia, Malaysia in 2008 and he received his PhD in Wireless
and Mobile Systems from Universiti Sains Malaysia, Malaysia in 2012. He served Universiti Sains
Malaysia, Malaysia from 2008 until 2011 as Postgraduate Teaching Assistant and in the year 2012 he
works at School of Engineering, Asia Pacific University of Technology and innovation (APU),
Malaysia, as a Senior lecturer until now. He has contributed in research and in the areas of Radio
Frequency Identification (RFID) and Wireless Sensor Network (WSN) and Internet of things (IOT).
Thomas O'Daniel holds a BA Business and a BA in Social Science from Michigan State University,
MBA from Golden Gate University, and PhD in Information Systems from Monash University. He is
currently a Senior Lecturer at Asia Pacific University of Technology and Innovation in Kuala Lumpur,
with teaching and research interests in systems administration, network protocols, cyber-security, and
technology adoption.
Maythem Kamal Abbas Al-Adili was born in Baghdad, Iraq, in 1984. He got his BSc in Control and
Computer Systems Engineering from University of Technology in Baghdad, Iraq in 2005. In 2014,
he was granted his PhD in Electrical and Electronic Engineering from Universiti Teknologi Petronas.
Since 2008 till 2014, he served as a researcher with the Information Technology Department and
the Electrical and Electronics Engineering department in Universitit teknologi Petronas. He is the
author of several journal articles and conference papers those were published in several countries.
His research interests include Internet of Things (IoT), vehicular ad hoc networks (VANET), formal
specification languages, decision making algorithms, protocol design, intelligent systems and
robotics.

More Related Content

What's hot

Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA ImplementationWi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementationijceronline
ย 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
ย 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
ย 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkIJERA Editor
ย 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
ย 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13Alexander Decker
ย 
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...IJECEIAES
ย 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
ย 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
ย 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks Yayah Zakaria
ย 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
ย 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
ย 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591Iasir Journals
ย 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
ย 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issuesijsrd.com
ย 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network eSAT Publishing House
ย 
Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...IJECEIAES
ย 

What's hot (19)

10 14
10 1410 14
10 14
ย 
Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA ImplementationWi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaverโ€™s Address Generation Unit through FPGA Implementation
ย 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ย 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
ย 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
ย 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
ย 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
ย 
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...
Establishment Network by Using FSO Link Based on MD Code for Hybrid SCM-SAC-O...
ย 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
ย 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
ย 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
ย 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
ย 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
ย 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
ย 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
ย 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
ย 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issues
ย 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
ย 
Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...
ย 

Similar to Advanced location-based IPv6 address for the node of wireless sensor network

Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
ย 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
ย 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Sharon Roberts
ย 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
ย 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
ย 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
ย 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
ย 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
ย 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networksIJCNCJournal
ย 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
ย 
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...CSITiaesprime
ย 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks IJECEIAES
ย 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
ย 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
ย 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
ย 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
ย 
IRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
ย 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
ย 

Similar to Advanced location-based IPv6 address for the node of wireless sensor network (20)

Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
ย 
C017371624
C017371624C017371624
C017371624
ย 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
ย 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
ย 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
ย 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
ย 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
ย 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
ย 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
ย 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
ย 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
ย 
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
ย 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks
ย 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
ย 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
ย 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
ย 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
ย 
IRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT Applications
ย 
B010130508
B010130508B010130508
B010130508
ย 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
ย 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelIJECEIAES
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...IJECEIAES
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...IJECEIAES
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodIJECEIAES
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkIJECEIAES
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...IJECEIAES
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...IJECEIAES
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...IJECEIAES
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksIJECEIAES
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...IJECEIAES
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...IJECEIAES
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersIJECEIAES
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...IJECEIAES
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...IJECEIAES
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...IJECEIAES
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...IJECEIAES
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelIJECEIAES
ย 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
ย 

Recently uploaded

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 

Recently uploaded (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 

Advanced location-based IPv6 address for the node of wireless sensor network

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 3, June 2020, pp. 2474~2483 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp2474-2483 ๏ฒ 2474 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Advanced location-based IPv6 address for the node of wireless sensor network Mohammed Nazar Hussein1 , Raed Abdulla2 , Thomas Oโ€™Daniel3 , Maythem K. Abbas4 1,2,3 Faculty of Computing, Engineering and Technology, Asia Pacific University of Technology and Innovation (APU), Technology Park Malaysia, Malaysia 4 Faculty of Science & Information Technology, Universiti Teknologi PETRONAS, Malaysia Article Info ABSTRACT Article history: Received May 5, 2019 Revised Oct 4, 2019 Accepted Nov 22, 2019 Fields such as military, transportation applications, human services, smart cities and many others utilized Wireless Sensor Network (WSN) in their operations. Despite its beneficial use, occurrence of obstacles is inevitable. From the sensed data, the randomly nodes distribution will produce multiple benefits from self-configuration and regular positioning reporting. Lately, localization and tracking issues have received a remarkable attention in WSNs, as accomplishing high localization accuracy when low energy is used, is much needed. In this paper, a new method and standards-compliant scheme according to the incorporation of GPS location data into the IPv6 address of WSN nodes is suggested. The suggestion is likewise others which depends on ground-truth anchor nodes, with a difference of using the network address to deliver the information. The findings from the results revealed that perfect GPS coordinates can be conducted in the IPv6 address as well as with the transmission radius of the node, and the information is significantly adequate to predict a nodeโ€™s location. The location scheme performance is assessed in OMNet++ simulation according to the positioning error and the power metrics used. Moreover, some improvement practices to increase the precision of the node location are suggested. Keywords: Attendance management Beacon IOT Mobile application Copyright ยฉ 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Raed Abdulla, School of Engineering, Asia Pacific University of Technology and Innovation (APU), Technology Park Malaysia, Bukit Jalil, Kuala Lumpur 57000, Malaysia. Email: dr.raed@apu.edu.my 1. INTRODUCTION WSNs are rapidly emanating as an important and influential factor in mobile computing [1]. Apparently, the integration of WSNs amongst computing, wireless and sensor technology has fascinated many people recently. The networks comprising a number of nodes, are facilitated with handling, communicating and sensing capabilities. WSNs which are operated using battery, consisting of cheap tiny devices of constrained processing and memory resources, is practical to measure and exchange various environmental data in their operation condition [2]. Identifying the location of sensed data and knowing the physical position of these sensor nodes are crucial to some applications [3]. However, each node needs to identify its location via one of the self-localization methods, which means estimating the unknown node position within the network [4]. The path length of mobile elements is shortened which as a result leads to minimize the energy consumption and to reduce the overall data gathering latency [5]. In order to have a longer battery lifespan, the power is utilized by taking into considerations of the unreliable radio connectivity, minimum bandwidth, small packet payload size, dynamic topology changes, ad hoc deployment, and nodes. Estimating the physical position of a sensor node within the IoT is a real challenge as it subjected to small capacity, low bandwidth,
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein) 2475 variable links, dynamic typologies, and the difficulty of battery replacement or recharging in several circumstances. On the other hand, being able to trace the source of information is crucial for various WSN applications, especially in military, environmental monitoring, and aviation for example. Nodes can be equipped with GPS, but this is a costly solution in terms of both money and energy. Cost and energy consumption are in fact the most important criteria that must be taken into account when designing the protocols and platforms of these small devices. GPS typically fails in severe environments (i.e. inside homes, offices, underground, shopping malls and between a heavy vegetative cover) [6]. This paper recommends a major design for a WSN which contains lightly distributed nodes that are small in numbers of GPS ground-truth and nodes of bigger numbers that include their location through inter-communication. The main objective of this localization process is to search for the physical position of a node (a node with obscure position) whilst utilizing reference nodes also called โ€œground-truthโ€ (nodes with preconfigure locations) to obtain specific accuracy from uneven radio communication and at the same time reducing power consumption to its minimum level. The method being introduced envelops the GPS coordinates and the nominal transmission radius for a node into its IPv6 address. The objective is for a node to secure an early approximation of the nodeโ€™s location and also limited alternate points which are possible as its actual location. It can be achieved by listening unreceptively to the transmissions with several accurate calculations. This action will reveal the farthest distance between a node and its neighbors when the transmissions are received. The method of location is conducted and validated in OMNet++ simulation. The findings displayed that precise GPS coordinates can be conducted in the IPv6 address in addition to the transmission radius of the node. 2. LOCATION INTERPOLATION IN IPv6 ADDRESS Requests for Comments (RFCs) is set as Internet standards by the Internet Engineering Task Force (IETF) [5]. Most of the IP-based networks depend on a one-to-one addressable flow pattern [7-8]. The IETF standard which functions to expand the use of IPv6 to WSNs is known as IPV6 over Low Power Wireless Personal Area Networks (6LoWPAN). The 6LoWPAN procedure mass contains IEEE 802.15.4 at the physical and Medium Access Control (MAC) layers, a 6LoWPAN adaptation layer, IPv6 at the network layer, and the standard Internet procedures at the transport and application layers [9-13]. Additional technologies used with 6LoWPAN include sub-GHz radios, long-range telemetry links and even power-line communications [14-15]. 6LoWPAN gateway architecture that aims to achieve end-to-end communication where Internet users can retrieve and observe real-time data [16]. 6LoWPAN has embraced the mechanism of IPv6 Stateless Address Autoconfiguration [17-20]. The WSN routing protocol usually employs data-centric routing [21] or location-based routing rather than address-centric routing that is normally used in TCP/IP networks. The IPv6 addressing architecture which is one of its kind and designed for local communicationsโ€™ purpose has a special-purpose address block and IPv6 unicast address format, usually discovered inside a site. The โ€œUnique Local IPv6 Unicast Addressesโ€ are not supposed to be forwarded to another network on the Internet [22-24] contain general forms which are; an 8-bit prefix 0xFD00, a 40-bit Global ID set to a pseudo- random number that utilizes a standard algorithm [25] a 16-bit Subnet ID decided by the site; and a 64-bit Interface ID as displayed in Figure 1. Figure 1. IPv6 unique local address [6] In order to instill GPS coordinates in an IPv6 address, the coordinates can be moved into positive integer space. A grid of 360*180=64,800 zones were produced from 360 degrees longitude and 180 degrees latitude. The 9,999,999 offsets in each direction are derived from the seven-digit precision within each zone [25]. Basically, in a usual computer architecture representation, the latitude and longitude zone can be kept as an unsigned short integer (ushort, 16 bits), meanwhile the offsets need 24 bits of a 32-bit unsigned integer (uint). The finish coordinates could be kept in an unsigned long integer (ulong, 64 bits). Although 64 bits is the needed length for the interface recognition in an IPv6 unicast address to enable the zone and offsets
  • 3. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483 2476 to be pushed wholly into the space, an enticing possibility could happen. The 16-bit Subnet-ID field in the address permits 65,536 subnets, which can easily accommodate all the latitude/longitude zones. The two 24-bit offsets can later be positioned in the interface identifier field and the 16 bits will be used as flags [13]. The numerical part is to be recorded onto the unsigned integer grid, and the zone is joined with FD00 and the 40-bit Global-ID to shape the first half part of the address. Interleaved bits (also known as Morton numbers) are suitable for linearizing 2D integer coordinates, where x and y are merged as one number that can be compared without difficulty and also has a characteristic that a number is typically close to one another if the x value is near to the y value [25]. The new IPv6 address scheme is displayed in Figure 2. Figure 2. New IPv6 address scheme 3. EXPERIMENTS AND RESULTS Different steps and situations are used to perform the location model and to be validated in OMNeT ver.4.1. The researcher experimental situation in the simulation is grounded on one main theory: no other network in radio range is available, in other words, there is no interference. In addition, all network nodes will be operating the identical software with no GPS attached to the nodes. Only several anchor nodes (ground- truth) will be embedded with actual GPS coordinates of their areas. However, majority of the nodes are without the coordinates. The network topology which is employed in the simulation exercises mainly begins with three fundamental Ground-Truth nodes with location coordinates (GT) which have been identified earlier and in a straight horizontal line positioning. 1000 seconds was the accumulated simulation time performance. Free space model is the best situation of the simulation of the whole experiment tests due to the absence of any hurdles of the sensing area. In the beginning, with no simulations being left out, these simulations used the OMNet++ default configuration settings and also the default configurations of the radio and within the boundary of the physical layer (Ieee802154Phy). 3.1. Evaluating the accuracy of the estimated nodes locations The number of nodes and their deployment locations and implemented transmission radius were key factors for the simulation tests to evaluate the feasibility of implementing this localization model. When the simulation starting, the GTs (Ground-Truth) nodes begins to transmit ICMP Echo Request messages. The neighbouring added node after simulation run (โ€œNewHostsโ€) can listen to this conversation and receive the packets that already consists of their neighbours location coordinates. Thus, the target node can implement the triangulation localization algorithm to determine its estimated location coordinates (longitude and latitude) after parsing their neighbours received addresses. To grasp the accuracy of this new location scheme, the position error between the exact coordination of the newly-added node and the approximate location is computed using the following (1): ๐ธ๐‘Ÿ๐‘Ÿ = โˆš(๐‘‹๐‘’๐‘ฅ๐‘Ž๐‘๐‘ก โˆ’ ๐‘‹๐‘’๐‘ ๐‘ก.)2 + (๐‘Œ๐‘’๐‘ฅ๐‘Ž๐‘๐‘ก โˆ’ ๐‘Œ๐‘’๐‘ ๐‘ก.)2 (1) 3.1.1. Scenario 1 The simulation network area in this scenario was 1200 โˆ— 1200 meters, and the distribution (x,y) coordinates of these GT nodes in the simulation in (longitude, latitude) coordinates is illustrated in Table 1. Five new sensor nodes were added dynamically during the runtime, named from โ€œNewHost1โ€ to โ€œNewHost5โ€. The total number of nodes in this simulation trials will be 8 sensor nodes (3 GTs and 5 unlocated nodes). The network topology of this scenario is shown in Figure 3(a). Figure 3 (b) showed all the actual positions of the basic GT nodes and the new added nodes in the simulation experiment. The obtained results from this scenario 1 shown that all newly-added nodes can be estimated their approximate location coordinates with a varied number of location errors as seen in Table 1.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein) 2477 (a) (b) Figure 3. (a) Scenario 1 network topology with 8 nodes, (b) absolute node position in scenario 1 Table 1. The exact location of new added nodes in Scenario 1 with estimated locations and location errors Node Omnet Location Obt. Location Lon. Error (m) Lat. Error (m) location Error (m) NewHost1 300,500 270,460 -30 -40 50 NewHost2 400,500 430,460 +30 -40 50 NewHost3 350,400 350,320 0 -80 80 NewHost4 400,400 510,320 +110 -80 136 NewHost5 300,400 190,320 -110 -80 136 The analysed results from the table shows that nodes with more neighbouring ground-truth nodes can obtain more accurate estimated locations than those nodes located further away from the original ground-truth hosts with pre-configured location coordinates. These outcomes indicate that the localization technique is not precise when using this network topology pattern (this way of nodes deployment) and within 177m of transmission radius. - The influence of transmission radius on estimated location As mentioned before, the network topology style and transmission radius have a real effect on the calculated locations accuracy of the sensor nodes. This happens because the implemented triangulation technique relies on finding the intersection point of the circles that continue to emit by its neighbour nodes. These circles empirically represent the actual transmission radius of the node. On the other hand, a random or specific location of the unlocated node from the intersection point of circles can also affect the accuracy of the estimated location in the network. However, the transmission power parameter was one of the key elements that is involved inside the calculation equation of the transmission radius distance for each node as shown in (2). ๐‘‡๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘…๐‘Ž๐‘‘๐‘–๐‘ข๐‘  ๐‘‘๐‘–๐‘ ๐‘ก๐‘Ž๐‘›๐‘๐‘’ = ( ๐‘ค๐‘Ž๐‘ฃ๐‘’๐ฟ๐‘’๐‘›๐‘”๐‘กโ„Žโˆ—๐‘ค๐‘Ž๐‘ฃ๐‘’๐ฟ๐‘’๐‘›๐‘”๐‘กโ„Žโˆ—๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘š๐‘–๐‘ก๐‘ก๐‘’๐‘Ÿ๐‘ƒ๐‘œ๐‘ค๐‘’๐‘Ÿ 16.0โˆ—๐‘š๐‘–๐‘›๐‘…๐‘’๐‘๐‘’๐‘–๐‘ฃ๐‘’๐‘ƒ๐‘œ๐‘ค๐‘’๐‘Ÿโˆ—๐‘€ ๐‘ƒ๐ผ 2 ) 1.0/๐‘Ž๐‘™๐‘โ„Ž๐‘Ž (2) Start from that, the transmission radius in meter can be a benchmark to refine the process for estimating the locations of the node, specifically by finding the best radio transmission coverage to give the most accurate measurements of the estimated nodes locations. These factors include wavelength, transmitterPower, minReceivePower. The minimum received power (minReceivePower) refers to sensitivity, and its value equals to the sensitivity value. The wavelength value comes from the division of speed of light over the carrier frequency. As is well known, the speed of light is constant at around 3 * 108 in the communication of wireless network. As shown in Table 1 (Scenario 1), the initial results of most approximate locations for the nodes have a high location errors in one or both longitude and latitude coordinates when applying the default configuration setting of physical and radio parameter. This methodology depends on trial-and-error by adapting several parameter values inside the transmission radius (2). These factors include transmitterPower, sensitivity and carrier frequency. In the first trial test, the radio transmission power of the nodes set to the range between (0.7 and 1) mW in Scenario 1. The detailed results are shown in Table 2(a), and the results of the second portion of the trial when set transmitterPower within the range (0.6 to 0.4) mW. The modified sensitivity value or/and carrierfrequency values in the tests are in Table 2(b).
  • 5. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483 2478 Table 2(a). Estimated locations of nodes with location error and transmission radius, changing transmission power and/or sensitivity and/or carrier frequency TransRadius (m) Node Est. Loc. Lon, Lat Error (m) Loc. Error (m) TrPw (mW) Min RecPw mW Sen dBm Fr. GHz 177 (Def.) NewHost1 270,460 -30,-40 50 1.0 3.16228e-09 -85 2.4 NewHost2 430,460 +30,-40 50 NewHost3 350,320 0,-80 80 NewHost4 510,320 +110,-80 136 NewHost5 190,320 -110,-80 136 141 NewHost1 270,500 -30,0 30 3 NewHost2 400,520 0,+20 20 NewHost3 360,400 +10,0 10 NewHost4 480,430 +80,+20 82.46 NewHost5 230,380 -70,-20 72.80 142 NewHost1 270,500 -30,0 30 0,8 2.51189e-09 -86 3 NewHost2 400,520 0,+20 20 NewHost3 360,400 +10,0 10 NewHost4 480,420 +80,+20 82.46 NewHost5 230,380 -70,-20 72.80 NewHost4 500,340 +100,-60 116.61 NewHost5 200,340 -100,-60 116.61 Certainly, the nodes are located far away one hop from the base sensor hosts (ground-truth). From Tables 3 and 4, comparing with the results from Table 2, most of the nodes in the network resulted in actual improvements in the approximate locations when fitting their transmission radius to 142m or 141m rather than the original 177m. The comparison of the estimated location errors for the sensor nodes before and after optimizing the transmission radius are shown in Figure 4. A comparison of the results from the Tables 2(a) and 2(b) illustrated that the approximate locations of the nodes with the best accuracy in the estimated locations of the nodes can be gathered at radio transmission radius equal to 142 m or 141 m in the simulation. Despite these accurate outcomes of the node positions, the approximate location coordinates of the nodes are still within the location errors when using the network topology pattern of Scenario 1. Table 2(b). Estimated locations of nodes with location error and transmission radius, changing transmission power and/or sensitivity and/or carrier frequency TransRadius (m) Node Est. Loc. Lon, Lat Error (m) Loc. Error (m) TrPw mW Min RecPw mW Sen dBm Fr. GHz 142 NewHost1 270,500 -30,0 30 0.5 1.58489e-09 -88 3 NewHost2 400,520 0,+20 20 NewHost3 360,400 +10,0 10 NewHost4 480,420 +80,+20 82.46 NewHost5 230,380 -70,-20 72.80 142 NewHost1 270,500 -30,0 30 0.4 1.25893e-09 -89 NewHost2 400,520 0,+20 20 NewHost3 360,400 +10,0 10 NewHost4 480,420 +80,+20 82.46 NewHost5 230,380 -70,-20 72.80 Figure 4. Approximate location errors of sensor nodes in scenario 1 before and after optimizing the transmission radius
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein) 2479 3.1.2. Scenario 2 The simulation network in this scenario is configured with a network deployment area of 1200 x 1200 meters, and began also with three ground-truth (GT) nodes with preconfigured A data stream framework is proposed in this phase where Figure 4 shows the flow of each package between several activities designed in phase one. In the phase, it keeps pairing with the existing receiver and corresponds the communication between beacon network and user-end equipment which allows the physical transmission of data, not only connecting but also matching and packing. All the data found are resided in datalink layer and waited for further processing. Locations in a straight line. The position coordinates of these nodes are shown in Figure 5(b) and Table 5. The deployment locations of these nodes are slightly different in this network topology from the previous Scenario 1. As before, network topology comprises three straight GT nodes (with known locations). As well as, five new sensor nodes were added dynamically during simulation time without any idea about their positions as depicted in the Figure 5(a). The exact or absolute locations coordination of these sensor nodes were shown in the Figure 5(b). (a) (b) Figure 5. (a) Scenario 2 network topology with 8 nodes, (b) Absolute node position in scenario 2 The obtained outcomes from this trial scenario about estimating the locations of unlocalized nodes shown that all new added nodes can be measured their approximate location coordinates with a varied numbers of location errors as illustrated in Table 3, by only listening and parsing the addresses of neighbour nodes that already determined their position coordinates. Thus, implement the triangulation mechanism successfully in OMNeT++. Table 3. The exact location of new added nodes in Scenario 2 with estimated positions and location errors Node Omnet Location Obtained Location Longitude Error (m) Latitude Error (m) Margin of Error (m) NewHost1 470,750 470,760 0 +10 10 NewHost2 630,750 630,760 0 +10 10 NewHost3 550,600 550,620 0 +20 20 NewHost4 400,600 390,620 -10 +20 22.36 NewHost5 700,600 710,620 +10 +20 22.36 - The impact of network style of nodes distribution on estimated location The network topology and the distribution positions of the sensor nodes inside the network area have actual impact on the accuracy of the approximate node location. The position of the node with regard to the presumed intersection point is very significant because the triangulation technique depends on estimating the intersection point position of the circles form by the neighbor nodes. There is a real trade-off between the used network pattern and the transmission radius of the involved nodes. The result of the calculated node location will be very accurate and without any position error, if the unlocated node randomly or purposely lies exactly on the intersection point of the transmission radius circles. That means that the estimated location of the node will be similar to the absolute physical location of that sensor host. Both of the scenarios 1 and 2 use exactly the same configuration settings in the simulation and even apply the same transmission radius which is 177 m. The only difference was in the locations of the deployed nodes in the network.
  • 7. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483 2480 The analysis in Scenario 1 Table 2(a) and Table 2(b) showed that the transmission radius of the node can play a crucial role on this localization scheme. Scenario 2 Table 3 showed that the distribution locations of the sensor nodes also were inappropriate in Scenario 1 network fashion, with regard to the calculations resulting from triangulation. Figure 6 shows the approximate location outcomes, Table 3 for Scenario 1 and Table 4 for Scenario 2. The conclusion of this observation test in the simulation demonstrates that network topology style and distribution manner have greater effect on the accuracy of the estimated location than just from making adjustments to the transmission radius of these nodes. Exceptionally, only the NewHost3 node recorded a downgrade in its measured location in the Scenario 2. Figure 6. Estimated location errors of nodes in scenario 1 after optimizing the transmission radius and scenario 2 (adapted locations) 3.1.3. Senario 3 This scenario extends to previous Scenario 2. All the configuration settings in the simulation are the same as the configuration settings of the previous scenarios. This scenario is only different from the previous one in terms of the number of nodes, principally by increasing the number of sensor nodes to 14. The new network topology was formed from the basic GT nodes in straight horizontal line and 11 nodes were added within simulation time without any idea about their positions, as seen in Figure 7(a). All the actual coordinates of the deployed nodes in the simulation are depicted in Figure 7(b). The results from this scenario are gathered with also regard to the accuracy of the approximate locations for all sensor nodes in the network. Consequently, all the obtained location outcomes for all nodes are shown in the Table 4. The analysis of the localization results in this Table showed that all the additional appended nodes in the simulation network can estimate their positions with different location error. (a) (b) Figure 7. (a) Scenario 3 network diagram with 14 nodes, (b) Absolute node locations in scenario 3
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein) 2481 Table 4. The exact location of all added nodes in Scenario 3 with measured positions and location errors Node Omnet Location Obtained Location Longitude Error (m) Latitude Error (m) Margin of Error (m) NewHost1 470,750 470,760 0 +10 10 NewHost2 630,750 630,760 0 +10 10 NewHost3 550,600 550,620 0 +20 20 NewHost4 400,600 390,620 -10 +20 22.36 NewHost5 700,600 710,620 +10 +20 22.36 NewHost6 350,750 320,760 -30 +10 31.62 NewHost7 750,750 780,760 +30 +10 31.62 NewHost8 250,650 230,630 -20 -20 28.28 NewHost9 850,650 870,630 +20 -20 28.28 NewHost10 470,500 470,490 0 -20 20 NewHost11 630,500 630,490 0 -20 20 3.2. Evaluating the consumed power for this localization model Wireless embedded applications are characterized by low data rate (< 2Mbps), low-power (can be battery-powered for years), and their short range. The power consumption evaluation of this location model was under assumption of using the TmoteSky sensor powered by the MSP430G2x53 microcontroller. The sensor radio circuit is assumed to be CC2480. The code that is used to calculate the results was compiled, run and analyzed on Linux on an Intel Core i7-8750H. The energy consumption of this thesis localization process was audited using Perf tools that is one of Linux tools. Use the perf stat command line to get the number of CPU cycles. In fact, many CPU factors can be obtained when performing perf stat. Eventually, the power consumption for each of these three functions is individually estimated. All the resulted indications for these three functions are listed in Table 5. Table 5. CPU factors from execution of location estimation Function CPU indication Value Note Time (mS) 1. two audible neighbors cycles 210331 0.793 GHz 1.581 instructions 767624 0.95 ins per cycle 2. one audible neighbor with two neighbors cycles 303164 0.794 GHz 1.761 instructions 880933 0.91 ins per cycle 3. one audible neighbor with one audible neighbor cycles 215291 1.387 GHz 0.9338 instructions 787594 0.91 ins per cycle All of these obtained results from the Table 5 may differ from CPU to others, because the architecture type of the CPU and the hardware provider have a real impact on the outcomes of these CPU indications. Actually, all of these factors are gathered under using the 64-bit CPU and most of the IoT CPU chips are built using 16- or 32-bit architectures. In addition, it relies on the kind of used compiler and the operation environment. a. Power consumption outcomes of these localization functions There are a number of equations used to calculate the power consumption of each location function. Firstly, the clock frequency is 16MHz with a maximum voltage of 3.5V, and the active mode current 4.5 mA, obtained from the MSP430G2x53 microcontroller datasheet. The results from the Table 6 illustrate that the power consumed of this localization scheme was small in each performed function and appropriate to these low power devices. These outcomes are not very precise and just approximate values because only a 64-bit CPU architecture is used in this test. Table 6. Energy consumption of each location function Function Power Consumption (W) Execution Time (mS) Energy Consumption (mJ) 1. two audible neighbors 0.01575 13.145 0.2070 2. one audible neighbor with two neighbors 18.947 0.2984 3. one audible neighbor with one audible neighbor 13.455 0.2119 b. Estimation power cost compared to transmission power cost The interval period and power cost per interval of different radio states should be calculated to compute the total power consumption of radio transmission operation. All the consumed current in various radio states are represented in Table 7. The collected results from Table 7 show that the cost of energy during transmission was very big compared with the energy consumed by the CPU to execute this localization scheme as shown in Table 6. The significance of this result is to show that several (possibly iterative) location
  • 9. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2474 - 2483 2482 calculations can be carried out on packets that embed the location coordinates in the address of normal communications, for the same or at a lower cost of a single beacon message dedicated to distributing location information. Table 7. Energy consumed for each phase of the CC2480 radio transceiver for transmission Radio State Power Consumption (W) Execution Time (mS) Energy Consumption (mJ) Phase 1 Activate the processor, radio on 0.047 10.2 0.4774 Phase 2 Clear Channel Assessment 0.117 1.6 0.1872 Phase 3 Send data packet (2 bytes data) 0.110 0.7 0.0075 Phase 4 Receive ACK packet 0.117 1.3 0.1521 Phase 5 Commute to sleep mode 0.047 9.0 0.4212 Total 22.9 1.2454 4. CONCLUSION The key solution of this thesis research was to calculate the location of these unknown location nodes through their neighbour sensor hosts that already know their location and interpolated their location information in their addresses. Thus, these new nodes interpolate the location information into the IPv6 address after determining their locations with availability of minimum information. This means these position coordinates will already be included in their sending packets. Different scenarios were implemented in the OMNeT++ ver. 4.1 simulation and the results from the simulation scenarios are also gathered and analysed for this location method based on the accuracy (computation of location errors) of the measured locations and power consumption metrics. REFERENCES [1] Ghassan S, Mohammad A., "Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks," International Journal of Electrical and Computer Engineering (IJECE), vol. 9(1), pp. 496-504, 2019. [2] Chehri, A., Jeon, G., Choi, B., "Link-quality measurement and reporting in wireless sensor networks," sensors, vol. 13, pp. 3066โ€“3076,2013. [3] Shahra, E. Q., Sheltami, T. R. and Shakshuki, E. M., "A comparative study of range-free and range-based localization protocols for wireless sensor network: Using cooja simulator," International Journal of Distributed Systems and Technologies (IJDST). IGI Global, vol. 8(1), pp. 1โ€“16, 2017. [4] Cheng, C.-Y., Chuang, C.-C. and Chang, R.-I., "Three-dimensional location-based IPv6 addressing for wireless sensor networks in smart grid," 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), IEEE, pp. 824โ€“831, 2012. [5] Alhasanat A, et al., "Data collection algorithm for wireless sensor networks using collaborative mobile elements," International Journal of Electrical and Computer Engineering (IJECE), vol. 9(3), pp. 2131-2140, 2019. [6] Maheshwari, H. K., "Optimizing range aware localization in wireless sensor networks (WSNs)," PhD thesis, University of Leeds, 2011. [7] Kujur, R. R. and Dwivedi, A. K., "Exploration of Existing Frameworks for Connecting Wireless Sensor Networks (WSNs) with Current Internet," International Journal of Computer Applications. Foundation of Computer Science, vol. 86(4), 2014. [8] Ding, R. and Du, H., "Location-based IP addressing in IP-enable wireless sensor networks," in 2011 International Conference on Control, Automation and Systems Engineering (CASE), IEEE, pp. 1โ€“4, 2011. [9] Ishaq, I., et al., "IETF standardization in the field of the internet of things (IoT): a survey," J. Sens. Actuator Networks vol. 2, pp. 235โ€“287, 2013. [10] Kushalnagar, N., et al. "IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals," RFC 4919 (Informational), Internet Engineering Task Force, 2007. [11] Montenegro, G., et al., "Transmission of IPv6 packets over IEEE 802.15. 4 networks," 2007. [12] Devasena, C. L., "IPv6 Low Power Wireless Personal Area Network (6LoWPAN) for Networking Internet of Things (IoT)โ€“Analyzing its Suitability for IoT," Indian Journal of Science and Technology, vol. 9(30), 2016. [13] Oโ€™Daniel, T., Hussein, M.N., Abdulla, R., "Localization using GPS Coordinates in IPv6 Addresses of Wireless Sensor Network Nodes," Indian J. Sci. Technol., vol. 9, 2016. [14] Ismail, N. H. A., et al., "A study on protocol stack in 6LoWPAN model. Journal of Theoretical and Applied Information Technology," Little Lion Scientific Islamabad Pakistan, vol. 41(2), pp. 220โ€“229, 2012. [15] Olsson, J., "6LoWPAN demystified," Texas Instruments, pp. 13, 2014. [16] Gopinath, R. S. et al., "A gateway solution for IPv6 wireless sensor networks," in International Conference on Ultra Modern Telecommunications & Workshops, 2009. ICUMTโ€™09. IEEE, pp. 1โ€“6, 2009. [17] Shelby, Z. et al., "Rfc 6775: Neighbor discovery optimization for ipv6 over low-power wireless personal area networks (6lowpans)," The Internet Engineering Task Force (IETF), pp. 28, 2013. [Online], Available: http://tools.ietf.org/html/rfc6775.
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Advanced location-based IPv6 address for the node of wireless sensorโ€ฆ (Mohammed Nazar Hussein) 2483 [18] Li, X., et al., "LaConf: A Localized Address Autoconfiguration Scheme for Wireless Ad Hoc Networks," Tsinghua Science & Technology. Elsevier, vol. 16(5), pp. 529โ€“538, 2011. [19] Xu, Y. et al., "Connect Internet with sensors by 6LoWPAN," Journal of Networks, vol. 8(7), pp. 1480โ€“1487, 2013. [20] Ma, L. et al., "IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks," Sensors & Transducers. IFSA Publishing, SL2014, vol. 174(7), pp. 81, 2014. [21] Tyagi, M. P. and Jain, M. S., "Comparative Study of Routing Protocols in Wireless Sensor Network," International Journal of Advanced Research in Computer Science and Software Engineering, Citeseer, vol. 2(9), 2012. [22] Blanchet, M., "Special-Use IPv6 Addresses," RFC 5156, 2008. [23] Cotton, M., Vegoda, L., Bonica, R., Haberman, B., "Special-purpose IP address registries," IETF, pp. 1721โ€“2070, Apr. 2013. [24] Nnn Hinden, R.M., Haberman, B., "Unique local IPv6 unicast addresses," 2005. [25] Oโ€™Daniel, T., Hussein, M.N., Abdulla, R., "Location Determination Using Tesselated Addresses in IPv6 Wireless Sensor Networks," Adv. Sci. Lett. vol. 24, pp. 1723โ€“1726, 2018. BIOGRAPHIES OF AUTHORS Mohammed Nazar Hussien a PhD in Computing from Asia Pacific University of Technology and innovation (APU), Bukit Jalil, Kuala Lumbur, Malaysia in 2019. He completed his B.E degree in Computer Engineering from Baghdad University, Baghdad, Iraq in 1999 and the Master degree in Electronic Business (e-business) from Arabic Academic University, Amman, Jordan in 2009. He has 15 years of networking and IT experiences within multiple companies in Iraq and Jordan, and he has about one and half year of teaching experience as a Part-Time lecturer at APU. My research field is about using a localization technique with Global GPS Coordinates in Wireless Sensor Network. Thus, proposed a fresh approach and standards-compliant scheme based on incorporate GPS location information into the IPv6 address of WSN. Thus innovate a new standard scheme and a baselining model toward achieving IoT. Raed Mohammed Taher Abdulla received the Bachelorโ€™s degree in Electrical engineering from AL- Mustansiria University, Baghdad, Iraq in 1997, the Master degree in Electronic Systems Design Engineering from Universiti Sains Malaysia, Malaysia in 2008 and he received his PhD in Wireless and Mobile Systems from Universiti Sains Malaysia, Malaysia in 2012. He served Universiti Sains Malaysia, Malaysia from 2008 until 2011 as Postgraduate Teaching Assistant and in the year 2012 he works at School of Engineering, Asia Pacific University of Technology and innovation (APU), Malaysia, as a Senior lecturer until now. He has contributed in research and in the areas of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) and Internet of things (IOT). Thomas O'Daniel holds a BA Business and a BA in Social Science from Michigan State University, MBA from Golden Gate University, and PhD in Information Systems from Monash University. He is currently a Senior Lecturer at Asia Pacific University of Technology and Innovation in Kuala Lumpur, with teaching and research interests in systems administration, network protocols, cyber-security, and technology adoption. Maythem Kamal Abbas Al-Adili was born in Baghdad, Iraq, in 1984. He got his BSc in Control and Computer Systems Engineering from University of Technology in Baghdad, Iraq in 2005. In 2014, he was granted his PhD in Electrical and Electronic Engineering from Universiti Teknologi Petronas. Since 2008 till 2014, he served as a researcher with the Information Technology Department and the Electrical and Electronics Engineering department in Universitit teknologi Petronas. He is the author of several journal articles and conference papers those were published in several countries. His research interests include Internet of Things (IoT), vehicular ad hoc networks (VANET), formal specification languages, decision making algorithms, protocol design, intelligent systems and robotics.