The document proposes a middleware framework to facilitate communication between smart devices using a Cloud-MANET model. A MANET (mobile ad hoc network) allows smart devices to discover and connect to each other without centralized infrastructure. The Cloud-MANET model integrates MANET with cloud computing - if one smart device connects to the internet, all devices can access cloud services and interact. The proposed middleware acts as an interface between MANETs and the cloud, allowing communication between smart devices on the internet of things. It is implemented in the Android operating system using Wi-Fi to establish connections within the MANET range. Mathematical models are used to analyze connection lifetimes, device mobility, and information transmission between smart devices in the Cloud-MAN
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING AlAtfat
The opportunistic mechanism is one of the most interesting inventions of mobile ad-hoc networks
(MANET) Communication techniques that are allowed to communicate the Internet of Things (IoT)
devices to each other. The opportunistic MANET is a particular kind of sparsely, unconnected
MANET that uses occasional interaction possibilities between nodes for information transmission.
The author investigates opportunistic MANET for next- generation Android IoT networking,
wherein the mobile devices randomly travel around a planar area autonomously. Importantly,
opportunistic routing became an effective approach to get better performance although connections
have been broken. Each device that tries to start that is nearer to its target to join in transmitting
the packets has been made possible by the opportunistic MANET. Although there are several
communication barriers throughout this particular framework. The author of this manuscript
introduced the opportunistic MANET network to communicate among IoT devices on the Internet.
The purpose of this study is to highlight the opportunities to transfer information among IoT nodes
using a peer-to-peer platform without a central controller in a disconnected MANET network.
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...AlAtfat
The MANET is one of the most useful networks that established dynamically among all connected devices without fixed
infrastructure in a decentralized approach. Smart devices such as Smart home automation entry point, smart air conditioners,
Smart hubs, Smart thermostat, Color changing smart LEDs, Smart Mobiles, Smart Watches and smart Tablets etc. are
ubiquitous in our daily life and becoming valuable device with the capabilities of wireless networking using different wireless
protocols that are typically used with an IEEE 802.11 access point. MANETs provide connectivity in heterogeneous network
with decentralized approach. MANET is formed by itself when two or more smart devices has active connection. The fuzzy
logic control system is a novel approach that is utilized in various area of research because of the performance ability to
control the system. The proposed research is focused mainly to design a fuzzy logic control mobility framework for
evaluating mobility models in MANET of smart devices in internet of things environment. To implement this research we
developed a new fuzzy control based mobility framework for communication in MANET of smart devices. Smart devices
are considered as mobility nodes in MANET network system. The related work shows various mobility models to
reproduction the movements of nodes but unfortunately most of them are not working in reality. The proposed mobility
framework is tested on simulation environment and results perform the better evaluation of mobility models in MANET.
This research may be useful in the development of internet of things framework, where smart devices are connected to each
other in real time.
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
— The internet of smart devices is a network of intelligent gadgets
with sensors, programs, Wi-Fi and communication network connections. These
devices store the data in cloud and process data outside the device using the
proposed Cloud-Internet communication framework. These devices can
communicate with other devices using the proposed framework. However, there
are many challenges for communication security among the internet of smart
devices. The Cloud can store the device data with security, reliability, privacy
and service availability. The communication Security has been raised as one of
the most critical issues of cloud computing where resolving such an issue would
result in a constant growth in the use and popularity of cloud computing. Our
purpose of this study is to create a framework for providing the communication
security among smart devices network for the internet of things using cloud
computing. Our main contribution links a new study for providing
communication security for the internet of smart devices using the cloud-Internet
framework. This study can be helpful for communication security problem in the
framework of the Internet of Things. The proposed study generates a new
framework for solving the issue of communication security among internet of
smart devices.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING AlAtfat
The opportunistic mechanism is one of the most interesting inventions of mobile ad-hoc networks
(MANET) Communication techniques that are allowed to communicate the Internet of Things (IoT)
devices to each other. The opportunistic MANET is a particular kind of sparsely, unconnected
MANET that uses occasional interaction possibilities between nodes for information transmission.
The author investigates opportunistic MANET for next- generation Android IoT networking,
wherein the mobile devices randomly travel around a planar area autonomously. Importantly,
opportunistic routing became an effective approach to get better performance although connections
have been broken. Each device that tries to start that is nearer to its target to join in transmitting
the packets has been made possible by the opportunistic MANET. Although there are several
communication barriers throughout this particular framework. The author of this manuscript
introduced the opportunistic MANET network to communicate among IoT devices on the Internet.
The purpose of this study is to highlight the opportunities to transfer information among IoT nodes
using a peer-to-peer platform without a central controller in a disconnected MANET network.
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...AlAtfat
The MANET is one of the most useful networks that established dynamically among all connected devices without fixed
infrastructure in a decentralized approach. Smart devices such as Smart home automation entry point, smart air conditioners,
Smart hubs, Smart thermostat, Color changing smart LEDs, Smart Mobiles, Smart Watches and smart Tablets etc. are
ubiquitous in our daily life and becoming valuable device with the capabilities of wireless networking using different wireless
protocols that are typically used with an IEEE 802.11 access point. MANETs provide connectivity in heterogeneous network
with decentralized approach. MANET is formed by itself when two or more smart devices has active connection. The fuzzy
logic control system is a novel approach that is utilized in various area of research because of the performance ability to
control the system. The proposed research is focused mainly to design a fuzzy logic control mobility framework for
evaluating mobility models in MANET of smart devices in internet of things environment. To implement this research we
developed a new fuzzy control based mobility framework for communication in MANET of smart devices. Smart devices
are considered as mobility nodes in MANET network system. The related work shows various mobility models to
reproduction the movements of nodes but unfortunately most of them are not working in reality. The proposed mobility
framework is tested on simulation environment and results perform the better evaluation of mobility models in MANET.
This research may be useful in the development of internet of things framework, where smart devices are connected to each
other in real time.
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
— The internet of smart devices is a network of intelligent gadgets
with sensors, programs, Wi-Fi and communication network connections. These
devices store the data in cloud and process data outside the device using the
proposed Cloud-Internet communication framework. These devices can
communicate with other devices using the proposed framework. However, there
are many challenges for communication security among the internet of smart
devices. The Cloud can store the device data with security, reliability, privacy
and service availability. The communication Security has been raised as one of
the most critical issues of cloud computing where resolving such an issue would
result in a constant growth in the use and popularity of cloud computing. Our
purpose of this study is to create a framework for providing the communication
security among smart devices network for the internet of things using cloud
computing. Our main contribution links a new study for providing
communication security for the internet of smart devices using the cloud-Internet
framework. This study can be helpful for communication security problem in the
framework of the Internet of Things. The proposed study generates a new
framework for solving the issue of communication security among internet of
smart devices.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
More Related Content
Similar to Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
Smart Curriculum Mapping and Its Role in Outcome-based EducationAlAtfat
Educational development processes are essential for successful academic performance in educational and
technical environments. Teachers and students also need a model and guidelines required for effective
learning. Without effective curriculum mapping, the institutions cannot accurately estimate outcomes and
maximize potential performance on resources. A matrix depicts the relationship between student learning
outcomes (SOs) and topics on the curricular map. The need to earn satisfying produce of education and
achieve considerable progress in the visibility of education equity in completing professional duties is a
primary motivation for learning the curriculum. One of the most effective strategies to increase overall
teaching effectiveness, involvement, or curricular interaction is curriculum development. The mapping
connects all disciplines to academic outcomes and displays well-planned teaches. An excellent example
of a curriculum should be well-prepared and purposefully encourage expertise acquisition. This paper
describes a set of range standards and recommendations for this technique and challenges that affect
curricular map construction. As a result, this strategy will increase the overall performance of education
and the quality of the curriculum.
Cloud-Based IoT Applications and Their Roles in Smart CitiesAlAtfat
A smart city is an urbanization region that collects data using several digital and physical devices. The information collected from such devices is used efficiently to manage revenues, resources, and assets, etc., while the information obtained from such devices is utilized to boost performance throughout the city. Cloud-based Internet of Things (IoT) applications could help smart cities that contain information gathered from citizens, devices, homes, and other things. This information is processed and analyzed to monitor and manage transportation networks, electric utilities, resources management, water supply systems, waste management, crime detection, security mechanisms, proficiency, digital library, healthcare facilities, and other opportunities. A cloud service provider offers public cloud services that can update the IoT environment, enabling third-party activities to embed IoT data within electronic devices executing on the IoT. In this paper, the author explored cloud-based IoT applications and their roles in smart cities.
Federated learning and its role in the privacy preservation of IoT devicesAlAtfat
Federated learning (FL) is a cutting-edge artificial intelligence approach. It is a decentralized problem-solving technique that allows users to train using massive data. Unprocessed information is stored in advanced technology by a secret confidentiality service, which incorporates machine learning (ML) training while removing data connections. As researchers in the field promote ML configurations containing a large amount of private data, systems and infrastructure must be developed to improve the effectiveness of advanced learning systems. This study examines FL in-depth, focusing on application and system platforms, mechanisms, real-world applications, and process contexts. FL creates robust classifiers without requiring information disclosure, resulting in highly secure privacy policies and access control privileges. The article begins with an overview of FL. Then, we examine technical data in FL, enabling innovation, contracts, and software. Compared with other review articles, our goal is to provide a more comprehensive explanation of the best procedure systems and authentic FL software to enable scientists to create the best privacy preservation solutions for IoT devices. We also provide an overview of similar scientific papers and a detailed analysis of the significant difficulties encountered in recent publications. Furthermore, we investigate the benefits and drawbacks of FL and highlight comprehensive distribution scenarios to demonstrate how specific FL models could be implemented to achieve the desired results.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Recycled Concrete Aggregate in Construction Part III
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices
1. IJCSNS International Journal of Computer Science and Network Security 1
Middleware Implementation in Cloud-MANET Mobility Model
for Internet of Smart Devices
Tanweer Alam,
tanweer03@iu.edu.sa
Faculty of Computer and Information Systems, Islamic University in Madinah, Saudi Arabia
How to cite?
Tanweer Alam. "Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices.",
International Journal of Computer Science and Network Security. Vol. 17 No. 5 pp. 86-94. 2017.
Abstract
The smart devices are extremely useful devices that are making our lives easier than before. A smart device is facilitated us to establish a
connection with another smart device in a wireless network with a decentralized approach. The mobile ad hoc network (MANET) is a novel
methodology that discovers neighborhood devices and establishes connection among them without centralized infrastructure. Cloud
provides service to the MANET users to access cloud and communicates with another MANET users. In this article, I integrated MANET
and cloud together and formed a new mobility model named Cloud-MANET. In this mobility model, if one smart device of MANET is
able to connect to the internet then all smart devices are enabled to use cloud service and can be interacted with another smart device in the
Cloud-MANET framework. A middleware acts as an interface between MANET and cloud. The objective of this article is to implement a
middleware in Cloud-MANET mobility model for communication on internet of smart devices.
Key words:
MANET; Cloud computing; Wireless communication; Middleware; Smart devices.
1. Introduction
The smart device to smart device communication in the
cloud-MANET framework is a novel methodology that
discovers and connected nearby smart devices with no
centralized infrastructure. The existing cellular network
doesn’t allow to connect all smart devices without
centralized infrastructure even if they are very near to each
other. The proposed technique will be very useful in
machine to machine (M2M) networks because, in M2M
network, there are several devices nearby to each other. So
the implementation of MANET model in the smart device
to smart device communication can be very efficient and
useful to save power as well as the efficiency of spectrums.
The cloud-based services in MANET modeling for the
device to device communication can be a very useful
approach to enhance the capabilities of smart devices. The
smart device users will use cloud service to discover the
devices, minimize useful information in a big data and can
process videos, images, text, and audio. In this article, I
proposed a new middleware framework to enhance the
capability of MANET and cloud computing on the internet
of smart devices that can be useful in the 5G heterogeneous
network. In proposed framework, the smart device will
consider as service nodes. We consider Android framework
to implement proposed idea. Android operating system is
more popular than another operating system in the world.
Android OS is a freely available platform for cell phones
and is produced by individuals from the Open Handset
Alliance.
Fig. 1.MANET of smart devices
The Open Handset Alliance is a gathering of more than 40
companies, including Google, ASUS, Garmin, and HTC
2. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010
2
and so on. These organizations have met up to quicken and
enhance the advancement of cell phones. Presently android
smart devices are increasing exponentially in the world [9].
These smart devices have strong multimedia features. These
features are helpful too much to the android user. The
android users use these features to share multimedia
quickly. Many android clients are increasing their interest
to share videos and take photos by embedded camera. Also,
the popularity of android devices is increasing in the
developing projects of entertainment. In this project, clients
upload their latest photographs to the system [38].
Presently, the android smart devices are very popular with
the addition of its high capability. The newly feature of
Android devices is Wi-Fi Direct [44]. Using this feature the
wireless technologies [29] provide support to their users to
make the very good use of ad hoc network with smart
devices at all time and everywhere [6]. The MANET is a
decentralized network [28] that created by the wireless
devices with infrastructure-less environment [47].
The communication between devices in ad hoc environment
is to be unique [12] and innovative [33]. The
intercommunication without centralized approach is a very
powerful mechanism [43] that provides secure
communication to the users [37]. The ad hoc network
communication of android smart devices can play a most
important role when the cellular network fails. Cloud
computing has been regarded as one of the most popularized
computing paradigms. Cloud computing gives its customers
with three essential administration models: SaaS, PaaS, and
IaaS. Software as a service (SaaS) is mainly intended to end
users who need to use software as a part of their daily
activities.
Fig. 2.Cloud-MANET integration model
Platform as a service (PaaS) is mainly intended for
application developers who need platforms to develop their
software or application. Infrastructure as a service (IaaS) is
mainly intended to network architects who need
infrastructure capabilities. The communication security
challenges and threats for communicating in cloud
perspective internet of smart devices are the most important
aspect. The smart device to smart device communication in
the cloud-MANET framework of the internet of things is a
novel methodology that discovers and connected nearby
smart devices with no centralized infrastructure. The smart
devices will connect in the range of Wi-Fi wireless network
[5]. All Android smart devices within the range can
communicate with each other without cellular network [15].
I mean communication in own created network. This own
created network is the special network without centralized
approach i.e. Ad Hoc Network [17]. The figure1 represents
the ad hoc network among some smart devices without
cellular networks [3].
The Cloud MANET mobility model is an integration model
of Cloud computing and MANET technologies. The
functionality of MANET is depended on the mobility of its
nodes and connectivity also resources such as storage and
energy efficiency [8]. In Cloud computing, cloud providers
retain network infrastructure, storage facilities, and
software applications that support flexibility, efficiency,
and scalability [41].
In Cloud MANET mobility model, smart devices of
MANET can communicate with each other but at least one
smart device must be connected with cellular or Wi-Fi
networks. All smart devices of MANET should be
registered in cloud individually. The proposed model will
activate in disconnected mode. When a MANET is
activated then cloud services will activate in a real time and
provide services to the smart devices of MANET. The smart
devices send a request to the cloud for a session of
connectivity. Cloud provide the best connection to the smart
device. The proposed middleware is designed to access
android services in ad hoc environment. It exists between
the user and hardware [26]. It connects with applications in
ad hoc networks [13]. Users communicate through
application among android devices. The connection is
established through middleware [16]. The middleware
provides facility to create ad hoc network
Fig. 3.Middleware between application and Linux kernel
3. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010 3
Fig. 4.Middleware among smart devices in Wi-Fi
[24], provide a secure route, transportation and secure
connections [27] [20]. It works in the wireless network [10].
So we need Wi-Fi network to establish middleware among
android devices.
In proposed middleware framework, the smart devices are
exploiting the cloud service in mobile ad hoc network and
create a connection among smart devices to communicate
each other in the internet of things scenario. These cloud
services provide a significant approach for communication
in a large number of smart devices using routing protocols.
In this article, I focused on implementation of middleware
in MANET of smart devices and exploit cloud service by at
least one smart device with an internet connection to
communicate other smart devices without internet
connection within the range of MANET.
2. Literature Survey
In the 1980s, with the evolving of the internet, the
foundation of an emerging grid computation was
established. The foundation involved various principals
which employ the internet in a way in which users are
provisioned as resource nodes. A grid coordinates these
resources nodes and dispenses takes to them thus the entire
computation is viewed as a cumulative fashion. The
principles paved the way of a novel computing paradigm
which eventually carved today’s distribution concepts. In
the 1990s, the concept of virtualization was driven to the
application tier. It followed by employing virtualized
private network connections which share the same physical
channel. In 1991, Theodore S. Rappaport published an
article entitles The wireless revolution, in this paper he
presented the wireless communications is the emerging
technology as a key for communication among human as
well as devices [35]. In 1994, Andy Harter and Andy
Hopper published the article entitled A Distributed Location
system for the active office, in this paper they presented
infrared sensor arrangements using badges for
communicating among devices and workstations [18]. In
1994, Tristan Richardson, Frazer Nett, Glenford Mapp, and
Andy Hopper presented an article on A ubiquitous,
personalized computing environment for all Telephone in
an X Window System Environment, in this article they
presented X windows systems, X protocol for securing the
communication between client and server [36]. In the article
[21], authors represented System Software for Ubiquitous
Computing for integration of different kinds of network,
also create a connection among the devices in different
types of network. In 2002 researchers published an article
entitled Connecting the Physical World with Pervasive
Networks, in this article they address the challenges and
opportunities of instrumenting the physical world with
pervasive networks of sensor-rich, embedded computation
[15]. The cloud computing came as a consequence of the
continued development of computing paradigms. The
emergence of these technologies has established the
appearance of (SaaS) software as a service which states that
consumers are not required to purchase the software rather
than paying according to their own demand. In the mid of
2006, Amazon achieved a prominent milestone by testing
elastic computing cloud (EC2) which initialized the spark
of cloud computing in it. However, the term cloud
computing was not found until March 2007. The following
year brought even more rapid development of the newly
emerged paradigm. Furthermore, the cloud computing
infrastructure services have widened to include (SaaS)
software as a service. In the mid of 2012, oracle cloud has
been introduced, where it supports different deployment
models. It is provisioned as the first unified collection of it
solutions which are under continued developments.
Nowadays, typing a cloud computing in any search engine
will result in a tremendous result. For example, it would
result in more than 139,000,000 matches in Google. In
2009, Evan Welbourne et al published an article entitled
Building the Internet of Things Using RFID, in this paper
authors presented RFID-based personal object and friend
tracking services for the IoT that proposed tools can quickly
enable [45]. In 2010, Gerd Kortuem et al. published an
article on Smart objects as building blocks for the internet
of things, in this article they presented the development of a
new flow-based programming paradigm for smart objects
and the Internet of Things [22]. In 2011, Ahmed Rahmati et
al published an article on Context-Based Network
Estimation for Energy-Efficient Ubiquitous Wireless
Connectivity, in this article they presented context-based
network estimation to leverage the strengths and provide
ubiquitous energy efficient wireless connectivity [34]. In
the article [44] researchers presented Wi-Fi based sensors
for the internet of things, they focused on measurement the
range performance. In May 2014, Lihong Jiang et al
published an article entitled An IoT-Oriented Data Storage
Framework in Cloud Computing Platform, they focused on
data storage framework that is not only enabling efficient
storing of massive IoT data but also integrating both
structured and unstructured data [19]. In the article [39],
introduced the IoT ecosystem and key technologies to
support IoT communications. In 2016, Maria Rita Palattella
et al published an article entitled Internet of Things in the
4. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010
4
5G Era: Enablers, Architecture and Business Models, in this
article they presented 5G technologies for the IoT, by
considering both the technological and standardization
aspects [30].
3. Problem and Research Questions
There is various software in the market to provide
connectivity among peoples and smart devices using cloud
service and internet. But this software required internet
connection always on their smart devices. The Internet is a
part of our daily life but sometimes we face problem for
network connection, slow speed or no network. Also in a
disaster situation, emergency or military rescue operation
etc., in that situation people can’t access their internet
connection to communicate their neighbors. We can’t get
our information on the site and communicate with our
neighbors or world without network bandwidth. Wi-Fi
direct was launched in 2010 for communication among
nearby devices. It has various features including
discovering the neighbor devices, social networking, file
sharing and disaster recovering etc., But it operates through
the battery so that it is a disadvantage of this technology.
The following are the open questions that we are addressing
in this article.
Question 1: Is Wi-Fi direct sufficient for communication
among smart devices?
Question 2: How can we increase the distance of coverage
while the transmission power is limited?
Question 3: How can we connect a large number of devices?
Question 4: How can we stable the connection between
smart devices through Wi-Fi Direct?
Question 5: Many users found bugs in this technology. How
can we remove these bugs?
4. Methodology
The proposed middleware implemented between the
application layer and Linux kernel. The Android operating
system runs on Linux kernel. The middleware has
transportation, discover the new devices and find the
shortest path and create a connection among all android
devices [25]. The middleware provides facility to android
based smart devices to create connection and joins self-
created network ie. Ad hoc network [25]. It provides a
reliable route to forward data in the transportation [48]. The
new proposed middleware is also providing a simple
interface to easily useful for non-technical users. It supports
almost all applications.
The life of connection is described as the probabilistic
function [49] as follows.
session(life))=
The expression in the integral will be 0 if the limit tends
to ∞.
session(life)=
Fig. 5.Middleware architecture
Fig. 6. Middleware implementation in Cloud-MANET
integration model
After computing session life by using above probabilistic
function, every smart device requires to compute the values
of σ and µ.
5. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010 5
These two parameters are related to the connection
establishment among MANETs and Cloud service that can
be measured through smart devices using the following
function. eµ(1/2)σ2
When a smart device estimate the connection life between
MANET and Cloud, it will transfer or receive data securely.
The connection will be activated and stability will be high.
We consider that every smart device is assured to establish
the route between MANET and cloud when they create
session in the cloud. The smart devices can move through
the maximum speed 20m/s from one location to another
location by using Gauss markov mobility model. The
following formula is used to calculate the moving speed and
direction of the smart device within MANET range [23].
and
The λ is used as random degree when computing speed as
well as direction of smart device in a duration (t). The
transmission (ts) of information (Ik) among the number of
smart devices (Sn) can be estimated during the time interval
[ti,ti−1]. The smart devices can moved within the MANET
and access the cloud service using the multidimensional
function (εk
).
εk = CSn×tk
× Ik
where k=0,1,2,3.......∞(+ve).
If smart devices have moved outside the MANET then
k will be negative value. Here we consider that the
transformation of information happens simultaneous. The
bessel’s function can be calculated as follows.
Where BF is the Bessel’s method and MQ is the Marcum’s
method. The σ and α are the parameters used to calculate
Marcum’s method.
We know that the probability is proportional to the one
divide by information.
The probability density function for transmission is
calculated mathematically as follows.
Now we have divided the probability density function of all
the connections using the entropy per symbol of all
connected devices in 3-dimensional directions.
Here is the Chi-Square distribution method
that is used here for convergence. Now we will calculate all
the probabilities, entropies in each direction and finally we
draw the transition matrix from the probabilities of all
connected devices as follows.
Now we will find entropy per symbol row-wise said
H1,H2,H3.......,HK according to above transition matrix. After
findings of H1,H2,H3.......,HK we will found the whole
entropy per symbol of the smart devices.
H=H1.P1 + H2.P2 + H3.P3 + .........HK.PK.
We have calculated the velocities of smart devices using
Gauss-Markov Mobility Model in multidimensional area of
MANET. We have tested on simulation using 5, 10 and 50
smart devices at 50 m/s and 100 m/s. We got data that are
shown in Tabel 1,2 at the time of testing. Middleware needs
some java classes to discover, block devices in a particular
location [42].
6. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010
6
5. Implementation
The middleware in the cloud-MANET framework is
implemented in Java programming language in the form of
android based mobile application. The Android architecture
provides built-in tools to android applications for mobile
smart devices [7]. It means that the programmers need only
to develop an application using the Android operating
system and they can run these applications on different
smart devices that powered by Android [2]. Android keeps
running on Linux under Dalvik VM. Dalvik has an in the
nick of time compiler where the byte code put away in
memory is ordered to a machine code. Bytecode can be
characterized as middle level. JIT compiler peruses the
bytecode in numerous segments and accumulates
progressively with a specific end goal to run the project
quicker. Java performs keeps an eye on distinctive parts of
the code and in this manner, the code is gathered just before
it is executed [1]. When it is compiled once, it is stored and
set to be prepared for later uses. Linux Kernel Android can
bolster administrations of the center framework that
provides a level of abstraction between the device hardware
[46] and it contains all the essential hardware drivers such
that front and rear camera, smart keypad, touch screen etc.
Also, the kernel handles networking, Wi-Fi and Bluetooth
drivers interfacing to peripheral hardware. The android
framework is divided into three layers [3]. The first layer is
Application Layer. It is designed for ad hoc applications to
simplify the components for reuse [21]. By default, the
android operating system uses so many core applications
like browsers, wireless services, contact list etc. Google
provides so many open source applications for developers.
Fig. 7. Middleware implementation using android
application
The developer has the possibility to change or modify these
applications and make their own applications accordingly.
The second layer is libraries and android runtime. In this
layer of Android Architecture in ad hoc environment
include a group of libraries of different services [11]. The
developer can use these services and develop creative
functionality in android architecture. This layer provides
device manager class, discovery classes of Wi-Fi as well as
Bluetooth services. The names of classes are Wi-
FiDiscoveryService, Wi-FiBlackListedService,
BluetoothDiscoveryService, BluetoothBlackListedService
and DeviceManager class. The Wi-FiDiscoveryService
class is used to discover all smart devices in the range of
Wi-Fi [14]. The Wi-Fi BlackListedService class is used to
make a list of all blacklisted smart devices. The
BluetoothDiscovery-Service class is used to discover all
smart devices in the range of Wi-Fi. The
BluetoothBlackListedService class is used to make a list of
all blacklisted smart devices [4]. The third layer is Routing
and link Layer. In routing layer [31] of Android
architecture, in include methods for sending datagram using
one of these, unicast, multicast and broadcast in the range
of Wi-Fi [32]. This layer also has an event that responsible
for notifying of incoming messages. This layer works
between network and libraries for discovering. These
libraries have discovered methods for discovering
immediate neighbors or network contacts [40]. We add the
proposed middleware between the application layer and
Linux kernel in the android framework with cloud service.
We used Wi-FiDiscoveryService class of android in
proposed middleware for discovering the smart devices
within the range of MANET. I have developed a mobile
application for testing middleware in Cloud-MANET
model of the internet of smart devices. This application
discovers all neighbor smart devices in the range of Wi-Fi
using the search button. When we want to connect our smart
device to other discovered device, then just click the name
in the list box and click connect button. When we click
connect button the connection created message will be sent
to the appropriate device. When we receive the
confirmation from that device we can communicate to each
other. Also, we can transfer data, voice, video and image
from one device to another device using this android
application.
The following procedure should be followed by smart
devices.
1. Install the mobile app and register in the cloud. The cloud
will provide access permission.
2. Enter smart device id and password to login in the cloud.
3. Store WPA supplicant.conf on every smart device. This
leis used to start MANET service on the smart devices.
We had connected this le to our developed mobile apps.
4. Start MANET.
5. Searching neighborhood devices within the range of
MANET or search through the device id. 6. Click on the
searched device and start communication.
In 50 meter range of Wi-Fi, the maximum throughput
among smart devices communication was 10 Mbps, 8.1
7. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010 7
Mbps, 8.5 Mbps, and 5.8 Mbps for Text, Image, Voice, and
Video, respectively [Table.3].
TABLE III. THROUGHPUT IN SMART DEVICES
COMMUNICATION IN MANET IN 50-METER
RANGE
Data Types Mbps
Text 10
Image 8.1
Voice 8.5
Video 5.8
Fig. 8.Transmission in Cloud-MANET at 50 m/s
In 100 meter range of Wi-Fi, the maximum throughput
among smart devices communication was 10 Mbps, 7.2
Mbps, 8.5 Mbps, and 4 Mbps for Text, Image, Voice, and
Video, respectively [Table.4].
In 200 meter range of Wi-Fi, the maximum throughput
among smart devices communication was 10 Mbps, 6.8
Mbps, 8.2 Mbps, and 2.6 Mbps for Text, Image, Voice, and
Video, respectively [Table.5].
Figure. 10 represents the result interpretation of sending the
Text, Images, Audio and video files from 50, 100 and
Fig. 9.Transmission in Cloud-MANET at 100 m/s
TABLE IV. THROUGHPUT IN SMART DEVICES
COMMUNICATION IN MANET IN 100-METER
RANGE
Data Types Mbps
Text 10
Image 7.2
Voice 8.5
Video 4
TABLE I. TRANSMISSION IN MANET OF SMART DEVICES
AT 50 M/S.
Devices εk = 0.1 εk = 0.2 εk = 0.4 εk = 0.6 εk = 0.8 εk = 1
5 2 2.1 2 2.2 2.5 2.4
10 3 3.2 3.1 3.5 3.4 3.3
50 7 7.2 7.5 7.8 7.4 7.3
TABLE II.
TRANSMISSION IN MANET OF SMART
DEVICES AT 100 M/S.
Devices εk = 0.1 εk = 0.2 εk = 0.4 εk = 0.6 εk = 0.8 εk = 1
5 2.1 1.9 1.9 2.2 2.3 2.42
10 3 2.9 3.1 2.8 2.7 3
50 5.1 5.5 7.5 5.3 5.2 5.6
8. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010
8
TABLE V. THROUGHPUT IN SMART DEVICES
COMMUNICATION IN MANET IN 200-METER
RANGE
Data Types Mbps
Text 10
Image 6.8
Voice 8.2
Video 2.6
200-meters distance using middleware of cloud-MANET
architecture among smart devices.
6. Conclusion
The middleware in Cloud-MANET mobility model is
sufficient for communication among smart devices without
centralized system while Wi-Fi Direct is not sufficient to
establish connection among smart devices using cloud. We
can increase the distance of coverage using cloud. The
smart device of one MANET is able to connect with another
smart device of different MANET using cloud service. We
can connect a large number of smart devices together. We
can establish connection among smart devices for a long
time. There is no bugs in this technology. It is working fine.
In the future, we can integrate this technology to internet of
things framework.
Fig. 10. Testing Text, Image, Voice and Video on
middleware in Cloud-MANET Mobility Model
As a consequence of node mobility fixed source/destination
paths cannot be maintained for the lifetime of the network.
The need for developing middleware technique in a mobile
ad hoc network communication for smart devices is to
communicate with each other and transfer data, image,
voice and video. The android application for connecting
smart devices and transfer data in mobile ad hoc
environment using cloud service has been done and results
were collected in the range of 50 meters, 100 meters, 200
meters respectively. The application has been tested in a
Wi-Fi ad-hoc network environment. The results showed
successful and expectation for a future scope in the area of
mobile ad hoc network and internet of things.
References
[1] T. Alam. Core java. 2015.
[2] T. Alam and M. Aljohani. An approach to secure
communication in mobile ad-hoc networks of android
devices. In Intelligent Informatics and Biomedical Sciences
(ICIIBMS), 2015 International Conference on, pages 371–
375. IEEE, 2015.
[3] T. Alam and M. Aljohani. Design and implementation of an
ad hoc network among android smart devices. In Green
Computing and Internet of Things (ICGCIoT), 2015
International Conference on, pages 1322–1327. IEEE, 2015.
[4] T. Alam and M. Aljohani. Design a new middleware for
communication in ad hoc network of android smart devices.
In Proceedings of the Second International Conference on
Information and Communication Technology for
Competitive Strategies, page 38. ACM, 2016.
[5] M. Aljohani and T. Alam. An algorithm for accessing traffic
database using wireless technologies. In Computational
Intelligence and Computing Research (ICCIC), 2015 IEEE
International Conference on, pages 1–4. IEEE, 2015.
[6] M. Aljohani and T. Alam. Design an m-learning framework
for smart learning in ad hoc network of android devices. In
Computational Intelligence and Computing Research
(ICCIC), 2015 IEEE International Conference on, pages 1–
5. IEEE, 2015.
[7] M. Aljohani and T. Alam. Real time face detection in ad hoc
network of android smart devices. In Advances in
Computational Intelligence: Proceedings of International
Conference on Computational Intelligence 2015, pages 245–
255. Springer, 2017.
[8] H. N. Alshareef and D. Grigoras. Mobile ad-hoc network
management in the cloud. In Parallel and Distributed
Computing (ISPDC), 2014 IEEE 13th International
Symposium on, pages 140–147. IEEE, 2014.
[9] A. Arabo and B. Pranggono. Mobile malware and smart
device security: Trends, challenges and solutions. In Control
Systems and Computer Science (CSCS), 2013 19th
International Conference on, pages 526– 531. IEEE, 2013.
[10] Z. Bar-Yossef, R. Friedman, and G. Kliot. Rawms-random
walk based lightweight membership service for wireless ad
hoc networks. ACM Transactions on Computer Systems
(TOCS), 26(2):5, 2008.
[11] Z. Bar-Yossef, R. Friedman, and G. Kliot. Rawms-random
walk based lightweight membership service for wireless ad
hoc networks. ACM Transactions on Computer Systems
(TOCS), 26(2):5, 2008.
[12] P. Bellavista, A. Corradi, M. Fanelli, and L. Foschini. A
survey of context data distribution for mobile ubiquitous
systems. ACM Computing Surveys (CSUR), 44(4):24,
2012.
[13] A. Boukerche and L. Bononi. Simulation and modeling of
wireless, mobile, and ad hoc networks. Mobile ad hoc
networking, pages 373– 409, 2004.
9. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010 9
[14] D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin. Toward
distributed service discovery in pervasive computing
environments. IEEE Transactions on mobile computing,
5(2):97–112, 2006.
[15] D. Estrin, D. Culler, K. Pister, and G. Sukhatme. Connecting
the physical world with pervasive networks. IEEE pervasive
computing, 1(1):59–69, 2002.
[16] P. Garcia Lopez, R. Gracia, M. Espelt, G. Paris, M. Arrufat,
and R. Messeguer. Topology-aware group communication
middleware for manets. In Proceedings of the Fourth
International ICST Conference on COMmunication System
softWAre and middlewaRE, page 7. ACM, 2009.
[17] S. Giordano, E. Biagioni, and A. Passarella. Topics in ad hoc
and sensor networks. IEEE Communications Magazine,
44(7):54–54, 2006.
[18] A. Harter and A. Hopper. A distributed location system for
the active office. IEEE network, 8(1):62–70, 1994.
[19] L. Jiang, L. Da Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu. An
iotoriented data storage framework in cloud computing
platform. IEEE Transactions on Industrial Informatics,
10(2):1443–1451, 2014.
[20] L. Juszczyk and S. Dustdar. A middleware for service-
oriented communication in mobile disaster response
environments. In Proceedings of the 6th international
workshop on Middleware for pervasive and ad-hoc
computing, pages 37–42. ACM, 2008.
[21] T. Kindberg and A. Fox. System software for ubiquitous
computing. IEEE pervasive computing, 1(1):70–81, 2002.
[22] G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton.
Smart objects as building blocks for the internet of things.
IEEE Internet Computing, 14(1):44–51, 2010.
[23] N. Meghanathan. Impact of the gauss-markov mobility
model on network connectivity, lifetime and hop count of
routes for mobile ad hoc networks. Journal of networks,
5(5):509–516, 2010.
[24] J. V. D. Merwe, D. Dawoud, and S. McDonald. A survey on
peer-topeer key management for mobile ad hoc networks.
ACM computing surveys (CSUR), 39(1):1, 2007.
[25] M. Musolesi. Designing a context-aware middleware for
asynchronous communication in mobile ad hoc
environments. In Proceedings of the 1st international
doctoral symposium on Middleware, pages 304–308. ACM,
2004.
[26] M. Musolesi, C. Mascolo, and S. Hailes. Adapting
asynchronous messaging middleware to ad hoc networking.
In Proceedings of the 2nd workshop on Middleware for
pervasive and ad-hoc computing, pages 121–126. ACM,
2004.
[27] M. Musolesi, C. Mascolo, and S. Hailes. Emma: Epidemic
messaging middleware for ad hoc networks. Personal and
Ubiquitous Computing, 10(1):28–36, 2006.
[28] Y. Ni, U. Kremer, A. Stere, and L. Iftode. Programming ad-
hoc networks of mobile and resource-constrained devices.
ACM SIGPLAN Notices, 40(6):249–260, 2005.
[29] A. M. Ortiz, F. Royo, T. Olivares, J. C. Castillo, L. Orozco-
Barbosa, and P. J. Marron. Fuzzy-logic based routing for
dense wireless sensor networks. Telecommunication
Systems, 52(4):2687–2697, 2013.
[30] M. R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner,
T. Engel, and L. Ladid. Internet of things in the 5g era:
Enablers, architecture, and business models. IEEE Journal
on Selected Areas in Communications, 34(3):510–527,
2016.
[31] T. Park and K. G. Shin. Optimal tradeoffs for location-based
routing in large-scale ad hoc networks. IEEE/ACM
Transactions on Networking (TON), 13(2):398–410, 2005.
[32] S. Pathak and S. Jain. A survey: on unicast routing protocols
for mobile ad hoc network. Int. J. Emerging Technol. Adv.
Eng, 3(1):2250–2459, 2013.
[33] K. Paul, S. Bandyopadhyay, A. Mukherjee, and D. Saha.
Communication-aware mobile hosts in ad-hoc wireless
network. In Personal Wireless Communication, 1999 IEEE
International Conference on, pages 83–87. IEEE, 1999.
[34] A. Rahmati and L. Zhong. Context-based network
estimation for energy-efficient ubiquitous wireless
connectivity. IEEE Transactions on Mobile Computing,
10(1):54–66, 2011.
[35] T. S. Rappaport. The wireless revolution. IEEE
Communications Magazine, 29(11):52–71, 1991.
[36] T. Richardson, F. Bennett, G. Mapp, and A. Hopper.
Teleporting in an X window system environment. Citeseer,
1994.
[37] P. Santi. Topology control in wireless ad hoc and sensor
networks. ACM computing surveys (CSUR), 37(2):164–
194, 2005.
[38] R. Shacham, H. Schulzrinne, S. Thakolsri, and W. Kellerer.
Ubiquitous device personalization and use: The next
generation of ip multimedia communications. ACM
Transactions on Multimedia Computing, Communications,
and Applications (TOMM), 3(2):12, 2007.
[39] Z. Sheng, C. Mahapatra, C. Zhu, and V. C. Leung. Recent
advances in industrial wireless sensor networks toward
efficient management in iot. IEEE access, 3:622–637, 2015.
[40] M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya. A review
on distributed application processing frameworks in smart
mobile devices for mobile cloud computing. IEEE
Communications Surveys & Tutorials, 15(3):1294–1313,
2013.
[41] M. L. Sichitiu. Mobility models for ad hoc networks. In
Guide to Wireless Ad Hoc Networks, pages 237–254.
Springer, 2009.
[42] E. Souto, G. Guimaraes, G. Vasconcelos, M. Vieira, N.
Rosa, and˜ C. Ferraz. A message-oriented middleware for
sensor networks. In Proceedings of the 2nd workshop on
Middleware for pervasive and ad-hoc computing, pages
127–134. ACM, 2004.
[43] C.-K. Toh, M. Delwar, and D. Allen. Evaluating the
communication performance of an ad hoc wireless network.
IEEE Transactions on Wireless Communications, 1(3):402–
414, 2002.
[44] S. Tozlu, M. Senel, W. Mao, and A. Keshavarzian. Wi-fi
enabled sensors for internet of things: A practical approach.
IEEE Communications Magazine, 50(6), 2012.
[45] E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S.
Raymer, M. Balazinska, and G. Borriello. Building the
10. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.12, December 2010
10
internet of things using rfid: the rfid ecosystem experience.
IEEE Internet Computing, 13(3), 2009.
[46] G. Xing, C. Lu, Y. Zhang, Q. Huang, and R. Pless. Minimum
power configuration for wireless communication in sensor
networks. ACM Transactions on Sensor Networks (TOSN),
3(2):11, 2007.
[47] B. Xu, S. Hischke, and B. Walke. The role of ad hoc
networking in future wireless communications. In
Communication Technology Proceedings, 2003. ICCT
2003. International Conference on, volume 2, pages 1353–
1358. IEEE, 2003.
[48] G. Yan and S. Olariu. A probabilistic analysis of link
duration in vehicular ad hoc networks. IEEE Transactions on
Intelligent Transportation Systems, 12(4):1227–1236, 2011.
[49] A. J. Yuste, A. Trivino, E. Casilari, and F. D. Trujillo.
Adaptive gateway discovery for mobile ad hoc networks
based on the characterisation of the link lifetime. IET
communications, 5(15):2241–2249, 2011.