The network extended not just internationally but also throughout a broad
variety of application areas in this age, with healthcare being one of the most
well-known and vital industries. Improvements in healthcare are possible if
we start using the popular internet of things (IoT) technology as a key
instead of focusing on other disciplines. Wireless body area network
(WBAN) is a field in which we communicate with a network of human
people and medical equipment that may be used in conjunction with internet
of things technology to perform any function. Additional features for
software defined networks will be added in the future. In the event of a
critical crisis, the suggested suggestions will be to take care of the patient's
life. Because the fitted equipment keeps a lot better eye on the patient than
previously advised methods. This study combines WBAN, IoT, and software
defined network (SDN) to make sense in the healthcare field.
Presented at the FDP Emerging Trends in IOT Enabled Wireless Communication , 8TH – 12TH, August, 2022 (ONLINE MODE) Organized By Department of Electronics Communication Engineering In association with IQAC, Haldia Institute of Technology Haldia-721657, West Bengal.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
2015 security for the internet of things a survey ofVinod Salunkhe
This document surveys existing protocols and open issues regarding security for communications in the Internet of Things (IoT). It analyzes how current approaches ensure security requirements and protect IoT communications. The document also identifies challenges and opportunities for future research. Key points:
- The IoT will connect everyday objects to the Internet, requiring secure communication protocols optimized for constrained sensing devices.
- Standardization bodies are developing a protocol stack to enable reliable, efficient Internet connectivity between devices. This includes 6LoWPAN, RPL, CoAP and security protocols.
- The survey analyzes these protocols and how they address security requirements like authentication, integrity and confidentiality. It also discusses open problems and strategies for future research.
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
Presented at the FDP Emerging Trends in IOT Enabled Wireless Communication , 8TH – 12TH, August, 2022 (ONLINE MODE) Organized By Department of Electronics Communication Engineering In association with IQAC, Haldia Institute of Technology Haldia-721657, West Bengal.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
2015 security for the internet of things a survey ofVinod Salunkhe
This document surveys existing protocols and open issues regarding security for communications in the Internet of Things (IoT). It analyzes how current approaches ensure security requirements and protect IoT communications. The document also identifies challenges and opportunities for future research. Key points:
- The IoT will connect everyday objects to the Internet, requiring secure communication protocols optimized for constrained sensing devices.
- Standardization bodies are developing a protocol stack to enable reliable, efficient Internet connectivity between devices. This includes 6LoWPAN, RPL, CoAP and security protocols.
- The survey analyzes these protocols and how they address security requirements like authentication, integrity and confidentiality. It also discusses open problems and strategies for future research.
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This document discusses the vision and potential technologies for 6G wireless communication systems. It begins by outlining the exponential growth in mobile data usage and the need for a system beyond 5G to support emerging applications. 6G is expected to be implemented between 2027-2030 and aims to provide data rates of around 1 Tbps per user, latency below 1 ms, and connectivity 1000 times greater than 5G. Technologies like terahertz communications, artificial intelligence, 3D networking and quantum communications could help 6G achieve high performance while supporting applications in areas like autonomous systems, virtual reality and smart cities. The document also examines 6G requirements, the role of different technologies, challenges and research directions.
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
[email protected]
Received December 4, 2019, accepted January 7, 2020, date of publication January 13, 2020, date of current version January 24, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2966271
5G Technology: Towards Dynamic Spectrum
Sharing Using Cognitive Radio Networks
W. S. H. M. W. AHMAD 1, N. A. M. RADZI 1,2, (Senior Member, IEEE), F. S. SAMIDI1,
A. ISMAIL 1,2, (Member, IEEE), F. ABDULLAH 1,2, (Senior Member, IEEE),
M. Z. JAMALUDIN1,2, (Senior Member, IEEE), AND M. N. ZAKARIA3
1Institute of Power Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
2Electrical and Electronics Engineering Department, College of Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
3Architecture and Governance, Tenaga Nasional Berhad Information and Communication Technology (TNB ICT), Kuala Lumpur 59200, Malaysia
Corresponding author: N. A. M. Radzi ([email protected])
This work was supported in part by UNITEN R & D Sdn Bhd through Tenaga Nasional Berhad Seed Fund under Grant U-TC-RD-19-04,
and in part by the Universiti Tenaga Nasional BOLD2025 under Grant 10436494/B/2019019.
ABSTRACT The explosive popularity of small-cell and Internet of Everything devices has tremendously
increased traffic loads. This increase has revolutionised the current network into 5G technology, which
demands increased capacity, high data rate and ultra-low latency. Two of the research focus areas for meeting
these demands are exploring the spectrum resource and maximising the utilisation of its bands. However,
the scarcity of the spectrum resource creates a serious challenge in achieving an efficient management
scheme. This work aims to conduct an in-depth survey on recent spectrum sharing (SS) technologies
towards 5G development and recent 5G-enabling technologies. SS techniques are classified, and SS surveys
and related studies on SS techniques relevant to 5G networks are reviewed. The surveys and studies are
categorised into one of the main SS techniques on the basis of network architecture, spectrum allocation
behaviour and spectrum access method. Moreover, a detailed survey on cognitive radio (CR) technology
in SS related to 5G implementation is performed. For a complete survey, discussions are conducted on the
issues and challenges in the current implementation of SS and CR, and the means to support efficient 5G
advancement are provided.
INDEX TERMS 5G, new radio, spectrum sharing, spectrum efficiency, cognitive radio, enabling
technologies.
I. INTRODUCTION
5G is the next-generation mobile communication technol-
ogy designed to provide greater capacity and higher data
speeds than the previous generation Long Term Evolution
(LTE). 5G technology, which is expected to be realised
by 2020 [1], [2], promises ultra-low latency and ultra-
high reliability, thus enabling innovative services across
different industry sectors [3]. 5G standards are currently
under development and will include the evolution of exist-
ing LTE and 5G New Radio (N ...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
The document discusses Internet of Things (IoT) and spectrum needs for IoT. It provides definitions of IoT from various organizations and describes key characteristics of IoT communications. It outlines the spectrum ranges used by different IoT technologies, both in licensed and unlicensed bands. It discusses spectrum needs for IoT based on application requirements and deployment scenarios. It also summarizes outcomes of WRC-15 related to identification of additional spectrum for mobile broadband and IMT, and issues to be studied at WRC-19 regarding spectrum needs for 5G and IMT-2020.
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
Among sensible goals of active and assisted living paradigm is the unobtrusive monitoring of daily living activities. A lot of research has been going on continuous home and personal monitoring applications. There are many solutions were adapted by these technologies to make better remote monitoring applications. The traditional continuous home and personal monitoring systems which are implemented with traditional client server architecture which may fail in factors like low power consumption, un deterministic data delivery time, More sensitive to external connectivity issues temporary failures of servers , adhoc networks using ZigBee and Z wave etc. and also increase the cost of implementation. However, when dealing with the home environment, and especially with older adults, obtrusiveness, usability, and cost concerns are of the utmost relevance for active and assisted Living AAL joint program. With advent of cloud services, the continuous remote monitoring based applications became truly plug and play' approach implementation and also reduce the problems of temporary failures. One of the biggest challenges in this area is to make such application devices work with low power battery based applications . The main drawback comes from the higher power consumption, inherently needed to sustain much higher data rates. In this project, a solution is proposed to improve the low power consumption in Wi Fi sensors by making use of advanced RF based Microprocessor from Texas instruments CC3200 . Bed Occupancy sensor automation has been designed and implemented to test the feasibility of the approach. The TI CC3200 comes with ARM Cortex M4 as a core and inbuilt Wi Fi subsystem. The CC3200 provides different power modes to make the device enter into sleep or hibernate mode. This device will only enter only in work phase when the sensor is active state. During this phase, the processor sample and processes the sensor data and uploads to the cloud using REST API. Thing speak is an IoT cloud service used to present the sensory data as graphs, bar charts, and dashboards on the cloud remaining time it will enter into sleep phase to save the power of the device, so that it will extend the battery life time of the device. B. N. Meenakshi | Mrs. N. V. Durga "An IOT Based Low Power Health Monitoring with Active Personal Assistance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29603.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/29603/an-iot-based-low-power-health-monitoring-with-active-personal-assistance/b-n-meenakshi
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
The document provides an overview of Internet of Things (IoT), including its definition, key challenges and applications. Some of the main points discussed include:
- IoT refers to the connection of physical devices, vehicles and other items embedded with sensors, software and network connectivity which enables these objects to collect and exchange data.
- Major challenges of IoT include networking issues, fragmentation due to different device standards, managing large amounts of data generated (big data), compatibility between different technologies, and security/privacy concerns.
- Applications of IoT discussed include wearable devices, healthcare monitoring, traffic management, fleet management, agriculture, hospitality, smart energy grids, water supply monitoring, and equipment maintenance.
-
Because of the rapid growth in technology breakthroughs, including
multimedia and cell phones, Telugu character recognition (TCR) has recently
become a popular study area. It is still necessary to construct automated and
intelligent online TCR models, even if many studies have focused on offline
TCR models. The Telugu character dataset construction and validation using
an Inception and ResNet-based model are presented. The collection of 645
letters in the dataset includes 18 Achus, 38 Hallus, 35 Othulu, 34×16
Guninthamulu, and 10 Ankelu. The proposed technique aims to efficiently
recognize and identify distinctive Telugu characters online. This model's main
pre-processing steps to achieve its goals include normalization, smoothing,
and interpolation. Improved recognition performance can be attained by using
stochastic gradient descent (SGD) to optimize the model's hyperparameters.
Scientific workload execution on a distributed computing platform such as a
cloud environment is time-consuming and expensive. The scientific workload
has task dependencies with different service level agreement (SLA)
prerequisites at different levels. Existing workload scheduling (WS) designs
are not efficient in assuring SLA at the task level. Alongside, induces higher
costs as the majority of scheduling mechanisms reduce either time or energy.
In reducing, cost both energy and makespan must be optimized together for
allocating resources. No prior work has considered optimizing energy and
processing time together in meeting task level SLA requirements. This paper
presents task level energy and performance assurance-workload scheduling
(TLEPA-WS) algorithm for the distributed computing environment. The
TLEPA-WS guarantees energy minimization with the performance
requirement of the parallel application under a distributed computational
environment. Experiment results show a significant reduction in using energy
and makespan; thereby reducing the cost of workload execution in comparison
with various standard workload execution models.
More Related Content
Similar to Research, challenges and opportunities in software define radio technologies
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This document discusses the vision and potential technologies for 6G wireless communication systems. It begins by outlining the exponential growth in mobile data usage and the need for a system beyond 5G to support emerging applications. 6G is expected to be implemented between 2027-2030 and aims to provide data rates of around 1 Tbps per user, latency below 1 ms, and connectivity 1000 times greater than 5G. Technologies like terahertz communications, artificial intelligence, 3D networking and quantum communications could help 6G achieve high performance while supporting applications in areas like autonomous systems, virtual reality and smart cities. The document also examines 6G requirements, the role of different technologies, challenges and research directions.
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
[email protected]
Received December 4, 2019, accepted January 7, 2020, date of publication January 13, 2020, date of current version January 24, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2966271
5G Technology: Towards Dynamic Spectrum
Sharing Using Cognitive Radio Networks
W. S. H. M. W. AHMAD 1, N. A. M. RADZI 1,2, (Senior Member, IEEE), F. S. SAMIDI1,
A. ISMAIL 1,2, (Member, IEEE), F. ABDULLAH 1,2, (Senior Member, IEEE),
M. Z. JAMALUDIN1,2, (Senior Member, IEEE), AND M. N. ZAKARIA3
1Institute of Power Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
2Electrical and Electronics Engineering Department, College of Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
3Architecture and Governance, Tenaga Nasional Berhad Information and Communication Technology (TNB ICT), Kuala Lumpur 59200, Malaysia
Corresponding author: N. A. M. Radzi ([email protected])
This work was supported in part by UNITEN R & D Sdn Bhd through Tenaga Nasional Berhad Seed Fund under Grant U-TC-RD-19-04,
and in part by the Universiti Tenaga Nasional BOLD2025 under Grant 10436494/B/2019019.
ABSTRACT The explosive popularity of small-cell and Internet of Everything devices has tremendously
increased traffic loads. This increase has revolutionised the current network into 5G technology, which
demands increased capacity, high data rate and ultra-low latency. Two of the research focus areas for meeting
these demands are exploring the spectrum resource and maximising the utilisation of its bands. However,
the scarcity of the spectrum resource creates a serious challenge in achieving an efficient management
scheme. This work aims to conduct an in-depth survey on recent spectrum sharing (SS) technologies
towards 5G development and recent 5G-enabling technologies. SS techniques are classified, and SS surveys
and related studies on SS techniques relevant to 5G networks are reviewed. The surveys and studies are
categorised into one of the main SS techniques on the basis of network architecture, spectrum allocation
behaviour and spectrum access method. Moreover, a detailed survey on cognitive radio (CR) technology
in SS related to 5G implementation is performed. For a complete survey, discussions are conducted on the
issues and challenges in the current implementation of SS and CR, and the means to support efficient 5G
advancement are provided.
INDEX TERMS 5G, new radio, spectrum sharing, spectrum efficiency, cognitive radio, enabling
technologies.
I. INTRODUCTION
5G is the next-generation mobile communication technol-
ogy designed to provide greater capacity and higher data
speeds than the previous generation Long Term Evolution
(LTE). 5G technology, which is expected to be realised
by 2020 [1], [2], promises ultra-low latency and ultra-
high reliability, thus enabling innovative services across
different industry sectors [3]. 5G standards are currently
under development and will include the evolution of exist-
ing LTE and 5G New Radio (N ...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
The document discusses Internet of Things (IoT) and spectrum needs for IoT. It provides definitions of IoT from various organizations and describes key characteristics of IoT communications. It outlines the spectrum ranges used by different IoT technologies, both in licensed and unlicensed bands. It discusses spectrum needs for IoT based on application requirements and deployment scenarios. It also summarizes outcomes of WRC-15 related to identification of additional spectrum for mobile broadband and IMT, and issues to be studied at WRC-19 regarding spectrum needs for 5G and IMT-2020.
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
Among sensible goals of active and assisted living paradigm is the unobtrusive monitoring of daily living activities. A lot of research has been going on continuous home and personal monitoring applications. There are many solutions were adapted by these technologies to make better remote monitoring applications. The traditional continuous home and personal monitoring systems which are implemented with traditional client server architecture which may fail in factors like low power consumption, un deterministic data delivery time, More sensitive to external connectivity issues temporary failures of servers , adhoc networks using ZigBee and Z wave etc. and also increase the cost of implementation. However, when dealing with the home environment, and especially with older adults, obtrusiveness, usability, and cost concerns are of the utmost relevance for active and assisted Living AAL joint program. With advent of cloud services, the continuous remote monitoring based applications became truly plug and play' approach implementation and also reduce the problems of temporary failures. One of the biggest challenges in this area is to make such application devices work with low power battery based applications . The main drawback comes from the higher power consumption, inherently needed to sustain much higher data rates. In this project, a solution is proposed to improve the low power consumption in Wi Fi sensors by making use of advanced RF based Microprocessor from Texas instruments CC3200 . Bed Occupancy sensor automation has been designed and implemented to test the feasibility of the approach. The TI CC3200 comes with ARM Cortex M4 as a core and inbuilt Wi Fi subsystem. The CC3200 provides different power modes to make the device enter into sleep or hibernate mode. This device will only enter only in work phase when the sensor is active state. During this phase, the processor sample and processes the sensor data and uploads to the cloud using REST API. Thing speak is an IoT cloud service used to present the sensory data as graphs, bar charts, and dashboards on the cloud remaining time it will enter into sleep phase to save the power of the device, so that it will extend the battery life time of the device. B. N. Meenakshi | Mrs. N. V. Durga "An IOT Based Low Power Health Monitoring with Active Personal Assistance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29603.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/29603/an-iot-based-low-power-health-monitoring-with-active-personal-assistance/b-n-meenakshi
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
The document provides an overview of Internet of Things (IoT), including its definition, key challenges and applications. Some of the main points discussed include:
- IoT refers to the connection of physical devices, vehicles and other items embedded with sensors, software and network connectivity which enables these objects to collect and exchange data.
- Major challenges of IoT include networking issues, fragmentation due to different device standards, managing large amounts of data generated (big data), compatibility between different technologies, and security/privacy concerns.
- Applications of IoT discussed include wearable devices, healthcare monitoring, traffic management, fleet management, agriculture, hospitality, smart energy grids, water supply monitoring, and equipment maintenance.
-
Similar to Research, challenges and opportunities in software define radio technologies (20)
Because of the rapid growth in technology breakthroughs, including
multimedia and cell phones, Telugu character recognition (TCR) has recently
become a popular study area. It is still necessary to construct automated and
intelligent online TCR models, even if many studies have focused on offline
TCR models. The Telugu character dataset construction and validation using
an Inception and ResNet-based model are presented. The collection of 645
letters in the dataset includes 18 Achus, 38 Hallus, 35 Othulu, 34×16
Guninthamulu, and 10 Ankelu. The proposed technique aims to efficiently
recognize and identify distinctive Telugu characters online. This model's main
pre-processing steps to achieve its goals include normalization, smoothing,
and interpolation. Improved recognition performance can be attained by using
stochastic gradient descent (SGD) to optimize the model's hyperparameters.
Scientific workload execution on a distributed computing platform such as a
cloud environment is time-consuming and expensive. The scientific workload
has task dependencies with different service level agreement (SLA)
prerequisites at different levels. Existing workload scheduling (WS) designs
are not efficient in assuring SLA at the task level. Alongside, induces higher
costs as the majority of scheduling mechanisms reduce either time or energy.
In reducing, cost both energy and makespan must be optimized together for
allocating resources. No prior work has considered optimizing energy and
processing time together in meeting task level SLA requirements. This paper
presents task level energy and performance assurance-workload scheduling
(TLEPA-WS) algorithm for the distributed computing environment. The
TLEPA-WS guarantees energy minimization with the performance
requirement of the parallel application under a distributed computational
environment. Experiment results show a significant reduction in using energy
and makespan; thereby reducing the cost of workload execution in comparison
with various standard workload execution models.
Investigating human subjects is the goal of predicting human emotions in the
real world scenario. A significant number of psychological effects require
(feelings) to be produced, directly releasing human emotions. The
development of effect theory leads one to believe that one must be aware of
one's sentiments and emotions to forecast one's behavior. The proposed line
of inquiry focuses on developing a reliable model incorporating
neurophysiological data into actual feelings. Any change in emotional affect
will directly elicit a response in the body's physiological systems. This
approach is named after the notion of Gaussian mixture models (GMM). The
statistical reaction following data processing, quantitative findings on emotion
labels, and coincidental responses with training samples all directly impact the
outcomes that are accomplished. In terms of statistical parameters such as
population mean and standard deviation, the suggested method is evaluated
compared to a technique considered to be state-of-the-art. The proposed
system determines an individual's emotional state after a minimum of 6
iterative learning using the Gaussian expectation-maximization (GEM)
statistical model, in which the iterations tend to continue to zero error. Perhaps
each of these improves predictions while simultaneously increasing the
amount of value extracted.
Early diagnosis of cancers is a major requirement for patients and a
complicated job for the oncologist. If it is diagnosed early, it could have made
the patient more likely to live. For a few decades, fuzzy logic emerged as an
emphatic technique in the identification of diseases like different types of
cancers. The recognition of cancer diseases mostly operated with inexactness,
inaccuracy, and vagueness. This paper aims to design the fuzzy expert system
(FES) and its implementation for the detection of prostate cancer. Specifically,
prostate-specific antigen (PSA), prostate volume (PV), age, and percentage
free PSA (%FPSA) are used to determine prostate cancer risk (PCR), while
PCR serves as an output parameter. Mamdani fuzzy inference method is used
to calculate a range of PCR. The system provides a scale of risk of prostate
cancer and clears the path for the oncologist to determine whether their
patients need a biopsy. This system is fast as it requires minimum calculation
and hence comparatively less time which reduces mortality and morbidity and
is more reliable than other economic systems and can be frequently used by
doctors.
The biomedical profession has gained importance due to the rapid and accurate diagnosis of clinical patients using computer-aided diagnosis (CAD) tools.
The diagnosis and treatment of Alzheimer’s disease (AD) using complementary multimodalities can improve the quality of life and mental state of patients.
In this study, we integrated a lightweight custom convolutional neural network
(CNN) model and nature-inspired optimization techniques to enhance the performance, robustness, and stability of progress detection in AD. A multi-modal
fusion database approach was implemented, including positron emission tomography (PET) and magnetic resonance imaging (MRI) datasets, to create a fused
database. We compared the performance of custom and pre-trained deep learning models with and without optimization and found that employing natureinspired algorithms like the particle swarm optimization algorithm (PSO) algorithm significantly improved system performance. The proposed methodology,
which includes a fused multimodality database and optimization strategy, improved performance metrics such as training, validation, test accuracy, precision, and recall. Furthermore, PSO was found to improve the performance of
pre-trained models by 3-5% and custom models by up to 22%. Combining different medical imaging modalities improved the overall model performance by
2-5%. In conclusion, a customized lightweight CNN model and nature-inspired
optimization techniques can significantly enhance progress detection, leading to
better biomedical research and patient care.
Class imbalance is a pervasive issue in the field of disease classification from
medical images. It is necessary to balance out the class distribution while training a model. However, in the case of rare medical diseases, images from affected
patients are much harder to come by compared to images from non-affected
patients, resulting in unwanted class imbalance. Various processes of tackling
class imbalance issues have been explored so far, each having its fair share of
drawbacks. In this research, we propose an outlier detection based image classification technique which can handle even the most extreme case of class imbalance. We have utilized a dataset of malaria parasitized and uninfected cells. An
autoencoder model titled AnoMalNet is trained with only the uninfected cell images at the beginning and then used to classify both the affected and non-affected
cell images by thresholding a loss value. We have achieved an accuracy, precision, recall, and F1 score of 98.49%, 97.07%, 100%, and 98.52% respectively,
performing better than large deep learning models and other published works.
As our proposed approach can provide competitive results without needing the
disease-positive samples during training, it should prove to be useful in binary
disease classification on imbalanced datasets.
Recently, plant identification has become an active trend due to encouraging
results achieved in plant species detection and plant classification fields
among numerous available plants using deep learning methods. Therefore,
plant classification analysis is performed in this work to address the problem
of accurate plant species detection in the presence of multiple leaves together,
flowers, and noise. Thus, a convolutional neural network based deep feature
learning and classification (CNN-DFLC) model is designed to analyze
patterns of plant leaves and perform classification using generated finegrained feature weights. The proposed CNN-DFLC model precisely estimates
which the given image belongs to which plant species. Several layers and
blocks are utilized to design the proposed CNN-DFLC model. Fine-grained
feature weights are obtained using convolutional and pooling layers. The
obtained feature maps in training are utilized to predict labels and model
performance is tested on the Vietnam plant image (VPN-200) dataset. This
dataset consists of a total number of 20,000 images and testing results are
achieved in terms of classification accuracy, precision, recall, and other
performance metrics. The mean classification accuracy obtained using the
proposed CNN-DFLC model is 96.42% considering all 200 classes from the
VPN-200 dataset.
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
Internet of things (IoT) has become one of the eminent phenomena in human
life along with its collaboration with wireless sensor networks (WSNs), due
to enormous growth in the domain; there has been a demand to address the
various issues regarding it such as energy consumption, redundancy, and
overhead. Data aggregation (DA) is considered as the basic mechanism to
minimize the energy efficiency and communication overhead; however,
security plays an important role where node security is essential due to the
volatile nature of WSN. Thus, we design and develop proximate node aware
secure data aggregation (PNA-SDA). In the PNA-SDA mechanism, additional
data is used to secure the original data, and further information is shared with
the proximate node; moreover, further security is achieved by updating the
state each time. Moreover, the node that does not have updated information is
considered as the compromised node and discarded. PNA-SDA is evaluated
considering the different parameters like average energy consumption, and
average deceased node; also, comparative analysis is carried out with the
existing model in terms of throughput and correct packet identification.
Drones provide an alternative progression in protection submissions since
they are capable of conducting autonomous seismic investigations. Recent
advancement in unmanned aerial vehicle (UAV) communication is an internet
of a drone combined with 5G networks. Because of the quick utilization of
rapidly progressed registering frameworks besides 5G officialdoms, the
information from the user is consistently refreshed and pooled. Thus, safety
or confidentiality is vital among clients, and a proficient substantiation
methodology utilizing a vigorous sanctuary key. Conventional procedures
ensure a few restrictions however taking care of the assault arrangements in
information transmission over the internet of drones (IOD) environmental
frameworks. A unique hyperelliptical curve (HEC) cryptographically based
validation system is proposed to provide protected data facilities among
drones. The proposed method has been compared with the existing methods
in terms of packet loss rate, computational cost, and delay and thereby
provides better insight into efficient and secure communication. Finally, the
simulation results show that our strategy is efficient in both computation and
communication.
Monitoring behavior, numerous actions, or any such information is considered
as surveillance and is done for information gathering, influencing, managing,
or directing purposes. Citizens employ surveillance to safeguard their
communities. Governments do this for the purposes of intelligence collection,
including espionage, crime prevention, the defense of a method, a person, a
group, or an item; or the investigation of criminal activity. Using an internet
of things (IoT) rover, the area will be secured with better secrecy and
efficiency instead of humans, will provide an additional safety step. In this
paper, there is a discussion about an IoT rover for remote surveillance based
around a Raspberry Pi microprocessor which will be able to monitor a
closed/open space. This rover will allow safer survey operations and would
help to reduce the risks involved with it.
In a world where climate change looms large the spotlight often shines on
greenhouse gases, but the shadow of man-made aerosols should not be
underestimated. These tiny particles play a pivotal role in disrupting Earth's
radiative equilibrium, yet many mysteries surround their influence on various
physical aspects of our planet. The root of these mysteries lies in the limited
data we have on aerosol sources, formation processes, conversion dynamics,
and collection methods. Aerosols, composed of particulate matter (PM),
sulfates, and nitrates, hold significant sway across the hemisphere. Accurate
measurement demands the refinement of in-situ, satellite, and ground-based
techniques. As aerosols interact intricately with the environment, their full
impact remains an enigma. Enter a groundbreaking study in Morocco that
dared to compare an internet of thing (IoT) system with satellite-based
atmospheric models, with a focus on fine particles below 10 and 2.5
micrometers in diameter. The initial results, particularly in regions abundant
with extraction pits, shed light on the IoT system's potential to decode
aerosols' role in the grand narrative of climate change. These findings inspire
hope as we confront the formidable global challenge of climate change.
The use of technology has a significant impact to reduce the consequences of
accidents. Sensors, small components that detect interactions experienced by
various components, play a crucial role in this regard. This study focuses on
how the MPU6050 sensor module can be used to detect the movement of
people who are falling, defined as the inability of the lower body, including
the hips and feet, to support the body effectively. An airbag system is
proposed to reduce the impact of a fall. The data processing method in this
study involves the use of a threshold value to identify falling motion. The
results of the study have identified a threshold value for falling motion,
including an acceleration relative (AR) value of less than or equal to 0.38 g,
an angle slope of more than or equal to 40 degrees, and an angular velocity
of more than or equal to 30 °/s. The airbag system is designed to inflate
faster than the time of impact, with a gas flow rate of 0.04876 m3
/s and an
inflating time of 0.05 s. The overall system has a specificity value of 100%,
a sensitivity of 85%, and an accuracy of 94%.
The fundamental principle of the paper is that the soil moisture sensor obtains
the moisture content level of the soil sample. The water pump is automatically
activated if the moisture content is insufficient, which causes water to flow
into the soil. The water pump is immediately turned off when the moisture
content is high enough. Smart home, smart city, smart transportation, and
smart farming are just a few of the new intelligent ideas that internet of things
(IoT) includes. The goal of this method is to increase productivity and
decrease manual labour among farmers. In this paper, we present a system for
monitoring and regulating water flow that employs a soil moisture sensor to
keep track of soil moisture content as well as the land’s water level to keep
track of and regulate the amount of water supplied to the plant. The device
also includes an automated led lighting system.
In order to provide sensing services to low-powered IoT devices, wireless sensor networks (WSNs) organize specialized transducers into networks. Energy usage is one of the most important design concerns in WSN because it is very hard to replace or recharge the batteries in sensor nodes. For an energy-constrained network, the clustering technique is crucial in preserving battery life. By strategically selecting a cluster head (CH), a network's load can be balanced, resulting in decreased energy usage and extended system life. Although clustering has been predominantly used in the literature, the concept of chain-based clustering has not yet been explored. As a result, in this paper, we employ a chain-based clustering architecture for data dissemination in the network. Furthermore, for CH selection, we employ the coati optimisation algorithm, which was recently proposed and has demonstrated significant improvement over other optimization algorithms. In this method, the parameters considered for selecting the CH are energy, node density, distance, and the network’s average energy. The simulation results show tremendous improvement over the competitive cluster-based routing algorithms in the context of network lifetime, stability period (first node dead), transmission rate, and the network's power reserves.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
Today, health monitoring relies heavily on technological advancements. This
study proposes a low-power wide-area network (LPWAN) based, multinodal
health monitoring system to monitor vital physiological data. The suggested
system consists of two nodes, an indoor node, and an outdoor node, and the
nodes communicate via long range (LoRa) transceivers. Outdoor nodes use an
MPU6050 module, heart rate, oxygen pulse, temperature, and skin resistance
sensors and transmit sensed values to the indoor node. We transferred the data
received by the master node to the cloud using the Adafruit cloud service. The
system can operate with a coverage of 4.5 km, where the optimal distance
between outdoor sensor nodes and the indoor master node is 4 km. To further
predict fall detection, various machine learning classification techniques have
been applied. Upon comparing various classifier techniques, the decision tree
method achieved an accuracy of 0.99864 with a training and testing ratio of
70:30. By developing accurate prediction models, we can identify high-risk
individuals and implement preventative measures to reduce the likelihood of
a fall occurring. Remote monitoring of the health and physical status of elderly
people has proven to be the most beneficial application of this technology.
The effectiveness of adaptive filters are mainly dependent on the design
techniques and the algorithm of adaptation. The most common adaptation
technique used is least mean square (LMS) due its computational simplicity.
The application depends on the adaptive filter configuration used and are well
known for system identification and real time applications. In this work, a
modified delayed μ-law proportionate normalized least mean square
(DMPNLMS) algorithm has been proposed. It is the improvised version of the
µ-law proportionate normalized least mean square (MPNLMS) algorithm.
The algorithm is realized using Ladner-Fischer type of parallel prefix
logarithmic adder to reduce the silicon area. The simulation and
implementation of very large-scale integration (VLSI) architecture are done
using MATLAB, Vivado suite and complementary metal–oxide–
semiconductor (CMOS) 90 nm technology node using Cadence RTL and
Genus Compiler respectively. The DMPNLMS method exhibits a reduction
in mean square error, a higher rate of convergence, and more stability. The
synthesis results demonstrate that it is area and delay effective, making it
practical for applications where a faster operating speed is required.
The increasing demand for faster, robust, and efficient device development of enabling technology to mass production of industrial research in circuit design deals with challenges like size, efficiency, power, and scalability. This paper, presents a design and analysis of low power high speed full adder using negative capacitance field effecting transistors. A comprehensive study is performed with adiabatic logic and reversable logic. The performance of full adder is studied with metal oxide field effect transistor (MOSFET) and negative capacitance field effecting (NCFET). The NCFET based full adder offers a low power and high speed compared with conventional MOSFET. The complete design and analysis are performed using cadence virtuoso. The adiabatic logic offering low delay of 0.023 ns and reversable logic is offering low power of 7.19 mw.
The global agriculture system faces significant challenges in meeting the
growing demand for food production, particularly given projections that the
world's population will reach 70% by 2050. Hydroponic farming is an
increasingly popular technique in this field, offering a promising solution to
these challenges. This paper will present the improvement of the current
traditional hydroponic method by providing a system that can be used to
monitor and control the important element in order to help the plant grow up
smoothly. This proposed system is quite efficient and user-friendly that can
be used by anyone. This is a combination of a traditional hydroponic system,
an automatic control system and a smartphone. The primary objective is to
develop a smart system capable of monitoring and controlling potential
hydrogen (pH) levels, a key factor that affects hydroponic plant growth.
Ultimately, this paper offers an alternative approach to address the challenges
of the existing agricultural system and promote the production of clean,
disease-free, and healthy food for a better future.
More from International Journal of Reconfigurable and Embedded Systems (20)
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A review on techniques and modelling methodologies used for checking electrom...
Research, challenges and opportunities in software define radio technologies
1. International Journal of Reconfigurable and Embedded Systems (IJRES)
Vol. 12, No. 2, July 2023, pp. 260~268
ISSN: 2089-4864, DOI: 10.11591/ijres.v12.i2.pp260-268 260
Journal homepage: http://ijres.iaescore.com
Research, challenges and opportunities in software define radio
technologies
Jacob Abraham1
, Kanagaraj Venusamy2
, Antony Judice3
, Joel Livin A. Obtained3
, Hameed Shaik3
,
Kannadhasan Suriyan4
1
Department of Electronics, Baselios Poulose II Catholicos College, Piravom, India
2
Department of Mechatronics, Rajalakshmi Engineering College, Thandalam, India
3
Department of Engineering, University of Technology and Applied Sciences, Ibri, Oman
4
Department of Electronics and Communication Engineering, Study World College of Engineering, Coimbatore, India
Article Info ABSTRACT
Article history:
Received Aug 18, 2022
Revised Oct 15, 2022
Accepted Dec18, 2022
The network extended not just internationally but also throughout a broad
variety of application areas in this age, with healthcare being one of the most
well-known and vital industries. Improvements in healthcare are possible if
we start using the popular internet of things (IoT) technology as a key
instead of focusing on other disciplines. Wireless body area network
(WBAN) is a field in which we communicate with a network of human
people and medical equipment that may be used in conjunction with internet
of things technology to perform any function. Additional features for
software defined networks will be added in the future. In the event of a
critical crisis, the suggested suggestions will be to take care of the patient's
life. Because the fitted equipment keeps a lot better eye on the patient than
previously advised methods. This study combines WBAN, IoT, and software
defined network (SDN) to make sense in the healthcare field.
Keywords:
Internet of things
Radar
Software defined network
Sonar
Wireless body area network
This is an open access article under the CC BY-SA license.
Corresponding Author:
Jacob Abraham
Department of Electronics, Baselios Poulose II Catholicos College
Piravom, Eranakulam, Kerala, India
Email: tjacobabra@gmail.com
1. INTRODUCTION
In addition to people, machines, and things, the next generation of mobile radio systems is
anticipated to provide wireless connection for a broad variety of new applications and services. the internet of
things (IoT), a unified ecosystem, will be created in the coming years when hundreds of billions of
inexpensive, low-complexity devices and sensors are linked to the network internet of things. As a
consequence, the 3rd generation partnership project (3GPP) will standardise narrowband-IoT (NB-IoT) in
2016, a brand-new narrowband radio technology created just for the IoT. In addition to assuring harmonious
coexistence with current general packet radio service (GPRS), global system for mobile (GSM) and long-
term evolution (LTE) systems, this new radio interface strives for huge connectivity, decreased UE
complexity, coverage expansion, and deployment flexibility. Recent years have seen a major revolution in
radio systems engineering due to the use of open-source software and software defined radio (SDR)
technologies. To analyse, evaluate, and test new wireless network technologies, researchers may utilise these
systems as a testbed for experiments and prototype development. The purpose of this thesis (OAI) is to
develop the NB-IoT stack of protocols on the EURECOM open-source software platform. The primary goal
of the mission's first phase is to link OAI with NB-radio IoT's resources control capabilities. New radio
resource configuration (RRC) levels coding structure, interfaces, and a cutting-edge technique for managing
signaling radio bearers are shown once the platform architecture has been described. After a detailed analysis
2. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Research, challenges and opportunities in software define radio technologies (Jacob Abraham)
261
of system information scheduling, a sub frame-based sending approach is suggested. The last section of this
thesis examines how to develop a multi-vendor platform interface using the small cell forum's functional
application platform interface (FAPI) standard. Between the medium access control (MAC) and design of
physical (PHY) layers of OAI, there is a programmable and dynamically loadable interface module (IF-
Module). Primitives and related code structures are defined, along with data and configuration actions. The
convergence of NB-IoT and FAPI standards [1]-[5] necessitates redesigning physical layer techniques and
creating a downlink transmission system.
Businesses and academia are both interested in the fast developing IoT platform. By 2020, it's
predicted that 50 billion devices will be connected to the internet, up from the current estimated 15 billion.
Resource allocation, data flows, and authentication in the IoT network are all problems because of the
enormous amount of data that these IoT devices create. As an alternate approach to address IoT issues,
functionality and centralised control are being studied. A software defined network (SDN), on the other hand,
offers centralised and customised network administration while needing no modifications to the current
network architecture. The combination of IoT and SDN is examined in this article. For the years 2010–2016,
a thorough assessment and general solutions are provided for the different communication domains. Along
with current research trends and contributing factors from the future, the paper also provides a critical
examination of IoT and SDN technologies. An easy-to-understand picture of the changing patterns may be
obtained by comparing the various SDN-based IoT deployment choices. The study concludes by making
prognoses for the future and providing a qualitative evaluation of the state of the globe in 2020.
Exciting possibilities for linking physical items already exist because to technological advancements
and telecommunications infrastructure. Wide area networks (WANs), actuator, mobile, embedded devices,
and even cross-infrastructure linkages are all emerging as new connectivity options. Device-to-device (D2D),
machine-to-machine (M2M), vehicle-to-vehicle (V2V), and so forth. In addition, it is claimed that these
gadgets will be web-connected, leading to the IoT or, used more broadly, the internet of everything (IoE) [6]-
[10]. In a linked world, IoT devices include wireless devices, radio frequency identification (RFID) devices,
actuators, and network gadgets. A new sort of connection called the IoT allows a smart environment. By
changing the way we think about interacting with an object in our surroundings, it enhances our quality of
life. Due to the enormous amount of data created, IoT is lacking in automation, speed, safety, and
information management. The utilisation of programmability and centralised control in IoT administration is
expected to be advantageous to customers. The high-level implementation of low-level forwarding devices is
hidden by SDN's separation of the control plane and data plane. We examined the possibilities for
incorporating SDN control plane into IoT networks in this article. In this article, we first looked at the current
state of IoT management based on SDN centralised control plane in various IoT contributors, summarising
architectural details and development, and then we went into detail about the remaining challenges in this
merger and provided some global forecasts for 2020.
2. SOFTWARE DEFINED RADIO NETWORK
Wireless body area networks (WBANs) have taken a lot of interest from academics and industry. A
WBAN is a network specialised to collecting individual biological data through sensors and transmitting
healthcare-related instructions to certain sorts of actuators for health-related goals. Even yet, there are a
variety of proprietary designs, which might lead to skewed results. This study investigates the function of
SDR in a WBAN system for in and out patient monitoring, as well as explaining the value of SDR in
WBANs to health professionals.
The reliance on hardware in all wireless networks is a source of worry, since it restricts
reprogramming and reconfiguration options. There is usually no way to address system vulnerabilities if a
mistake occurs in the equipment, firmware, or software. SDR eliminates a variety of fixed-hardware issues
while also providing additional advantages. There are increasing medical sector dynamism and net
convergence as a result of the SDR, according to stake-holders. Through rearrangements of modules,
updating, and elasticity, the SDR paradigm may give creativity to the compatibility of medical subsystem.
The IoT relies on radio frequency (RF) technologies to achieve its long-range, low-power capabilities. IoT is
changing for the better with the introduction of 5G RF technology, however some may find it challenging to
take advantage of the newest and finest. RF communication is at the heart of the internet of things [11]-[15]. 5G
RF technologies in IoT are fast evolving to unite high bandwidth, low latency, and long-range applications,
and we may anticipate to witness their disruptive implications on a variety of sectors in the near future! In the
meanwhile, current technologies and protocols like as long range (LoRa) and LoRaWAN enable IoT devices
to transmit data over great distances, although at reduced bandwidths.
The internet of things in agriculture allows for the optimization of agricultural production through
precision farming, which involves the careful monitoring and control of a variety of environmental
3. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 2, July 2023: 260-268
262
conditions, including temperature, light levels, atmospheric composition, and water usage. Other agricultural
uses may include asset monitoring and smart irrigation, allowing for the management of vast swaths of
agriculture from a single location. Precision farming, such as monitoring the status of individual animals in
real time, may now be done on a far bigger scale because to the high speeds provided by 5G. By
incorporating IoT into traffic lights, street lighting, and trash management, smart cities offer a larger, more
connected cyber physical environment in which to live. This enables data-driven choices to be made to
improve operations and save expenses, such as the environmental consequences of idle traffic. The
interconnection of smart cities will become more common than ever before with 5G as a standard for
wireless communication across mobile phones, PCs, and IoT devices!
With 5G RF technology enabling reduced latency transmission, remote robotics is no longer a pipe
dream. 5G will allow robotic surgery in the healthcare industry by offering high-quality video streaming and
real-time control. Remote control robots, from the other hand, will make infrastructure and rescue operations
safer in hazardous large factories or conflict zones. Rise of the IoT and industrial internet of things (IIoT) a
wave of innovation is trying to sweep the marketplace, linking an eco-system of sensing devices, gadgets,
and machinery to a network that guarantees to endorse resource utilization, operational efficiencies, and
productivity. The number of linked "things" is expected to approach 25 billion by 2020, presenting a
potential to change how enterprises are run. Gateways, sensors, infrastructure, and some of the parts of the
IoT ecosystem, big data and analytics are shown in Figure 1. The simplest way to summarise it was said by a
speaker at a recent IoT conference: "Big Data will be Big!". It is important to note modelling of
substantiating data analytics, whether this resides in the cloud or at the edge, companies can quickly make a
diagnosis and troubleshooting not just to one‘s smart sensors from the proactive maintenance point of view,
but also their operations.
While the ecosystem may be hardwired, most people choose a mixed approach. WSN and most
network architectures are accessible via speeded broadband connections. Despite the fact that RF technology
is a part of our daily life and has been used in some of the toughest environments for decades in the context
of IIoT, many people still see wireless technology as creative. The goal of this article is to demystify the
issue by showing how the same essential ideas apply independent of the RF technology used in IoT
installations.
Figure 1. SDN network based wireless sensor networks
Wireless IoT devices may last for years and can be placed almost anywhere. New applications may
need the usage of these devices in very challenging RF environments. For example, smart meters located in
basements must be able to withstand difficult coverage circumstances. Factory-floor robots must contend
with extreme radio circumstances while maintaining dependable, low-latency connectivity. Other devices,
such as linked mousetraps or parking lot sensors, must be very durable and waterproof, which makes the
entire RF design difficult. The wireless connection performance of IoT devices is a critical aspect in the
success of IoT applications. Otherwise, crucial performance characteristics like dependability, power
consumption, latency, and coverage may suffer [16]-[20]. Routing protocol for low-power and lossy
networks (RPL) was developed by the internet engineering task force (IETF) as a routing architecture for the
IoT. RPL allows for one-to-many, many-to-many, and many-to-one communication. According to recent
research, RPL performs badly in many-to-many and one-to-many communications because of the higher
control cost involved with finding many-to-many and one-to-many forwarding channels, as well as its non-
storing manner of operation (MoP). We provide an internet of things routing framework (IoT-RF) in this
4. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Research, challenges and opportunities in software define radio technologies (Jacob Abraham)
263
paper that enables many-to-one, many-to-many, and one-to-many communications. To overcome the
memory constraints of the storage MoP, the framework collaborates with it and suggests a network of
gateways. Two protocols are included in the framework for locating many-to-many and one-to-many
forwarding channels, respectively. One of the recommended protocols finds many-to-many and one-to-many
forwarding connections using many-to-one communication; as a result, the protocol doesn't have any
additional control overhead. Using empty control messages, the other protocol looks for many-to-many and
one-to-many forwarding paths. IoT-RF was mostly developed using Contiki OS. Comparing "IoT-RF to a de
facto IoT routing system" is achievable using Cooja-based emulation testing. In terms of packet delivery
ratio, end-to-end packet delivery delay, and control overhead in many-to-one, many-to-many, and one-to-
many communications, our IoT-RF significantly surpasses the de facto routing design, according to our
results. The proof-of-concept was built on a small number of 8-channel private mobile radio use-cases.
Every radio has the capacity to perform a variety of useful activities for the user and network due to
the intricacy of radio communication at this stage. It may also aid in reducing spectrum congestion. A perfect
software-defined radio, or cognitive radio in a broader sense, would include all the advantages of software
defined radio with artificial intelligence (AI) by adopting advantageous wavelengths and waveform to reduce
and minimise interference with current radio communication systems. The work that is being presented is
based on spectrum sensing and is backed by simulation findings. Spectrum sensing is carried out using a
matching filter. A high-performance SDR that is seamlessly connected with state-of-the-art deep learning
hardware is called the deepwave digital artificial intelligence radio-transceiver (AIR-T). This RF module
combines a fast USB 3.0 connection with the AD9371 RFIC transmitter and a reprogrammable Xilinx 7
field-programmable gate array (FPGA). A continuous frequency coverage range of 300 MHz to 6 GHz is
provided by the AIR-T module. One RF module houses the three digital processors (FPGA, graphics
processing unit (GPU), and central processing unit (CPU)). The AIR-T module has a Mini-ITX form factor
and uses 22 W of power to operate. A new "AIR-T Edge" series product from deepwave digital is the
AIR8201. The AIR8201 AIR-T is superior to the AIR8201 in that it has a sturdy case, more receive gain,
better noise figure, a global positioning system (GPS) controlled oscillator, and a broader frequency range.
The AIR8201 increases the AIR-versatility T's by making it possible to use an industrial SDR for edge data
processing, adaptive communications, spectrum management, and "signals intelligence."
3. CHALLENGES OF SOFTWARE DEFINED RADIO
The use of waveforms for communications, both military and commercial, has established SDR as
the de facto industry standard during the last 30 years. At that time, the need to fully realise waveforms in
software running on "general purpose processors (GPPs)" had to be balanced against "size, weight, and
power (SWaP)" limitations. As a result, compute-intensive portions of the waveform software had to be run
on hardware like "field programmable gate arrays (FPGAs)" or "hardened IP accelerators." Recently,
research activities in AI and machine learning (ML) have become more widespread across the world. A new
desire for ML/AI approaches to be fully implemented in software has emerged with the advent of open
source machine learning frameworks like PyTorch and TensorFlow. This need must be balanced against
SWaP restrictions, particularly for inference at the edge. Fortunately, this problem's solution has been
significantly influenced by technological advancements in both the semiconductor and tool sectors. The
"adaptive compute acceleration platform," a novel kind of heterogeneous processor, will be discussed in this
session.
Standard RGB cameras combine the number of pixels to produce RGB colour, therefore three
separate cameras with varying band pass filters that allow just the necessary colour signal to penetrate the
sensor are needed to represent each colour in each pixel separately. The most challenging part of constructing
such a system is calibrating the cameras and creating a platform that can read data from several sensors and
aggregate the outcomes. The CubeSat's short access time and slow data transfer speed are its other issues. In
addition, the CubeSat's quick speed results in noisy photographs and fuzzy photos. Additionally, in certain
cases when it is overcast, the captured images only include clouds. Consequently, it is desirable to have an
intelligent system that can classify photographs as worthwhile for downlink or not utilising machine learning
methods. Images with value are crystal clear, blur-free, and cloud-free.
SDR is a transceiver that can be programmed to execute a number of wireless communication
protocols without needing to make any hardware upgrades or adjustments. With a stronger emphasis on
programmability, flexibility, portability, and energy efficiency, advancements in the SDR industry have led
to a surge in protocol development and a wide variety of applications in cellular, WiFi, and M2M
communication. As a consequence, SDR has garnered a lot of attention and is significant for both academia
and business. SDR's creators want to simplify the implementation of communication protocols while
enabling academics to test concepts on operational networks. This paper provides an overview of the most
5. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 2, July 2023: 260-268
264
recent state-of-the-art SDR systems in the context of wireless communication protocols. Our discussion of
significant design trends and development tools is immediately followed by a study of the SDR architecture
and its key elements. We also employ a set of measurements to show how there are significant disparities in
the energy, computing power, and physical space used by different SDR systems. We also examine existing
SDR systems and provide a comparative analysis for programmers to utilise. We next list a few pertinent
study areas and provide a description of potential solutions. We provided an in-depth analysis of the various
design methodologies and hardware frameworks utilised in SDR systems. Examples of this include co-
design, GPPs, GPUs, digital signal processors (DSPs), and FPGAs. We went through the basic architectural
types, their advantages, and disadvantages. It was required to compare them based on their processing speed
and energy efficiency because to the variances in design methods. The most important previous and present
SDR systems were then reviewed, whether they were developed by business or by academia. In our last
discussion, we covered some of the research issues and topics that are anticipated to advance SDRs and gain
mainstream adoption in the near future. We predict that SDR solutions will become commonplace and that
their high levels of adaptability and programmability to a wide range of wireless communication protocols
will become the standard. This article explores this phenomenon in detail, as well as its supporting
technology, applications, and continuing study, from a variety of angles.
The separation of forwarding and control functions is a feature of the relatively new SDN
communication network concept. The network's intelligence is moved to an SDN controller that is
conceptually centrally placed. This controller communicates with data-plane devices, maintains a broad view
of the network, and provides a programming interface for network management applications. The potential of
this idea may be seen in the possibility of traffic engineering and resource management being carried out
more successfully in a centralised system with insight into application demands and all available resources.
SDN and fog computing are used in the recommended IoT architecture to support applications that need
mobility and low latency. Despite the fact that these technologies' benefits have received widespread
recognition in the scientific community, there are still a number of barriers preventing their widespread use.
This study's objective is to demonstrate how SDN and fog computing may be successfully paired to
overcome each other's weaknesses.
The proposed IoT architecture aims to solve the fog orchestration with SDN problem as well as the
SDN scalability problems with fog computing. To address current agricultural challenges, such as the need to
strike a balance between output and environmental concerns, precision agriculture leverages contemporary
information and communication technologies. The applications of this scenario are made feasible by ad-hoc
wireless sensor and actuator networks (WSANs), which are used to measure/monitor certain environmental
parameters and impose control decisions. The Cloud application uses the data gathered by the sensor nodes to
make intelligent control decisions that should lead to better and more crops by ensuring that water,
herbicides, and fertilisers are administered properly. With a fog node installed at the network edge, the local
application instance may instantly understand the data gathered, control the measurement process, the
stability and oscillatory behaviours, and transmit commands to actuators (such as irrigation valves). The fog
programme has the option of removing unnecessary data packets and sending the combined data to the cloud
for long-term analysis. One of the apps that might be utilised on the fog node is a local SDN controller. The
automated configuration of WSNs and best feasible management of energy-limited sensor nodes with
constrained communication capabilities would be the responsibility of this initiative [21]-[25].
To overcome these limitations in traditional networks, a novel concept known as SDN has been
created. Network control may now be separated from traditional hardware devices thanks to the new network
architecture known as SDN. Because of this, the main objective of the SDN is to separate the control plane
from the data plane, which contains the forwarding devices. As a result, depending on the requirements of the
individual application, suitable control logic for physical devices may be constructed in real-time.
Infrastructure, control, and application are the three primary categories that make up SDN. SDN includes a
number of application programming interfaces (APIs), including northbound, southbound, eastbound, and
westbound. The application layer and the control layer are linked via the northbound API, enabling
communication between them. Through the northbound API, the network's abstracted image is also made
available to the application layer. The southbound API is responsible for bridging the gap between the
control and infrastructure layers by enabling controllers to install different rules in forwarding devices like
routers and switches and for enabling those devices to communicate with the controller in real time. In order
for different controllers to make decisions together, the eastbound and westbound APIs are responsible for
bridging the gap between them. OpenFlow is the most used protocol for facilitating communication across
the control and data planes. The IoT is a quickly developing technology that enables diverse objects, such as
sensor nodes, embedded systems, and intermediate devices, to collect and exchange data in order to realise
the objectives of a fully interconnected world in the near future. For real-time applications like smart energy,
intelligent transportation, and smart health care, an IoT architecture is often made up of several sensor and
6. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Research, challenges and opportunities in software define radio technologies (Jacob Abraham)
265
RFID nodes that form large-scale distributed embedded systems. Even while devices are capable of
performing many jobs, traditional network systems' preset programmed nature forbids them from doing so. It
is important to virtualize device functionality and update it in real time as a consequence. Network function
virtualization (NFV) is a newly developed concept that allows devices to execute a variety of tasks while
modifying their functionality in real time depending on application-specific requirements. The separation of
the control plane from the physical devices from the perspective of SDN makes NFV for internet service
providers easier. The usefulness of a network may be decreased by under- or overusing its resources and
reducing its performance. Effective mapping of users' requests is thus crucial for increased resource
efficiency and network utility. The improved use of network resources in SDN is made possible by flow-rule-
based traffic forwarding. Because of the SDN controller's flow-rules, requests from different users may be
forwarded along the desired path.
To manage the enormous quantity of data collected from billions of devices, IoT will need a
significant number of data centres. As a consequence, data centres will use enormous quantities of electricity.
Smart energy management technologies are thus necessary for energy-efficient data centre networking. In
SDN-based data centre networking, traffic may be efficiently directed to the right servers. As a consequence,
energy-efficient data centre networking is possible since the devices in the data centre may be switched on
and off dynamically depending on the demands. A network of IoT devices could find use for this
functionality. Finally, the security of the devices and network is required in order to support several devices,
vendors, and users on a single platform. For instance, a number of gadgets are connected to a certain service
provider. The only person who should be able to control such devices is the particular service provider. Other
service providers should not be able to access the data generated by the devices even if they have access to
the data. Consumers in an IoT network are fundamentally concerned about privacy at the same time. The
privacy of customers may be violated since multiple authorities may have access to information about who is
doing what due to the integration of many devices into a single platform. Therefore, in order to safeguard
users' privacy when integrating diverse devices into a unified platform, researchers must take into
consideration such eventualities. The security and privacy of network traffic are enhanced by SDN's fine-
grained flow control. Giving an RF to IoT SDRs is the first technology hurdle in realising the concept since
smartphones do not directly link any of their radio front ends to the application processors. The availability of
a plug-in RF module has not changed despite the fact that smartphone manufacturers began promoting
swappable plug-in hardware modules in 2016. So, in order to demonstrate the principle, we connect a
smartphone to an external RF. For connecting to the external RF, the only wired interface available on
modern smartphones is the universal serial bus (USB) interface. It's not intended to be a preferred
configuration, only a workaround that comes the closest to the alternative design we provide. The external
RF is only used for analogue signal processing, such as frequency up/down-sampling and "analog-digital and
digital/analog conversion (ADC/DAC)", not for digital signal processing. All baseband signal processing for
the physical layer is carried out by the SDR running on the application processors, with continuous coverage
from 70 MHz to 6 GHz. The smartphone may act as a host for the USRP device by using USB on-the-go
(OTG), which is another option. Unfortunately, while utilising an OTG connection, mobile phones only
support USB 2.0, although other devices can use USB 3.0. It limits USB bandwidth to a maximum of 32
MB/s despite USB 2.0 having a maximum raw throughput of 480 Mb/s because of overheads.
The internet of things is becoming more approachable because to the cloud-based IoT service
prototype known as "sensing as a service (SaS)". In order to meet the demands, it may also make it easier for
the efficient transmission of sensor data to different stakeholders on demand via a data stream. The IoT
consists of readily identifiable, digitally networked objects or smart devices that can recognise, process, and
interact with events. A smart device application based on the IoT domain (ecosystem) may be created by
merging the services of smart devices. To perform IoT-related tasks, smart device sensors are used. As they
roam about their deployment area, these sensors gather data. Data distribution and collection are managed by
the cloud, and data collectors or sensors obtain the necessary information via a pay-as-you-go IoT
application. In order to enhance prediction services' accuracy and optimise network operations for effective
automation, real-time data acquired from sensor devices is monetized and transformed into new data streams.
The key components of the sensing model need efficient search methodologies and effective sensing
algorithms in order to provide the sensing service.
A part of the IoTs called sensing is the process of obtaining information from smart devices linked
to a network. The IoT era is characterised by connectivity, and APIs enable users to connect to one another
and combine services. The analysis, organisation, use, and acquisition of data remain the most pressing
concerns for the IoT. The various approaches in the literature reveal that IoT and cloud have a number of
complementary properties, and there is a need to organise and construct IoT such that these systems may
benefit from the nearly endless capabilities that cloud computing can provide, for example, to compensate for
smart device technological limitations (storage, computation, and energy consumption). The cloud may serve
as a temporary layer between IoT devices and apps so that resources are appropriately managed.
7. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 2, July 2023: 260-268
266
4. CONCLUSION
Several sensors are connected to the internet through the IoT, a current hot technology that enables
effective and appealing asset management in a smart environment (viz., Smart Home, and Smart city).
Platforms, infrastructures, and programming tools are offered as services using cloud technology. Using the
IoT's global resources, SaS is a kind of advanced distributed computing that enables the creation of a shared
sensor network that can be used as a service. These services are available for usage by businesses and
developers, providing users the opportunity to monetise their data using existing infrastructure. Additionally, the
SaS paradigm concept has to be looked at and analysed in light of IoT technology. The main objective is to
examine the innovative, social, technological, and ideological merits of the SaS paradigm. In this in-depth
survey, we look at different sensing framework paradigms and give a comprehensive overview of the various
difficulties and problems that come up when creating the ideal framework that satisfies the needs of all the
stakeholders (users, developers, operators, and organisations) in the most effective way possible.
REFERENCES
[1] A. S. Joy and R. Ravi, “Smart card authentication model based on elliptic curve cryptography in IoT networks,” International
Journal of Electronic Security and Digital Forensics, vol. 13, no. 5, pp. 548-569, 2021, doi: 10.1504/IJESDF.2021.117314.
[2] A.-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: a survey on enabling technologies,
protocols, and applications,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015, doi:
10.1109/COMST.2015.2444095.
[3] “The working group setting the standards for wireless LANs,” IEEE 802.11, [Online]. Available: http://www.ieee802.org/11.
[4] “3GPP - Release 16,” 3GPP, [Online]. Available: http://www.3gpp.org/release-16
[5] M. Bansal, J. Mehlman, S. Katti, and P. Levis, “OpenRadio,” in Proceedings of the first workshop on Hot topics in software
defined networks - HotSDN ’12, New York, USA, 2012, doi: 10.1145/2342441.2342464.
[6] T. Kempf, E. M. Witte, V. Ramakrishnan, G. Ascheid, M. Adrat, and M. Antweiler, “A practical view on SDR baseband
processing portability,” in Proceedings of the SDR ’08 Technical Conference and product Exposition, Oct. 2008
[7] Y. Zhang, S. Dyer and N. Bulat, “Strategies and insights into SCA-compliant waveform application development,” MILCOM
2006 - 2006 IEEE Military Communications conference, Washington, DC, USA, 2006, pp. 1-7, doi:
10.1109/MILCOM.2006.302287.
[8] B. Paillassa and C. Morlet, “Flexible satellites: software radio in the sky,” 10th International Conference on Telecommunications,
2003, Papeete, France, 2003, pp. 1596-1600 vol.2, doi: 10.1109/ICTEL.2003.1191672.
[9] P. Angeletti, R. D. Gaudenzi, M. Lisi, I. Introduction, S. Division, and C. Scientist, “From bent pipes to software defined
payloads: evolution and trends of satellite communications systems,” In 26th International Communications Satellite Systems
Conference (ICSSC), 2008, doi: 10.2514/6.2008-5439.
[10] P. Angeletti, M. Lisi, and P. Tognolatti, “Software defined radio: a key technology for flexibility and reconfigurability in space
applications,” in 2014 IEEE Metrology for Aerospace (MetroAeroSpace), pp. 399–403, 2014, doi:
10.1109/MetroAeroSpace.2014.6865957.
[11] J. Seo et al., “A real-time capable software-defined receiver using GPU for adaptive anti-jam GPS sensors,” Sensors (Basel,
Switzerland), vol. 11, no. 9, pp. 8966–91, 2011, doi: 10.3390/s110908966.
[12] C. Bhuvaneshwari and A Manjunathan, “Reimbursement of sensor nodes and path optimization,” Materials Today: Proceedings,
vol. 45, 2021, pp. 1547-1551, doi: 10.1016/j.matpr.2020.08.193.
[13] P. J. Balister, C. Dietrich, and J. H. Reed, “Memory usage of a software communication architecture waveform,” in 2007
Software Defined Radio Technical Conf. Product Exposition, Nov. 2007.
[14] S. Kannadhasan, G. KarthiKeyan and V. Sethupathi, “A graph theory based energy efficient clustering techniques in wireless
sensor networks,” 2013 IEEE Conference on Information & Communication Technologies, Thuckalay, India, 2013, pp. 151-155,
doi: 10.1109/CICT.2013.6558080.
[15] S. Surya and R. Ravi, "concoction node fault discovery (CNFD) on wireless sensor network using the neighborhood density
estimation in SHM," Wireless Personal Communication, vol. 113, no. 4, pp. 2723-2746, 2020, doi: 10.1007/s11277-020-07623-5.
[16] S. E. Raja and R. Ravi, “A performance analysis of software defined network based prevention on phishing attack in cyberspace
using a deep machine learning with CANTINA approach (DMLCA),” Computer communications, Elseiver, vol. 153, no. 1,
pp. 375-381, 2020, doi: 10.1016/j.comcom.2019.11.047.
[17] W. G. Scanlon and N. E. Evans, “Numerical analysis of bodyworn UHF antenna systems,” in Electronics and Communication
Engineering Journal, vol. 13, no. 2, pp. 53-64, 2001, doi: 10.1049/ecej:20010203.
[18] P. Boilot et al., “Classification of bacteria responsible for ENT and eye infections using the cyranose system,” in IEEE Sensors
Journal, vol. 2, no. 3, pp. 247-253, 2002, doi: 10.1109/JSEN.2002.800680.
[19] S. Arnon, D. Bhastekar, D. Kedar, and A. Tauber, “A comparative study of wireless communication network configurations for
medical applications,” in IEEE Wireless Communications, vol. 10, no. 1, pp. 56-61, 2003, doi: 10.1109/MWC.2003.1182112.
[20] E. B. Sloane, “Using a decision support system tool for healthcare technology assessments,” in IEEE Engineering in Medicine
and Biology Magazine, vol. 23, no. 3, pp. 42-55, 2004, doi: 10.1109/MEMB.2004.1317981.
[21] J. X. Wu, P. T. Huang, C. H. Lin, and C. M. Li, “Blood leakage detection during dialysis therapy based on fog computing with
array photocell sensors and heteroassociative memory model,” in Healthcare Technology Letters, vol. 5, no. 1, pp. 38-44, 2018,
doi: 10.1049/htl.2017.0091.
[22] J. Mitola, “Software radios: survey, critical evaluation and future directions,” in IEEE Aerospace and Electronic Systems
Magazine, vol. 8, no. 4, pp. 25-36, April 1993, doi: 10.1109/62.210638.
[23] C.-H. Hsu, S.-H. Hsieh, J.-T. Hsu, P.-H. Cheng, S.-J. Chen and F.-P. Lai, “Mobile nursing cart with software defined radio for
healthcare enterprises,” TENCON 2011 - 2011 IEEE Region 10 Conference, Bali, Indonesia, 2011, pp. 1221-1224, doi:
10.1109/TENCON.2011.6129307..
[24] R. Chvez-Santiago, A. Mateska, K. Chomu, L. Gavrilovska, and I. Balasingham “Applications of software-defined radio (SDR)
technology in hospital environments, Engineering in Medicine and Biology Society (EMBC),” 35th Annual International
Conference of the IEEE, 2013, doi: 10.1109/EMBC.2013.6609738.
8. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Research, challenges and opportunities in software define radio technologies (Jacob Abraham)
267
[25] L. Catarinucci et al., “An IoT-aware architecture for smart healthcare systems,” IEEE Internet of Things Journal, vol. 2, no. 6, pp.
515-526, 2015, doi: 10.1109/JIOT.2015.2417684.
BIOGRAPHIES OF AUTHORS
Dr. Jacob Abraham is working as an Associate Professor in the Department of
Electronics, Baselios Poulose II Catholicos College [NAAC “A” grade] an aided institution
affiliated to Mahatma Gandhi University, Kerala, India. He has more than twenty-five years of
teaching experience. He obtained his B. Tech in Electronics and Communication Engineering
from Mahatma Gandhi University, M. Tech in Optoelectronics from Kerala University and
PhD in Microstrip Antennas and Arrays from Mahatma Gandhi University, Kerala, India. He
has published around 16 papers in the reputed indexed international journals and more than 25
papers presented in national and international conferences. Besides he has contributed three
book chapters also. He also served as editor of the book titled “Recent Developments in
Electronics and Communication Engineering” published by IoT Academy. He also served as a
member board of studies of UG Electronics and as chairman expert committee for PG
[Electronics] Syllabus revision of Mahatma Gandhi University. Currently he is a member of
Academic Council of Mahatma Gandhi University, Kottayam Kerala. He has successfully
completed one minor project funded by University Grants Commission (UGC). He also served
as convener of the UGC sponsored national seminar titled “Modern Trends in Electronic
Communication and Signal Processing”. His research area includes microwave engineering,
printed antennas, fractal antennas, IoT and electric vehicle control and charging. He is life
member of ILA and ISCA. He can be contacted at email: tjacobabra@gmail.com.
Kanagaraj Venusamy is an Assistant Professor at Rajalakshmi Engineering
College in Chennai, Tamil Nadu, India. He obtained his undergraduate degree in Electronics
and Communication Engineering (2005). He has received his Master of Business
Administration in Production Management from Manonmanium Sundaranar University in
2011. He received a Master of Engineering in Mechatronics from Anna University affiliated
College-Rajas college in 2019. His main area of awareness is robotics, drone, industrial
automation, artificial intelligence, internet of things, embedded system, entrepreneurship and
human resource development. He had a ten years of teaching experience in reputed academic
Institution in India and Sultanate of Oman. He has technically assisted in various academic
Projects, Robotics International Competition, TRC-Oman funded Projects. He acted as course
facilitator in numerous short-term course and Workshop which is organized by IEEE-UTAS-
Al mussanah. His team won GCC level and national level robotics competition in the year of
2017, 2018, and 2019. He has published journals, book chapter and Conferences in high
indexed platform. He has conducted various technical workshop in online mode in the
following area robotics, embedded system, drone and machine learning during pandemic
period (2020-2021). He can be contacted at email: kanagaraj.v@rajalakshmi.edu.in.
Antony Judice Working as a Lecturer in the Department of ECE at University of
Technology and Applied Sciences-Ibri, Sultanate of Oman since from 2013 & having more
than 14 years of teaching experience. He received his B.E Degree in ECE from Noorul Islam
College of Engineering and M.E Degree in Applied Electronics with distinction from SSN
college of Engineering. He has published more than 15 reputed papers in reputed indexed
journals (Scopus, PubMed, EMBASE,) and IEEE Conferences. His areas of research includes
mmwave antennas design, 5G networks, satellite networks, optical wireless networks.
Currently he is the Quality Assurance Coordinator of Engineering Department at the
university level and pursuing Ph.D. at Chitkara University. He is life time member of ISTE
and served as a college level staff coordinator of IETE during 2008-2010. He can be contacted
at email: judice.av@ibrict.edu.om.
Joel Livin A. Obtained Ph.D. in Information and Communication Engineering
Specialization in 2022 from Anna University, India. His research interest includes cluster
based spectrum sensing in cooperative cognitive radio networks, signal processing for
communications, and resource Allocation in Xgen networks. He has published more than 10
national and international journals and conferences and co-authored a book titled "Electronics
devices and Circuits". He has 2 patents in the field of Internet of things. He can be contacted at
email: joellivz@gmail.com or joellivin@ict.edu.om.
9. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 2, July 2023: 260-268
268
Hameed Shaik received B.Tech degree in Electrical and Electronics Engineering
in 2000 from Kakatiya University, TG, India and Masters degree in Electrical Electrical
Engineering from National institute of Technology Durgapur, West Bengal in 2002. He is
Research scholar at JNTUA, AP. Currently he is working as Lecturer in Electrical Engineering
department, College of Engineering and Technology, University of Technology and Applied
Sciences-Ibra. Having 20 years of Teaching experience, and published 12 papers in various
conferences and journals. His area of interest is application of FACTS controllers and soft
computing methods in geneating systems with hybrid renewable energy sources to imporve
the power quality. He can be contacted at email: hameedqcet@gmail.com or
hameed@ict.edu.om.
Dr. Kannadhasan Suriyan is working as an Assistant Professor in the
department of Electronics and Communication Engineering in Study World College of
Engineering, Coimbatore, Tamil Nadu, India. He is completed the Ph.D. in the field of Smart
Antenna for Anna University in 2022. He is twelve years of teaching and research experience.
He obtained his B.E in ECE from Sethu Institute of Technology, Kariapatti in 2009 and M.E
in Communication Systems from Velammal College of Engineering and Technology, Madurai
in 2013. He obtained his M.B.A in Human Resources Management from Tamil Nadu Open
University, Chennai. He has published around 45 papers in the reputed indexed international
journals indexed by SCI, Scopus, Web of science, major indexing and more than 146 papers
presented/published in national, international journal and conferences. Besides he has
contributed a book chapter also. He also serves as a board member, reviewer, speaker, session
chair, advisory and technical committee of various colleges and conferences. He is also to
attend the various workshop, seminar, conferences, faculty development programme, STTP
and Online courses. His areas of interest are smart antennas, digital signal processing, wireless
communication, wireless networks, embedded system, network security, optical
communication, microwave antennas, electromagnetic compatability and interference,
wireless sensor networks, digital image processing, satellite communication, cognitive radio
design and soft computing techniques. He is Member of SM IEEE, ISTE, IEI, IETE, CSI,
IAENG, SEEE, IEAE, INSC, IARDO, ISRPM, IACSIT, ICSES, SPG, SDIWC, IJSPR and
EAI Community. He can be contacted at email: kannadhasan.ece@gmail.com.