Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
Capillary Networks ā Bridging the Cellular and IoT WorldsEricsson
Ā
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Integration of internet of things with wireless sensor networkIJECEIAES
Ā
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
Ā
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Capillary Networks ā Bridging the Cellular and IoT WorldsEricsson
Ā
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Integration of internet of things with wireless sensor networkIJECEIAES
Ā
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
Ā
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Background
Mobile Grid and Cloud Computing
Cloud Robotics
Mobile Ad hoc Computational Grid and Cloud
Opportunities
Research Challenges
Future Research Directions
Conclusion
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isnāt efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. āFuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,ā explains Baker. āSo we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.ā This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Ā
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
Ā
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...AJIT M KARANJKAR
Ā
Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Ā
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Describes the term Internet of Things IoT security architecture based on Software Defined Networking SDN . In this context, building on SDN works with or without infrastructure. This is called the SDN domain. This work describes the mechanics of the proposed architecture and reduces the chances of using SDN to achieve more effective and flexible network security. It outlined the issues associated with current SDN security applications and introduced a new IoT system plan. This document has discussed the management of Internet access for specific networks and monitoring of global traffic. Finally, it describes the choice of architecture for SDN using OpenFlow and discusses the resulting results. M. Silambarasan | B. Michael Vinoline Rinoj | V. Karthik ""A Novel SDN Architecture for IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29908.pdf
Paper Url : https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/29908/a-novel-sdn-architecture-for-iot-security/m-silambarasan
A Review on Wireless Sensor Network Securityijtsrd
Ā
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Real time audio translation module between iax and rswIJCNCJournal
Ā
At the last few years, multimedia communication has
been developed and improved rapidly in order to
enable users to communicate between each other over
the internet. Generally, multimedia communication
consists of audio and video communication. However,
this research concentrates on audio conferencing
only. The audio translation between protocols is a
very critical issue, because it solves the communic
ation
problems between any two protocols. So, it enables
people around the world to talk with each other eve
n
they use different protocols. In this research, a r
eal time audio translation module between two proto
cols
has been done. These two protocols are: InterAsteri
sk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used
to provide two ways audio transfer feature. The
solution here is to provide interworking between th
e two protocols which they have different media
transports, audio codecās, header formats and diffe
rent transport protocols for the audio transmission
. This
translation will help bridging the gap between the
two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some
related works have been done to provide translation
between IAX and RSW control signalling messages. Bu
t, this research paper concentrates on the
translation that depends on the media transfer. The
proposed translation module was tested and evaluat
ed
in different scenarios in order to examine its perf
ormance. The obtained results showed that the Real-
Time
Audio Translation Module produces lower rates of pa
cket delay and jitter than the acceptance values fo
r
each of the mentioned performance metrics.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
Ā
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
Background
Mobile Grid and Cloud Computing
Cloud Robotics
Mobile Ad hoc Computational Grid and Cloud
Opportunities
Research Challenges
Future Research Directions
Conclusion
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isnāt efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. āFuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,ā explains Baker. āSo we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.ā This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Ā
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
Ā
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...AJIT M KARANJKAR
Ā
Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Ā
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Describes the term Internet of Things IoT security architecture based on Software Defined Networking SDN . In this context, building on SDN works with or without infrastructure. This is called the SDN domain. This work describes the mechanics of the proposed architecture and reduces the chances of using SDN to achieve more effective and flexible network security. It outlined the issues associated with current SDN security applications and introduced a new IoT system plan. This document has discussed the management of Internet access for specific networks and monitoring of global traffic. Finally, it describes the choice of architecture for SDN using OpenFlow and discusses the resulting results. M. Silambarasan | B. Michael Vinoline Rinoj | V. Karthik ""A Novel SDN Architecture for IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29908.pdf
Paper Url : https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/29908/a-novel-sdn-architecture-for-iot-security/m-silambarasan
A Review on Wireless Sensor Network Securityijtsrd
Ā
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Real time audio translation module between iax and rswIJCNCJournal
Ā
At the last few years, multimedia communication has
been developed and improved rapidly in order to
enable users to communicate between each other over
the internet. Generally, multimedia communication
consists of audio and video communication. However,
this research concentrates on audio conferencing
only. The audio translation between protocols is a
very critical issue, because it solves the communic
ation
problems between any two protocols. So, it enables
people around the world to talk with each other eve
n
they use different protocols. In this research, a r
eal time audio translation module between two proto
cols
has been done. These two protocols are: InterAsteri
sk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used
to provide two ways audio transfer feature. The
solution here is to provide interworking between th
e two protocols which they have different media
transports, audio codecās, header formats and diffe
rent transport protocols for the audio transmission
. This
translation will help bridging the gap between the
two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some
related works have been done to provide translation
between IAX and RSW control signalling messages. Bu
t, this research paper concentrates on the
translation that depends on the media transfer. The
proposed translation module was tested and evaluat
ed
in different scenarios in order to examine its perf
ormance. The obtained results showed that the Real-
Time
Audio Translation Module produces lower rates of pa
cket delay and jitter than the acceptance values fo
r
each of the mentioned performance metrics.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
Ā
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
A comparative analysis of number portability routing schemesIJCNCJournal
Ā
To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost
important. NP allows end user to retain their telephone number in case of change of geographical location
or service type or service provider. This paper describes the various number portability routing schemes
namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis
between these routing schemes on various parameters is presented here. The issues pertaining to NP have
also been described.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Ā
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
Ā
Network jammers can uncover the reliability of the wireless networks, where the position of the jammer node permit the network to cope with jamming leveraging varieties of defence strategies. Wireless Bluetooth network is a short range network, where the Bluetooth transceiver is operating in the 2.4 GHz ISM (industrial, scientific and medical) radio band, and a special type of frequency hopping pattern was included with the specification of the Bluetooth technology to offer the necessity requirement for the matching Radio Frequency RF channels. This paper calculates and evaluates the effect of noise power
jammer and follower jammer on the Personal Area Network (PAN) Bluetooth network. The results prove
that the effect on the Bluetooth network depends on many factors such as power density, distance and
immunity technique, which is used in many Bluetooth networks
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
Ā
We propose a new evaluation method forāgeneralized confidential modulation(GCM)ā for quantum
communication. Confidential modulationrealizes a secret communication by using secret information for
modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication.
The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical
security andthe evaluation depends on the security status of pseudo random numbergenerator (PRNG)
which controls the modulation. On the other hand,our method is based on mode of operation for block
ciphers and clears theweaknesses from structural viewpoint. Using our method, we can comparethe
security of different GCM structures. Our method of security evaluationand comparison does not depend on
the security status of PRNG.From the results of our evaluation, we conclude that the security of GCMis
limited to computational security.
Pwm technique to overcome the effect ofIJCNCJournal
Ā
Many current communication systems suffer from performance degradation due to the high sensitivity to
high power peaks especially in the nonlinear devices. The author introduces a new concept based on the
Pulse Width Modulation (PWM), namely MIMO-OFDM system based PWM (MO-PWM) to overcome this
deficiency. Here, the peak-to-average power ratio (PAPR) problem in Orthogonal Frequency Division
Multiplexing (OFDM) technique is used as a criterion to check the validity of the proposed work.
Moreover, the proposed system work has been implemented over Field Programmable Gate Array (FPGA),
which is designed to characterize both of the complexity and the speed issues.
The systems performance based MO-PWM and validity have been checked based on a numerical analysis
and a conducted simulation. The simulation results show that the MO-PWM can clearly reduce the PAPR
values nevertheless the used OFDM systemsā specifications, and gives a promising results over some
techniques found in the literature, such as clipping, SLM and PTS under same bandwidth occupancy and
systemās specifications.
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
Ā
The Bandwidth Allocation Models (MAM, RDM, G-RDM and AllocTC-Sharing) are management
alternatives currently available which propose different resource (bandwidth) allocation strategies in
multiservice networks. The BAM adoption by a network is typically a management choice and
configuration task executed by the network operations and management system setup in a static or nearly
static way. This paper proposes and explores the alternative of allowing BAM definition and configuration
on a more dynamic way. In effect, one of the basic motivations towards BAM dynamic allocation is the fact
that multiservice networks characteristics (traffic load) may change considerably in daily network
operation and, as such, some dynamics in BAM allocation should be introduced in order to improve
performance. A framework is presented supporting BAM dynamic allocation. The framework adopts an
OpenFlow-based software-defined networking (SDN) implementation approach in order to support
scalability issues with a centralized controller and management network view. The framework architecture
also supports the implementation of some autonomic characteristics which, in brief, look for improving and
facilitating the decision-making process involved with BAM provisioning in a multiservice network. A
proof of concept is presented evaluating different BAM performance under different traffic loads in order to
demonstrate the framework strategy adopted.
On clientās interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Ā
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the clientās interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the clientās interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
Ā
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victimsā ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
Ā
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e senderās TCP implementation, it needs
modifications to senderās operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
A new method for controlling and maintainingIJCNCJournal
Ā
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Energy aware clustering protocol (eacp)IJCNCJournal
Ā
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
Ā
With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jacksonās network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
Link aware nice application level multicast protocolIJCNCJournal
Ā
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
Cloud computing challenges and solutionsIJCNCJournal
Ā
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Ā
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about studentās academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
āK- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
Analysis and Implementation Wireless Sensor Network of Information Technology...IJERDJOURNAL
Ā
ABSTRACT:- This paper, we propose a smart home system based on two approaches. The first approach is topologi architecture mesh and the second is the protocol of Wireless Sensor Network (WSN) are efficient. This system has two working environment, indoor and outdoor. Indoor environment using WSN system, while the external environment usingsystem. internet-cloudThis scheme is known as the Internet-of-Things (IOT). Indoor and outdoor environments connected to each other by means of a connecting bridge. WSN system formed from the components of WSN that uses a mesh topology. Each component of the WSN designed for implementing efficient data protocols are proposed. For outdoor environments, system-cloud Internet that there is a major infrastructure. Thus, the smart home system can be monitored and controlled from a smartphone, anytime and anywhere, as long as access to mobile data is available. For the evaluation of the system, several tests have been done to get the system profile.
Wireless sensor network plays vital role in todayās life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Ā
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
Efficient addressing schemes for internet of thingsIJECEIAES
Ā
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
A conceptual architecture for integrating software defined network and netwo...IJECEIAES
Ā
Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a softwarebased environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating SDN and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.
Presented at the FDPĀ Ā Emerging Trends in IOT Enabled Wireless Communication ,Ā 8THĀ ā 12TH, August, 2022Ā (ONLINE MODE)Ā Organized ByĀ Ā Department of Electronics Communication EngineeringĀ In association with IQAC,Ā Ā Haldia Institute of TechnologyĀ Haldia-721657, West Bengal.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Ā
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
Ā
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
Ā
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
Ā
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
Ā
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
Ā
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehiclesā identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
Ā
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Ā
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
Ā
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
Ā
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
Ā
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
Ā
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
Ā
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehiclesā identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Ā
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
Ā
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Ā
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
Ā
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Ā
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
Ā
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
Ā
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Ā
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Ā
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatās changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Ā
As AI technology is pushing into IT I was wondering myself, as an āinfrastructure container kubernetes guyā, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitās both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Ā
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Ā
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Ā
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Ā
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Ā
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā
Towards internet of things iots integration of wireless sensor network to cloud services for data
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
DOI : 10.5121/ijcnc.2013.5505 59
TOWARDS INTERNET OF THINGS (IOTS):
INTEGRATION OF WIRELESS SENSOR NETWORK TO
CLOUD SERVICES FOR DATA COLLECTION AND
SHARING
Rajeev Piyare1
and Seong Ro Lee2
1,2
Department of Information Electronics Engineering, Mokpo National University, 534-
729, South Korea
rajeev.piyare@hotmail.com;srlee@mokpo.ac.kr
ABSTRACT
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
KEYWORDS
Internet of Things, Cloud computing, REST, Wireless Sensor Network, XBee
1. INTRODUCTION
The Internet of Things (IoTs) can be described as connecting everyday objects like smart-phones,
Internet TVs, sensors and actuators to the World Wide Web where the devices are intelligently
linked together enabling new forms of communication between things and people, and between
things themselves. Building IoTs has advanced significantly in the last couple of years since it has
added a new dimension to the world of information and communication technologies. According
to [1], in 2008, the number of connected devices surpassed connected people and it has been
estimated by Cisco that by 2020 there will be 50 billion connected devices which is seven times
the world population. Now anyone, from anytime and anywhere can have connectivity for
anything and it is expected that these connections will extend and create an entirely advanced
dynamic network of IoTs. The development of the Internet of Things will revolutionize a number
of sectors, from wireless sensors to nanotechnology.
In fact, one of the most important elements in the Internet of Things paradigm is wireless sensor
networks (WSNs). WSNs consist of smart sensing nodes with embedded CPUs, low power radios
and sensors which are used to monitor environmental conditions such as temperature, pressure,
humidity, vibration and energy consumption [2]. In short, the purpose of the WSN is to provide
sensing services to the users. Since, the number of users of the Internet is increasing therefore; it
is wise to provide WSN services to this ever growing community.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
60
Cloud computing is a flexible, powerful and cost-effective framework in providing real-time data
to users at any time with vast coverage and quality. The Cloud consists of hardware, networks,
services, storage, and interfaces that enable the delivery of computing as a service [3]. In addition,
itās also possible to upload the data obtained from the wireless sensor nodes to the Web services
based on Simple Object Access Protocol (SOAP) and Representational State Transfer (REST),
using messaging mechanisms such as emails and SMS or social networks and blogs [4]. By
connecting, evaluating and linking these sensor networks, data conclusions can be made in real-
time, trends can be predicted and hazardous situations can be avoided.
In this paper, we present the design, development and integration of an extensible architecture for
WSN with the Cloud based sensor data platform, Open.Sen.se [5] where info-graphic of different
data streams can be displayed, accessed and shared from anywhere with Internet connectivity.
The collected data from the sensor nodes are processed, stored and analyzed on Open.Sen.se
server via an Application Programming Interface (API). We have used REST based Web services
as an interoperable application layer that can be directly integrated into other application domains
like e-health care services, smart homes, or even vehicular area networks (VAN). For proof of
concept in a smart environment, we have implemented a REST based Web services on an IP
based low power WSN test bed, which enables data access from anywhere for the smart
environment.
The remaining of the paper is organized as follows. In Section 2, we briefly discuss related work.
Section 3 describes the proposed architecture while Section 4 outlines the hardware design of the
base station and the End Nodes. In Section 5 we discuss the software implementation of our
approach. Section 6 presents the implementation results and discussions and finally, some
conclusions are presented.
2. RELATED WORK
Wireless sensor platforms have been widely deployed in a number of applications ranging from
medical such as Alarm-Net [6], or CodeBlue [7] to environmental monitoring [8-10]. The
architecture of these systems has been designed in a very ad hoc fashion and is not flexible to
adapt to other applications or scenarios while the core problem is the same, remote monitoring
using sensor networks. During the last few years, many researchers have investigated on ways to
connect wireless sensor networks to the Cloud [11]. Authors in [12-16] have presented Internet
protocols for connecting wireless sensor networks to the Internet but no real implementations
have been shown. Much of the previous work has been on theoretical aspects of system
architecture rather than actual deployment and testing of wireless sensor networks with the
Clouds. Use of Web services to connect sensor networks with external networks have also been
suggested by researchers in [17, 18]. However, their work was mainly focused on the feasibility
of SOAP based Web services in terms of energy and bandwidth overheads.
SenseWeb [19] is one of the first architectures being presented on integrating WSN to the
Internet for sharing sensor data. Users were able to register and publish their own sensor data
using the SenseWeb API. The main drawback of SenseWeb is that all the decision making
process is executed at a single central point called the Coordinator. The Coordinator is the central
point of access for all applications and sensor contributors where all the sensor data is stored and
analyzed. That is, all the intelligence to control and to make a decision is located at this central
point and if the Coordinator fails, the entire network is disrupted.
It is therefore suggested that the various decision levels can be implemented onto different
architectural layers. The upper level known as Supervision Layer will be used for all sensor data
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
61
storage, analysis and for decision making, while the Sensor Layer where the sensors are deployed
can be used to partially analyze data and the determination of reactive response. The Coordinator
still exists as a point of control for analysis of data and remote monitoring as well as acting as a
gateway between sensors and the Cloud.
In order to address the above mentioned issues of flexibility and centralized decision making
process, we designed and implemented a more flexible architecture for integrating WSN to Cloud
using REST based Web services as an interoperable application layer which can be directly
integrated into other applications. The architecture presented in this work can be customized in
different ways in order to accommodate different application scenarios with minimum recoding
and redesign. To build a low power and self-healing Wireless Sensor Network we have used
XBee ZB modules which are ZigBee-complaint wireless sensor networking devices developed by
Digi International, Inc [20]. Due to low power, simple network deployment, reliable data
transmission and low installation costs, the ZigBee wireless standard has been preferred for this
study over Wi-Fi and Bluetooth. In addition, to reduce the overall cost of implementation and
network latency, each End Device is only equipped with an XBee ZB module with sensors.
Furthermore, to reduce energy consumption and to increase the network lifetime, sleep
mechanism for battery powered sensor nodes have been utilized.
3. DESCRIPTION OF PROPOSED ARCHITECTURE
The architecture of the proposed system is divided into three layers (Figure 1): Sensor Layer, the
Coordinator Layer and the Supervision Layer.
Figure 1. Proposed Architecture
The Sensor Layer consists of sensors that interact with the environment. Every sensor was
integrated with wireless nodes using an XBee ZB platform called End Devices. These End
Devices form a Mesh network and send the information gathered by the sensors to the
Coordinator Layer through the sink node called the base station. Messages are routed from one
End Device to another until they reach this base station. There are several hardware platforms
available for wireless sensor network deployment such as TelosB, Mica, IRIS and Wasp mote.
For our prototype system, we have utilized XBee module from Digi International, Inc. Each XBee
ZB module has the capability to directly gather sensor data and transmit it without the use of an
external microcontroller, a capability known as XBee direct [21]. This offers many advantages.
By using XBee alone, it can minimize weight which is an important factor for systems such as
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
62
Body Sensor Networks or wearableās. Omitting an external microcontroller also reduces power
consumption which is a critical advantage for wireless systems that run on batteries and save
money. However, there are also some important tradeoffs associated with this.
The Coordination Layer is responsible for the management of the data received from the sensor
network. It temporarily stores the gathered data into buffer and sends it to the Supervision layer at
predefined intervals. Base station which comprises of Arduino UNO, Ethernet shield and XBee is
connected to the Internet using RJ45 cable and is powered using an AC adaptor. It serves as a
mobile mini application server between the wireless sensors and the dedicated network and has
more advanced computational resources compared to the End Devices found in Sensor Layer. At
the base station, the sink node gathers data from wireless sensors using the ZigBee protocol and
sends this data to Cloud based sensor data platforms.
Finally, the Supervision Layer accommodates the base station with a Web server to connect and
publish the sensor data on the Internet. This layer stores the sensor data in a database and also
offers a Web interface for the end users to manage the sensor data and generate statistics. For the
Supervision Layer, we have used Open.sen.se [5] HTTP Service which provides a REST based
API to publish and access the sensor data. Thus, allowing existing networks to be connected into
other applications with minimal changes. Open.Sen.se offers a graphical interface for real-time
monitoring of systems using info graphic data streams and to retrieve the sensor values using
device type and timestamp. Alerts can also be automatically generated to notify the user each time
if the desired event has been sensed by the domain rules programmed in the base station.
4. WIRELESS SENSOR NODE DESIGN
This section highlights the design and development phases of test bed in terms of hardware in
order to integrate it to the proposed architecture.
4.1. Base station (Coordinator) Design
The base station plays a key role in our proposed system as illustrated in Figure 1. This node has
been kept minimum size while ensuring all functions of communication, sensing and calculation.
The prototype of the base station is shown in Figure 2. The hardware of base station consists of an
Arduino UNO board, an Ethernet shield and an XBee shield that supports XBee ZB module. The
Arduino is an open-source microcontroller that uses ATMEGA 328, an Atmel AVR processor
which can be programmed by the computer in C language via USB port [22]. Arduino also has
on-board 5 analog pins and 13 digital pins for input and output operations, supporting SPI and
I2C which can be used to interface with other devices. The role of the microcontroller in this
wireless sensor network is to collect sensor readings from the End Devices via XBee ZB module,
arrange sensor data using developed packet protocols and send it to Open.Sen.se server via an
Ethernet module. The Ethernet module acts as a central node to bridge the wireless sensor
network with local proxy. Generally, the function of the base station is divided into two parts:
Web-Server and XBee interface to the wireless sensor network. These two functions are
implemented on Arduino UNO. The Web-Server function uses <Ethernet.h> library, while XBee
interface uses <XBee.h> library.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
63
Figure 2. Base station connected to Ethernet router consisting of an Arduino UNO, an Ethernet Shield and
XBee ZB module
4.2. End Device
4.2.1. XBee ZB Interface
The End Devices consist of two parts: Sensor Interface and XBee ZB Interface as illustrated in
Figure 3. The End Device is developed based on XBee Radio Frequency module operating in an
unlicensed band of 2.4 GHz with a data transfer rate of 250 kbps [23]. XBee uses ZigBee protocol
and support the needs of low cost, low power wireless sensor networks. ZigBee is built on top of
IEEE 802.15.4 standard which defines the Medium Access Control (MAC) and physical layers.
ZigBee protocol also features multi-hop communication capability, therefore providing a vast
range of communication and a wide coverage area [24]. An XBee ZB offers transmission range of
40m in indoor scenarios and 140m in outdoor. End Devices wait for data reading request (i.e.
Polling) from the Coordinator and then responses with the value from the sensor. Polling is a
method in which the network Coordinator requests each End Device one by one to send sensor
readings. This avoids interference from multiple nodes transmitting to the Coordinator
simultaneously.
Figure 3. End device with temperature and voltage sensing unit
4.2.2. Sensor Interface
A cost reduction for each node is achieved by removing the additional use of a microcontroller
and using XBee ZB as a standalone device known as XBee direct as mentioned in Section 3.
Since, XBee houses on-board 9 analog and digital input and output pins, sensors can be directly
interfaced to it. This allows XBee modules to automatically sample the sensor inputs and report
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
64
back to the Coordinator using API firmware. There are three End Devices for this experimental
setup and each consists of a temperature sensor. For the temperature monitoring sensor, we have
used a low cost LM35 analog sensor from DF Robot to show the proof of concept. LM35 is a
precision integrated-circuit temperature sensor, whose output voltage is linearly proportional to
Celsius temperature [25]. This sensor employs a 3-wire interface, has a low impedance and power
consumption of 60ĀµA from its supply. The sensor interface reads temperature strings from LM35
on analog pin AD0 of XBee ZB module and sends this data packet to the base station. At the base
station, Arduino microcontroller receives this data packet, converts it into numerical values with
specific data format and End Device ID. Analog samples are returned as 10-bit values from the
XBee ZB modules. This analog signal is then sampled and quantized at the base station by the
Arduino into a digital value in the range of 0-1023, where 0 represents 0V and 1023 represents
5V. To convert the A/D reading to mV, the following equation is utilized:
Then the temperature value in volts is further converted into degree Celsius according to equation
(2). Since the scale factor for LM35 is 0.01V/o
C, therefore:
To monitor the supply voltage for each End Node, voltage sensing unit has also been
incorporated. If the voltage level is too low, then the End Device enters sleep mode automatically
and a notification is automatically generated and send to the user by Open.Sen.se. One of the
main challenges in integrating voltage sensor into an XBee module is matching the output of the
voltage to the analog input. XBee analog inputs cannot read more than 1.2V [23]. Therefore, a
voltage division circuitry was constructed to map the supply voltage to a safe level for an XBee
input (Figure 4).
Figure 4. Voltage sensing circuitry
XBee ZB modules can operate within a supply voltage of 2.1V to 3.6V. In order to match the
voltage to 1.2V, the values of R1 and R2 were calculated using the voltage division equation:
Where Vout is the desired output voltage and Vin is the input voltage to the circuit. Using Vin as
3.3V, R1 as 200 , R2 was found to be 100 . This provides a voltage output of 1.1V, which is
within the tolerance of XBee. This voltage data is then transmitted to the base station using the
method as described above. At the base station this data packet is again converted into numerical
values based on the following equation:
4.2.3. Power Supply
1023/)1200/()( mVreadingDAmVAD Ć= (1)
10/mV)in(VoutĀ°C =inTemp (2)
21
2
RR
RV
V
in
out
+
Ć
= (3)
1000/)1023/)31200/(()( ĆĆ= readingDAmVAD (4)
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
65
The prototype sensor nodes are powered by a 2000 mAh, 9V Energizer lithium polymer battery.
This particular battery was preferred because of its long battery life and is rechargeable, which is
of interest for continued deployment.
5. SOFTWARE DEVELOPMENT
Different software products were developed for this wireless sensor network experiment in order
to establish the sensor interface, configure ZigBee network and manage the sensed data for
receiving, storing and publishing it on Cloud. Each development phase is described as follows.
5.1. XBee Module Configuration
To realize the proposed network architecture, XBee ZB modules were configured to behave as
Coordinator and End Devices. XBee supports two modes of operation: Transparent mode (AT)
and Application Programming Interface (API) mode with the Escape (ESC) character. API mode
was chosen for this research due to following reasons:
1. Allows XBee modules to receive input and output data from one or more remote XBees.
2. MAC layer Acknowledgment (ACK) and retries. This ACK packet indicates to the source
node that the data packet was successfully received by the destination node. If ACK is not
received, the source node will resend the packet.
3. Receive packets contain the source address of the transmitting node.
4. Packets include a checksum for data integrity.
The data frame for API operation is shown in Figure 5 which is divided into four sections; Start
Delimiter, Length section, Frame Data and Checksum. The checksum is calculated as below:
Figure 5. XBee API data frame
5.2. Communication and Sensor Layers in Arduino
To successfully communicate with remote sensor nodes from the base station, communication
and sensor layers have been implemented on the Arduino. The libraries in the communication
layer are used to establish a reliable connection between the sensor nodes and to communicate
with Open.Sen.se server. The <XBee.h> libraries are used to receive data on Arduino and create
output messages in JavaScript Object Notation (JSON) format. Figure 6 shows the flowchart of
communication and sensor layers in Arduino and the End Nodes. A base station is connected to
Open.Sen.se server over TCP/IP. Since Arduino Ethernet shield already supports a TCP/IP stack,
we have focused on implementing software to connect it to Open.Sen.se server. When Arduino is
turned on, it first connects to a local server using a static IP address. To optimize the process of
connection, we have used static IP address rather than acquiring an IP via Dynamic Host
Configuration Protocol (DHCP). Once the connection is successful, the Coordinator requests for
the data from the End Devices. Upon successful reception of data packets, itās decoded and
āāĆ= structureAPIinbytesallofFFChecksum 0 (5)
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
66
converted into numerical values as described in Section 4.2.2. These values are then updated on
Open.Sen.se platform using GET and POST HTTP method which is described in detail in the
next section. Since the Open.Sen.se server accepts several TCP connections while
communicating, it is scalable for the large number of concurrent users. The base station does not
need to re-establish TCP connection every time it sends a message
Figure 6. Flowchart of communication and sensor layers in (a) Arduino and (b) the End Nodes (c) Arduino
without Timer and (d) with Timer
start
Static IP Address
Establish
connection to
http://api.sen.se
server
Connection
successful
Request packets
from remote
Xbees
Wait for
response
response
Decode packets
Post value for feed
to Sen.se
Post successful
Delay
30 min
No
Yes
No
Yes
Yes
No
start
Wait
Response
Enter Sleep Mode
Transmit to
Coordinator
Read value from
sensors
Sen.se Server ARDUINO
REQUEST
DATA
REQUEST
DATA
REQUEST
DATA
.
.
Sen.se Server ARDUINO
TIMER SETUP
DATA
DATA
DATA
.
.
0
30
60
0
30
60
(c) (d)
(a)
(b)
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
67
5.3. Connecting Sensor Network to Cloud Service
As mentioned previously, the access to Cloud services has to be easy, direct, open and
interoperable. That is, the provided communication means and programming interfaces (APIs)
shall be easy to implement on every platform and developing environment [26]. The most open
and interoperable way to provide access to remote services or to enable applications to
communicate with each other is to utilize Web services. There are two classes of Web services:
Simple Object Access Protocol (SOAP) and Representational State Transfer (REST). REST is a
much more lightweight mechanism than SOAP offering functionality similar to SOAP based Web
services.
Open.Sen.se is an open source āInternet of Thingsā application and API to store and retrieve data
from things and sensors using Hypertext Transfer Protocol (HTTP) over the internet or via a
Local Area Network (LAN). In addition to storing and retrieving numeric and alphanumeric data,
Open.Sen.se API allows for numeric data processing such as time scaling, averaging, median and
summing. The channel feeds supports JavaScript Object Notation (JSON), Extensible Markup
Language (XML), and comma-separated values (CSV) formats for integration into applications.
Therefore, in our approach we have used REST based Web service utilizing standard operation
such as GET and POST requests that return (JSON) responses to communicate between the base
station and the Open.Sen.se server. JSON is a lightweight data-interchange format. It is easy for
human beings to read and write. It is also simpler for machines to parse and generate messages
than using XML. For example, to read the current sensor value, an HTTP GET request is sent to
the resource of the sensor. The response includes a textual representation of the current sensor
value. A soon as the Coordinator decodes the received data packets from the End Devices, an
HTTP POST request is sent from the base station to a pre-specified URL, containing the updated
value as illustrated in Figure 7. To access the Open.Sen.se API, the following base URL is used:
http://api.sen.se. Each data entry is stored with a date and time stamp and is assigned a unique
Entry ID. In terms of authentication, every communication between the connected Device and
Open.Sen.se server is protected with a Sen.se key which is specific and unique to each user.
Figure 7. A serial Monitor window showing successful POST for data values
5.4. Timer and Reset Function
A timer function is also associated to send notifications to Open.Sen.se server from Arduino
periodically. For example, when Sen.se server is required to receive sensor values after every 30
minutes from Arduino, this function is called to configure the Arduino. Once the timer is
activated, Arduino reports Open.Sen.se server with the measured sensor data by periods without
any further request as illustrated in Figure 6 (c) and (d).
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
68
A reset function initializes all setups on Arduino in software. It performs the same function when
the reset button on the Arduino is pressed. If there are conflicts on the communication with
Open.Sen.se server, the Arduino will be reset and try to connect with Open.Sen.se server again.
Also, Arduino itself calls this function when it finds exceptional errors while connecting.
6. IMPLEMENTATION RESULTS AND DISCUSSION
In order to evaluate and demonstrate the proposed model, we implement it by using the technical
approach which is described in the above sub-sections. A WSN was created to collect temperature
and battery voltage readings. Preliminary experiments were performed to evaluate the system in
terms of sensor data accessibility, alert notification time, and battery consumption. Furthermore,
Senseboard was created on Open.sen.se server to present the collected data to the user in an easy
and meaningful way.
6.1. Senseboard
Open.Sen.se server offers graphical interface called āSenseboardā where different apps can be
added. This allows info graphic data streams to be displayed and viewed in real-time anywhere
and on any website. It also offers critical multiviz functionality to combine data from multiple
sensors into one graph. Figure 8 shows the real-time acquisition curve with measurements
showing environment temperature (Red Line) and End Device battery voltage (Green Line). The
Senseboard created for this implementation is supported by Internet Explorer, Safari, Firefox,
Opera browsers and can also be accessed at http://open.sen.se/sensemeters/tab/3114/.
Figure 8. Senseboard displaying real-time Node Voltage and Environmental Temperature
6.2. Event Notification
An event notification system is also implemented on Open.Sen.se server based on measurements
from sensors and predefined If-conditions. This allows monitoring End Devices supply voltage. If
the voltage is too low, the End Device will enter sleep mode automatically. When Open.Sen.se
server receives the voltage data for each remote Node through the base station, it compares it with
a predefined threshold of 2.1V. If the measurement is equivalent to the threshold, it triggers the
predefined actions. For instance, it can send a notification alert to the user via a push email or
tweets. Figure 9 demonstrates the notification email received by the user as soon as the threshold
11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
69
value is reached. The time taken to notify the user from the time the event has occurred, in this
case low battery voltage, was also measured. Using a variable DC power supply, the voltage for
the End Device was manually reduced to 2.1V and the time it takes to receive the alert
notification via an email was noted. Ten trials were conducted and it is observed that it takes
about 8-13s and an average of 11s for the notification email to be auto generated and delivered to
the user on their specified email account from the Open.Sen.se server (Figure 10). For event
notification, we consider this value to be acceptable as the required time to notify the user.
Figure 9. Notification Email to alert the user on low battery voltage
Figure 10. Time taken for auto generation and delivery of Email Alert Notification (10 attempts)
6.3. Battery Lifetime of the End Devices
For wireless sensor networks, energy efficiency is one of the important functional indexes since it
directly affects the life cycle of the system. Replacing batteries regularly for failed sensor nodes
in huge wireless networks is not convenient due to terrain and space limitations and also due to
hazardous environments in which they are placed in. Therefore, the best method to save energy is
setting sleep mechanism. The power consumption measurement is only carried out for the End
Devices as the Coordinator is mains powered at the base station. To provide for an energy-
efficient operation mode, End Devices are configured to be in a cyclic sleep mode (SM = 4).
After transmission has completed, the End Device will return to sleep mode for another sleep
cycle. The following Table 1 shows the average power consumption during different modes of an
End Device. The measured average power consumption is not considering the power consumed
by the XBee module only, but also includes the voltage regulation component and its peripheral
circuits.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
70
Table 1. Current measurement of an End Device
Parameters End Device
Activate and Deactivate current (Ionoff) 8.1mA
Listen current (Ilisten) 40mA
Transmitter current (Itrans) 38mA
Sleep current (Isleep) 0.6mA
Battery Capacity 2000mAh
Battery Voltage 9V
The transmitted data from the End Device consisted of 2 bytes (one to encode the sensed
temperature and the other for the supply voltage). With this data, MATLABĀ® simulations were
conducted to estimate the lifetime of XBee ZB wireless sensor nodes with variable data packet
size and different values of consecutive transmission time (update period) as shown in Figure 11.
Figure 11. Wireless Sensor Network Node lifetime with different packet size and update period
The figures include two extreme cases for the value of data size: 2 bytes and 102 bytes which is
the maximum admissible value of the ZigBee/802.15.4 MAC payload. From the results obtained,
the figure shows that ZigBee technology provides a typical maximum battery lifetime of up to
several years for many typical scenarios of mote networks. It was also observed that the lifetime
of the node decreases as the packet size increases. Hence, it is also possible to achieve longer
lifetime for battery powered sensor nodes using high current capacity lithium batteries.
Apparently, the power consumption of ZigBee End Devices using the cyclic sleep mode can be
reduced effectively, which will improve the lifetime of the entire network.
7. CONCLUSIONS
This paper proposed a flexible architecture for integration of Wireless Sensor Networks to the
Cloud for sensor data collection and sharing using REST based Web services as an interoperable
application layer which can be directly integrated into other applications. To avoid loss of data
13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
71
and network disruption due to failure of Coordinator, we embedded intelligence at different
architectural layers to accommodate for the diverse requirements of possible application scenarios
with minimum redesign and recoding. The evaluation results illustrate that the sensor data can be
accessed by the users anywhere and on any mobile device with internet access. The results also
demonstrated that it takes an average of 11s for the alert notification email to be auto generated
and delivered to the user on their specified email account from the Open.Sen.se server. In
addition, using the sleep mechanism for low power XBee ZB transceiver modules provided an
energy efficient approach to increase the lifetime of sensor nodes.
Our future research will focus on integrating Body Sensor Networks (BSNs) to the Cloud for real-
time patient monitoring and notification.
ACKNOWLEDGEMENTS
This work was supported by Priority Research Centers program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2009-
0093828) and MKEC (The Ministry of Knowledge Economy), Korea, under the ITRC
(Information Technology Research Center) supported program supervised by the NIPA, National
IT Industry Promotion Agency (NIPA-2013-H0301-13-2005).
REFERENCES
[1] M. Swan, "Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the
Quantified Self 2.0," Journal of Sensor and Actuator Networks, vol. 1, pp. 217-253, 2012.
[2] W. Wei, K. Lee, and D. Murray, "Integrating sensors with the cloud using dynamic proxies," in
Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International
Symposium on,, 2012, pp. 1466-1471.
[3] Perumal.B, P. Rajasekaran.M, and Ramalingam.H.M, "WSN INTEGRATED CLOUD FOR
AUTOMATED TELEMEDICINE (ATM) BASED e-HEALTHCARE APPLICATIONS," in 4th
International Conference on Bioinformatics and Biomedical Technology, Singapore, 2012, pp. 166-
170.
[4] C. Alcaraz, P. Najera, J. Lopez, and R. Roman, "Wireless Sensor Networks and the Internet of
Things: Do We Need a Complete Integration?," presented at the 1st International Workshop on the
Security of the Internet of Things (SecIoT'10), Tokyo ,Japan, 2010.
[5] (2012, 20th December, 2012). Open.Sen.se. Available: http://open.sen.se/sensemeters/tab/3114/
[6] A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, et al., "ALARM-NET: Wireless sensor
networks for assisted-living and residential monitoring," University of Virginia Computer Science
Department Technical Report, 2006.
[7] D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, "Codeblue: An ad hoc sensor network
infrastructure for emergency medical care," in International workshop on wearable and implantable
body sensor networks, 2004.
[8] G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, et al., "Deploying a wireless
sensor network on an active volcano," Internet Computing, IEEE, vol. 10, pp. 18-25, 2006.
[9] J. Tooker, X. Dong, M. C. Vuran, and S. Irmak, "Connecting soil to the cloud: A wireless
underground sensor network testbed," in Sensor, Mesh and Ad Hoc Communications and Networks
(SECON), 2012 9th Annual IEEE Communications Society Conference on, 2012, pp. 79-81.
[10] F. Kausar, E. Al Eisa, and I. Bakhsh, "Intelligent Home Monitoring Using RSSI in Wireless Sensor
Networks," International Journal of Computer Networks & Communications (IJCNC), vol. 4, pp. 33-
46, 2012.
[11] H. ElAarag, D. Bauschlicher, and S. Bauschlicher, "System Architecture of HatterHealthConnect: An
Integration of Body Sensor Networks and Social Networks to Improve Health Awareness,"
International Journal of Computer Networks & Communications, vol. 5, p. 22, 2013.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
72
[12] P. A. C. d. S. Neves and J. J. P. C. Rodrigues, "Internet Protocol over Wireless Sensor Networks,
from Myth to Reality," JOURNAL OF COMMUNICATIONS, vol. 5, pp. 189-195, 2010.
[13] M. R. KosanoviÄ and M. K. StojÄev, "CONNECTING WIRELESS SENSOR NETWORKS TO
INTERNET," FACTA UNIVERSITATIS, Mechanical Engineering, vol. 9, pp. 169-182, 2011.
[14] A. E. Kouche, "Towards a wireless sensor network platform for the Internet of Things: Sprouts WSN
platform," in Communications (ICC), 2012 IEEE International Conference on,, 2012, pp. 632-636.
[15] B. Li and J. Yu, "Research and Application on the Smart Home Based on Component Technologies
and Internet of Things," Procedia Engineering, vol. 15, pp. 2087-2092, // 2011.
[16] N. Mitton, S. Papavassiliou, A. Puliafito, and K. S. Trivedi, "Combining Cloud and sensors in a smart
city environment," EURASIP Journal on Wireless Communications and Networking, vol. 2012, p.
247, 2012.
[17] D. Guinard and V. Trifa, "Towards the web of things: Web mashups for embedded devices," in
Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM 2009),
in proceedings of WWW (International World Wide Web Conferences), Madrid, Spain, 2009.
[18] N. B. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, "Tiny web services: design and
implementation of interoperable and evolvable sensor networks," in Proceedings of the 6th ACM
conference on Embedded network sensor systems, 2008, pp. 253-266.
[19] A. Kansal, S. Nath, J. Liu, and F. Zhao, "SenseWeb: An Infrastructure for Shared Sensing," IEEE
MultiMedia, vol. 14, pp. 8-13, 2007.
[20] D. International, "XBee User Manual," ed: Digi International, 2012, pp. 1-155.
[21] C. Chiu-Chiao, H. Ching Yuan, W. Shiau-Chin, and L. Cheng-Min, "Bluetooth-Based Android
Interactive Applications for Smart Living," in Innovations in Bio-inspired Computing and
Applications (IBICA), 2011 Second International Conference on, 2011, pp. 309-312.
[22] C.-H. Chen, C.-C. Gao, and J.-J. Chen, "Intelligent Home Energy Conservation System Based On
WSN," presented at the International Conference on Electrical, Electronics and Civil Engineering,
Pattaya, 2011.
[23] S. Hilton. (2012, 14 January). Progression from M2M to the Internet of Things: an introductory blog.
Available: http://blog.bosch-si.com/progression-from-m2m-to-internet-of-things-an-introductory-
blog/
[24] Z. Alliance. (2012, accessed on 6 October). ZigBee Specification. Available: http://www.zigbee.org
[25] Y. A. Alqudah, "VITAL SIGNS REMOTE MONITORING AND ANALYSIS: SEAMLESS
INTEGRATION WITH A SMART PHONE," Biomedical Engineering: Applications, Basis and
Communications, vol. 0, p. 1350003.
[26] C. Doukas, Building Internet of Things with the Arduino vol. 1, 2012.