1,543 results on '"M2M"'
Search Results
202. HTML5 Standards and Open API Mashups for the Web of Things
- Author
-
Cha, Si-Ho, Yun, Yoemun, Kim, Tai-hoon, editor, Mohammed, Sabah, editor, Ramos, Carlos, editor, Abawajy, Jemal, editor, Kang, Byeong-Ho, editor, and Ślęzak, Dominik, editor
- Published
- 2012
- Full Text
- View/download PDF
203. Management Framework Based on a Vending Machine Scenario
- Author
-
Wei, Ya-Ting, Cho, Jae-Hyoung, Lee, Jae-Oh, Lee, Geuk, editor, Howard, Daniel, editor, Ślęzak, Dominik, editor, and Hong, You Sik, editor
- Published
- 2012
- Full Text
- View/download PDF
204. Research on Ubiquitous Network Technique and Application
- Author
-
Zhu, Ping, Xu, Xiaofei, Wang, Yongheng, editor, and Zhang, Xiaoming, editor
- Published
- 2012
- Full Text
- View/download PDF
205. Remote Monitoring of Electric Vehicle Based on M2M in Mobile Platform
- Author
-
Bayarmagnai, Erdenebat, Lee, Sung-Hyup, Kim, Do-Hyeun, Park, James J. (Jong Hyuk), editor, Jeong, Young-Sik, editor, Park, Sang Oh, editor, and Chen, Hsing-Chung, editor
- Published
- 2012
- Full Text
- View/download PDF
206. Internet of Things: Principle, Framework and Application
- Author
-
Li, Tong, Chen, Liping, and Zhang, Ying, editor
- Published
- 2012
- Full Text
- View/download PDF
207. A Secure Machine to Machine-Based Framework for Service Provisioning in Cloud Computing Infrastructures
- Author
-
Cagalaban, Giovanni, Ahn, Jae Young, Kim, Seoksoo, and Zhu, Min, editor
- Published
- 2012
- Full Text
- View/download PDF
208. M2M Applications and Open API: What Could Be Next?
- Author
-
Sneps-Sneppe, Manfred, Namiot, Dmitry, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Andreev, Sergey, editor, Balandin, Sergey, editor, and Koucheryavy, Yevgeni, editor
- Published
- 2012
- Full Text
- View/download PDF
209. Survey on Congestion Control Mechanisms for Wireless Sensor Networks
- Author
-
Dashkova, Ekaterina, Gurtov, Andrei, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Andreev, Sergey, editor, Balandin, Sergey, editor, and Koucheryavy, Yevgeni, editor
- Published
- 2012
- Full Text
- View/download PDF
210. Creating Smart Cities.
- Author
-
Jozić, Mikela, Zrno, Vjekoslav, and Cvjetković, Slobodanka Jelena
- Subjects
SMART cities ,INTERNET of things ,INFORMATION & communication technologies ,MANAGEMENT ,PERSONS - Abstract
Smart cities refer to integrated cities where the essential is interconnectedness and smart development of the economy, people, management, mobility, environment and living. What makes a city smart is connected to following elements: "10; the strong introduction of Information and Communications Technology (ICT) into the business and private process "10; the application of smart network where all the elements of the system are connected in an intelligent and energy-efficient way "10; Internet connection of all objects (Internet of Things) using M2M (Machine to Machine) communication "10; reducing environment pollution through the introduction of intelligent transport systems "10; increasing energy efficiency through the application of smart metering, but also by introduction innovative solutions in construction. [ABSTRACT FROM AUTHOR]
- Published
- 2018
211. Design of dual-band reflectarray using genetic algorithm.
- Author
-
Tamami Maruyama
- Subjects
- *
GENETIC algorithms , *REFLECTARRAY antennas , *ANTENNAS (Electronics) , *POLARIZATION (Electricity) , *RADIO frequency - Abstract
This paper proposes novel design method of dual-band reflectarray using genetic algorithm (GA). Ordinary, each elements of reflectarray are designed to have desired reflection phase. However, when we adopt same polarization in dual frequencies, the element configuration designed to satisfy desired reflection phase in one frequency influences the characteristics in other frequency. Therefore, it is difficult to achieve dual-band reflectarray. To address the issues, we adopt two layer patches for element to increase flexibility of design and optimize the patches configuration using GA. As a result, we achieve novel reflectarray that reflect wave towards the direction of theta equal to 27 deg. and phi equal to 0 deg. in dual frequency simultaneously when incidence wave is coming from the direction of theta equal to 0 deg. and phi equal to 0 deg. in dual frequency. [ABSTRACT FROM AUTHOR]
- Published
- 2017
212. Cognitive Adaptive Systems for Industrial Internet of Things Using Reinforcement Algorithm
- Author
-
Anand Singh Rajawat, S. B. Goyal, Chetan Chauhan, Pradeep Bedi, Mukesh Prasad, and Tony Jan
- Subjects
0906 Electrical and Electronic Engineering ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,5G ,Industrial Internet of Things ,D2D ,M2M ,reinforcement learning algorithms ,Electrical and Electronic Engineering - Abstract
Agile product development cycles and re-configurable Industrial Internet of Things (IIoT) allow more flexible and resilient industrial production systems that can handle a broader range of challenges and improve their productivity. Reinforcement Learning (RL) was shown to be able to support industrial production systems to be flexible and resilient to respond to changes in real time. This study examines the use of RL in a wide range of adaptive cognitive systems with IIoT-edges in manufacturing processes. We propose a cognitive adaptive system using IIoT with RL (CAS-IIoT-RL) and our experimental analysis showed that the proposed model showed improvements with adaptive and dynamic decision controls in challenging industrial environments.
- Published
- 2023
- Full Text
- View/download PDF
213. A Novel Algorithm for Selecting M2M Gateway Using Geographical Region-Based Query in M2M Platform
- Author
-
Kim, Minsu, Son, Kijun, Byun, Tae-Young, Kim, Tai-hoon, editor, Adeli, Hojjat, editor, Robles, Rosslin John, editor, and Balitanas, Maricel, editor
- Published
- 2011
- Full Text
- View/download PDF
214. A New Algorithm to Estimate Sensing Information for M2M Platform
- Author
-
Kim, Minsu, Son, Kijun, Byun, Tae-Young, Kim, Tai-hoon, editor, Adeli, Hojjat, editor, Robles, Rosslin John, editor, and Balitanas, Maricel, editor
- Published
- 2011
- Full Text
- View/download PDF
215. A novel root-index based prioritized random access scheme for 5G cellular networks
- Author
-
Taehoon Kim, Han Seung Jang, and Dan Keun Sung
- Subjects
Internet-of-Everything ,M2M ,Random access ,Zadoff–Chu sequence ,Access priority ,Information technology ,T58.5-58.64 - Abstract
Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE). One of the challenging issues is to support the quality of service (QoS) during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA) procedure and propose a novel root-index based prioritized random access (RIPRA) scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.
- Published
- 2015
- Full Text
- View/download PDF
216. Machine to Machine Comunication Management
- Author
-
Andres Melian Navas and Caridad Anias Calderón
- Subjects
gestión ,M2M ,Smart grid ,LWM2M ,Mechanical engineering and machinery ,TJ1-1570 ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Today are a lot of devices or machines that communicates between each other without human interaction,this technology is actually known as “Machine to machine communications. Many of these devicesare common objects like TVs, cell phones and even home objects likes lamps, cooks, air-conditioned andothers. This technology is suffering a huge growth and a vertiginous development, having a count theuse of this one into a lot of areas like: smart home, smart grid, environmental monitory, and others thatare directed for green technology and the care of the environment. The management of these services,applications and devices are a primitive for the development of this technology and its performance, however,the high cost of the management is a restriction for its development because almost all the solutionsnow a days are proprietary. The selection and analysis of a newest standardized management protocolfor this communication, so like, it’s possible use into a typical scenario of this technology (smart grid), isthe main contribution of this paper.
- Published
- 2015
- Full Text
- View/download PDF
217. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources
- Author
-
Tiago D. P. Mendes, Radu Godina, Eduardo M. G. Rodrigues, João C. O. Matias, and João P. S. Catalão
- Subjects
smart home ,HAN ,M2M ,wireless home communication protocols ,Technology - Abstract
The paper discusses Home Area Networks (HAN) communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M) communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.
- Published
- 2015
- Full Text
- View/download PDF
218. The challenges of M2M massive access in wireless cellular networks
- Author
-
Andrea Biral, Marco Centenaro, Andrea Zanella, Lorenzo Vangelista, and Michele Zorzi
- Subjects
M2M ,MTD ,MTC ,Massive access ,5G ,Information technology ,T58.5-58.64 - Abstract
The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT) and Machine-to-Machine (M2M) services, which involve communication between Machine-Type Devices (MTDs) in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.
- Published
- 2015
- Full Text
- View/download PDF
219. A Study on Marker Overlapping Control for M2M-Based Augmented Reality Multiple Object Loading Using Bresenham Algorithm
- Author
-
Jung, Sungmo, Song, Jae-gu, Kim, Seoksoo, Kim, Tai-hoon, editor, Pal, Sankar K., editor, Grosky, William I., editor, Pissinou, Niki, editor, Shih, Timothy K., editor, and Ślęzak, Dominik, editor
- Published
- 2010
- Full Text
- View/download PDF
220. Trends in M2M Application Services Based on a Smart Phone
- Author
-
Ahn, Jae Young, Song, Jae-gu, Hwang, Dae-Joon, Kim, Seoksoo, Kim, Tai-hoon, editor, Kim, Haeng-Kon, editor, Khan, Muhammad Khurram, editor, Kiumi, Akingbehin, editor, Fang, Wai-chi, editor, and Ślęzak, Dominik, editor
- Published
- 2010
- Full Text
- View/download PDF
221. A Study on M2M-based System for Hygienic Meteorology Service
- Author
-
Song, Jae-gu, Ahn, Jae Young, Kim, Seoksoo, Kim, Tai-hoon, editor, Stoica, Adrian, editor, and Chang, Ruay-Shiung, editor
- Published
- 2010
- Full Text
- View/download PDF
222. Development of High-Integrity Software Product Lines Using Model Transformation
- Author
-
Hutchesson, Stuart, McDermid, John, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Schoitsch, Erwin, editor
- Published
- 2010
- Full Text
- View/download PDF
223. A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture.
- Author
-
Ouaissa, Mariya and Rhattoy, Abdallah
- Subjects
SMART cities ,IMAGE encryption ,COMPUTER architecture ,DATA integrity - Abstract
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It provides the ability to remotely monitor, manage and control devices. The main features of a smart city include privacy of users and security of communication. The distributed architecture of IoT aims at providing location awareness and low-latency interactions to Machine-to-Machine (M2M) applications. In this context, the Long Term Evolution (LTE) technology and its evolutions are expected to play a major role as a communication infrastructure that guarantees low deployment costs and embedded security, we show how a network deployment that exploits Device-to-Device (D2D) communications and Wireless Sensor Network (WSN), currently under definition within 3rd Generation Partnership Project (3GPP) and non-3GPP access network, can be employed to support efficient communication between M2M devices (nodes and smart objects) and the core network in LTE system. In this paper, we propose a secure group model include different authentication mechanisms combined between D2D and WSN technologies that allow the protection of M2M devices through strong encryption and authentication means, so that devices can benefit from high security functionalities without however having to execute computationally intensive operations with a low communication complexity. The results obtained show that our model firstly solve the initial key establishment and integrity problems in the presence of the inside adversaries in networks and offers best performance than the standard Bluetooth in D2D link. Secondly our proposed examine the area of authentication for sensor networks by make a combination between algorithms such as TinyPK and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in order to secure the link between sensors and achieve a high levels of security. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
224. Anonymous mutual authentication with location privacy support for secure communication in M2M home network services.
- Author
-
Gope, Prosanta
- Abstract
Machine to machine (M2M) communications have significant application potential in the emerging networks including home network. The advent of M2M communication brings numerous security issues as well, while existing efforts have not fully solved those issues. In this article, we propose a secure lightweight anonymous authentication and key agreement protocol for M2M home network service, which can guarantee to resist various security issues like, forgery attacks, insider attacks, masquerade attacks, resilience to key exposure, etc. Furthermore, the proposed protocol generates reasonable additional computational and communication overhead, which is also verified by performance analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
225. On the performance of UNB for machine‐to‐machine low earth orbit (LEO) satellite communications.
- Author
-
Anteur, Mehdi, Thomas, Nathalie, Deslandes, Vincent, and Beylot, André‐Luc
- Subjects
LOW earth orbit satellites ,TELECOMMUNICATION satellites ,NARROW gap semiconductors ,TELECOMMUNICATION ,GAUSSIAN function - Abstract
Summary: Ultra narrow band (UNB) is a widely used technology for machine‐to‐machine and low‐power wide‐area communications. Its properties, long range with small RF power, make it naturally attractive for satellite communications but also draw new challenges compared with terrestrial systems where this technology is already deployed. Indeed, the main advantage of UNB signals, their small bandwidth, makes them more sensitive to frequency drifts that are particularly present in the case of LEO satellite systems. It also implies the use of a random access method in which the carrier frequency is a parameter unknown by the receiver. In this paper, we propose a general semianalytical model to evaluate the performance of a terrestrial or satellite system using UNB technology, taking into account the multiuser interference and the frequency drift. This model is then used to assess the performance (packet loss ratio and throughput) on the return link medium access control (MAC) of a representative LEO satellite system. With our model, we analyze the effect of frequency drift on the system performance. This paper also proposes to investigate more deeply the multiuser interference modeling in order to estimate accurately the performances of a UNB system in terms of bit error rate (BER). We propose a semianalytical approach to study the interference in presence of arbitrary power imbalance that includes the effect of frequency offset and frequency drift and applicable for any linear modulation and any pulse‐shaping filter. The expression of the multiuser interference is established in the general case. We then propose a methodology to compare this exact model to the Gaussian interference approximation (mainly used through the central limit theorem) in order to assess its accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
226. On Efficient Scheduling of H2H Traffic and Reducing Signaling Overhead due to Uplink Small Data M2M Traffic in LTE-A Networks.
- Author
-
Giluka, Mukesh Kumar, Pasca, Thomas Valerrian, Tamma, Bheemarjuna Reddy, and Rajoria, Nitish
- Subjects
MACHINE-to-machine communications ,COMPUTER scheduling ,SIGNAL processing ,TELECOMMUNICATION links ,INTERNET of things ,LONG-Term Evolution (Telecommunications) ,RADIO access networks - Abstract
Large coverage and global connectivity makes cellular networks as preferred choice for internet of things (IoT). Machine-to-machine (M2M) communications deal with communication and networking aspects of IoT. Since, cellular networks are optimized to support human-to-human (H2H) communication (e.g., Voice calls, Internet), incorporating M2M communication may affect the QoS of the former. Also, the large number of M2M devices incur significant signaling overhead on both core network (CN) and radio access network (RAN). In LTE-A networks, EPS bearer establishment procedure to connect a device to the PDN gateway involves several signaling messages exchange between the device and the network. M2M devices mostly generate traffic of low volume and less frequent, in nature. So, it is very uneconomical to have rigorous signaling messages exchange to send few bytes of data. In this paper, we first studied class based dynamic priority (CBDP) algorithm Giluka et al. (in: Proceedings of IEEE WF-IoT, 2014), which is a delay aware radio resource scheduling algorithm to support uplink M2M traffic with minimal effect on QoS of uplink H2H traffic. Further, we modeled the optimal behavior of the CBDP algorithm and compared with its behavior in practical scenarios. Apart from this, we propose a lightweight EPS bearer establishment procedure to be followed by M2M devices sending small data, in which M2M small data is piggybacked with control message. Further, in the same procedure, redundant signaling messages for small data transmission (SDT) are carefully removed preserving the security aspects of the system. To ensure security for the small data transmitted, a new insightful technique of replacing authentication with confidentiality is conceived. With this, we propose an enhanced version of CBDP algorithm, named as Non-SDT-CBDP algorithm or NSDT-CBDP algorithm, which schedules resources only to H2H and NSDT-M2M flows while SDT-M2M flows are piggybacked with Message 3 (MSG-3) of lightweight EPS bearer establishment procedure. The simulation results show performance gain of NSDT-CBDP over CBDP, specially for class-3 M2M and class-4 H2H. The NSDT-CBDP algorithm show percentage reduction in packet loss ratio by 25% for class-3 M2M, percentage reduction in end-to-end delay by 11 and 19% for class-4 H2H and class-3 M2M, percentage gain in throughput by 27 and 19% for class-4 H2H and class-3 M2M. Apart from this, NSDT-CBDP algorithm is able to allocate 12% more RBs to H2H devices in comparison to CBDP algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
227. New Method Based on Priority of Heterogeneous Traffic for Scheduling Techniques in M2M Communications over LTE Networks.
- Author
-
Ouaissa, Mariyam and Rhattoy, Abdallah
- Subjects
LONG-Term Evolution (Telecommunications) ,WIRELESS communications ,QUALITY of service ,RESOURCE allocation ,ALGORITHMS - Abstract
Machine to Machine (M2M) communication is a technology for machines communicating with each other without human intervention. Long Term Evolution (LTE) and Long-Term Evolution-Advanced (LTE-A) cellular networks technologies provide the resources required for M2M communication. However, LTE is required to meet M2M communication requirements, such as power management and support for a large number of devices while maintaining the Quality of Service (QoS) requirements for these devices. Resource allocation or scheduling is one of the key challenges facing M2M communications over Long-Term Evolution networks. M2M traffic has unique characteristics; it usually consists of a large number of small data packets, with specific delays, generated by a potentially large number of devices competing on scarce radio resources. In this article, we will present the scheduling techniques on the Packet Downlink Control Channel (PDCCH) in a M2M scenario based on the priority and differentiation between heterogeneous traffic (real time and non-real time) to achieve high spectral efficiency in cellular systems and provide quality of service guarantees for system users. The results obtained show that the FLS downlink scheduler is the optimal solution based on our proposed method which offers more priority to the real time service (video and voip) than the non real time service (best effort). [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
228. Internet of Everything (IoE): A New Technology Era will have Impact on Every Facet of our Life.
- Author
-
Ravikanti, Sandeep
- Subjects
INTERNET of things ,SMARTPHONES ,BLUETOOTH technology ,WIRELESS Internet ,NEAR field communication ,INTELLIGENT networks ,ARTIFICIAL intelligence - Abstract
The word internet is changed the way we live, the way we take decisions, the way we think and the way we act etc. Its playing most important in day to day life of humans we can confidently say that Internet is the 4th requirement which is added to our basic survival things like Food, Cloths, Shelter and the Internet In short period of time, the Internet has had an amazing impact on almost everyone's life. With the power of it we are able to get updated information on time; we are able to post new ideas, share information with others, technologies, innovations around the world minute by minute. It evolved a lot from Arpanet to till date and showing impact on many things like business transactions, logistics management, health, industry automobiles, farming, transportation and many more. The most important thing we need to observe here is minute to minute and day to day more number of devices are getting connected to the internet with the help of advanced technologies like Internet of Things (IoT).Internet Of Everything (IoE), Industrial Internet of Things (IIoT), Web of Things(WoT). The year 1969 we have only four devices with internet, in the year 2012 its increased to 8.7 billion connected devices, 2017 the number is increased to 29 billion connected devices by 2020 according to Cisco this number will be increased to 50 billion devices. These numbers are the just examples how much impact its showing in our day to day life. So the more usage of internet is creating platform for developing new technologies like Internet of Everything. In this paper am giving the overview about what is Internet of Everything (IoE), how its different from IoT, Architecture and its applications. [ABSTRACT FROM AUTHOR]
- Published
- 2018
229. Performance Analysis of M2M Traffic in LTE Network Using Queuing Systems with Random Resource Requirements.
- Author
-
Sopin, E. S., Ageev, K. A., Markova, E. V., Vikhrova, O. G., and Gaidamaka, Yu. V.
- Abstract
Abstract: We analyze a multiserver queuing system, in which customers require a server and a certain amount of limited resources for the duration of their service. For the case of discrete resources, we develop a recurrence algorithm to evaluate the model's stationary probability distribution and its various stationary characteristics, such as the blocking probability and the average amount of occupied resources. The algorithm is applied to analysis of M2M traffic characteristics in a LTE network cell. We derive the cumulative distribution function of radio resource requirements of M2M devices and propose a sampling approach in order to apply the recurrence algorithm to the case of continuous resources. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
230. SEIP: Secure and seamless IP communications for group-oriented machine to machine communications.
- Author
-
Lai, Chengzhe, Guo, Wenlong, Li, Yafei, and Zheng, Dong
- Subjects
BIT rate ,5G networks ,TELECOMMUNICATION systems ,QUALITY of service ,HARDWARE - Abstract
The main requirements of machine to machine (M2M) communication in 5G include support of a massive number of low-data-rate devices and very-low-latency data transfer. Addressing these requirements in 5G requires new methods and in this paper we focus on one of the paramount issues, i.e., secure and seamless IP communications for group-oriented M2M communications. We consider a heterogeneous network architecture based on 3GPP standard, in which the handover occurs between E-UTRAN and Non-3GPP access network. We first propose an improved Proxy Mobile IPv6 (PMIPv6) protocol, and further implement the improved PMIPv6 associated with the group-based lightweight authentication scheme to achieve secure and seamless IP communications, named SEIP, which improves handover latency, packet loss, and signaling overhead. Particularly, SEIP performs access authentication process before IP layer (L3) and link layer (L2) handover to reduce handover delay. In addition, it uses packet buffering and forwarding mechanisms to reduce packet loss during the handover period. SEIP can not only fulfill security requirements in previous protocols, but also can successfully resist some sophisticated attacks, such as redirection, DoS attacks, etc. The results of performance analysis illustrate that SEIP achieves better performance in terms of signaling cost on wireless link, handover latency and packet loss compared to several other schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
231. A survey of hybrid MAC protocols for machine-to-machine communications.
- Author
-
Amodu, Oluwatosin Ahmed and Othman, Mohamed
- Subjects
MACHINE-to-machine communications ,WIRELESS communications ,QUALITY of service ,ACCESS control ,SCHEDULING - Abstract
Machine-to-machine (M2M) communications are envisaged to present several interesting applications in the coming years. However, they have major setbacks hurdling their massive deployment. A major challenge is ensuring the network and wireless medium robustly accommodate the millions of devices which will be part of this communication paradigm while gracefully accommodating their diverse quality of service requirements. In this regard, medium access control schemes play a vital role. Traditional contention-based protocols are constrained in their performance under high loads while scheduling-based schemes may be faced with limited scalability and poor delay guarantees. Similarly, tree-based contention resolution schemes have some finite delay associated with them. Recently, hybrids of the aforementioned schemes have been studied in literature to solve the problems associated with traditional medium access schemes. This paper surveys the state-of-the-art hybrid schemes for M2M presenting a classification of recent protocols. Furthermore, we give a summary of major areas of interest such as problem solved, approach used and trade-offs. Salient differences in the protocols are identified with insights into opportunities for improvement. Our findings reveal general design guidelines and interesting future directions. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
232. Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency.
- Author
-
Abdurohman, Maman, Putrada, Aji Gautama, Prabowo, Sidik, Wijiutomo, Catur Wirawan, and Elmangoush, Asma
- Abstract
This paper proposes an integrated lighting enabler system (ILES) based on standard machine-to-machine (M2M) platforms. This system provides common services of end-to-and M2M communication for smart lighting system. It is divided into two sub-systems, namely end-device system and server system. On the server side, the M2M platform OpenMTC is used to receive data from the sensors and send response for activating actuators. At the end-device system, a programmable smart lighting device is connected to the actuators and sensors for communicating their data to the server. Some experiments have been done to prove the system concept. The experiment results show that the proposed integrated lighting enabler system is effective to reduce the power consumption by 25.22% (in average). The proving of significance effect in reducing power consumption is measured by the Wilcoxon method. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
233. Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform.
- Author
-
Anggorojati, Bayu, Prasad, Neeli Rashmi, and Prasad, Ramjee
- Subjects
SOFTWARE engineering ,ACCESS control ,COMPUTER security ,ELECTRONIC check conversion ,CRYPTOGRAPHY - Abstract
One of the critical requirement in managing security of any computing system is access control, which includes protection and access management to the available resources. This requirement becomes more strict especially in a distributed computing environment that consists of constrained devices such as Machine-to-Machine (M2M). New challenges in access control are identified in a system comprises a group of distributed multiple M2M gateways forming a so called M2M local cloud platform (Vallati et al. in Wirel Trans Commun 87(3):1071-1091,
2016 ). Scalability is obviously a necessity which is lacking in some existing access control system. In addition, flexibility in managing access from users or entity belonging to other authorization domains as well as delegating access right are not provided as an integrated features. Lately, the capability-based access control has been suggested as method to manage access for M2M as the key enabler of Internet of Things. In this paper, a capability based access control equipped with Elliptic Curve Cryptography based key management is proposed for the M2M local cloud platform. The feasibility of the proposed capability based access control and key management are tested by implementing them within the security manager that is part of the overall component of the platform architecture, and evaluating their performances by a series of experimentations. [ABSTRACT FROM AUTHOR]- Published
- 2018
- Full Text
- View/download PDF
234. An energy consumption model for IEEE 802.11ah WLANs.
- Author
-
Bel, Albert, Adame, Toni, and Bellalta, Boris
- Subjects
IEEE 802.11 (Standard) ,ENERGY consumption ,DATA transmission systems ,WIRELESS communications ,ELECTRIC inverters - Abstract
One of the main challenges when designing a new self-powered Low Power Wide Area Network (LPWAN) technology is the vast operational dependence on its scarce energy resources. Therefore, a thorough identification and characterisation of the main energy consumption processes may lay the foundation for developing novel mechanisms aimed to make a more efficient use of devices’ batteries, as well as for planning future network deployments. This paper provides an analytical energy consumption model for IEEE 802.11ah WLANs, which are expected to become one of the technology drivers in the future development of the Internet of Things (IoT). Given the network characteristics, the presented analytical model is able to provide an estimation of the average energy consumed by a station in the network, predicting its battery lifetime, based on a set of closed-form equations. In addition, this model can be used as a tool to understand the effects of the main network parameters on the network energy consumption, and to find the most suitable network configuration for a given application scenario. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
235. LITERATURE REVIEW ON SECURITY ASPECTS OF IOT.
- Author
-
Malik, Rohit, Solanki, Kamna, and Dalal, Sandeep
- Subjects
LITERATURE reviews ,INTERNET of things ,WIRELESS sensor networks ,INTERNET security ,INTERNET privacy - Abstract
This Review paper sheds light on the very approach of Internet of Things. The whole conception of having all the gadgets to be interconnected is a landmark of our technological advancements. The wonders that IoT has provided us have redefined what communication and efficiency means to us. Accessibility has become a more refined privilege, all because of IoT. However it seems all that glitter isn't gold, IoT being a technological wonder it still attaches some limitations to it, foremost of it being the issue of security where data privacy is a very crucial issue that goes in various spheres of social and technological systems, it is something that IoT has to be developed to overcome. Also, the second aspect is the number of devices connected. This research paper also discusses the design aspects of the IoT architecture, its components and various security issues of IoT which can be developed to achieve better efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
236. On Study Results: Round Trip Engineering of Space Systems
- Author
-
Sadovykh, Andrey, Vigier, Lionel, Gomez, Eduardo, Hoffmann, Andreas, Grossmann, Juergen, Estekhin, Oleg, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Paige, Richard F., editor, Hartman, Alan, editor, and Rensink, Arend, editor
- Published
- 2009
- Full Text
- View/download PDF
237. A review of Internet of Things: qualifying technologies and boundless horizon
- Author
-
Goel, Shalini Sharma, Goel, Anubhav, Kumar, Mohit, and Moltó, Germán
- Published
- 2021
- Full Text
- View/download PDF
238. Evaluation of the application of correctives assisted by radio communication between machines - a case study
- Author
-
Schafer, Alexandre, Russini, Alexandre, Amaral, Lúcio de Paula, and Vargas, Rogério Rodrigues de
- Subjects
Precision agriculture ,Variable rate ,CIENCIAS AGRARIAS::AGRONOMIA [CNPQ] ,M2M ,Taxa variável ,Agricultura de precisão - Abstract
A data da defesa foi registrada conforme consta na ata de defesa. In the agricultural mechanization field, communication between machines has gained popularity, improving agricultural operations. Using a case study, this paper aims to evaluate, the overlap in soil amendments application using radio communication between machines. It also seeks to determine the difference in applied areas and the return on investment for such technology. Three application formats were the focus of the study, including field activities, and controlled bench simulations. The applications consist of: Application A, which accomplishes the real-field application using the machine-to-machine communication system; Application B, performed through simulation without the system; and Application C, which simulates using the intermachine communication system. The finding shows that operations A, B, and C had average overlaps of 4.72%, 4.17%, and 4.73%, respectively. Therefore, the overlap decreasing in applied areas was 13.4%. The reduction in the amount of product for the total overlap considering the simulation conditions was 0.56%, saving about R$ 18.995,2 per equipment. The results indicate that after applying 71 tons of product per machine or after 10 months, ‘the return on investments is given. Na área de mecanização agrícola a comunicação entre máquinas tem se popularizado visando aumentar a eficiência das operações agrícolas. Neste sentido, o presente estudo tem por objetivo avaliar a partir de um estudo de caso a sobreposição na aplicação a lanço de corretivos de solo utilizando a comunicação via rádio entre máquinas, buscando determinar a diferença de áreas aplicadas e o retorno do investimento desta tecnologia. Foram elaborados no estudo três formatos de aplicação contemplando a operação de campo e simulações em bancada controlada. As aplicações consistem em: Aplicação A considerando a aplicação real de campo utilizando o sistema de comunicação entre máquinas; Aplicação B sendo realizada por meio de simulação sem o sistema, e Aplicação C com simulação utilizando o sistema de comunicação entre máquinas. Os resultados demonstram que houve uma sobreposição média de 4,72 %, 4,17% e 4,73% para as aplicações A, B e C, respectivamente. Desta forma, a redução na transposição de áreas aplicadas foi de 13,4%, em relação a sobreposição total considerando as condições de simulação, a redução na quantidade de produto foi de 0,56% gerando uma economia de produto na ordem de R$ 18.995,2 por equipamento, tendo o retorno do investimento a partir de 10 meses, ou de 71 toneladas aplicadas por máquina considerando as condições em que o estudo foi realizado.
- Published
- 2022
239. Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
- Author
-
Evangelina Lara, Leocundo Aguilar, Mauricio A. Sanchez, and Jesús A. García
- Subjects
internet of things ,industrial internet of things ,authentication ,m2m ,lightweight ,avispa ,ban ,Chemical technology ,TP1-1185 - Abstract
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows−Abadi−Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.
- Published
- 2020
- Full Text
- View/download PDF
240. A latency analysis for M2M and OG-like traffic patterns in different HSPA core network configurations
- Author
-
M. V. Popović, D. D. Drajić, and S. M. Krčo
- Subjects
Core network delay ,HSPA ,Latency ,M2M ,Online Gaming ,RTT ,Telecommunication ,TK5101-6720 - Abstract
In this paper we present an analysis intended to reveal possible impacts of core network features on latency for modelled M2M and Online Gaming traffic. Simulations were performed in a live 3G/HSPA network. Test traffic simulating multiplayer real-time games and M2M applications was generated on 10 mobile phones in parallel, sending data to a remote server. APNs with different combinations of hardware and features (proxy server, different GGSNs and firewalls, usage of Service Awareness feature) were chosen. The traffic was recorded on the Gn interface in the mobile core. The goal of experiments was to evaluate any eventually significant variation of average recorded RTTs in the core part of mobile network that would clearly indicate either the impact of used APN on delay for a specific traffic pattern, or selectivity of the APN towards different traffic patterns.
- Published
- 2014
241. IoMT Platform for Pervasive Healthcare Data Aggregation, Processing, and Sharing Based on OneM2M and OpenEHR
- Author
-
Jesús N. S. Rubí and Paulo R. L. Gondim
- Subjects
e-health ,pervasive healthcare ,openehr ,m2m ,iomt ,semantic interoperability ,data warehouse ,data mining ,fhir ,Chemical technology ,TP1-1185 - Abstract
Pervasive healthcare services have undergone a great evolution in recent years. The technological development of communication networks, including the Internet, sensor networks, and M2M (Machine-to-Machine) have given rise to new architectures, applications, and standards related to addressing almost all current e-health challenges. Among the standards, the importance of OpenEHR has been recognized, since it enables the separation of medical semantics from data representation of electronic health records. However, it does not meet the requirements related to interoperability of e-health devices in M2M networks, or in the Internet of Things (IoT) scenarios. Moreover, the lack of interoperability hampers the application of new data-processing techniques, such as data mining and online analytical processing, due to the heterogeneity of the data and the sources. This article proposes an Internet of Medical Things (IoMT) platform for pervasive healthcare that ensures interoperability, quality of the detection process, and scalability in an M2M-based architecture, and provides functionalities for the processing of high volumes of data, knowledge extraction, and common healthcare services. The platform uses the semantics described in OpenEHR for both data quality evaluation and standardization of healthcare data stored by the association of IoMT devices and observations defined in OpenEHR. Moreover, it enables the application of big data techniques and online analytic processing (OLAP) through Hadoop Map/Reduce and content-sharing through fast healthcare interoperability resource (FHIR) application programming interfaces (APIs).
- Published
- 2019
- Full Text
- View/download PDF
242. Design and Implementation of a Narrow-Band Intersatellite Network with Limited Onboard Resources for IoT
- Author
-
Zizung Yoon, Walter Frese, and Klaus Briess
- Subjects
intersatellite communication ,nanosatellite network ,distributed space system ,iot ,m2m ,Chemical technology ,TP1-1185 - Abstract
Satellite networks are inevitable for the ubiquitous connectivity of M2M (machine to machine) and IoT (internet of things) devices. Advances in the miniaturization of satellite technology make networks in LEO (Low Earth Orbit) predestined to serve as a backhaul for narrow-band M2M communication. To reduce latency and increase network responsivity, intersatellite link capability among nodes is a key component in satellite design. The miniaturization of nodes to enable the economical deployment of large networks is also crucial. Thus, this article addresses these key issues and presents a design methodology and implementation of an adaptive network architecture considering highly limited resources, as is the case in a nanosatellite (≈10 kg) network. Potentially applicable multiple access techniques are evaluated. The results show that a time division duplex scheme with session-oriented P2P (point to point) protocols in the data link layer is more suitable for limited resources. Furthermore, an applicable layer model is defined and a protocol implementation is outlined. To demonstrate the technical feasibility of a nanosatellite-based communication network, the S-NET (S band network with nanosatellites) mission has been developed, which consists of four nanosatellites, to demonstrate multi-point crosslink with 100 kbps data rates over distances up to 400 km and optimized communication protocols, pushing the technological boundaries of nanosatellites. The flight results of S-NET prove the feasibility of these nanosatellites as a space-based M2M backhaul.
- Published
- 2019
- Full Text
- View/download PDF
243. IoT6 Project in a Nutshell
- Author
-
Ziegler, Sébastien, Crettaz, Cedric, Galis, Alex, editor, and Gavras, Anastasius, editor
- Published
- 2013
- Full Text
- View/download PDF
244. Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
- Author
-
Azari, Amin and Azari, Amin
- Abstract
—The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications. The ultimate goal is to extract insights from this data and develop solutions that improve quality of life and generate new revenue. Providing large-scale, long-lasting, reliable, and near real-time connectivity is the major challenge in enabling a smart connected world. This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G)and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. Aligned with the main key performance indicators of 5G and beyond 5G networks, we investigate solutions and standards that enable energy efficiency, reliability, low latency, and scalability (connection density) of current and future IoT networks. The solutions include grant-free access and channel coding for short-packet communications, nonorthogonal multiple access, and on-device intelligence. Further, a vision of new paradigm shifts in communication networks in the 2030s is provided, and the integration of the associated new technologies like artificial intelligence, non-terrestrial networks, and new spectra is elaborated. In particular, the potential of using emerging deep learning and federated learning techniques for enhancing the efficiency and security of IoT communication are discussed, and their promises and challenges are introduced. Finally, future research directions toward beyond 5G IoT, QC 20220214
- Published
- 2022
245. Reference Network and Localization Architecture for Smart Manufacturing Based on 5G
- Author
-
Ludwig, Stephan (author), Aschenbrenner, D. (author), Scharle, Marvin (author), Klessig, Henrik (author), Karrenbauer, Michael (author), Wu, Huanzhuo (author), Taghouti, Maroua (author), Lozano, Pedro (author), Schotten, Hans D. (author), Fitzek, F.H.P. (author), Ludwig, Stephan (author), Aschenbrenner, D. (author), Scharle, Marvin (author), Klessig, Henrik (author), Karrenbauer, Michael (author), Wu, Huanzhuo (author), Taghouti, Maroua (author), Lozano, Pedro (author), Schotten, Hans D. (author), and Fitzek, F.H.P. (author)
- Abstract
5G promises to shift Industry 4.0 to the next level by allowing flexible production. However, many communication standards are used throughout a production site, which will stay so in the foreseeable future. Furthermore, localization of assets will be equally valuable in order to get to a higher level of automation. This paper proposes a reference architecture for a convergent localization and communication network for smart manufacturing that combines 5G with other existing technologies and focuses on high-mix, low-volume applications, particularly at small and medium-sized enterprises. The architecture is derived from a set of functional requirements, and we describe different views on this architecture to show how the requirements can be fulfilled. It connects private and public mobile networks with local networking technologies to achieve a flexible setup addressing many industrial use cases., Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public., Mechatronic Design
- Published
- 2022
- Full Text
- View/download PDF
246. INVITED: Ultra Low Power Integrated Transceivers for Near-Field IoT.
- Author
-
Sanduleanu, Mihai and Elfadel, Ibrahim (Abe) M.
- Subjects
RADIO transmitter-receivers ,INTERNET of things ,NEAR field communication ,MACHINE-to-machine communications ,WIRELESS sensor networks ,NOISE control - Abstract
In this paper, we propose mm-Waves for Near-Field IoT, ultralow power transceivers. With small footprint and no external components, the transceivers could be integrated with the sensors, with the wireless sensor nodes organized in a Master-Slave, asymmetrical network. With low complexity and high energy efficiency, the slave nodes benefit from a minimalist design approach with integrated antennas and integrated resonators for absolute frequency accuracy. Two designs are presented. The first is a K-band, super-regenerative, logarithmic-mode, OOK receiver achieving a peak energy efficiency of 200pJ/bit at 4Mb/s and a BER of 10-3. With 800μW peak and 8μW average power, the sensitivity of the receiver is -60dBm for the same data and biterror rates. Realized in a 65nm CMOS process from GF, the active area of the receiver is 740x670μm
2 . The second design is a 100Kb/s, V-band transceiver with integrated antenna. It achieves 20pJ/bit energy efficiency (Rx mode) and it provides means for 1/f noise mitigation. [ABSTRACT FROM AUTHOR]- Published
- 2016
- Full Text
- View/download PDF
247. Model-driven Development of Partial Model-to-Model Transformations in a CASE Tool.
- Author
-
Skersys, Tomas, Danenas, Paulius, and Pavalkis, Saulius
- Subjects
- *
ENGINEERING models , *CUSTOMIZATION , *TRANSPARENCY in architecture , *USER interfaces , *TRANSFORMATION groups - Abstract
Model-to-model (M2M) transformation is at the core of Model Driven Architecture (MDA) and model-driven systems engineering in general. Nevertheless, the support of M2M transformations in CASE tools remains quite poor, and the existing solutions lack so needed transparency, flexibility and customization options. The main goal of this paper is to present an approach and implementation of model-driven development of user-interacted partial M2M transformations in a CASE tool. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
248. Data-Driven Self-Learning Controller for Power-AwareMobile Monitoring IoT Devices
- Author
-
Prauzek Michal, Paterova Tereza, Konecny Jaromir, and Martinek Radek
- Subjects
5G and beyond wireless ,IoT ,LPWAN ,M2M ,Q-learning - Abstract
Nowadays, there is a significant need for maintenance free modern Internet of things (IoT) devices which can monitor an environment. IoT devices such as these are mobile embedded devices which provide data to the internet via Low Power Wide Area Network (LPWAN). LPWAN is a promising communications technology which allows machine to machine (M2M) communication and is suitable for smallmobile embedded devices. The paper presents a novel data-driven self-learning (DDSL) controller algorithm which is dedicated to controlling small mobile maintenance-free embedded IoT devices. The DDSL algorithm is based on a modified Q-learning algorithm which allows energy efficient data-driven behavior of mobile embedded IoT devices. The aim of the DDSL algorithm is to dynamically set operation duty cycles according to the estimation of future collected data values, leading to effective operation of power-aware systems. The presented novel solution was tested on a historical data set and compared with a fixed duty cycle reference algorithm. The root mean square error (RMSE) and measurements parameters considered for the DDSL algorithm were compared to a reference algorithm and two independent criteria (the performance score parameter and normalized geometric distance) were used for overall evaluation and comparison. The experiments showed that the novel DDSL method reaches significantly lowerRMSE while the number of transmitted data count is less than or equal to the fixed duty cycle algorithm. The overall criteria performance score is 40% higher than the reference algorithm base on static confirmation settings.
- Published
- 2022
- Full Text
- View/download PDF
249. Shhh!: Wait till the people leave the room [Machine to machine internet use]
- Author
-
Howarth, Brad
- Published
- 2012
250. HARE: Supporting Efficient Uplink Multi-Hop Communications in Self-Organizing LPWANs.
- Author
-
Adame Vázquez, Toni, Barrachina-Muñoz, Sergio, Bellalta, Boris, and Bel, Albert
- Subjects
- *
WIDE area networks , *SCALABILITY , *ENERGY consumption , *INTERNET of things , *COMPUTER network reliability - Abstract
The emergence of low-power wide area networks (LPWANs) as a new agent in the Internet of Things (IoT) will result in the incorporation into the digital world of low-automated processes from a wide variety of sectors. The single-hop conception of typical LPWAN deployments, though simple and robust, overlooks the self-organization capabilities of network devices, suffers from lack of scalability in crowded scenarios, and pays little attention to energy consumption. Aimed to take the most out of devices' capabilities, the HARE protocol stack is proposed in this paper as a new LPWAN technology flexible enough to adopt uplink multi-hop communications when proving energetically more efficient. In this way, results from a real testbed show energy savings of up to 15% when using a multi-hop approach while keeping the same network reliability. System's self-organizing capability and resilience have been also validated after performing numerous iterations of the association mechanism and deliberately switching off network devices. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.