Filter by subject:
- Protocols [2684]
- Electrical and electronic engineering [2675]
- Communications [2675]
- Information and communication theory [2675]
- Communication system theory [2675]
- Telecommunication [2262]
- Radio links and equipment [1631]
- Computer and control engineering [1148]
- Telecommunication applications [1005]
- Computer hardware [934]
- [915]
- http://iet.metastore.ingenta.com/content/subject/c5640,http://iet.metastore.ingenta.com/content/subject/b6210l,http://iet.metastore.ingenta.com/content/subject/b6250f,http://iet.metastore.ingenta.com/content/subject/b0000,http://iet.metastore.ingenta.com/content/subject/c5620,http://iet.metastore.ingenta.com/content/subject/b6150p,http://iet.metastore.ingenta.com/content/subject/b0200,http://iet.metastore.ingenta.com/content/subject/b6120,http://iet.metastore.ingenta.com/content/subject/c6000,http://iet.metastore.ingenta.com/content/subject/c6100,http://iet.metastore.ingenta.com/content/subject/b0240,http://iet.metastore.ingenta.com/content/subject/c6130,http://iet.metastore.ingenta.com/content/subject/b6150e,http://iet.metastore.ingenta.com/content/subject/c6130s,http://iet.metastore.ingenta.com/content/subject/b6120d,http://iet.metastore.ingenta.com/content/subject/b6250k,http://iet.metastore.ingenta.com/content/subject/c5620w,http://iet.metastore.ingenta.com/content/subject/b0240z,http://iet.metastore.ingenta.com/content/subject/c5620l,http://iet.metastore.ingenta.com/content/subject/c1000,http://iet.metastore.ingenta.com/content/subject/b6120b,http://iet.metastore.ingenta.com/content/subject/c7000,http://iet.metastore.ingenta.com/content/subject/b6150c,http://iet.metastore.ingenta.com/content/subject/b6260,http://iet.metastore.ingenta.com/content/subject/b0100,http://iet.metastore.ingenta.com/content/subject/b0170,http://iet.metastore.ingenta.com/content/subject/b0170n,http://iet.metastore.ingenta.com/content/subject/c1100,http://iet.metastore.ingenta.com/content/subject/c7400,http://iet.metastore.ingenta.com/content/subject/c3000,http://iet.metastore.ingenta.com/content/subject/c3300,http://iet.metastore.ingenta.com/content/subject/b5000,http://iet.metastore.ingenta.com/content/subject/b5200,http://iet.metastore.ingenta.com/content/subject/b6210c,http://iet.metastore.ingenta.com/content/subject/b6210r,http://iet.metastore.ingenta.com/content/subject/b0260,http://iet.metastore.ingenta.com/content/subject/b6250g,http://iet.metastore.ingenta.com/content/subject/b7000,http://iet.metastore.ingenta.com/content/subject/c7410,http://iet.metastore.ingenta.com/content/subject/b8000,http://iet.metastore.ingenta.com/content/subject/b6260f,http://iet.metastore.ingenta.com/content/subject/c1140,http://iet.metastore.ingenta.com/content/subject/c3370,http://iet.metastore.ingenta.com/content/subject/b6140,http://iet.metastore.ingenta.com/content/subject/b5230,http://iet.metastore.ingenta.com/content/subject/a,http://iet.metastore.ingenta.com/content/subject/b6400,http://iet.metastore.ingenta.com/content/subject/b6150j,http://iet.metastore.ingenta.com/content/subject/b6220,http://iet.metastore.ingenta.com/content/subject/b1000,http://iet.metastore.ingenta.com/content/subject/c1200,http://iet.metastore.ingenta.com/content/subject/b0290,http://iet.metastore.ingenta.com/content/subject/b1200,http://iet.metastore.ingenta.com/content/subject/b6210d,http://iet.metastore.ingenta.com/content/subject/b7200,http://iet.metastore.ingenta.com/content/subject/c1260,http://iet.metastore.ingenta.com/content/subject/b0250,http://iet.metastore.ingenta.com/content/subject/c5200,http://iet.metastore.ingenta.com/content/subject/b6260m,http://iet.metastore.ingenta.com/content/subject/b8100,http://iet.metastore.ingenta.com/content/subject/c1260c,http://iet.metastore.ingenta.com/content/subject/b1265,http://iet.metastore.ingenta.com/content/subject/c3370h,http://iet.metastore.ingenta.com/content/subject/c7410f,http://iet.metastore.ingenta.com/content/subject/b0240c,http://iet.metastore.ingenta.com/content/subject/b0240j,http://iet.metastore.ingenta.com/content/subject/b5270,http://iet.metastore.ingenta.com/content/subject/c7410b,http://iet.metastore.ingenta.com/content/subject/c1140z,http://iet.metastore.ingenta.com/content/subject/c6150,http://iet.metastore.ingenta.com/content/subject/c6190,http://iet.metastore.ingenta.com/content/subject/e,http://iet.metastore.ingenta.com/content/subject/c5670,http://iet.metastore.ingenta.com/content/subject/b6250b,http://iet.metastore.ingenta.com/content/subject/b6220b,http://iet.metastore.ingenta.com/content/subject/c7200,http://iet.metastore.ingenta.com/content/subject/b0290f,http://iet.metastore.ingenta.com/content/subject/b6430,http://iet.metastore.ingenta.com/content/subject/c7210,http://iet.metastore.ingenta.com/content/subject/a0000,http://iet.metastore.ingenta.com/content/subject/a8000,http://iet.metastore.ingenta.com/content/subject/b6135,http://iet.metastore.ingenta.com/content/subject/b6420,http://iet.metastore.ingenta.com/content/subject/c7210n,http://iet.metastore.ingenta.com/content/subject/b6250l,http://iet.metastore.ingenta.com/content/subject/b8110,http://iet.metastore.ingenta.com/content/subject/b7210,http://iet.metastore.ingenta.com/content/subject/b7230,http://iet.metastore.ingenta.com/content/subject/c1140c
- c5640,b6210l,b6250f,b0000,c5620,b6150p,b0200,b6120,c6000,c6100,b0240,c6130,b6150e,c6130s,b6120d,b6250k,c5620w,b0240z,c5620l,c1000,b6120b,c7000,b6150c,b6260,b0100,b0170,b0170n,c1100,c7400,c3000,c3300,b5000,b5200,b6210c,b6210r,b0260,b6250g,b7000,c7410,b8000,b6260f,c1140,c3370,b6140,b5230,a,b6400,b6150j,b6220,b1000,c1200,b0290,b1200,b6210d,b7200,c1260,b0250,c5200,b6260m,b8100,c1260c,b1265,c3370h,c7410f,b0240c,b0240j,b5270,c7410b,c1140z,c6150,c6190,e,c5670,b6250b,b6220b,c7200,b0290f,b6430,c7210,a0000,a8000,b6135,b6420,c7210n,b6250l,b8110,b7210,b7230,c1140c
- [857],[792],[698],[655],[649],[595],[542],[525],[463],[463],[349],[349],[343],[306],[265],[251],[241],[227],[227],[223],[214],[211],[203],[172],[168],[159],[150],[150],[150],[144],[141],[137],[136],[136],[133],[131],[129],[122],[110],[108],[96],[92],[89],[80],[79],[74],[73],[72],[72],[62],[61],[60],[60],[60],[60],[59],[56],[55],[54],[54],[54],[52],[52],[52],[51],[50],[45],[44],[43],[42],[42],[42],[41],[40],[38],[38],[37],[37],[37],[36],[35],[35],[35],[35],[33],[33],[32],[32],[31]
- /search/morefacet;jsessionid=887mlejcsbrc6.x-iet-live-01
- /content/searchconcept;jsessionid=887mlejcsbrc6.x-iet-live-01?option1=pub_concept&sortField=prism_publicationDate&pageSize=20&sortDescending=true&value1=b6150m&facetOptions=2&facetNames=pub_concept_facet&operator2=AND&option2=pub_concept_facet&value2=
- See more See less
Filter by content type:
- Article [1532]
- ConferencePaper [1068]
- Chapter [76]
- E-Book [8]
- Appendix [2]
- E-First Article [1]
- ReferenceWorks [1]
Filter by publication date:
- 2011 [139]
- 2012 [130]
- 2006 [129]
- 2005 [128]
- 2007 [123]
- 2003 [114]
- 2004 [110]
- 2010 [101]
- 2020 [94]
- 2008 [92]
- 2019 [91]
- 2000 [86]
- 1995 [84]
- 1997 [81]
- 2015 [78]
- 2013 [76]
- 2014 [76]
- 1999 [74]
- 1998 [72]
- 2001 [69]
- 2002 [64]
- 2017 [61]
- 2009 [59]
- 2018 [59]
- 2016 [54]
- 1996 [49]
- 1994 [32]
- 1992 [31]
- 1993 [19]
- 1991 [11]
- 2021 [2]
- See more See less
Filter by author:
- B. Honary [15]
- Hongke Zhang [12]
- A.C. Boucouvalas [11]
- A.H. Aghvami [10]
- G. Fairhurst [10]
- Jianfeng Guan [10]
- X. Wang [10]
- J.-T. Lim [9]
- J.M. Senior [9]
- R. Tafazolli [9]
- Alex X. Liu [8]
- B.G. Evans [8]
- H. Cruickshank [8]
- H.T. Mouftah [8]
- J. Zhang [8]
- Keqiu Li [8]
- L. Hanzo [8]
- Muhammad Shahzad [8]
- V. Vitsas [8]
- Xiulong Liu [8]
- H.-C. Chao [7]
- J. Dunlop [7]
- J. Zheng [7]
- Mohammad S. Obaidat [7]
- T. O'Farrell [7]
- X.H. Chen [7]
- Yajuan Qin [7]
- Z. Sun [7]
- D. Grace [6]
- F. Adachi [6]
- G.A. Safdar [6]
- J. Oksman [6]
- J.H. Lee [6]
- Q. Wang [6]
- R. Casellas [6]
- R. Prasad [6]
- T. Tsuritani [6]
- V. Friderikos [6]
- Y. Zhang [6]
- Y.-C. Chen [6]
- C. de Almeida [5]
- C.K. Un [5]
- Changgiao Xu [5]
- F.P. Coakley [5]
- Fernando J. Velez [5]
- Guangzhi Qu [5]
- H. Wang [5]
- H.-H. Chen [5]
- Hailin Zhang [5]
- Huachun Zhou [5]
- I. Andonovic [5]
- J. Crowcroft [5]
- J. Murphy [5]
- J.M. Pitts [5]
- K.C. Chua [5]
- Kiseon Kim [5]
- L. Harn [5]
- M.A. Abu-Rgheff [5]
- P. Perry [5]
- P.D. Mitchell [5]
- R. Martinez [5]
- R.P.F. Hoefel [5]
- S.E. Trinder [5]
- T. Otani [5]
- V.C.M. Leung [5]
- W.G. Scanlon [5]
- Yang Xiao [5]
- Yue Cao [5]
- Zhiguo Ding [5]
- A.G. Burr [4]
- A.K. Gupta [4]
- B.-S. Kim [4]
- B.C. Shin [4]
- B.S. Sharif [4]
- Baoyu Zheng [4]
- Binqiang Wang [4]
- C.-M. Huang [4]
- C.K. Siew [4]
- D.J. Edwards [4]
- E. Gunawan [4]
- F.C.M. Lau [4]
- G. Feng [4]
- G. Junyent [4]
- G. Losquadro [4]
- H. Aghvami [4]
- H. Zhang [4]
- H.-J. Lee [4]
- I. Morita [4]
- J. Liu [4]
- J.A. Schormans [4]
- Jing Li [4]
- Ju Liu [4]
- Junde Song [4]
- K. Samaras [4]
- L. Zhao [4]
- Lei Wang [4]
- Li Li [4]
- M. Al-Akaidi [4]
- M. Fleury [4]
- M. Ghanbari [4]
- See more See less
Filter by access type:
The National Institute of Information and Communications Technology (NICT) of Japan has performed communications propagation measurements between the Wideband InterNetworking engineering test and Demonstration Satellite (WINDS, also known as “KIZUNA”) and a moving vehicle earth station. With a focus on the future occurrences of a Nankai Trough earthquake and an associated giant tsunami, regions with a higher disaster risk have been selected for extensive study. Shadowing has been shown to have a large impact on satellite communications due to the use of a directional Ka-band antenna with high rectilinearity. The influence of shadowing is dependent on the seasons, as the conditions of the leaves vary by season for different types of trees. Therefore, in a previous study, we measured the attenuation of a received signal from the satellite throughout the year with shadowing from several types of trees to examine seasonal differences. The results of our year-long investigation revealed seasonal fluctuations in the received power beneath deciduous trees but no such variations beneath evergreen trees. In this chapter, we present the results of the measured user datagram protocol (UDP) throughput for Ka-band satellite communication.
In this chapter, we first review the state-of-the-art schemes for nonorthogonal multiple access where multiple users share the satellite channel radio resources. Among different grant-based and grant-free access schemes, we focus on nonslotted techniques, we study some decoding strategies to improve the performance of asynchronous contention resolution diversity ALOHA. Our preliminary results show that the performance of the decoder can be improved significantly if the information on overlapping bursts' powers and the exact differential delay among the incoming bursts are known at the receiver. We present the simulation results for a simple model and discuss the possible generalizations to a more realistic system scenario. Finally, we shortly discuss the efficiency of the physical layer abstraction methods under our model assumptions.
This study is concerned with the design of active queue management (AQM) subjected to quantisation errors. First, the authors will show here that quantisation errors exist when AQM experiences transmission control protocol (TCP) during the congestion. Second, a TCP/AQM model that takes into account quantisation errors is proposed – the considered quantisers are dynamic and have a scale parameter. Based on this model, stabilisation will be analysed in which the controller and the scaling parameters are obtained using the Lyapunov–Krassovskii functional method. Finally, Matlab simulation results are displayed to show the effectiveness of the proposed method.
To achieve reliable and green communication in the internet of things (IoT) networks, the authors extend the traditional half-duplex quantise-and-forward (QF) cooperation into the simultaneous wireless information and power transfer (SWIPT) regime. This study investigates the achievable rate of the SWIPT-based half-duplex QF cooperation with the channel state information available only at the receivers. The source and destination are provided by the external power supply and the relay simultaneously implements the information transmission and the energy harvesting by SWIPT technology with the power-splitting protocol. The achievable rate of the proposed system over the additive white Gaussian noise channels is analysed and further maximised by optimising the power-splitting factor. Furthermore, the expected rate of the proposed system over the slow-fading channels is analysed. Theoretical analysis and simulation results show that the achievable rate or expected rate of the SWIPT-based QF cooperation is obviously superior to that of the SWIPT-based amplify-and-forward or SWIPT-based decode-and-forward cooperation. Meanwhile, the SWIPT-based QF cooperation can achieve similar performance to the traditional QF cooperation when the external power supply at the relay is not provided.
The existence of link correlation has been empirically validated, and different exemplary works exploit the link correlation in the designing of various network protocols. In this work, the authors investigated the impact of this link correlation in contention mechanism of medium access control (MAC). They illustrated negative link correlation could deteriorate the contention mechanism designed to handle hidden terminal problems and, consequently, increase the packet collision rate between the neighbours. They also showed that negative link correlation could increase the chance of an exposed terminal problem. Therefore, ignoring negative link correlation could lead to overestimate overall network throughput and underestimate packet delay. Next, instead of designing a new contention mechanism exploiting the link correlation, they proposed a new routing tree which mitigates the negative effect of negative link correlation without altering the underlying MAC layer. They evaluated this routing tree on Indriya testbed with TelosB nodes and compared it to the minimum spanning tree based on link quality only. The results show improvement in end-to-end throughput and packet reception ratio at each node.
The vehicular ad hoc network (VANET) is a promising technology to improve the comfort and safety of passengers, roads and urban traffic. Applications applied to VANETs require efficient routing protocols. Urban environments include tunnels, subways, overpasses, and multilevel highways, which indicate the multilevel information environment and specific conditions of radio channel dissemination. In this paper proposed a three-dimensional (3D) evidence theory based, opportunistic routing protocol, called 3DEOR, which address the above issues using a new hybrid criterion called PAL. The PAL criterion includes three metrics of packet delivery probability to compensate for unreliable dissemination environments, packet advancement appropriated to 3D environments to reduce the number of hop counts and level to improve link connectivity. Prioritise the relay set members based on the new criteria to select the best relay node. In cases where there is no certainty, the evidence theory can be a good choice for combining the three metrics of the PAL criterion. The simulation results show the superiority of the proposed protocol over the 3D link state aware geographic opportunistic (3DLSGO) and 3D greedy perimeter stateless routing (3DGPSR) protocols in network performance indices such as packet delivery rate, end-to-end delay and average hop count.
Mobile ad hoc networks (MANETs) represent a class of important network models for supporting various critical applications, while the security breach due to eavesdropping attacks has been a critical issue. This study investigates the security issue of MANETs from the perspective of physical layer security (PLS). In particular, by combining PLS techniques [e.g. artificial noise (AN) injection and Secrecy Guard zoNe (SGN)] and the conventional Aloha protocol, the authors first propose an AN-based Aloha protocol and a SGN-based Aloha protocol to ensure secure medium access for legitimate transmitters. In the AN-based Aloha protocol, all potential transmitters are allowed to be active and each active transmitter injects AN into its transmitted signals to confuse eavesdroppers. In the SGN-based protocol, each potential transmitter has an SGN, a circle centred at itself, and only the potential transmitters whose SGN contains no eavesdroppers are allowed to be active. To understand the security performances of the proposed security-aware Aloha protocols, the authors then apply tools from Stochastic Geometry to analyse the secrecy transmission capacity (STC) performances of MANETs under both protocols. Finally, the authors provide simulation/numerical results to corroborate the proposed theoretical analysis and also to show the impacts of network parameters on the STC performances.
Research on underwater acoustic sensor networks has become a compelling field in recent years since resources on land are being depleted. Therefore, robust and efficient routing protocols are needed to ensure the reliability of message gathering and transmitting in underwater sensor networks. In the process of biological foraging in nature, creatures such as insects can find paths while adapting to dynamic environmental conditions through group cooperation, which provides a new perspective for research on routing protocols. In this study, the authors proposed an ant colony algorithm-based routing protocol (ACAR). In ACAR, the pheromone with a novel physical meaning and concentration changing mechanism is utilised to guide ants (path establishing packets) to the sink node. In addition, node depth information is used to decrease redundancy in the underwater environment. The routing process can be summarised in three parts: pheromone list setup, routing decision and damaged path repair. Simulation results, carried out on an underwater simulator based on NS-2, showed that ACAR outperforms other schemes with regards to network lifetime with a relatively better delivery ratio and latency in the proposed network scenarios.
A communication void is one of the most serious issues in any routing techniques. This issue occurs when a node does not have any forwarder node to forward the data packets towards the sink node or surface station. The presence of a void node affects the overall performance of routing techniques in terms of end-to-end delay, data loss, energy consumption, and so on. The primary objective of this work is to avoid the void region in underwater sensor networks (UWSNs). For the same purpose, this work introduces the void-hole avoidance routing algorithm for UWSNs. This work avoids horizontal transmission, which further reduces the end-to-end delay. The residual energy, depth, holding time, and distance from the sending node to the forwarding node and forwarding node to the surface station are used as a matrix to select the best forwarder node. The simulation has been done on MATLAB to analyse the performance of the proposed algorithm. The proposed routing algorithm attained better performance using the metrics, namely packet delivery delay, number of dead nodes, and energy tax with the values of 0.9147, 48, and 72.14 by varying the transmission range, and 0.9184, 38, and 71.12 by varying the network size, respectively.
Ever since the idea of buffers was incorporated in wireless communications, buffer-aided relaying has become an emerging breakthrough in the world of transmitting and receiving signals. Equipping the relays with buffers adds a new degree of freedom capable of enhancing numerous quality-of-service (QoS) metrics including throughput, outage probability, power efficiency and physical-layer security. The QoS enhancement is achieved by compromising the end-to-end delay that is inflicted by storing the packets in the relays' buffers until a suitable source–relay or relay–destination link is selected. In this context, the selection of a relay for transmission/reception is important since it governs the QoS-delay trade-off that can be contemplated. In this survey, the authors review and analyse various link selection protocols in buffer-aided relaying systems. These relaying strategies are categorised and contrasted according to their performance levels, limitations, applications, system model assumptions and complexity. Finally, they discuss current challenges, and highlight future research directions.
The authors consider the problem of multi-choice majority voting in a network of n agents where each agent initially selects a choice from a set of K possible choices. The agents try to infer the choice in the majority merely by performing local interactions. Extending the popular ‘Population Protocol’ framework for pairwise interactions between agents, in this study, they propose a new model called ‘Broadcasting Population Protocol’. In the proposed model, each agent broadcasts its messages in such a way that all its neighbours will receive the message simultaneously. They design two distributed algorithms for solving the multi-choice majority voting problem in this new model. They show that these algorithms return the correct output, i.e. the choice in the majority. They also analyse their performances in terms of time and message complexities. They establish via simulations that the proposed algorithms improve both time and message complexities significantly with respect to previous algorithms proposed in conventional population protocols, and they can be utilised in networks where messages can be transmitted to a subset of agents simultaneously, such as wireless networks.
In this paper, the problem of interference management is investigated in the downlink of multi-user multiple-input multiple-output two-hop interference channel under various scenarios of channel state information (CSI) and antenna correlation. Interference alignment (IA) in the space dimension is a powerful tool to solve this problem. Iterative IA algorithms are adopted in both the first and the second hops transmissions independently. After aligning interfering signals, the recovery of the transmitted signal vector is performed based on zero-forcing and semi-definite relaxation detectors. Furthermore, the impacts of the imperfect CSI and antenna correlation on sum-rate are investigated for decode-and-forward (DF) and amplify-and-forward relaying protocols. When the system is proper but IA is not completely feasible, the performance of minimum interference leakage (MIL) is compared with rank-constrained rank minimisation (RCRM) algorithm in DF protocol. RCRM algorithm is more sensitive to CSI such that the channel uncertainty easily leads to an increase in the interference matrix rank. According to the simulation results, for the case of perfect CSI, RCRM makes further interference-free dimensions which leads to better performance than MIL, but for the case of imperfect CSI, close performance is observed.
This study presents a theoretical model for polarisation manipulation using electronic polarisation controllers (EPCs) based on fibre squeezing. A method to calculate the EPC configuration in order to transform between two arbitrary states of polarisation (SOP) is presented. After, a technique to deterministically generate four SOPs for use in polarisation-encoded quantum communication systems is proposed. Moreover, the effectiveness of the proposed technique is experimentally assessed through the generation of two pairs of orthogonal SOPs. The experimental implementation used an field programmable gate array (FPGA) board to electrically control the four waveplates of the EPC, reaching a rate of 500 qubit/s. Results show that this polarisation generation process is intrinsically stable, demonstrating its potential for practical implementations of polarisation-encoding quantum key distribution systems using the BB84 and B92 protocols.
IEEE 802.15.4 has been widely accepted as the de facto standard for wireless sensor networks (WSNs). However, as in their current solutions for medium access control (MAC) sub-layer protocols, channel efficiency has a margin for improvement, in this study, the authors evaluate the IEEE 802.15.4 MAC sub-layer performance by proposing to use the request-/clear-to-send (RTS/CTS) combined with frame concatenation and block acknowledgement (BACK) mechanism to optimise the channel use. The proposed solutions are studied in a distributed scenario with single-destination and single-rate frame aggregation. The throughput and delay performance is mathematically derived under channel environments without/with transmission errors for both the chirp spread spectrum and direct sequence spread spectrum physical layers for the 2.4 GHz Industrial, Scientific and Medical band. Simulation results successfully verify the authors’ proposed analytical model. For more than seven TX (aggregated frames) all the MAC sub-layer protocols employing RTS/CTS with frame concatenation (including sensor BACK MAC) allow for optimising channel use in WSNs, corresponding to 18–74% improvement in the maximum average throughput and minimum average delay, together with 3.3–14.1% decrease in energy consumption.
The conventional carrier-sense multiple access/collision avoidance (CSMA/CA) IEEE 802.11 protocol uses the rigid binary exponential backoff algorithm of the distribution coordination function (DCF) for channel access. The protocol poorly performs under loss by wireless links with high packet error rates and dense networks with numerous collisions from hidden nodes. Furthermore, the scheme is not cognisant of the state of the wireless link in its operation. This work develops hybrid adaptive orthogonal frequency division multiple access (OFDMA) CSMA/CA (hybrid AO–CSMA/CA) protocol that adapts the backoff and congestion window size according to the knowledge of the wireless channel conditions to mitigate against the effects of the loss by wireless links. The protocol utilises OFDM for effective resource allocation and solving the problem of the hidden terminal node on an OFDMA IEEE 802.11-based wireless network. The teletraffic performance analysis of the developed protocol is investigated in terms of throughput and delay metrics on a real dynamic Markovian wireless channel. The performance results indicate that the developed hybrid protocols perform better than the DCF protocol on the lossy wireless communication links.
Designing a scalable and efficient application layer protocols for the Internet of Things (IoT) environment is an ongoing problem. The constrained application protocol (CoAP) offering RESTful services for IoT devices implements a simple congestion control mechanism. This study proposes and analyses the distance-based congestion control CoAP (DCC-CoAP) for the current state of the network and accordingly calculate the future flow rate to handle congestion. The authors’ main idea is to use the combination of distance between nodes and round trip time (RTT) measurements which limits the losses of CoAP messages, which is an efficient way to predict the network congestion. The user-defined options, i.e. retransmission counter and timestamp of sent and received CON and ACK messages are introduced for mapping CON to ACK and measure RTT. The comparative analysis of the DCC-CoAP with other congestion control mechanism like default CoAP, CoCoA+ is also highlighted in this study. With low additional computations, future RTT can be measured for avoiding congestion, and retransmission timeout varies with distance to avoid transaction losses. An algorithm with varying data rate has been used in homogeneous and mixed traffic to calculate the parameters in terms of packet delivery ratios, delay and retransmission count.
Software-defined networking (SDN) is an emerging technology of efficiently controlling and managing computer networks, such as in data centres, wide-area networks, as well as in ubiquitous communication. In this study, the authors explore the idea of embedding the SDN components, represented by SDN controller and virtual switch, in end-hosts to improve network performance. In particular, the authors consider load balancing across multiple network interfaces on end-hosts with different link capacity scenarios. The authors have explored and implemented different SDN-based load-balancing approaches based on OpenFlow software switches, and have demonstrated the feasibility and the potential of this approach. The proposed system has been evaluated with MultiPath transmission control protocol (MPTCP). The proposed results demonstrated the potential of applying the SDN concepts on multi-homed devices resulting in an increase in achieved throughput of 55% compared to the legacy single network approach and 10% compared to the MPTCP.
Channel selection is a challenging task in cognitive radio vehicular networks. Vehicles have to sense the channels periodically. Due to this, a lot of time is wasted which could have been utilised for transmission of data. Employing road side units (RSUs) in sensing can prove to be useful for this purpose. The RSUs may select the channel and allocate it to the vehicles on demand. However, this sensing should be proactive. RSUs should know in advance the channel to be allocated when requested. For this purpose, a deep reinforcement learning algorithm namely deep reinforcement learning based optimal channel selection is proposed in this study for training the network according to the previously sensed data. Proposed protocol is simulated and results are compared with the existing methods. The packet delivery ratio is increased by 2%, throughput is increased by 1.8%, average delay is decreased by 2% and primary user collision ratio is reduced by 3.2% when compared with similar recent work by varying number of vehicles. On the other hand, when compared with similar recent work by varying channel availability, the packet delivery ratio is increased by 4.5 %, throughput by 4.3%, average delay is decreased by 3% and PU collision ratio by 5.5%.
As the core of a blockchain system, the consensus mechanism not only helps to maintain the consistency of nodes' data but also gets involved in issuance of tokens and prevention of attacks. Since the first blockchain system was born in 2009, it has been continuously improved with the development of the blockchain technology and evolved into multiple new branches. Starting with the basic introduction of the consensus and the classic Byzantine Generals Problem in distributed computing area, this chapter proposes a thorough classification of current consensus protocols in blockchain system, enumerates the characteristics of mainstream protocols (proof-of-work (PoW), proof-of-stake (PoS), delegated PoS (DPoS), practical Byzantine fault tolerance (PBFT), etc.) and analyzes the strengths and weaknesses of them. Then we compare the performances of them from the number of nodes to the degree of scalability and other aspects. In the end, we introduce the incentive mechanism in the design of a consensus and summarize the future directions of developing more practical consensus schemes.
Despite the importance of cyber-security for networked control systems, no suitable cryptosystem exists for networked control systems that guarantees stability and has low computational complexity. This study proposes a novel dynamic ElGamal cryptosystem for encrypted control systems. The proposed cryptosystem is a multiplicative homomorphic cryptosystem, and it updates key pairs and ciphertexts by simple updating rules with modulo operations at every sampling period. Furthermore, the authors modify the proposed cryptosystem by using a dynamic encoder and decoder so that the asymptotic stability of the encrypted control systems is guaranteed. Numerical simulations demonstrate that the encrypted controller with the proposed cryptosystem achieves asymptotic stability while randomly updating key pairs and ciphertexts. The feasibility of the proposed encrypted control system is evaluated through regulation control with a positioning table testbed. The processing time of the proposed encrypted control system is on the order of milliseconds, indicating that the system achieves real-time control.