Open AccessArticle
Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations
J. Sens. Actuator Netw. 2017, 6(2), 4; doi:10.3390/jsan6020004 -
Abstract
Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate
[...] Read more.
Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers. Full article
Figures

Figure 1

Open AccessArticle
Novel Adaptive Transmission Protocol for Mobile Sensors that Improves Energy Efficiency and Removes the Limitation of State Based Adaptive Power Control Protocol (SAPC)
J. Sens. Actuator Netw. 2017, 6(1), 3; doi:10.3390/jsan6010003 -
Abstract
In this paper, we have presented a novel transmission protocol which is suited for battery-powered sensors that are worn by a patient when under medical treatment, and allow constant monitoring of health indices. These body-wearable sensors log data from the patient and transmit
[...] Read more.
In this paper, we have presented a novel transmission protocol which is suited for battery-powered sensors that are worn by a patient when under medical treatment, and allow constant monitoring of health indices. These body-wearable sensors log data from the patient and transmit the data to a base-station or gateway, via a wireless link at specific intervals. The signal link quality varies because the distance between the patient and the gateway is not fixed. This may lead to packet drops that increase the energy consumption due to repeated retransmission. The proposed novel transmission power control protocol combines a state based adaptive power control (SAPC) algorithm and an intelligent adaptive drop-off algorithm, to track the changes in the link quality, in order to maintain an acceptable Packet success rate (PSR)(~99%). This removes the limitation of the SAPC by making the drop-off rate adaptive. Simulations were conducted to emulate a subject’s movement in different physical scenarios—an indoor office environment and an outdoor running track. The simulation results were validated through experiments in which the transmitter, together with the sensor mounted on the subject, and the subject themselves were made to move freely within the communicable range. Results showed that the proposed protocol performs at par with the best performing SAPC corresponding to a fixed drop-off rate value. Full article
Figures

Figure 1

Open AccessArticle
A Framework for Multiple Object Tracking in Underwater Acoustic MIMO Communication Channels
J. Sens. Actuator Netw. 2017, 6(1), 2; doi:10.3390/jsan6010002 -
Abstract
This work presents a computational framework for the analysis and design of large-scale algorithms utilized in the estimation of acoustic, doubly-dispersive, randomly time-variant, underwater communication channels. Channel estimation results are used, in turn, in the proposed framework for the development of efficient high
[...] Read more.
This work presents a computational framework for the analysis and design of large-scale algorithms utilized in the estimation of acoustic, doubly-dispersive, randomly time-variant, underwater communication channels. Channel estimation results are used, in turn, in the proposed framework for the development of efficient high performance algorithms, based on fast Fourier transformations, for the search, detection, estimation and tracking (SDET) of underwater moving objects through acoustic wavefront signal analysis techniques associated with real-time electronic surveillance and acoustic monitoring (eSAM) operations. Particular importance is given in this work to the estimation of the range and speed of deep underwater moving objects modeled as point targets. The work demonstrates how to use Kronecker products signal algebra (KSA), a branch of finite-dimensional tensor signal algebra, as a mathematical language for the formulation of novel variants of parallel orthogonal matching pursuit (POMP) algorithms, as well as a programming aid for mapping these algorithms to large-scale computational structures, using a modified Kuck’s paradigm for parallel computation. Full article
Figures

Figure 1

Open AccessEditorial
Acknowledgement to Reviewers of JSAN in 2016
J. Sens. Actuator Netw. 2017, 6(1), 1; doi:10.3390/jsan6010001 -
Abstract The editors of JSAN would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...] Full article
Open AccessArticle
Cloud-Enhanced Robotic System for Smart City Crowd Control
J. Sens. Actuator Netw. 2016, 5(4), 20; doi:10.3390/jsan5040020 -
Abstract
Cloud robotics in smart cities is an emerging paradigm that enables autonomous robotic agents to communicate and collaborate with a cloud computing infrastructure. It complements the Internet of Things (IoT) by creating an expanded network where robots offload data-intensive computation to the ubiquitous
[...] Read more.
Cloud robotics in smart cities is an emerging paradigm that enables autonomous robotic agents to communicate and collaborate with a cloud computing infrastructure. It complements the Internet of Things (IoT) by creating an expanded network where robots offload data-intensive computation to the ubiquitous cloud to ensure quality of service (QoS). However, offloading for robots is significantly complex due to their unique characteristics of mobility, skill-learning, data collection, and decision-making capabilities. In this paper, a generic cloud robotics framework is proposed to realize smart city vision while taking into consideration its various complexities. Specifically, we present an integrated framework for a crowd control system where cloud-enhanced robots are deployed to perform necessary tasks. The task offloading is formulated as a constrained optimization problem capable of handling any task flow that can be characterized by a Direct Acyclic Graph (DAG). We consider two scenarios of minimizing energy and time, respectively, and develop a genetic algorithm (GA)-based approach to identify the optimal task offloading decisions. The performance comparison with two benchmarks shows that our GA scheme achieves desired energy and time performance. We also show the adaptability of our algorithm by varying the values for bandwidth and movement. The results suggest their impact on offloading. Finally, we present a multi-task flow optimal path sequence problem that highlights how the robot can plan its task completion via movements that expend the minimum energy. This integrates path planning with offloading for robotics. To the best of our knowledge, this is the first attempt to evaluate cloud-based task offloading for a smart city crowd control system. Full article
Figures

Figure 1

Open AccessArticle
Reducing Side-Sweep Accidents with Vehicle-to-Vehicle Communication
J. Sens. Actuator Netw. 2016, 5(4), 19; doi:10.3390/jsan5040019 -
Abstract
Side-sweep accidents are one of the major causes of loss of life and property damage on highways. This type of accident is caused by a driver initiating a lane change while another vehicle is blocking the road in the target lane. In this
[...] Read more.
Side-sweep accidents are one of the major causes of loss of life and property damage on highways. This type of accident is caused by a driver initiating a lane change while another vehicle is blocking the road in the target lane. In this article, we are trying to quantify the degree to which different implementations of vehicle-to-vehicle (V2V) communication could reduce the occurrence of such accidents. We present the design of a simulator that takes into account common sources of lack of driver awareness such as blind-spots and lack of attention. Then, we study the impact of both traditional, non-technological communication means such as turning signals as well as unidirectional and bidirectional V2V communications. Full article
Figures

Figure 1

Open AccessArticle
Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols
J. Sens. Actuator Netw. 2016, 5(4), 18; doi:10.3390/jsan5040018 -
Abstract
Delay Tolerant Networking (DTN) is well suited to challenging environments, defined by the lack of reliable end-to-end communication paths to the destination. However, the available energy is not considered in the majority of existing DTN routing protocols when they make forwarding decisions. This
[...] Read more.
Delay Tolerant Networking (DTN) is well suited to challenging environments, defined by the lack of reliable end-to-end communication paths to the destination. However, the available energy is not considered in the majority of existing DTN routing protocols when they make forwarding decisions. This limits both delivery probabilities and the network lifetimes in energy-constrained applications. This paper investigates energy-aware routing protocols for wildlife tracking application to transmit data from attached sensors on the animal’s back to data collection base stations. We propose three new network protocol strategies to extend common DTN routing protocols, and consider the available energy to achieve efficient utilization of the node’s energy in transmission and sensing. These strategies enhance packet delivery rates up to 13% by carefully using the limited energy resources. We simulate two different animal tracking scenarios and show that the new strategies provide significant performance improvement under different scenarios. Full article
Figures

Figure 1

Open AccessArticle
Priority-Based Content Delivery in the Internet of Vehicles through Named Data Networking
J. Sens. Actuator Netw. 2016, 5(4), 17; doi:10.3390/jsan5040017 -
Abstract
Named Data Networking (NDN) has been recently proposed as a prominent solution for content delivery in the Internet of Vehicles (IoV), where cars equipped with a variety of wireless communication technologies exchange information aimed to support safety, traffic efficiency, monitoring and infotainment applications.
[...] Read more.
Named Data Networking (NDN) has been recently proposed as a prominent solution for content delivery in the Internet of Vehicles (IoV), where cars equipped with a variety of wireless communication technologies exchange information aimed to support safety, traffic efficiency, monitoring and infotainment applications. The main NDN tenets, i.e., name-based communication and in-network caching, perfectly fit the demands of time- and spatially-relevant content requested by vehicles regardless of their provenance. However, existing vehicular NDN solutions have not been targeted to wisely ensure prioritized traffic treatment based on the specific needs of heterogeneous IoV content types. In this work, we propose a holistic NDN solution that, according to the demands of data traffic codified in NDN content names, dynamically shapes the NDN forwarding decisions to ensure the appropriate prioritization. Specifically, our proposal first selects the outgoing interface(s) (i.e., 802.11, LTE) for NDN packets and then properly tunes the timing of the actual transmissions. Simulation results show that the proposed enhancements succeed in achieving differentiated traffic treatment, while keeping traffic load under control. Full article
Figures

Figure 1

Open AccessArticle
Design and Implementation of a CoAP-Compliant Solution for RFID Inclusion in the Internet of Things
J. Sens. Actuator Netw. 2016, 5(4), 16; doi:10.3390/jsan5040016 -
Abstract
Recent technological advancements allowed widening the applicability scope of the RFID (Radio Frequency Identification) technology from item identification to sensor-enabled computation platforms. This feature, added to the native radio energy-harvesting capability and the extremely low power consumption, has attracted the interest of research
[...] Read more.
Recent technological advancements allowed widening the applicability scope of the RFID (Radio Frequency Identification) technology from item identification to sensor-enabled computation platforms. This feature, added to the native radio energy-harvesting capability and the extremely low power consumption, has attracted the interest of research and industrial communities and pushed them to include the RFID technology into a global network of interconnected objects, as envisaged by the Internet of Things paradigm. In the last few years, standardization bodies have made significant efforts to design lightweight approaches, such as CoAP (Constrained Application Protocol), to efficiently manage resource-constrained nodes by using traditional web interfaces; nevertheless, RFID integration is not addressed yet. In this paper, we propose a CoAP-compliant solution where RFID tags, behaving as virtual CoAP servers, are directly accessible by remote CoAP clients via a reader, which acts as a CoAP proxy. A real testbed, addressing key aspects, such as tag addressing, discovery and management of CoAP requests via RFID operations, is deployed to validate the feasibility of the proposal. Experimental results show rapid response times: less than 60 ms are requested for resource retrieval, while from 80 to 360 ms for sending data to the RFID device, depending on the tag memory dimension. Full article
Figures

Figure 1

Open AccessArticle
FLEHAP: A Wind Powered Supply for Autonomous Sensor Nodes
J. Sens. Actuator Netw. 2016, 5(4), 15; doi:10.3390/jsan5040015 -
Abstract
The development of the Internet of Things infrastructure requires the deployment of millions of heterogeneous sensors embedded in the environment. The powering of these sensors cannot be done with wired connections, and the use of batteries is often impracticable. Energy harvesting is the
[...] Read more.
The development of the Internet of Things infrastructure requires the deployment of millions of heterogeneous sensors embedded in the environment. The powering of these sensors cannot be done with wired connections, and the use of batteries is often impracticable. Energy harvesting is the common proposed solution, and many devices have been developed for this purpose, using light, mechanical vibrations, and temperature differences as energetic sources. In this paper we present a novel energy-harvester device able to capture the kinetic energy from a fluid in motion and transform it in electrical energy. This device, named FLEHAP (FLuttering Energy Harvester for Autonomous Powering), is based on an aeroelastic effect, named fluttering, in which a totally passive airfoil shows large and regular self-sustained motions (limit cycle oscillations) even in extreme conditions (low Reynolds numbers), thanks to its peculiar mechanical configuration. This system shows, in some centimeter-sized configurations, an electrical conversion efficiency that exceeds 8% at low wind speed (3.5 m/s). By using a specialized electronic circuit, it is possible to store the electrical energy in a super capacitor, and so guarantee self-powering in such environmental conditions. Full article
Figures

Figure 1

Open AccessArticle
Querying on Federated Sensor Networks
J. Sens. Actuator Netw. 2016, 5(3), 14; doi:10.3390/jsan5030014 -
Abstract
A Federated Sensor Network (FSN) is a network of geographically distributed Wireless Sensor Networks (WSNs) called islands. For querying on an FSN, we introduce the Layered Federated Sensor Network (L-FSN) Protocol. For layered management, L-FSN provides communication among islands by its inter-island querying
[...] Read more.
A Federated Sensor Network (FSN) is a network of geographically distributed Wireless Sensor Networks (WSNs) called islands. For querying on an FSN, we introduce the Layered Federated Sensor Network (L-FSN) Protocol. For layered management, L-FSN provides communication among islands by its inter-island querying protocol by which a query packet routing path is determined according to some path selection policies. L-FSN allows autonomous management of each island by island-specific intra-island querying protocols that can be selected according to island properties. We evaluate the applicability of L-FSN and compare the L-FSN protocol with various querying protocols running on the flat federation model. Flat federation is a method to federate islands by running a single querying protocol on an entire FSN without distinguishing communication among and within islands. For flat federation, we select a querying protocol from geometrical, hierarchical cluster-based, hash-based, and tree-based WSN querying protocol categories. We found that a layered federation of islands by L-FSN increases the querying performance with respect to energy-efficiency, query resolving distance, and query resolving latency. Moreover, L-FSN’s flexibility of choosing intra-island querying protocols regarding the island size brings advantages on energy-efficiency and query resolving latency. Full article
Figures

Figure 1

Open AccessArticle
An Experimental Comparison of Radio Transceiver and Transceiver-Free Localization Methods
J. Sens. Actuator Netw. 2016, 5(3), 13; doi:10.3390/jsan5030013 -
Abstract
This paper presents an experimental performance assessment for localization systems using received signal strength (RSS) measurements from a wireless sensor network. In this experimental study, we compare two types of model-based localization methods: transceiver-based localization, which locates objects using RSS from transmitters to
[...] Read more.
This paper presents an experimental performance assessment for localization systems using received signal strength (RSS) measurements from a wireless sensor network. In this experimental study, we compare two types of model-based localization methods: transceiver-based localization, which locates objects using RSS from transmitters to receivers at known locations; and transceiver-free localization, which estimates location by using RSS changes on known-location nodes caused by objects. We evaluate their performance using three sets of experiments with different environmental conditions. Our performance analysis shows that transceiver-free localization methods are generally more accurate than transceiver-based localization methods for a wireless sensor network with high node density. Full article
Figures

Open AccessArticle
A Cooperative MAC Protocol for a M2M Heterogeneous Area Network
J. Sens. Actuator Netw. 2016, 5(3), 12; doi:10.3390/jsan5030012 -
Abstract
With the increasing demand of Machine to Machine (M2M) communications and Internet of Things (IoT) services it is necessary to develop a new network architecture and protocols to support cost effective, distributed computing systems. Generally, M2M and IoT applications serve a large number
[...] Read more.
With the increasing demand of Machine to Machine (M2M) communications and Internet of Things (IoT) services it is necessary to develop a new network architecture and protocols to support cost effective, distributed computing systems. Generally, M2M and IoT applications serve a large number of intelligent devices, such as sensors and actuators, which are distributed over large geographical areas. To deploy M2M communication and IoT sensor nodes in a cost-effective manner over a large geographical area, it is necessary to develop a new network architecture that is cost effective, as well as energy efficient. This paper presents an IEEE 802.11 and IEEE 802.15.4 standards-based heterogeneous network architecture to support M2M communication services over a wide geographical area. For the proposed heterogeneous network, we developed a new cooperative Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) medium access control (MAC) protocol to transmit packets using a shared channel in the 2.4 GHz ISM band. One of the key problems of the IEEE 802.11/802.15.4 heterogeneous network in a dense networking environment is the coexistence problem in which the two protocols interfere with each other causing performance degradation. This paper introduces a cooperative MAC protocol that utilizes a new signaling technique known as the Blank Burst (BB) to avoid the coexistence problem. The proposed MAC protocol improves the network QoS of M2M area networks. The developed network architecture offers significant energy efficiency, and operational expenditure (OPEX) and capital expenditure (CAPEX) advantages over 3G/4G cellular standards-based wide area networks. Full article
Figures

Figure 1

Open AccessArticle
Novel Simulation Approaches for Smart Grids
J. Sens. Actuator Netw. 2016, 5(3), 11; doi:10.3390/jsan5030011 -
Abstract
The complexity of the power grid, in conjunction with the ever increasing demand for electricity, creates the need for efficient analysis and control of the power system. The evolution of the legacy system towards the new smart grid intensifies this need due to
[...] Read more.
The complexity of the power grid, in conjunction with the ever increasing demand for electricity, creates the need for efficient analysis and control of the power system. The evolution of the legacy system towards the new smart grid intensifies this need due to the large number of sensors and actuators that must be monitored and controlled, the new types of distributed energy sources that need to be integrated and the new types of loads that must be supported. At the same time, integration of human-activity awareness into the smart grid is emerging and this will allow the system to monitor, share and manage information and actions on the business, as well as the real world. In this context, modeling and simulation is an invaluable tool for system behavior analysis, energy consumption estimation and future state prediction. In this paper, we review current smart grid simulators and approaches for building and user behavior modeling, and present a federated smart grid simulation framework, in which building, control and user behavior modeling and simulation are decoupled from power or network simulators and implemented as discrete components. This framework enables evaluation of the interactions between the communication infrastructure and the power system taking into account the human activities, which are at the focus of emerging energy-related applications that aim to shape user behavior. Validation of the key functionality of the proposed framework is also presented. Full article
Figures

Figure 1

Open AccessArticle
A Privacy-by-Design Contextual Suggestion System for Tourism
J. Sens. Actuator Netw. 2016, 5(2), 10; doi:10.3390/jsan5020010 -
Abstract
We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of
[...] Read more.
We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of modern smart devices to offer high quality personalized POI (point of interest) recommendations. To protect user privacy, we apply a privacy by design approach within all of the steps of creating Pythia. The outcome is a system that comprises important architectural and operational innovations. The system is designed to process sensitive personal data, such as location traces, browsing history and web searches (query logs), to automatically infer user preferences and build corresponding POI-based user profiles. These profiles are then used by a contextual suggestion engine to anticipate user choices and make POI recommendations for tourists. Privacy leaks are minimized by implementing an important part of the system functionality at the user side, either as a mobile app or as a client-side web application, and by taking additional precautions, like data generalization, wherever necessary. As a proof of concept, we present a prototype that implements the aforementioned mechanisms on the Android platform accompanied with certain web applications. Even though the current prototype focuses only on location data, the results from the evaluation of the contextual suggestion algorithms and the user experience feedback from volunteers who used the prototype are very positive. Full article
Open AccessArticle
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids
J. Sens. Actuator Netw. 2016, 5(2), 9; doi:10.3390/jsan5020009 -
Abstract
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP) domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM) with the ESP.
[...] Read more.
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP) domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM) with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home) and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time. Full article
Open AccessArticle
Data Dissemination in Mobile Social Networks with the Acknowledgment Feedback
J. Sens. Actuator Netw. 2016, 5(2), 8; doi:10.3390/jsan5020008 -
Abstract
Most existing dissemination schemes in Mobile Social Networks (MSNs) only consider the data dissemination. However, there are two types of messages: data and the control message (i.e., acknowledgment) in MSNs, and receiving acknowledgment is very important in many applications (e.g., the
[...] Read more.
Most existing dissemination schemes in Mobile Social Networks (MSNs) only consider the data dissemination. However, there are two types of messages: data and the control message (i.e., acknowledgment) in MSNs, and receiving acknowledgment is very important in many applications (e.g., the mobile trade and the incentive mechanism). In order to maximize the desired message delivery ratio, we have to identify the priority of each message in the network during the limited contact opportunity. Therefore, we propose a generic priority-based compare-split routing scheme, which proves to be the optimal buffer exchange strategy. During each contact opportunity, relays compare their forwarding abilities to different destinations based on two types of criteria: the contact probability and the social status. Ideally, each relay keeps the messages whose destinations meet the current relay frequently. Then, an adaptive priority-based exchange scheme, which considers the priority within each type of messages and the relative priority between two types of messages, is proposed to exchange the most benefit messages. The effectiveness of our scheme is verified through extensive simulations in synthetic and real traces. Full article
Open AccessArticle
Business Model Design and Architecture for the Internet of Everything
J. Sens. Actuator Netw. 2016, 5(2), 7; doi:10.3390/jsan5020007 -
Abstract
Smart devices and cyber-physical systems, which are interconnected to IT systems and services, form the basis for the arising Internet of Everything, opening up new economic opportunities for its participants and users beyond its technological aspects and challenges. While today’s e-business scenarios are
[...] Read more.
Smart devices and cyber-physical systems, which are interconnected to IT systems and services, form the basis for the arising Internet of Everything, opening up new economic opportunities for its participants and users beyond its technological aspects and challenges. While today’s e-business scenarios are mostly dominated by a few centralized online platforms, future business models, which will be feasible for the Internet of Everything, need to address special requirements. Such business models, e.g., leveraging the possibilities of smart cities, need to cope with arbitrary combinations of products and services orchestrated into complex products in a highly distributed and dynamic environment. Furthermore, these arbitrary combinations are influenced by real-time context information derived from sensor networks or IT systems, as well as the users’ requirements and preferences. The complexity of finding the optimal product/service combination overstrains users and leads to decisions according to the principle of adverse selection (i.e., choosing good enough instead of optimal). Such e-business models require an appropriate underlying value generation architecture that supports users in this process. In this paper, we develop a business model that addresses these problems. In addition, we present the Distributed Market Spaces (DMS) software-system architecture as a possible implementation, which enables the aforementioned decentralized and context-centric e-business scenario and leverages the commercial possibilities of smart cities. Full article
Figures

Open AccessArticle
Routing Protocols for Delay Tolerant Networks: A Reference Architecture and a Thorough Quantitative Evaluation
J. Sens. Actuator Netw. 2016, 5(2), 6; doi:10.3390/jsan5020006 -
Abstract
In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements
[...] Read more.
In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements of our reference architecture: queue management, forwarding and replication. Queue management orders and manages the messages in the node’s buffer; forwarding selects the messages to be delivered when there is a contact; and finally, replication bounds the number of replicas in the network. Contrary to most previous papers, where either only qualitative comparisons have been presented or only a single category of protocols has been analyzed, in our work, we discuss the results of our experimental activity on many of the DTN protocols in the literature. Our results, which have been obtained both using synthetic and real mobility traces, show that an effective combination of the proposed techniques can significantly improve the performance of the protocols in terms of delivery ratio, overhead and delay. Full article
Figures

Open AccessArticle
Dealing with Data Quality in Smart Home Environments—Lessons Learned from a Smart Grid Pilot
J. Sens. Actuator Netw. 2016, 5(1), 5; doi:10.3390/jsan5010005 -
Abstract
Over the last years, we have witnessed increasing interconnection between the physical and digital world. The so called Internet of Things (IoT) is becoming more and more a reality in application domains like manufacturing, mobile computing, transportation, and many others. However, despite promising
[...] Read more.
Over the last years, we have witnessed increasing interconnection between the physical and digital world. The so called Internet of Things (IoT) is becoming more and more a reality in application domains like manufacturing, mobile computing, transportation, and many others. However, despite promising huge potential, the application domain of smart homes is still at its infancy and lags behind other fields of IoT. A deeper understanding of this type of techno-human system is required to make this vision a reality. In this paper, we report findings from a three year pilot that sheds light on the challenges of leveraging IoT technology in the home environment. In particular, we provide details on data quality issues in real-world deployments. That is, we analyze application level data for errors in measurements as well as issues in the end-to-end communication. Understanding what data errors to expect is crucial for understanding the smart building domain and paramount for building successful applications. With our work, we provide insights in a domain of IoT that has tremendous growth potential and help researchers as well as practitioners to better account for the data characteristics of smart homes. Full article