Intelligent and Cooperation Communication and Networking Technologies for IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 April 2020) | Viewed by 48552

Special Issue Editors


E-Mail Website
Guest Editor
1. School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
2. Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education, Beijing Jiaotong University, Beijing 100044, China
3. Collaborative Innovation Center of Railway Traffic Safety, Beijing Jiaotong University, Beijing 100044, China
4. National Engineering Research Center of Advanced Network Technologies, Beijing Jiaotong University, Beijing 100044, China
Interests: IoT; wireless cooperative networks; wireless powered networks; AI-based network optimization and network information theory
Special Issues, Collections and Topics in MDPI journals

E-Mail Website1 Website2
Guest Editor
Assistant Professor in the Department of Applied Science and Engineering at Thompson Rivers University (TRU), 805 TRU Way, Kamloops, BC V2C 0C8, Canada
Interests: cognitive radios; M2M communication; next generation wireless networks

Special Issue Information

IoT has great potential to be employed in various fields including industrial controlling; automatic driving; environmental monitoring; and medical protection, which plays a key role in supporting future smart cities. However, designing efficient IoT systems involves may challenges. For example, more and more sensors will be deployed in IoT systems for sensing and information collection, which will generate a huge amount of data. Such data is required to be transferred over IoT and processed as soon as possible for systems to make decisions. However, due to their limited energy and computing capabilities, it is difficult for sensors to fulfill reliable communications and computing. Besides, for large-scale IoT systems, optimally allocating the limited network sources such as time, frequency, power, and routing paths in order to improve system performances is not an easy task. Fortunately, the recent development of communication and networking technologies including energy harvesting, wireless power transfer, fog computing, cooperative communications, user cooperation, convex optimization, and artificial intelligence may provide efficient ways to help solve these problems. Motivated by these observations, this Special Issue aims to capture state-of-the-art advances in intelligent and cooperation communication and networking technologies for IoT and foster new avenues for research in this area. The topics of interest include, but are not limited to, the following:

  1. Energy harvesting-powered IoT;
  2. Fog computing and cloud computing for IoT;
  3. Cooperative communication and routing methods for IoT;
  4. Green IoT system design;
  5. Artificial intelligence-assisted IoT systems;
  6. Resource management in IoT systems;
  7. Self-organization technologies for IoT;
  8. Cognitive techniques for IoT;
  9. New Emerging Applications for IoT.

Dr. Waleed Ejaz
Prof. Dr. Ke Xiong
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT
  • Energy harvesting
  • Fog computing
  • Intelligence
  • Green IoT
  • Resource Management

Published Papers (14 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 11127 KiB  
Article
LoRaWAN Network for Fire Monitoring in Rural Environments
by Sandra Sendra, Laura García, Jaime Lloret, Ignacio Bosch and Roberto Vega-Rodríguez
Electronics 2020, 9(3), 531; https://doi.org/10.3390/electronics9030531 - 23 Mar 2020
Cited by 46 | Viewed by 8164
Abstract
The number of forest fires that occurred in recent years in different parts of the world is causing increased concern in the population, as the consequences of these fires expand beyond the destruction of the ecosystem. However, with the proliferation of the Internet [...] Read more.
The number of forest fires that occurred in recent years in different parts of the world is causing increased concern in the population, as the consequences of these fires expand beyond the destruction of the ecosystem. However, with the proliferation of the Internet of Things (IoT) industry, solutions for early fire detection should be developed. The assessment of the fire risk of an area and the communication of this fact to the population could reduce the number of fires originated by accident or due to the carelessness of the users. This paper presents a low-cost network based on Long Range (LoRa) technology to autonomously evaluate the level of fire risk and the presence of a forest fire in rural areas. The system is comprised of several LoRa nodes with sensors to measure the temperature, relative humidity, wind speed and CO2 of the environment. The data from the nodes is stored and processed in a The Things Network (TTN) server that sends the data to a website for the graphic visualization of the collected data. The system is tested in a real environment and, the results show that it is possible to cover a circular area of a radius of 4 km with a single gateway. Full article
Show Figures

Figure 1

18 pages, 23771 KiB  
Article
CaBIUs: Description of the Enhanced Wireless Campus Testbed of the Ionian University
by Aikaterini Georgia Alvanou, Alexandros Zervopoulos, Asterios Papamichail, Konstantinos Bezas, Spiridon Vergis, Andreana Stylidou, Athanasios Tsipis, Vasileios Komianos, Georgios Tsoumanis, George Koufoudakis and Konstantinos Oikonomou
Electronics 2020, 9(3), 454; https://doi.org/10.3390/electronics9030454 - 08 Mar 2020
Cited by 7 | Viewed by 3113
Abstract
Technological evolution and in particular the development of the Internet of Things (IoT) has paved the way for material prosperity and a better standard of living. A critical factor in the effectiveness of emerging IoT applications, which heavily rely on sensor information flow, [...] Read more.
Technological evolution and in particular the development of the Internet of Things (IoT) has paved the way for material prosperity and a better standard of living. A critical factor in the effectiveness of emerging IoT applications, which heavily rely on sensor information flow, is the development of a functional and efficient Wireless Sensor Network. Additionally, the levels of automation are conducive to usability and time efficiency by reducing the need for human intervention, as well as increasing the rate at which experiments can be carried out. In current work, an already installed infrastructure on the Ionian University campus is considered and enhanced, with the goal of elevating accessibility and user-friendliness, by designing a web platform. The presented platform enables the remote development, execution and monitoring of simple but necessary network-based algorithms using a custom language, without requiring code to be uploaded to remote nodes. As a proof of concept, three information dissemination algorithms are implemented and provided as example templates for users, promoting simultaneously ease of use. Full article
Show Figures

Figure 1

14 pages, 3452 KiB  
Article
Elastic Computing in the Fog on Internet of Things to Improve the Performance of Low Cost Nodes
by Rafael Fayos-Jordan, Santiago Felici-Castell, Jaume Segura-Garcia, Adolfo Pastor-Aparicio and Jesus Lopez-Ballester
Electronics 2019, 8(12), 1489; https://doi.org/10.3390/electronics8121489 - 06 Dec 2019
Cited by 7 | Viewed by 2579
Abstract
The Internet of Things (IoT) is a network widely used with the purpose of connecting almost everything, everywhere to the Internet. To cope with this goal, low cost nodes are being used; otherwise, it would be very expensive to expand so fast. These [...] Read more.
The Internet of Things (IoT) is a network widely used with the purpose of connecting almost everything, everywhere to the Internet. To cope with this goal, low cost nodes are being used; otherwise, it would be very expensive to expand so fast. These networks are set up with small distributed devices (nodes) that have a power supply, processing unit, memory, sensors, and wireless communications. In the market, we can find different alternatives for these devices, such as small board computers (SBCs), e.g., Raspberry Pi (RPi)), with different features. Usually these devices run a coarse version of a Linux operating system. Nevertheless, there are many scenarios that require enhanced computational power that these nodes alone are unable to provide. In this context, we need to introduce a kind of collaboration among the devices to overcome their constraints. We based our solution in a combination of clustering techniques (building a mesh network using their wireless capabilities); at the same time we try to orchestrate the resources in order to improve their processing capabilities in an elastic computing fashion. This paradigm is called fog computing on IoT. We propose in this paper the use of cloud computing technologies, such as Linux containers, based on Docker, and a container orchestration platform (COP) to run on the top of a cluster of these nodes, but adapted to the fog computing paradigm. Notice that these technologies are open source and developed for Linux operating system. As an example, in our results we show an IoT application for soundscape monitoring as a proof of concept that it will allow us to compare different alternatives in its design and implementation; in particular, with regard to the COP selection, between Docker Swarm and Kubernetes. We conclude that using and combining these techniques, we can improve the overall computation capabilities of these IoT nodes within a fog computing paradigm. Full article
Show Figures

Figure 1

14 pages, 419 KiB  
Article
Performance Analysis of IEEE 802.11p for Continuous Backoff Freezing in IoV
by Qiong Wu, Siyang Xia, Qiang Fan and Zhengquan Li
Electronics 2019, 8(12), 1404; https://doi.org/10.3390/electronics8121404 - 25 Nov 2019
Cited by 10 | Viewed by 2476
Abstract
With the rapid development of cloud computing and big data, traditional Vehicular Ad hoc Networks (VANETs) are evolving into the Internet of Vehicles (IoV). As an important communication technology in IoV, IEEE 802.11p protocols have been studied by many experts and scholars. In [...] Read more.
With the rapid development of cloud computing and big data, traditional Vehicular Ad hoc Networks (VANETs) are evolving into the Internet of Vehicles (IoV). As an important communication technology in IoV, IEEE 802.11p protocols have been studied by many experts and scholars. In IEEE 802.11p, a node’s backoff counter will be frozen when the channel is detected as busy. However, most studies did not consider the possibility of continuous backoff freezing when calculating delay. Thus, in this paper, we focus on the performance analysis of IEEE 802.11p for continuous backoff freezing. Specifically, we establish an analytical model to analyze the broadcast performance in the highway scene where vehicles can obtain traffic density from roadside units through Vehicle to Infrastructure (V2I) communications. We first calculate the relationship between vehicle density and the number of vehicles. Then, we derive the relationship between the number of vehicles and packet delay according to Markov chains. Next, we utilize the probability generating function (PGF) to transform traditional Markov chains into z domain under the situation of non-saturation. Finally, we employ the Mason formula to derive packet delay. As compared with the performance without considering the continuous backoff freezing, the simulation results have demonstrated that our analytical model is more reasonable. Full article
Show Figures

Figure 1

19 pages, 724 KiB  
Article
A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks
by Geetanjali Rathee, Farhan Ahmad, Chaker A. Kerrache and Muhammad Ajmal Azad
Electronics 2019, 8(11), 1299; https://doi.org/10.3390/electronics8111299 - 07 Nov 2019
Cited by 14 | Viewed by 2672
Abstract
Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant [...] Read more.
Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant bands/channels through the Cognitive Radio Network (CRN) cycle by executing its different phases, which are comprised of sensing, decision making, sharing (accessing) and hand-off (mobility). Among these phases, hand-off is the most critical phase as the CU needs to switch its current data transmissions to another available channel by recalling all the previous functions upon the emergence of a PU. Further, from the security perspective, a Malicious User (MU) may imitate the PU signal with the intention to never allow the CU to use its idle band, which ultimately degrades the overall network performance. Attacks such as the Cognitive User Emulation Attack (CUEA) and Primary User Emulation Attack (PUEA) may be encountered by the handoff procedure, which need to be resolved. To address this issue, a secure and trusted routing and handoff mechanism is proposed specifically for the CRN environment, where malicious devices are identified at the lower layers, thus prohibiting them from being part of the communication network. Further, at the network layer, users need to secure their data that are transmitted through various intermediate nodes. To ensure a secure handoff and routing mechanism, a Trust Analyser (TA) is introduced between the CU nodes and network layer. The TA maintains the record of all the communicating nodes at the network layer while also computing the rating and trust value of the Handoff Cognitive User (HCUs) using the Social Impact Theory Optimizer (SITO). The simulation results suggest that the proposed solution leads to 88% efficiency in terms of better throughput of CRN during data communication, the packet loss ratio, the packet delivery ratio and the maximum and average authentication delay and clearly outperforms the prevailing mechanisms in all the parameters. Full article
Show Figures

Figure 1

20 pages, 620 KiB  
Article
An Energy-Efficient and Fault-Tolerant Topology Control Game Algorithm for Wireless Sensor Network
by Yongwen Du, Jinzong Xia, Junhui Gong and Xiaohui Hu
Electronics 2019, 8(9), 1009; https://doi.org/10.3390/electronics8091009 - 09 Sep 2019
Cited by 19 | Viewed by 2590
Abstract
Due to resource constraints and severe conditions, wireless sensor networks should be self-adaptive to maintain certain desirable properties, such as energy efficiency and fault tolerance. In this paper, we design a practical utility function that can effectively balance transmit power, residual energy, and [...] Read more.
Due to resource constraints and severe conditions, wireless sensor networks should be self-adaptive to maintain certain desirable properties, such as energy efficiency and fault tolerance. In this paper, we design a practical utility function that can effectively balance transmit power, residual energy, and network connectivity, and then we investigate a topology control game model based on non-cooperative game theory. The theoretical analysis shows that the topology game model is a potential game and can converge to a state of the Nash equilibrium. Based on this model, an energy-efficient and fault-tolerant topology control game algorithm, EFTCG, is proposed to adaptively constructs a network topology. In turn, we present two subalgorithms: EFTCG-1 and EFTCG-2. The former just guarantees network single connectivity, but the latter can guarantee network biconnectivity. We evaluate the energy-efficient effect of EFTCG-1. Meanwhile, we also analyze the fault-tolerant performance of EFTCG-2. The simulation results verify the validity of the utility function. EFTCG-1 can efficiently prolong the network lifetime compared with other game-based algorithms, and EFTCG-2 performs better in robustness, although does not significantly reduce the network lifetime. Full article
Show Figures

Figure 1

31 pages, 6437 KiB  
Article
Dynamic Network Topology Control of Branch-Trimming Robot for Transmission Lines
by Man Wang, Gongping Wu, Fei Fan, Qiaoling Ji, Wenshan He and Qi Cao
Electronics 2019, 8(5), 549; https://doi.org/10.3390/electronics8050549 - 15 May 2019
Cited by 6 | Viewed by 3072
Abstract
With the development of engineering technology, the distributed design-based Branch-Trimming Robot (BTR) has been used to ensure the power supply security of transmission lines. However, it remains difficult to combine distributed BTRs with a wireless sensor network to build an efficient multi-robot system. [...] Read more.
With the development of engineering technology, the distributed design-based Branch-Trimming Robot (BTR) has been used to ensure the power supply security of transmission lines. However, it remains difficult to combine distributed BTRs with a wireless sensor network to build an efficient multi-robot system. To achieve this combination, a dynamic network topology control method was proposed, combining the motion characteristics of robots with the structure of a distributed wireless sensor network. In addition, a topology-updating mechanism based on node signal strength was adopted as well. To achieve efficient data transmission for distributed multi-robot systems, the present study focused on the design of a distributed network model and a dynamic network topology control strategy. Several simulation and test scenarios were implemented, and the changes of network performance under different parameters were studied. Furthermore, the real scene-based dynamic topology control method considers the relationship between network performance and antenna layout. Full article
Show Figures

Figure 1

21 pages, 975 KiB  
Article
AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks
by Weili Ge, Zhengyu Zhu, Wanming Hao, Yi Wang, Zhongyong Wang, Qiong Wu and Zheng Chu
Electronics 2019, 8(4), 459; https://doi.org/10.3390/electronics8040459 - 25 Apr 2019
Cited by 3 | Viewed by 2844
Abstract
In this paper, we investigate the physical layer security in a two-tier heterogeneous wireless sensor network (HWSN) depending on simultaneous wireless information and power transfer (SWIPT) approach for multiuser multiple-input multiple-output wiretap channels with artificial noise (AN) transmission, where a more general system [...] Read more.
In this paper, we investigate the physical layer security in a two-tier heterogeneous wireless sensor network (HWSN) depending on simultaneous wireless information and power transfer (SWIPT) approach for multiuser multiple-input multiple-output wiretap channels with artificial noise (AN) transmission, where a more general system framework of HWSN only includes a macrocell and a femtocell. For the sake of implementing security enhancement and green communications, the joint optimization problem of the secure beamforming vector at the macrocell and femtocell, the AN vector, and the power splitting ratio is modeled to maximize the minimal secrecy capacity of the wiretapped macrocell sensor nodes (M-SNs) while considering the fairness among multiple M-SNs. To reduce the performance loss of the rank relaxation from the SDR technique while solving the non-convex max–min program, we apply successive convex approximation (SCA) technique, first-order Taylor series expansion and sequential parametric convex approximation (SPCA) approach to transform the max–min program to a second order cone programming (SOCP) problem to iterate to a near-optimal solution. In addition, we propose a novel SCA-SPCA-based iterative algorithm while its convergence property is proved. The simulation shows that our SCA-SPCA-based method outperforms the conventional methods. Full article
Show Figures

Figure 1

22 pages, 10633 KiB  
Article
Resource Management Based on OCF for Device Self-Registration and Status Detection in IoT Networks
by Wenquan Jin and Dohyeun Kim
Electronics 2019, 8(3), 311; https://doi.org/10.3390/electronics8030311 - 11 Mar 2019
Cited by 11 | Viewed by 3721
Abstract
Recently, there are heterogeneous devices that connect to the Internet to provide ubiquitous and intelligent services based on sensors and actuators in the network of the Internet of Things (IoT). The resources of IoT represent the physical entities on the Internet to expose [...] Read more.
Recently, there are heterogeneous devices that connect to the Internet to provide ubiquitous and intelligent services based on sensors and actuators in the network of the Internet of Things (IoT). The resources of IoT represent the physical entities on the Internet to expose functions through services. Resource management is necessary to enable a massive amount of IoT-connected devices to be discoverable and accessible in the network of IoT. In this paper, we propose an IoT resource management to provide schemes of device self-registration and status detection for devices based on the Open Connectivity Foundation (OCF) standard. This device self-registration scheme is based on an agent that is proposed for registering devices itself which deployed in the OCF network. The devices host the OCF resources to provide IoT services such as sensing and controlling through the sensors and actuators. For a group of devices, an agent-based self-registration is proposed to register the resources. Through the proposed self-registration, the information of IoT devices is published using profile and saved in the management platform that enables the clients to discover the resources and access the services. For accessing the IoT resources in the OCF network, an interworking proxy is proposed to support the communications between web clients and devices over Hypertext Transfer Protocol (HTTP) and Constrained Application Protocol (CoAP) based on OCF. Furthermore, through the interoperability of the resources using the registered information, a real-time monitoring scheme is proposed based on periodic request and response for the status detection of deployed devices. Full article
Show Figures

Figure 1

13 pages, 1626 KiB  
Article
Resource Allocation in Wireless-Powered Mobile Edge Computing Systems for Internet of Things Applications
by Bingjie Liu, Haitao Xu and Xianwei Zhou
Electronics 2019, 8(2), 206; https://doi.org/10.3390/electronics8020206 - 12 Feb 2019
Cited by 14 | Viewed by 3298
Abstract
Wireless devices in Internet of Things (IoT) applications, such as wireless sensors and Radio Frequency Identifications (RFIDs), are faced with challenges of heavy computation tasks and limited energy, which can be solved by the importation of mobile edge computing (MEC) and wireless power [...] Read more.
Wireless devices in Internet of Things (IoT) applications, such as wireless sensors and Radio Frequency Identifications (RFIDs), are faced with challenges of heavy computation tasks and limited energy, which can be solved by the importation of mobile edge computing (MEC) and wireless power transfer (WPT) techniques. As MEC can effectively enhance computation capability, and the wireless power transfer can ensure a sustainable supply of energy, it has drawn significant research interest in IoT applications. In this paper, we will study the resource allocation problem in the wireless-powered MEC system for IoT applications with one access point (AP) and many other wireless devices, and propose a Stackelberg dynamic game model to obtain the optimal allocated resource for the nodes in the IoT environment. The AP is a wireless power source that can charge wireless devices based on wireless power transfer techniques. The AP is also integrated with a MEC server that can carry out computation tasks that offload from wireless devices. The wireless devices can use the harvested energy to execute and offload computation tasks to the AP. Based on the proposed game model, the AP and wireless devices can control their optimal transmit power for energy transfer, and computation tasks offloading to the AP, respectively. The numerical simulation results show the correctness and effectiveness of the proposed model. Full article
Show Figures

Figure 1

19 pages, 3598 KiB  
Article
Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT
by Qiong Wu, Hanxu Liu, Cui Zhang, Qiang Fan, Zhengquan Li and Kan Wang
Electronics 2019, 8(2), 148; https://doi.org/10.3390/electronics8020148 - 31 Jan 2019
Cited by 18 | Viewed by 2964
Abstract
With the proliferation of the Internet-of-Things (IoT), the users’ trajectory data containing privacy information in the IoT systems are easily exposed to the adversaries in continuous location-based services (LBSs) and trajectory publication. Existing trajectory protection schemes generate dummy trajectories without considering the user [...] Read more.
With the proliferation of the Internet-of-Things (IoT), the users’ trajectory data containing privacy information in the IoT systems are easily exposed to the adversaries in continuous location-based services (LBSs) and trajectory publication. Existing trajectory protection schemes generate dummy trajectories without considering the user mobility pattern accurately. This would cause that the adversaries can easily exclude the dummy trajectories according to the obtained geographic feature information. In this paper, the continuous location entropy and the trajectory entropy are defined based on the gravity mobility model to measure the level of trajectory protection. Then, two trajectory protection schemes are proposed based on the defined entropy metrics to protect the trajectory data in continuous LBSs and trajectory publication, respectively. Experimental results demonstrate that the proposed schemes have a higher level than the enhanced dummy-location selection (enhance-DLS) scheme and the random scheme. Full article
Show Figures

Figure 1

16 pages, 1425 KiB  
Article
Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT
by Li Xu, Jiaqi Chen, Ming Liu and Xiaoyi Wang
Electronics 2019, 8(2), 146; https://doi.org/10.3390/electronics8020146 - 31 Jan 2019
Cited by 7 | Viewed by 3876
Abstract
The increasing Internet-of-Things (IoT) applications will take a significant share of the services of the fifth generation mobile network (5G). However, IoT devices are vulnerable to security threats due to the limitation of their simple hardware and communication protocol. Massive multiple-input multiple-output (massive [...] Read more.
The increasing Internet-of-Things (IoT) applications will take a significant share of the services of the fifth generation mobile network (5G). However, IoT devices are vulnerable to security threats due to the limitation of their simple hardware and communication protocol. Massive multiple-input multiple-output (massive MIMO) is recognized as a promising technique to support massive connections of IoT devices, but it faces potential physical layer breaches. An active eavesdropper can compromises the communication security of massive MIMO systems by purposely contaminating the uplink pilots. According to the random matrix theory (RMT), the eigenvalue distribution of a large dimensional matrix composed of data samples converges to the limit spectrum distribution that can be characterized by matrix dimensions. With the assistance of RMT, we propose an active eavesdropping detection method in this paper. The theoretical limit spectrum distribution is exploited to determine the distribution range of the eigenvalues of a legitimate user signal. In addition the noise components are removed using the Marčenko–Pastur law of RMT. Hypothesis testing is then carried out to determine whether the spread range of eigenvalues is “normal” or not. Simulation results show that, compared with the classical Minimum Description Length (MDL)-based detection algorithm, the proposed method significantly improves active eavesdropping detection performance. Full article
Show Figures

Figure 1

12 pages, 375 KiB  
Article
Adaptive Method for Packet Loss Types in IoT: An Naive Bayes Distinguisher
by Yating Chen, Lingyun Lu, Xiaohan Yu and Xiang Li
Electronics 2019, 8(2), 134; https://doi.org/10.3390/electronics8020134 - 28 Jan 2019
Cited by 11 | Viewed by 3252
Abstract
With the rapid development of IoT (Internet of Things), massive data is delivered through trillions of interconnected smart devices. The heterogeneous networks trigger frequently the congestion and influence indirectly the application of IoT. The traditional TCP will highly possible to be reformed supporting [...] Read more.
With the rapid development of IoT (Internet of Things), massive data is delivered through trillions of interconnected smart devices. The heterogeneous networks trigger frequently the congestion and influence indirectly the application of IoT. The traditional TCP will highly possible to be reformed supporting the IoT. In this paper, we find the different characteristics of packet loss in hybrid wireless and wired channels, and develop a novel congestion control called NB-TCP (Naive Bayesian) in IoT. NB-TCP constructs a Naive Bayesian distinguisher model, which can capture the packet loss state and effectively classify the packet loss types from the wireless or the wired. More importantly, it cannot cause too much load on the network, but has fast classification speed, high accuracy and stability. Simulation results using NS2 show that NB-TCP achieves up to 0.95 classification accuracy and achieves good throughput, fairness and friendliness in the hybrid network. Full article
Show Figures

Figure 1

16 pages, 3168 KiB  
Article
Structure of All-Digital Frequency Synthesiser for IoT and IoV Applications
by Marijan Jurgo and Romualdas Navickas
Electronics 2019, 8(1), 29; https://doi.org/10.3390/electronics8010029 - 27 Dec 2018
Cited by 4 | Viewed by 3077
Abstract
In recent years number of Internet of Things (IoT) services and devices is growing and Internet of Vehicles (IoV) technologies are emerging. Multiband transceiver with high performance frequency synthesisers should be used to support a multitude of existing and developing wireless standards. In [...] Read more.
In recent years number of Internet of Things (IoT) services and devices is growing and Internet of Vehicles (IoV) technologies are emerging. Multiband transceiver with high performance frequency synthesisers should be used to support a multitude of existing and developing wireless standards. In this paper noise sources of an all-digital frequency synthesiser are discussed through s-domain model of frequency synthesisers, and the impact of noise induced by main blocks of synthesisers to the overall phase noise of frequency synthesisers is analysed. Requirements for time to digital converter (TDC), digitally controlled oscillator (DCO) and digital filter suitable for all-digital frequency synthesiser for IoT and IoV applications are defined. The structure of frequency synthesisers, which allows us to meet defined requirements, is presented. Its main parts are 2D Vernier TDC based on gated ring oscillators, which can achieve resolution close to 1 ps; multi core LC-tank DCO, whose tuning range is 4.3–5.4 GHz when two cores are used and phase noise is −116.4 dBc/Hz at 1 MHz offset from 5.44 GHz carrier; digital filter made of proportional and integral gain stages and additional infinite impulse response filter stages. Such a structure allows us to achieve a synthesiser’s in-band phase noise lower than −100 dBc/Hz, out-of-band phase noise equal to −134.0 dBc/Hz and allows us to set a synthesiser to type-I or type-II and change its order from first to sixth. Full article
Show Figures

Figure 1

Back to TopTop